摘要:
Locations for deploying mesh nodes in a wireless network are determined based on a Terminal Steiner tree (TST). The TST that is formulated from an input graph and client locations in the wireless network is determined. The input graph includes signal strength values for pairs of mesh node-to-client location and mesh node-to-mesh node links and mesh node locations for deploying the mesh nodes are selected from the Steiner nodes in the TST.
摘要:
An embodiment of a method of forming a virtual computer cluster within a shared computing environment begins with a step of placing gatekeeper software on each of a plurality of particular host computers of the shared computing environment. The method continues with a step of assigning computing platforms located on the particular host computers to the virtual computer cluster. The gatekeeper software interposes between the computing platforms and hardware resources of the particular host computers. The method concludes with a step of isolating the virtual computer cluster from a remainder of the shared computing environment using the gatekeeper software. The gatekeeper software allows communication between the computing platforms while precluding communication with other computing platforms of the shared computing environment. The gatekeeper software controls input and output operations for the virtual computer cluster.
摘要:
A method of and apparatus for determining whether a multi-component target system meets a given multi-part performability requirement is provided. A description of the target system, failure probabilities for components of the target system and a multi-part performability requirement for the target system are obtained. The multi-part performability requirement indicates desired performance levels and corresponding fractions of time. One or more failure-scenarios are successively computed that represent one or more states of the target system having zero or more components failed and a corresponding probability of occurrence of the one or more of the states of the target system. Performance of the target system is modeled under the failure scenarios using a performance predictor module for generating a multi-part performability function. The multi-part performability function is compared with said multi-part performability requirement to determine whether the target system meets the multi-part performability requirement.
摘要:
Embodiments associate software applications with computing resources based on failure correlation information and an anti-affinity rule. An anti-affinity rule indicates that a first software application is to be separated from a second software application during execution. A management device determines failure correlations between a first computing resource that is associated with the first software application and a plurality of computing resources other than the first computing resource. The management device selects the computing resource that corresponds to the lowest failure correlation and associates the second software application with the selected computing resource based on the anti-affinity rule.
摘要:
A location for placing a new capacity point in a wireless network is determined based on a wireless contention of the network and capacities for capacity points in the network. Each capacity point is a network device interfacing the network with a second network. The capacities are calculated as a function of the wireless contention.
摘要:
To determine files associated with one or more workflows, a trace of accesses of files in at least one server is received. The files are grouped into at least one set of files, where the files in the set are accessed together more than a predetermined number of times in the trace. Files associated with the particular workflow are identified based on the at least one set.
摘要:
A location for placing a new capacity point in a wireless network is determined based on a wireless contention of the network and capacities for capacity points in the network. Each capacity point is a network device interfacing the network with a second network. The capacities are calculated as a function of the wireless contention.
摘要:
Provided are, among other things, systems, methods and techniques for collaborative compression, in which is obtained a collection of files, with individual ones of the files including a set of ordered data elements (e.g., bit positions), and with individual ones of the data elements having different values in different ones of the files, but with the set of ordered data elements being common across the files. The data elements are partitioned into an identified set of bins based on statistics for the values of the data elements across the collection of files, and a received file is compressed based on the bins of data elements.
摘要:
Embodiments of the present invention pertain to improving recoverability of a dataset associated with a multi-tier storage system. According to one embodiment, updates to a dataset are stored in first storage. The dataset and a point-in-time copy of the dataset reside on second storage, and the first storage provides higher reliability than the second storage. The dataset is restored using at least a subset of the stored updates in combination with the point-in-time copy in the event that the dataset is lost.
摘要:
A method for controlling resource allocation is provided. The method includes determining a service metric associated with a first application, wherein the first application is associated with one or more virtual machines. The method further includes comparing the service metric to an application specific service level goal associated with the first application and modifying a resource allocation associated with the first application at one or more of the virtual machines.