摘要:
Implementation of resource management services is provided. A method includes setting a price, per unit of a resource, for a defined time period and based upon a collective projected resource demand corresponding to resource consumption entities (RCEs). For the duration of the time period, the method includes iteratively performing: monitoring actual usage of the resource for each of the RCEs. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and a projected surplus exists for another RCE, the method includes re-allocating a number of projected surplus units of the resource from the RCE having the projected surplus to the other RCE having the projected shortage. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and no projected surplus exists for any of the other RCEs, the method includes acquiring additional units of the resource.
摘要:
Embodiments of the present invention provide an approach for dynamically relocating a set of workloads among geographic regions of a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, it is determined whether a first geographic region of the networked computing environment has a first set of computing resources with an available capacity that meets a needed capacity for handling a set of workloads that is initially associated with the first geographic region. If not, a second geographic region of the networked computing environment having a second set of computing resources with the needed capacity is identified. In general, this determination can be made based upon multiple factors such as: a set of performance requirements, stored in at least one computer data structure, needed to handle the set of workloads; a set of environmental parameters, stored in the at least one computer data structure, having a potential to affect the handling of the set of workloads; and/or a set of cost parameters, stored in the at least one computer data structure, associated with handling the set of workloads. Once the second geographic region has been identified, the set of workloads can be associated with and handled thereby.
摘要:
Embodiments of the present invention provide an approach for predictively migrating data between network computing environments (e.g., cloud computing environments). Specifically, in a typical embodiment, data access patterns for sets of data utilized by a set of services running in a first networked computing environment may be analyzed. Based on the analysis one or more of the sets of data may be identified as candidates to be migrated from the first networked computing environment to a second networked computing environment. Then, a data migration protocol for the one or more sets of data to be migrated to the second networked computing environment may be generated based on the data access patterns and a predicted data migration time. Based on the data migration protocol, the one or more sets of data may then be migrated to the second networked computing environment.
摘要:
In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.
摘要:
Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity.
摘要:
The present invention provides an approach for dynamically acquiring computing resources in a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, a set of computing resources (needed to process a set of workloads) external to a first portion of a networked computing environment is identified. Once identified, electronic negotiations with at least one provider of the set of computing resources may be held for utilizing the provider's set of computing resources to process the set of workloads. In general, the negotiations are based on at least one resource registration (setting forth terms for utilizing the set of computing resources such as usage rates, usage limitations, etc.) associated with the at least one provider stored in at least one computer data structure. Responsive to successful completion of the negotiations, the set of computing resources will be associated with the first portion.
摘要:
Provided is an approach for credit transaction authorization/approval. Specifically, a particular transaction payment device/mechanism (e.g., credit card, etc.) may be associated with a set of purchase authorization criteria/rules that sets forth specific conditions (e.g., an authorization protocol) under which the transaction payment device may be utilized. When a user later attempts to conduct a proposed credit transaction using the transaction payment device, it will be determined whether the proposed credit transaction complies with this set of purchase authorization criteria (e.g., the authorization protocol). Based on this determination, the proposed credit transaction can be approved or declined.
摘要:
In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.
摘要:
A proxy-based digital video recording system and method, including receiving a request to record a video program from a requesting user and transmitting a request for the video program over a network to a first provider server. The requested video program is received and stored in memory according to a first provider format. A digital video format of a digital video recorder associated with the requesting user is determined, the stored video program is converted from the first provider format to the digital video format, and the converted video program is transmitted to the digital video recorder.
摘要:
Embodiments of the present invention relate to the migration of virtual machines (VMs) between networked computing environments (e.g., cloud computing environments) based on resource utilization. Specifically, embodiments of the present invention provide an approach to select an optimal set (one or more) of VMs as candidates for pre-staged migration. In a typical embodiment, when a first cloud environment nears physical resource capacity, an optimal set of VMs will be identified for migration to a second cloud environment that has sufficient capacity to accommodate workload(s) from the first cloud environment. To make this process more efficient, data associated with the set of virtual machines may be “pre-stage” replicated from the first cloud environment to the second cloud environment (e.g., in advance of the migration of the identified set of VMs).