Abstract:
A computer-implemented method includes identifying a first set of utterances from a plurality of utterances. The plurality of utterances is associated with a conversation and transmitted via a plurality of audio signals. The computer-implemented method further includes mining the first set of utterances for a first context. The computer-implemented method further includes determining that the first context associated with the first set of utterances is not relevant to a second context associated with the conversation. The computer-implemented method further includes dynamically muting, for at least a first period of time, a first audio signal in the plurality of audio signals corresponding to the first set of utterances. A corresponding computer system and computer program product are also disclosed.
Abstract:
An approach for managing a family tree archive is provided. The approach includes creating an electronic archive based on a family tree. The approach also includes automatically discovering Internet-based data associated with at least one member of the family tree. The approach additionally includes adding the Internet-based data to the archive. The approach further includes storing the archive at a storage device.
Abstract:
A baseline virtual machine (VM) instance is created within a protected secure environment from a production VM image. The baseline VM instance is a protected clone of a production VM instance created within a deployed environment from the production VM image. VM instance information of the baseline VM instance is collected during a startup process of the baseline VM instance within the protected secure environment. First baseline validity code is generated from the collected VM instance information of the baseline VM instance. VM instance information of the production VM instance is collected during a startup process of the production VM instance within the deployed environment. First production validity code is generated from the collected VM information of the production VM instance. A determination is made as to whether there is an error in the production VM instance by comparing the first baseline validity code and the first production validity code.
Abstract:
Embodiments of the present invention provide an approach for allowing a user to capture a set of values for a set of input parameters in a template that may be used for present and/or future provisioning of virtual resources. Under this approach, the template may be managed within a networked computing environment (e.g., cloud computing environment) for future use by the creating user or other authorized users. The next time the user is interacting with the environment, the set of templates available may be accessed, and the user can select/utilize a previously stored template. Once a template is chosen, the user may initiate a provisioning request from the environment's interface(s), which may include graphical user interfaces (GUIs), command lines, application programming interfaces (APIs), etc. In any event, the user may also have the opportunity to update any saved data and/or provide additional data.
Abstract:
In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments. The approach uses a rate of capacity consumption to calculate the risk of consuming the available capacity in each resource pool (e.g., resource pools allocated to satisfy different levels of service with different SLA failure penalties). Based on the relative available capacity in each pool (as determined by the pool rate of consumption), resources are reallocated to maximize revenue (e.g., reduce financial penalty) across a resource pool set.
Abstract:
A method and associated system. A request to deploy a virtual machine in a computing environment is received. The request identifies an ordered sequence of attributes that the virtual machine to be deployed includes. In response to the request, a virtual machine resource usage pattern having attributes matching a subset of attributes in the ordered sequence of attributes is selected, based on an ordering of the attributes in the ordered sequence of attributes. A node on which the virtual machine is to be deployed is selected from two or more nodes in the computing environment, based on the selected virtual machine resource usage pattern and predicted runtime resource requirements of the virtual machine to be deployed.
Abstract:
Embodiments of the present invention provide an approach for allowing a user to capture a set of values for a set of input parameters in a template that may be used for present and/or future provisioning of virtual resources. Under this approach, the template may be managed within a networked computing environment (e.g., cloud computing environment) for future use by the creating user or other authorized users. The next time the user is interacting with the environment, the set of templates available may be accessed, and the user can select/utilize a previously stored template. Once a template is chosen, the user may initiate a provisioning request from the environment's interface(s), which may include graphical user interfaces (GUIs), command lines, application programming interfaces (APIs), etc. In any event, the user may also have the opportunity to update any saved data and/or provide additional data.
Abstract:
An apparatus for enabling resiliency for cloud computing systems is provided. An apparatus includes a processor and a memory storing computer program code. The memory and the computer program code are configured to, with the processor, cause the apparatus to perform actions. The actions include modifying a topology graph of a network architecture by mapping processes flows onto the topology graph and creating a resiliency graph based on the modified topology graph. The actions also include modifying the resiliency graph by translating at least one SLA into the resiliency graph and identifying overlaps and dependencies in the modified resiliency graph. Apparatus and computer readable instructions are also described.
Abstract:
An approach for querying and managing/manipulating network computing resources (e.g., cloud computing resources) is provided. Typically, an interpreter component may be implemented so that a language describing such computing resources may be interpreted. The interpreter component may include other components such as a request processor, a provisioning queue, an execution engine, a results store, and response marshaller/handler that collaborate to manage the computing resources. Such computing resources may, for example, include virtual machine instances, virtual machine images, storage volumes, network resources, files, software bundles, etc.
Abstract:
An embodiment for controlling material movement with swarm power generating robots in a multi-machine environment is provided. The embodiment may include receiving data relating to an activity and one or more material handling devices to perform the activity. The embodiment may also include identifying one or more characteristics of one or more objects associated with the activity. The embodiment may further include predicting an amount of power required to transport the one or more objects. The embodiment may also include in response to determining at least one material handling device is unable to produce the required amount of power, identifying one or more power generation robots capable of transmitting the required amount of power to the at least one material handling device. The embodiment may further include deploying the one or more power generation robots to a target location of the at least one material handling device.