摘要:
Methods and arrangements for facilitating virtual appliance image delivery. Virtual appliance image templates are stored at a caching location, based on a historical request pattern. A request is received for a virtual appliance image and there is provided, to a second location, a virtual appliance image responsive to the received request. A difference is determined between the requested virtual appliance image and stored virtual appliance image templates.
摘要:
Techniques for facilitating a real-time virtual interaction between two or more users are provided. The techniques include extracting a dynamically changing context from two or more users, wherein the context comprises at least one of user-provided information and one or more items related to at least one of current activity and past activity of the two or more users, analyzing the context from each user to create a classification for each user, comparing the classification for each user with a classification for each additional user, wherein comparing comprises ordering each user in terms of closeness to each additional user, and using the ordering of each user in terms of closeness to each additional user to facilitate a real-time virtual interaction between two or more users. Techniques are also provided for generating a database of one or more user classifications.
摘要:
A method is provided in one example embodiment and includes receiving a subscriber accounting start packet for a subscriber device in a mobile network environment. The method also includes extracting, from the subscriber accounting start packet, subscriber device information and a network address of the subscriber device. The method further includes mapping the network address to the subscriber device information, and then correlating the subscriber device information and a security event when the security event is detected in subscriber data network traffic associated with the subscriber device. In a specific embodiment, the subscriber device information includes at least one of an International Mobile Equipment Identity (IMEI), an International Mobile Subscriber Identity (IMSI), a Mobile Station International Subscriber Directory Number (MSISDN), and an access point name (APN). In further embodiments, an identification of the security event and one or more items of the subscriber device information are provided to a user.
摘要:
A method, system and article of manufacture are disclosed for registering and deregistering memory pages in a computer system. The method comprises the steps of hoisting register and deregister calls in a given routine where temporal locality is present to overlap computation and communication; using software pipelined registration and deregistration where spatial locality is observed; and using intra-procedural and inter-procedural analysis by a compiler of the computer system to deregister dynamically allocated buffers. The preferred embodiment of the invention is based on an optimizing compiler. The compiler is used to extract information such as addresses of buffers which are being reused repeatedly (temporal locality), preferably in a loop. The compiler may also find information about spatial locality, such as arrays whose indexes are used in a well-defined manner in a series of messages, for example, array pages being accessed in a pre-defined pattern in a loop.
摘要:
A method, an apparatus and an article of manufacture for creating a virtual machine super template to create a user-requested virtual machine template. The method includes identifying at least one virtual machine super template to be created via analyzing at least one existing template in a repository and/or a user-defined combination of software, creating the super template by installing software requested by the user to be within the super template, and creating a user-requested virtual machine template by un-installing software from the super template that is not required in the user-requested template and/or adding software to the super template required in the user-requested template that is not present in the super template.
摘要:
A prioritized update system, method, and computer program product are provided. In use, a priority is assigned to a plurality of instances of known unwanted data. In addition, information associated with at least one of the instances of known unwanted data is communicated over a network for updating a system, based on the priority. In one embodiment, the prioritized update system may be provided for updating a security system definition database, based on prioritized instances of known unwanted data.
摘要:
Techniques for automatically documenting activity data in connection with execution of a ticket are provided. The techniques include receiving activity data in connection with execution of a ticket, processing the activity data to generate an output, and appending the processed activity data output to the ticket for ticket enrichment. Techniques for identifying a wrong choice of resolution code in connection with a ticket are also provided. The techniques include analyzing one or more previous tickets to determine a category in which a ticket belongs, determining whether a user-defined code is in variance with a system-suggested code, and sending an alert to a system administrator if the user-defined code is different than the system-suggested code.
摘要:
A computer-implemented method of providing targeted video promotional material includes transmitting a promotional item for display on a video terminal, determining whether the promotional item was skipped, and updating a profile corresponding to the promotional item or a viewer of the promotional item based on whether or not the promotional item was skipped.
摘要:
Methods and arrangements for detecting and diagnosing system outages. A system outage is ascertained and aberrant user activities are categorized, as possible contributors to the system outage, based on system impact. User activities and system impact are learned, and user activities and system impact are compared against predetermined rules. A system outage alert is generated, and a user activity responsible for the system outage is displayed.
摘要:
Methods and arrangements for tracking changes in an information technology environment. Configuration dependencies are learned in a production environment, and a model of the production environment is built. Events on a target system in the production environment are subscribed to. Events are received and correlated with the model to generate an enhanced model, and the enhanced model is thereupon employed to predict configuration errors.