摘要:
Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated.
摘要:
A method of securely deploying a software application in the Internet cloud including identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data, deploying the secure data on one or more secure servers that are not publicly accessible over the Internet, and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, where communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results.
摘要:
Data representative of a set of requests for cloud computing services is obtained. The services are to be provided by a cloud having a plurality of base images. The requests specify requested subsets of the base images. Data representative of provisioning and de-provisioning costs associated with the plurality of base images is obtained. Then, k composite virtual appliances are pre-provisioned. The composite virtual appliances include virtual appliance subsets of the base images, based on cost minimization, in accordance with the data representative of the set of requests and the data representative of the provisioning and de-provisioning costs.
摘要:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system.
摘要:
An illustrative embodiment includes a method for use with a computing system comprising a first computer coupled to one or more additional computers, wherein each of the one or more additional computers manages a respective set of one or more virtualized computing resources, and wherein the first computer manages the one or more additional computers. The method includes the steps of determining an assignment of at least one application to at least one of: (i) the first computer; and (ii) at least one of the one or more additional computers; and responsive to a detected condition, changing the assignment of the at least one application to the at least one of: (i) the first computer; and (ii) the at least one of the one or more additional computers.
摘要:
A method and system for ensuring the authenticity of server returned information displayed at a client browser is provided. The method comprises receiving the server returned information at a client computer; storing a copy of the server returned information at the client computer; inspecting the server returned information for one or more locked objects; allowing the client browser to operate one or more client installed scripts; inspecting the server returned information for any modifications to the one or more locked objects; and in response to determining that the one or more client installed scripts have made modifications to the one or more locked objects, replacing the modified locked objects with unmodified versions of the locked objects from the stored copy of the server returned information.
摘要:
A method, and system employing the method, initiates proactive maintenance of computer systems and/or devices in a computer network. The method determines the subsystems of the computers and network devices and analyzes their configuration data including their respective subsystems. The method generates maintenance characteristics for the devices, and determines a maintenance event for devices using the maintenance characteristics and the configuration data of the devices. The method initiates a maintenance solution of a device determined to have a problematic configuration.
摘要:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, a mechanism for improving connection establishment in a system utilizing an offload network adapter is provided. The connection establishment mechanism provides the ability to offload connection establishment and maintenance of connection state information to the offload network adapter. As a result of this offloading of connection establishment and state information maintenance, the number of communications needed between the host system and the offload network adapter may be reduced. In addition, offloading of these functions to the offload network adapter permits bulk notification of established connections and state information to the host system rather than piecemeal notifications as is present in known computing systems.
摘要:
A plurality of master desktop images for a plurality of users are stored at a plurality of geographically diverse data centers. At a first one of the data centers, a virtual desktop is constructed for a remote client. The virtual desktop is constructed from a given one of the master desktop images at the first one of the data centers and an individualized delta image for a user associated with the remote client. When it is determined that the remote client is at a geographical location wherein the first one of the data centers is not the closest one of the data centers to the remote client, the virtual desktop for the remote client is reconstructed at a second, closest, one of the data centers. The virtual desktop is reconstructed from a given one of the master desktop images at the second one of the data centers and the individualized delta image for the user associated with the remote client. A copy of the individualized delta image is moved from the first one of the data centers to the second one of the data centers to facilitate reconstructing the virtual desktop.