Abstract:
The scope of the system changes to be considered for analysis for finding problematic changes is reduced in order to allow focusing on highly potential suspicious drifts caused by change sequences. The method and system includes a data cleaning module to remove irrelevant changes, a feature extraction and normalization module to extract the features of change objects, data annotation module to remove irrelevant changes based on patterns, and a clustering module to obtain groups for further analysis. Data cleaning is simplified using domain independent rules. Additional sources of change sequences are removed by application of pattern based techniques so as to narrow down problematic system changes to analyze for root cause analysis. Change error sequence and degree of temporal correlation to correlate system changes with errors, as well as change behavior patterns may be used for downsizing the diagnosis scope.
Abstract:
Embodiments are directed to a computer implemented method for generating a drift detector. The method includes generating, using a processor system, drift cases based at least in part on known drift set data of a computer system. The method further includes injecting, using the processor system, the drift cases into the computer system to generate a first data set. The method further includes applying, using the processor system, cleaning rules to the first data set to reduce a size of the first data set and generate a cleaned data set. The method further includes extracting one or more features of the cleaned data set. The method further includes normalizing the extracted one or more features of the cleaned data set. The method further includes training a machine learning system using the extracted and normalized one or more features of the cleaned data, wherein an output of the machine learning system comprises the drift detector.
Abstract:
Embodiments include methods and devices for migrating virtual assets over networks that have a first manager connected to a physical host a virtual machine run. Aspects include registering the physical host to a second manager in the network, creating the mapping relationship of the physical host between a database of the first manager and a database of the second manager and importing instance data and status data of the virtual machine of the physical host from the database of the first manager into the database of the second manager. Aspects also include switching the management for the physical host from the first manager to the second manager.
Abstract:
Disclosed is a novel system and method to select software components. A set of available software components are accessed. Next, one or more dimensions are defined. Each dimension is an attribute to the set of available software components. A set of coherence distances between each pair of the available software components in the set of available software components is calculated for each of the dimensions that have been defined. Each of the coherence distances are combined between each pair of the available software components that has been calculated in the set of the coherence distances into an overall coherence degree for each of the available software components. Using the overall coherence degree, one or more software components are selected to be included in a software bundle.
Abstract:
Systems and articles of manufacture for coordinating application migration processes include selecting at least one migration service for an application based on analysis of application information and information pertaining to multiple migration services, creating a migration plan to migrate the application to a target cloud based on the at least one selected migration service, and executing the migration plan, utilizing the at least one selected migration service, to migrate the application to the target cloud.
Abstract:
The present invention provides a method, apparatus, and non-transitory article of manufacture embodying computer readable instructions for scheduling discrete event simulation. One embodiment of the present invention is a method for scheduling discrete event simulation. The method includes: extracting two or more event types in the discrete event simulation in response to having loaded the discrete event simulation; constructing a correlation graph used for the discrete event simulation based on the two or more event types; and scheduling events that are classified into the two or more event types according to the correlation graph wherein each node in the correlation graph describes one of the two or more event types, and an edge in the correlation graph describes the creation or dependency relationship between the two or more event types. Other embodiments of the present invention provide an apparatus and computer program product for scheduling discrete event simulation.
Abstract:
A computer-implemented method for computing workload management includes collecting power usage information from a location and collecting computing task information with respect to computing tasks performed at the location. The collected computing task information can be parsed to get a predicted approximate power usage information for each task. The tasks can be scheduled based on the predicted approximate power usage information to improve (e.g., maximize) usage of power from an unstable power source.
Abstract:
A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include receiving a task request from a user and determining a preferred executor type for the task request. The operations may include selecting an executor of the preferred executor type for the task request. The operations may include performing the task request with the executor and returning a response to the task request to the user.
Abstract:
A method of managing an active-active database system storing a first copy of data records at a first node a second copy of the data records at a second node includes receiving a first set of operations stored at the first node as a first set of local operations, a copy of the first set of operations transmitted to the second node and stored as a first set of remote operations, and receiving a second set of operations stored at the second node as a second set of local operations, a copy of the second set of operations transmitted to the first node and stored as a second set of remote operations. The method includes determining a comparison point by selecting an operation from each of the first set of operations and the second set of operations, and comparing the first copy of the data records to the second copy.
Abstract:
According to an aspect, a method includes searching for a correlated log identifier in a correlation database based on detecting a metrics-based anomaly. The method also includes providing, in a problem diagnosis, related log information associated with the correlated log identifier based on locating one or more log entries including the correlated log identifier in a same time window as the metrics-based anomaly. The method further includes searching for a correlated metric in the correlation database based on detecting a log-based anomaly and providing, in the problem diagnosis, related metric information associated with the correlated metric based on locating one or more metrics records including the correlated metric in the same time window as the log-based anomaly.