Abstract:
An approach for sharing an asset in a peer-to-peer network is provided. After determining a locally stored first list does not include meta data specifying the asset, a new node is identified. In response to receiving a subscription from the new node, a second list locally stored at the new node is received. The second list includes the meta data and an identification of a source node that has the asset. The first list is updated to include the meta data and the identification of the source node. The updated first list is searched and in response, the meta data and the identification of the source node are detected. Based on the detected meta data and identification, the source node is identified. A request to retrieve the asset is sent to the source node, and in response, the asset is received.
Abstract:
An approach for sharing an asset in a peer-to-peer (P2P) network is provided. After a computer sends a request to a new node for a new subscription and prior to the computer receiving the new subscription, the new node requests a digital certificate or permission from a user. The new node receives the digital certificate or permission. The new node determines a number of P2P connections in the network does not exceed a threshold amount and determines that no bandwidth degradation exists in the network. Responsive to receiving the digital certificate or permission, determining the number of P2P connections does not exceed the threshold, and determining that no bandwidth degradation exists in the network, the new node transfers the asset to the computer and updates a local list of nodes authorized to receive assets shared by the new node by adding an identification of the computer.
Abstract:
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
Abstract:
The program directs a computer processor to implement a program that manages a device. The program stores a medication listing, together with medication consumption instructions. The program monitors one or more medication containers, which contain at least one medication for the patient. The program receives medication consumption data of the patient, including the name of the drug consumed, the quantity, and the time that the patient last consumed the one or more medications. The program receives patient condition data from one or more monitoring devices in real-time, which includes at least one measurement of a medical vital sign of the patient. Based on the patient condition data, the program recommends that the patient consume a dosage amount of a medication at a designated time, from the one or more medication containers, or locks the one or more medication containers to prevent an adverse drug reaction or overdose in the patient.
Abstract:
A method to generate an executable orchestration process includes: querying a user to enter first computer code for activating a service; querying the user to enter second computer code for undoing actions performed in the activating; loading pre-defined third computer code for determining whether the activated service is a success or has an error, based on the service; loading pre-defined fourth computer code for correcting the error; generating an executable orchestration function from the first through fourth computer code; and generating the orchestration process from the executable orchestration function.
Abstract:
A computer-implemented method includes: receiving, by a computing device, a template for creating a virtual machine (VM) instance; separating, by the computing device, the template into a repeated portion and a unique portion; determining, by the computing device, whether the repeated portion is stored in a cache; creating, by the computing device and based on determining that the repeated portion is stored in the cache, the VM instance using the repeated portion stored in the cache; completing, by the computing device, the unique portion of the VM instance to create a completed VM instance; and deploying, by the computing device, the completed VM instance.
Abstract:
Methods, systems, and computer program products for black box techniques for detecting performance and availability issues in virtual machines exploiting hardware assisted virtualization are provided herein. A computer-implemented method includes capturing multiple hardware assisted virtualization exit calls generated in connection with a given virtual machine; calculating one or more virtual machine performance metrics attributed to the given virtual machine based on the multiple hardware assisted virtualization exit calls; determining one or more virtual machine performance issues and/or one or more virtual machine availability issues attributed to the given virtual machine based on the one or more calculated virtual machine performance metrics; and outputting an alert identifying the one or more determined virtual machine performance issues and/or the one or more virtual machine availability issues attributed to the given virtual machine.
Abstract:
A method of automatic security parameter renewal includes determining if the security parameter satisfies a renewal condition, the determining including automatically detecting a time when a security parameter is going to expire, and automatically updating the security parameter when the renewal condition is satisfied. The automatically updating the security parameter includes modifying a certificate upon receipt of a new certificate.
Abstract:
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.
Abstract:
An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration.