摘要:
An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines. Then, a capacity risk indicator calculator calculates a capacity risk indicator characterizing a capacity risk of the host computing resources with respect to meeting a prospective capacity demand of the virtual machines, based on the access assignment data.
摘要:
A cost estimator may estimate execution costs for execution of at least one query against a database, using at least one existing index, if any, and based on estimation criteria determined from analyzing the query execution. A candidate index provider may provide candidate indexes, based on the estimation criteria, and re-estimate the execution costs to obtain updated execution costs, using the candidate indexes. An index recommender may recommend a recommended index, based on the updated execution costs.
摘要:
A non-transitory computer-readable storage medium may comprise instructions for managing a server template stored thereon. When executed by at least one processor, the instructions may be configured to cause at least one computing system to at least convert the server template to a corresponding virtual machine, manage the corresponding virtual machine, and convert the corresponding virtual machine back into a template format.
摘要:
A system and method for managing data transfer operations includes at least one data server including data stored in a plurality of data fields, at least one transaction server operatively coupled to the at least one data server and configured to provide at least one customizable business rule and a customer relationship application, an information server operatively coupled to the at least one transaction server, and at least one workstation operatively coupled to the information server. The least one workstation includes local memory accessible to the customer relationship application and configured to provide web communication and presentation services to a user of the at least one workstation that are deployed on the information server. The at least one customizable business rule specifies a mapping between the plurality of data fields and the local memory, the mapping having been provided by the user interacting with the web communication and presentation services.
摘要:
Embodiments provide a method for upgrading resources in a system including normalizing a collected dataset, scattering data from the normalized dataset, obtaining a plurality of clusters based on the scattered data, discarding one or more clusters from the plurality of clusters with less than a percentage of a total number of observations, in each cluster, performing clusterwise regression and obtaining linear sub-clusters in a defined number, reducing one or more sub-clusters including applying a refinement procedure, removing one or more sub-clusters that fit to outliers and merging pairs of clusters that fit an equivalent model, updating one or more clusters with the reduced sub-clusters, removing one or more globular clusters, reducing a number of clusters with the refinement procedure, and de-normalizing one or more results.
摘要:
A system for reconciling object for a configuration management databases employs statistical rules to reduce the amount of manual identification required by conventional reconciliation techniques. As users manually identify matches between source and target datasets, statistical rules are developed based on the criteria used for matching. Those statistical rules are then used for future matching. A threshold value is adjusted as the statistical rules are used, incrementing the threshold value when the rule successfully matches source and target objects. If the threshold value exceeds a predetermined acceptance value, the system may automatically accept a match made by a statistical rule. Otherwise, suggestions of possibly applicable rules may be presented to a user, who may use the suggested rules to match objects, causing adjustment of the threshold value associated with the suggested rules used.
摘要:
Specified data sets may be tracked from creation to end-of-life (e.g., deletion). Between creation and end-of-life, data set storage changes may be recorded (i.e., when additional storage is allocated or when some storage is released). During a subsequent allocation cycle, this information may be used in conjunction with user-specified allocation rules to manage or control the data set's initial allocation.
摘要:
A request handler may receive an image capture request for an operating system (OS) executing on a server. A pre-boot image handler may generate a pre-boot image, based on the image capture request and on the executing operating system. An image handler may capture an image of the operating system, based on the pre-boot image.
摘要:
A method to redirect SRB routines from otherwise non-zIIP eligible processes on an IBM z/OS series mainframe to a zIIP eligible enclave is disclosed. This redirection is achieved by intercepting otherwise blocked operations and allowing them to complete processing without errors imposed by the zIIP processor configuration. After appropriately intercepting and redirecting these blocked operations more processing may be performed on the more financially cost effective zIIP processor by users of mainframe computing environments.
摘要翻译:披露了将IBM z / OS系列主机上的其他非zIIP合格进程的SRB例程重定向到zIIP符合条件的飞地的方法。 这种重定向是通过拦截否则阻止的操作实现的,并允许它们完成处理,而不会由zIIP处理器配置施加错误。 在适当拦截和重定向这些被阻止的操作之后,可以在大型机计算环境的用户对更经济有效的zIIP处理器执行更多的处理。
摘要:
Disclosed are methods and systems to automate the provisioning and deployment of application instances within a heterogeneous data center. In one embodiment, the application provisioning is performed based upon a blueprint and deployment model defining requirements of the provisioned application. In another embodiment, the totality of available resources for provisioning is divided into different segments. When resources are requested and assigned to an incoming provisioning request, the resource pool may be refreshed or augmented as defined by thresholds or forecasting of user needs. The resource pool may be refreshed by recapturing allocated resources that are no longer in use or by configuring resources taken from the reserve. Further, when reserve resources are not available or are below a minimum reserve threshold, capacity planning actions may be initiated or advised.