Abstract:
A service catalog may be stored on a storage device and represent systems management tools with types, managed component types the systems management tools can manage, and dependencies associated with the systems management tools. A portal comprises a user interface receiving a request for a systems management tool from the service catalog. A configuration management database stores registered state of the systems management tools and the managed components managed by the systems management tools. An orchestration component is capable of coupling a computer-executable plugin to activate, deactivate, and run the systems management tool on a managed component.
Abstract:
A computer-implemented method includes: receiving, by a computing device, a template for creating a virtual machine (VM) instance; separating, by the computing device, the template into a repeated portion and a unique portion; determining, by the computing device, whether the repeated portion is stored in a cache; creating, by the computing device and based on determining that the repeated portion is stored in the cache, the VM instance using the repeated portion stored in the cache; completing, by the computing device, the unique portion of the VM instance to create a completed VM instance; and deploying, by the computing device, the completed VM instance.
Abstract:
Allocating resources during failure recovery is provided. A set of one or more service level agreement tiers are identified corresponding to a client workload that was being processed by a failed computing environment. A highest level tier is selected in the set of one or more service level agreement tiers. Recovery resources are allocated in a failover computing environment to the highest level tier sufficient to meet a service level agreement associated with the highest level tier. The highest level tier is recovered in the set of one or more service level agreement tiers using the recovery resources in the failover computing environment. In response to recovering the highest level tier, tier resources of the highest level tier are reduced to a steady state level of processing in the failover computing environment.
Abstract:
Software, hardware, and virtual network resources are anti-collocated on a networked computing environment. A computerized network-management system receives a list of resources to be installed on components of a network and a set of anti-collocation rules that identify combinations of resources that may not be installed concurrently on the same network component. Each resource is assigned a priority and the resources are organized into groups as a function of these priorities. The groups are processed sequentially in priority order, and a color is assigned to each resource in each group. Any resource not constrained by an anti-collocation rule is assigned a default “most popular” color. Each constrained resource is assigned a color that is not already used by any other resource with which the constrained resource is anti-collocated. The resources in each group are then installed in order of color, with the more populous colors being installed first.
Abstract:
A system for managing cloud-based resources. The system includes a computer interface for receiving a computing resource. A computer including at least one central processing unit is configured to determine that the computing resource is abandoned and, upon determining the computer resource is abandoned, determine a disposition action for the computing resource.
Abstract:
A method and system for teaching an object of a deictic reference to a machine. A processor of the machine teaches the object of the deictic reference to the machine which results in the machine learning the object. The teaching includes: the processor finds an item in a region indicated by a physical pointing gesture, by the user, that points to the object; the processor shines a laser light on the item and in response, the processor receives a negative spoken indication from the user that the item shined on by the laser light is not the object; in response to the negative spoken indication from the user, the processor interacts with the user in an iterative procedure wherein the machine learns the object in a final iteration of the procedure. The processor stores the learned object in a storage repository.
Abstract:
A method of automatic security parameter renewal includes determining if a security parameter satisfies a renewal condition, and automatically updating the security parameter when the renewal condition is satisfied. The automatically updating the security parameter includes modifying a certificate in dependent components of an application of the security parameter, by a central certification server, upon receipt of a new certificate.
Abstract:
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
Abstract:
A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource.
Abstract:
A computer-implemented method includes receiving a template for creating a virtual machine (VM) instance; separating the template into a repeated portion and a unique portion; determining whether the repeated portion is stored in a cache; creating based on determining that the repeated portion is stored in the cache, the VM instance using the repeated portion stored in the cache; completing the unique portion of the VM instance to create a completed VM instance; and deploying the completed VM instance.