摘要:
Workloads that are and are not appropriate for transformation and processing on a cloud computing environment are identified. A user entity is provided with a measurement of at least one of the value which will be realized, and the effort which will be required. A plurality of attributes is specified. Input data represents the extent to which the user entity processing system possesses the given attribute. The input data for each attribute is employed to derive a corresponding numerical parameter value, which are to compute a final score.
摘要:
A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
摘要:
A methodology is presented for discovering and storing end-to-end associations between different types of entities in a system configuration model of a distributed middleware system. First associations are determined, at each distributed system tier, between instances of data and data-container configuration elements. Those first associations point to logical subdivision of a data service that is directly responsible for implementing an instance of data. Second associations are determined, at said each distributed system tier, between said data-container configuration elements and a server infrastructure. Said second associations point to a server infrastructure that hosts said data-container configuration elements. Third associations are composed, within said each distributed system tier, between said instances of data and said server infrastructure, using said first associations and said second associations. Fourth associations are composed, end-to-end, which represent dependency of an application using said instances of data to said server infrastructure.
摘要:
Provided are data structures for use in storing data. A plurality of data structures are defined in a computer readable medium, wherein each data structure indicates a plurality of attributes and at least one function of a storage resource to store data. Policies are defined in the computer readable medium that associate data characteristics to data structures based on a correspondence of data characteristics and the attributes defined in the data structures, wherein each defined data structure is adapted to provide requirements to determine a storage resource to store associated data, and wherein the defined data structure is adapted to provide the storage resource with requirements for storing the data.
摘要:
A method and system are disclosed for providing automated assistance to a service provider for creating a technical solution definition for a project for delivering Information Technology (IT) outsourcing services for a customer. The method comprises the steps of providing, in machine processable form, a definition of a taxonomy of a set of standard services offered by the service provider; providing, in machine processable form, a repository of service designs, each of the service designs describing a set of IT architecture components to deliver a service associated with a standard service element, according to a specified best practice rule; and providing, in machine processable form, a collection of policies that can be executed to validate the service designs selected to deliver the set of contracted services. A computer implemented design tool is used to define the scope of a project a set of service designs, and to run policy-based validation checks on the design.
摘要:
Method and system are disclosed for automatically discovering associations between applications and data in multi-tiered distributed systems. The method in one aspect uses a machine-readable specification of a model or template that describes use and transformation of data by software components. The method additionally utilizes a model of system configuration and appropriate runtime support to mine information available from systems management software present in enterprise systems. The application-data association discovery process performs a traversal of the distributed system configuration graph with actions taken during this traversal driven by the contents of the templates for the software components present in the system. The results of the application-data association discovery process are stored in a database and may be used to specify application-specific information lifecycle management (ILM) policy or as input to impact analysis tools in access control and antivirus systems.
摘要:
Goal-based availability and change management are handled over groups of heterogeneous storage controllers. Probabilistic and deterministic methods are employed to determine the allocation and placement of storage volumes to storage controllers, as well as the degree of data redundancy necessary to achieve data availability goals. The probabilistic methods can take into account past observations of controller availability, and operator beliefs, as well as the state of storage controller configuration, in coming up with a probabilistic estimate of future availability.
摘要:
Method and system are disclosed for automatically discovering associations between applications and data in multi-tiered distributed systems. The method in one aspect uses a machine-readable specification of a model or template that describes use and transformation of data by software components. The method additionally utilizes a model of system configuration and appropriate runtime support to mine information available from systems management software present in enterprise systems. The application-data association discovery process performs a traversal of the distributed system configuration graph with actions taken during this traversal driven by the contents of the templates for the software components present in the system. The results of the application-data association discovery process are stored in a database and may be used to specify application-specific information lifecycle management (ILM) policy or as input to impact analysis tools in access control and antivirus systems.
摘要:
Provided are data structures for use in storing data. A plurality of data structures are defined in a computer readable medium, wherein each data structure indicates a plurality of attributes and at least one function of a storage resource to store data. Policies are defined in the computer readable medium that associate data characteristics to data structures based on a correspondence of data characteristics and the attributes defined in the data structures, wherein each defined data structure is adapted to provide requirements to determine a storage resource to store associated data, and wherein the defined data structure is adapted to provide the storage resource with requirements for storing the data.
摘要:
In a fault-tolerant distributed file system, the server state needs to be reconstructed after the server restarts or when its function is taken over by another node. A crucial part of the server state is determining whether or not in-flight, directory-operations initiated by the clients have been completed. Described is a check-before-request scheme that solves this problem. A global lock is obtained on the directory or directories first. A check is made on the directories to see if the operation would succeed, and if so a request is made to the server for the operation. If the server were to fail during the execution of the operation, completion of the operation prior to failure can be determined by merely re-examining the directory contents.