摘要:
A method, system, and computer code for administrating a data mirroring relationship between a first node and a second node. The invention includes an event coordinator configured to receive a notification from the first node when an event that may potentially affect the mirroring relationship has occurred, and to perform a predetermined task in response to the notification. The predetermined task may include logging the event that occurred at the first node, notifying the second node that the event occurred at the first node, and notifying a system administrator that the event occurred at the first node.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.
摘要:
A system and method of providing data to a mashup application may involve receiving a request from a mashup application and supplying first data to the mashup application in response to the request. Mashup information can be received from the mashup application, wherein the mashup information indicates an inclusion of the first data with second data in the execution of the mashup application. The mashup information may be stored and analyzed to identify relationships between previously unrelated data.
摘要:
At a data center controller, a first server location is determined from a set of available server locations at which to change a server active state for a data center. A time and configuration change for the data center are forecasted. A second server location is determined from the set of available server locations at which to change the server active state based upon the forecasted configuration change for the data center. An available server location is selected at which to change the server active state based upon the first server location, the second server location, and the forecasted time associated with the forecasted configuration change for the data center.
摘要:
A computing environment climate-aware policy management system provides decision support by receiving a request to perform an action, where the request is communicated from or on behalf of a computing resource. Upon receiving the request, an indication of a computing environment climate is obtained, which may include for example, information related to the workflow associated with the requested action, information external to the workflow or other information that contextualizes the computing environment of components thereof. At least one policy is obtained that is associated with at least one of the action associated with the request, the resource associated with the request to perform the action received by the policy system manager, and the indicated climate. Each obtained policy is evaluated and a response to the request to perform the action is provided based upon the results of the policy evaluation.
摘要:
A system and method for improved communication notification forwarding on a network. An instant messaging (IM) server program receives at least one communication notification from a first client among a collection of clients on a network, wherein the at least one communication notification is targeted to a second client among the collection of clients. A notification manager compares a current network performance level to a predetermined threshold. In response to said comparing the current network performance level to the predetermined threshold, the notification manager parses a first list to determine if a first user indicator associated with said first client is present on the first list, wherein the first list indicates a first collection of user indicators of clients from which communication notifications are to be forwarded as high priority communication notifications. If the user indicator associated with the first client is present on the first list, the IM server program forwards the at least one communication notification as a high priority communication notification to said second client.
摘要:
A method, system and computer-usable medium are disclosed for using an interactive progress indicator bar to graphically display the completion status of a plurality of computer operations, reorder the sequence of predetermined operations before they are completed, and then restart the reordered operations. An interactive progress indicator bar is implemented in a graphical user interface (GUI) and comprises a plurality of progress indicator segments. As computer operations are completed, the details of their completion status are entered into a computer operation log and related to their corresponding progress indicator segments. Concurrently, color attributes are applied to progress indicator segments to graphically indicate the completion status of their associated computer operations. One or more progress indicator segments are selected through a first user gesture to view the completion status details of their corresponding computer operations. To change the order of the predetermined computer operation, a second user gesture is used to move its corresponding progress indicator segment to a target location on the progress indicator bar. Previously completed computer operations that are subsequent to the reordered operation are reversed and computer operations are then restarted, beginning with the reordered computer operation.
摘要:
A computer-implementable method, system and computer media for typing a resource-based event in a rule system. In one embodiment, the computer-implementable method includes the steps of: defining an event type according to a resource property that is associated with the event type; creating a resource definition that describes which one or more event type can occur in a resource; storing the resource definition in the rule system; receiving asynchronous data from a particular resource in the data processing system; correlating the asynchronous data with a particular rule that is associated with a resource definition for the particular resource; and applying the particular rule to the asynchronous data.
摘要:
Meta data specifying modification constraints for one or more of the attributes of an (operational) policy is generated/provided. Thereafter, the meta data is associated with the policy so that the constraints specified by the meta data can govern the modification of the policy. Under the present invention there are at least two ways of associating the meta data with a policy. In one embodiment, the meta data is embodied as a meta policy that can be associated with one or more (operational) policies. In another embodiment, the meta data is inserted into individual policies as additional attributes.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to distributed computing for large data sets on clusters of computers and provide a novel and non-obvious method, system and computer program product for detecting and correcting malicious nodes in a cloud computing environment (e.g., MapReduce computing). In one embodiment of the invention, a computer-implemented method for detecting and correcting malicious nodes in a cloud computing environment can include selecting a task to dispatch to a first worker node, setting a suspicion index threshold for the selected task, determining a suspicion index for the selected task, comparing the suspicion index to the suspicion index threshold and receiving a result from a first worker node. The method further can include applying a recovery action when the suspicion index exceeds the selected suspicion index threshold.