Abstract:
A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective.
Abstract:
A method (and system) for managing a distributed-memory parallel application running on multiple servers, includes dynamically moving a plurality of executable program components, where each of the plurality of executable program components are running on one of a plurality of virtual machines, using migration of the virtual machines between physical servers. The load balancing is operated based on a workload of each of the virtual machines and servers, where a virtual machine, or a plurality of virtual machines, are transferred to balance the workload between each of the servers.
Abstract:
A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The monitoring agent monitors performance of the multiple virtual computing devices. The method measures simple operating characteristics of only a base level virtual computing device. The method monitors complex operating characteristics using the monitoring agent by: measuring the complex operating characteristics for each of the multiple virtual computing devices (using each of the multiple virtual computing devices); recording the complex operating characteristics of each of the multiple virtual computing devices on a corresponding memory page of each of the multiple virtual computing devices; and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics and outputs the simple events and the complex events for each of the multiple virtual computing devices.
Abstract:
A method of estimating a transit demand graph includes collecting conditional information that includes at least one condition that when satisfied converts at least one non-rider into a rider, generating a non-rider transit demand graph by satisfying one of the conditions, and generating a normalized transit demand graph from the non-rider transit demand graph and a rider transit demand graph. The riders use public transit and the non-riders do not use public transit. The non-rider transit demand graph shows the demand of the non-riders for a public transit route. The rider transit demand graph shows the demand of riders for the same public transit route.
Abstract:
A method of deploying a software application on the Internet cloud that is failure-tolerant includes identifying those aspects of a software application that need to be persisted in the event of failure, and those aspects of the application that do not need to be persisted, and deploying the application where aspects that need to be persisted are deployed to persistent storage and aspects that aspects that do not need to be persisted are deployed ton non-persistent virtual partitions, where when a virtual partition or an application component fails, an instance of the application is recreatable from those application aspects that were deployed to persistent storage.
Abstract:
Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated.
Abstract:
A method of securely deploying a software application in the Internet cloud including identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data, deploying the secure data on one or more secure servers that are not publicly accessible over the Internet, and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, where communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results.
Abstract:
Data representative of a set of requests for cloud computing services is obtained. The services are to be provided by a cloud having a plurality of base images. The requests specify requested subsets of the base images. Data representative of provisioning and de-provisioning costs associated with the plurality of base images is obtained. Then, k composite virtual appliances are pre-provisioned. The composite virtual appliances include virtual appliance subsets of the base images, based on cost minimization, in accordance with the data representative of the set of requests and the data representative of the provisioning and de-provisioning costs.
Abstract:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
Abstract:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system.