Abstract:
A towed system for underwater electromagnetic prospecting for use with a seaward vessel is provided. The towed system comprises a first portion, a second portion, and a tow cable. The first portion is located on the vessel and includes a controller and a power supply system. The second towed portion is for submersion in the water and transmits an electromagnetic waveform and receives a corresponding electromagnetic signal. The tow cable connects the first portion with the second portion. The tow cable includes at least a pair of suitable conductors for delivering to the second portion a power signal generated by the first portion and at least one optical fiber for carrying data communications between the first portion and the second portion. The transmitted and received signals are digitized and this information is sent digitally to the controller in the first portion.
Abstract:
Sizing an infrastructure configuration optimized for a workload mix includes: a) instructing a virtualized-aware testing service (VATS) test controller to perform a test of an initial infrastructure configuration in a virtualized environment, in which the test provides at least one test result; b) determining whether the at least one test result satisfies a predetermined requirement as identified in the workload mix; c) modifying at least one parameter of the initial infrastructure configuration to create a modified infrastructure configuration in response to the at least one test result failing to satisfy the predetermined requirement; d) instructing the VATS test controller to perform another test on the modified infrastructure configuration to generate another at least one test result; e) repeating steps b)-d) until a final infrastructure configuration that causes the another at least one test result to satisfy the predetermined requirement is identified; and f) outputting the final infrastructure configuration.
Abstract:
A volume management system (300) in a cloud computing environment is disclosed. The volume management system (300) is useable by a plurality of users (301-1 . . . 301-N) and is configured to allow a user to create and manage volumes (304, 305, 306) and to allow said volumes to be attached to virtual machines created in said cloud computing environment wherein a record of each volume created is stored in a structured hierarchical directory. A method of managing volumes in a cloud computing environment and a volume management cell for managing volumes in a cloud computing environment are also disclosed.
Abstract:
Sizing an infrastructure configuration optimized for a workload mix includes: receiving the workload mix; identifying demand estimates for the one or more predefined benchmarks; applying a predictive model to identify an initial infrastructure configuration having a size anticipated to meet the demand estimates; instructing a virtualized-aware testing service (VATS) test controller to perform a test of the initial infrastructure configuration in a virtualized environment, where performance of the test generates at least one test result; determining whether the at least one test result satisfies a predetermined requirement as identified in the workload mix; and outputting the determination of whether the at least one test result satisfies the predetermined requirement.
Abstract:
Sizing an infrastructure configuration optimized for a workload mix includes: a) instructing a virtualized-aware testing service (VATS) test controller to perform a test of an initial infrastructure configuration in a virtualized environment, in which the test provides at least one test result; b) determining whether the at least one test result satisfies a predetermined requirement as identified in the workload mix; c) modifying at least one parameter of the initial infrastructure configuration to create a modified infrastructure configuration in response to the at least one test result failing to satisfy the predetermined requirement; d) instructing the VATS test controller to perform another test on the modified infrastructure configuration to generate another at least one test result; e) repeating steps b)-d) until a final infrastructure configuration that causes the another at least one test result to satisfy the predetermined requirement is identified; and f) outputting the final infrastructure configuration.
Abstract:
A patient subjected to laryngectomy is provided surgically with a fistula intended to serve as a pseudo-glottis, and a tracheostome, these two tracts being sited in the midline region of the neck surface. A laryngeal prosthesis for the patient is of generally symmetrical form comprising a hollowed main body with two external tubes to respectively engage the surgically-formed tracts, the fistular tube being sufficiently short to avoid inhibiting the pseudo-glottis function. The prosthesis body is apertured to provide a valve function communicating the tracheal tube with atmosphere for respiration, or with the fistular tube for phonation. This function can be effected by a normally-open flap valve closable by a first high pressure in the body, and a normally-closed blow-out valve may then be appropriate to open at second higher pressure to remove secretions, together with a further normally-open valve to close the fistular tube at the higher pressure. Also, a non-return valve is normally appropriate in the fistular tube, and this, or a similar valve, can serve as a tone generator if necessary.
Abstract:
Management of heterogeneous data sources is described. In accordance with an embodiment method, a plurality of heterogeneous data sources is identified (410). The plurality of heterogeneous data sources can represent static data sources and management data streams received from servers for network management. The data sources can be encapsulated into data source containers (420). Each data source container can encapsulate a separate data source and can be mapped into an interdependent source graph (430). The interdependent source graph can include object links between the data source containers, the object links representing relationships existing between the data source containers. The interdependent source graph can be queried by traversing the interdependent source graph using data source container relationships to obtain management information about at least one of the data sources (440). Management information obtained while querying can be rendered to a management program on the management server to provide a unified view of the management information (450).
Abstract:
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated and have their own management entities. An interface between infrastructures allows controlled relaxation of the isolation, using a gateway between virtual nets, or shared virtual storage devices. This can allow businesses to share data or applications, while maintaining control of security.
Abstract:
A system for automated lifecycle management of a computer implemented service, according to requirements, having a service model (30) representing the service at a given development state in the lifecycle, and a transition model (70) representing allowed operations to change the service model to a different one of the development states of the service, according to the requirements, and the transition model having a transparent structure suitable for automated inspection of the allowed operations, and suitable for automated adaptation of the allowed operations. The service model can be developed to another of its states of development according to the transition model. This can help facilitate more automation of the service development than for example code in a closed and fixed form such as for example a compiled program for altering the service model. This in turn can enable more complex services to be developed, or reduce development costs.
Abstract:
A method of automated deployment managed by a service provider, of a computer based business process, involves generating a model (730) of the business process including a design of computing infrastructure, and deploying the model on hardware (770) dedicated to the enterprise, with an interface for the service provider to enable ongoing management of the deployed process by the service provider. Having dedicated hardware means the location of the hardware can be arranged to suit the enterprise. This means limitations such as bandwidth or latency of WAN links, can be addressed by choosing the location of the dedicated hardware appropriately. Trust of security can also be increased compared to that of the shared data centres. The automated model driven deployment can help enable the service provider to provide such deployments on different types of hardware. The need for the enterprise to maintain specialist expertise in house is reduced.