摘要:
An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider.
摘要:
A computer implemented method, a computer program product, and data processing system clone virtual machines in a virtual desktop environment. A request to clone a new virtual machine is intercepted, wherein the request was initially sent to a virtual management server. Responsive to intercepting the request, the new virtual machine is cloned from a snapshot of a master virtual machine. A delta file is created for the new virtual machine, wherein the delta file includes a base disk reference and a copied delta file. The new virtual machine is configured to read a base disk image from a snapshot of the master virtual machine. The new virtual machine is configured to write data to the copied delta file in the delta file.
摘要:
A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective.
摘要:
Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern.
摘要:
An exemplary method (which can be computer implemented) for problem determination and resolution includes the steps of detecting anomalous changes in an environment for which a problem diagnosis is to be provided, generating domain specific key words and predicates based, at least in part, on the detected anomalous changes, searching in a knowledge resolution repository for solutions related to the generated key words and predicates, and generating a particular solution for the problem, based, at least in part, on the solutions from the knowledge resolution repository
摘要:
A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed.
摘要:
Techniques for problem determination are provided. The techniques include identifying one or more configuration items in two or more systems connected to one or more networks, performing a comparison of one or more common configuration items from the one or more configuration items in the two or more systems connected to one or more networks, and using the comparison to detect deviation between one or more configuration items of one of the two or more systems and one or more respective configuration items in the other one or more systems.
摘要:
A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed.
摘要:
Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern.
摘要:
A system and method for managing responsiveness of virtual desktops using passive monitoring includes monitoring interactive desktop events for a computer device and measuring a time between the interactive desktop event and a result of the interactive desktop event. Based on the time, desktop responsiveness is evaluated. System resources are reallocated to improve the responsiveness.