摘要:
A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network.
摘要:
In one embodiment, the present invention is a method and an apparatus for bandwidth efficient distribution of content over a computer network. In one embodiment, a server cooperates with clients to reduce the usage of server bandwidth, thereby reducing bandwidth-associated distribution costs. The server controls the way that content is distributed within the system, and the clients/receivers may act as intermediate forwarders of data packets. In one embodiment, this is accomplished by sending data items to a first group of receivers on a packet-by-packet basis using unicast communication. The first group of receivers then sends the packets on to a second set of receivers, and the process continues until the packet is forwarded to all intended receivers.
摘要:
A solution for managing a computer infrastructure is provided. In particular, the solution can generate a set of tentative recovery segments for the computer infrastructure based on a related resource graph and a set of partition rules. The related resource graph can be generated based on a managed resource graph, which includes resource type information for each node in the managed resource graph. The set of tentative recovery segments can be used to manage the computer infrastructure and/or a set of recovery segments, which includes recovery characteristic(s) for each segment can be generated based on the set of tentative recovery segments and a set of recovery segment templates. In any event, the invention provides a solution that fully and/or partially automates the identification of recovery segments within a computer infrastructure, thereby enabling a more effective management of the computer infrastructure.
摘要:
A system, method and program product for siting charging stations. A mobility detection module collects traffic data from vehicle sensors distributed in an area. A map matching module maps detected traffic in the area. A vehicle flow module temporally characterizes mapped traffic flow. An electric vehicle (EV) requirements (EVR) evaluator determines an optimal number of charging stations and respective locations for siting the charging stations.
摘要:
Access is obtained to call data records (or other data) for a plurality of mobile telephony users. The call data records (or other data) include location-time sequences. For each of the mobile telephony users, corresponding ones of the location-time sequences are segmented into trips; a home-work-school classification model is used to determine a home location and a work-school location, based on the trips; and a trip purpose classification model is used to assign each of the trips a purpose label, based at least on comparing at least one of a start location and an end location for each one of the trips to at least one of the home location and the work-school location determined using the home-work-school classification model. The trips are aggregated into purpose based origin-destination categories based at least on the purpose labels, time ranges of the location-time sequences, and the start and end locations.
摘要:
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
摘要:
A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode.
摘要:
A method of generating analytics to provide an analysis of data from distinct data domains includes collecting sensor data from at least two distinct data domains, deriving parameters from the collected data, wherein at least one of the parameters is a first domain parameter derived from one of the data domains and at least another one of the parameters is a second domain parameter derived from the other data domain, providing a data model that enables a user to specify at least one of the first parameters and at least one of the second domain parameters and generate at least one rule based on the selected parameters, and generating analytics that analyze the collected data against the rules to determinate whether the rules have been satisfied and provide results of the analysis to a user of the analytics.
摘要:
A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective.
摘要:
A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services.