Abstract:
A system and method for information technology (IT) migration includes determining a relationship among objects to be migrated such that the relationship includes a set of objects having at least one of a common feature or dependency between the objects in the set. The objects are grouped into a plurality of migration waves such that cross-wave relationships are minimized among the plurality of migration waves. The objects are migrated wave by wave.
Abstract:
Data characterizing a source computing environment having at least one hardware resource and at least one workload is obtained, as is a specification of a target computing environment to which the at least one workload is to be migrated in a migration. Based on the data characterizing the source computing environment and the specification of the target computing environment, the migration is categorized into one of a plurality of categories; and the migration is specified in accordance with a migration technique selected based on the categorizing step. Techniques to identify suitable migration candidates are also provided.
Abstract:
Techniques for unstacking software components are provided. The techniques include discovering a plurality of software components and one or more dependencies between the software components in a computer system, designing a plurality of unstacking options for unstacking said components, and selecting one of said unstacking options to unstack said components.
Abstract:
A method for rule compliance situation checking is provided. The method in one aspect, includes the steps of: a) building a rule model for predefined rules and building a business operational model for business processes; b) normalizing vocabularies in the rule model and the business operational model; c) checking whether the rule model is satisfied by the business operational model; and d) outputting a report on checking results. The present invention also provides a corresponding system for rule compliance checking. The rule compliance checking of the present invention allows users to perform fast and effective automatic checking of rule compliance, avoid interference of man-made factors in checking process to a great extent and thus guarantee veracity of checking results.
Abstract:
Provides methods, apparatus and systems for determining an applicable policy for an incoming message having a service-level addressing element. A method includes the following steps: a) applying a potentially applicable policy (P1) on the incoming message to make the service-level addressing element of the incoming message visible, b) if the service-level addressing element of the incoming message gets visible and is the one to which the currently applied policy (P1) is associated, the currently applied policy (P1) is determined to be the applicable policy, and if not associated c) repeating steps a) and b) with a further potentially applicable policy (P2 . . . Pn).
Abstract:
A method is presented for obtaining information from a client for the benefit of a server using a particular communication protocol that the server does not implement. A primary server receives a client-generated request, and the primary server sends a first request to a secondary server as part of the processing of the client-generated request. While processing the first request, the secondary server determines a need for data obtainable from a client application that supports user interaction using a communication protocol for which the secondary server is not configured to implement. The secondary server sends a second request to the primary server for obtaining data that results from using the communication protocol. The secondary server subsequently receives the resulting data and continues to process the first request using the resulting data, after which the secondary server returns a response for the first request to the primary server.
Abstract:
A file system interface is simulated out of at least a portion of a dormant computer system. File-based discovery is performed on the simulated file system interface to obtain a detailed inventory of at least the portion of the dormant computer system. The detailed inventory includes one or more of software profiles of at least the portion of the dormant computer system, software instances of at least the portion of the dormant computer system, services of at least the portion of the dormant computer system, and data objects used by the services.
Abstract:
Data characterizing a source computing environment having at least one hardware resource and at least one workload is obtained, as is a specification of a target computing environment to which the at least one workload is to be migrated in a migration. Based on the data characterizing the source computing environment and the specification of the target computing environment, the migration is categorized into one of a plurality of categories; and the migration is specified in accordance with a migration technique selected based on the categorizing step. Techniques to identify suitable migration candidates are also provided.
Abstract:
Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment.
Abstract:
Component relinking in migrations may include discovering one or more dependencies in one or more components; planning one or more new locations where the one or more components are to be placed; determining relinking needs in the one or more components based on the discovering and the planning; and applying the relinking needs.