摘要:
A system and method for avoiding serialization on updating the modification time of files in a cluster system. In accordance with the method, the modification time field of a file can be accessed by multiple readers or multiple writers and each client in the cluster system can update their own copy of the modification time. Whenever a client requests to read the modification time, the copies of the modification time are reconciled. The copies of the modification times are also reconciled when a cache flush or synchronization operation forces such reconciliation. The present system and method supports the requirement (of certain operating systems such as UNIX) that an explicit user-issued command to set the modification time is accomplished by granting an exclusive-write mode for the modification field.
摘要:
Techniques are described for scheduling received tasks in a data center in a manner that accounts for operating costs of the data center. Embodiments of the invention generally include comparing cost-saving methods of scheduling a task to the operating parameters of completing a task—e.g., a maximum amount of time allotted to complete a task. If the task can be scheduled to reduce operating costs (e.g., rescheduled to a time when power is cheaper) and still be performed within the operating parameters, then that cost-saving method is used to create a workload plan to implement the task. In another embodiment, several cost-saving methods are compared to determine the most profitable.
摘要:
Risk associated with over-committing shared resources is determined. In response to receiving a request to provision a new workload, a candidate mix of virtual machines is selected from plurality of virtual machines already running on a cloud infrastructure. A utilization profile is then created for an aggregate behavior of the candidate mix of virtual machines and a new virtual machine running the new workload. A risk inherent in over-commitment if the new workload is grouped with the candidate mix of virtual machines is determined, and whether that risk is acceptable. If the risk is acceptable, the new workload is provisioned by over-committing the candidate mix of virtual machines with the new virtual machine running on the cloud infrastructure.
摘要:
The present invention describes a method and system for discovering of server devices. The system and method receive a list of known server devices. The system and method obtain middleware configuration data and/or log files for each of the known server devices in the list. The system and method derives dependencies on at least one other server device from the middleware configuration data and/or log files. The system and method determines whether the at least one other server device is a new server device not included in the list. Thus, the system and method discovers the new server device upon determining that the at least one other server device is not included in the list.
摘要:
Techniques are described for controlling the climate in a data center. Using the input of an administrator, multiple desired attributes of a data center (e.g., temperature, energy consumption, costs, or system performance) may be balanced using a utility function that maximizes the utility of the computing systems in the data center according to the administrator's preferences. Additionally, a cooling model is generated that represents the affect of a control parameter (e.g., the fan speed of a CRAC) on the desire attributes of the data center. The cooling model may then be substituted into the utility function to replace the desired attributes. Using this new utility function, the control parameters may be varied such that the maximum utility is achieved.
摘要:
One embodiment of the present method and apparatus for performance and policy analysis in distributed computing systems includes representing a distributed computing system as a state transition model. A queuing network is then superimposed upon the state transition model, and the effects of one or more policies on the distributed computing system performance are identified in accordance with a solution to the queuing network.
摘要:
Method and system are disclosed for automatically discovering associations between applications and data in multi-tiered distributed systems. The method in one aspect uses a machine-readable specification of a model or template that describes use and transformation of data by software components. The method additionally utilizes a model of system configuration and appropriate runtime support to mine information available from systems management software present in enterprise systems. The application-data association discovery process performs a traversal of the distributed system configuration graph with actions taken during this traversal driven by the contents of the templates for the software components present in the system. The results of the application-data association discovery process are stored in a database and may be used to specify application-specific information lifecycle management (ILM) policy or as input to impact analysis tools in access control and antivirus systems.
摘要:
A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task.
摘要:
Method and system are disclosed for automatically discovering associations between applications and data in multi-tiered distributed systems. The method in one aspect uses a machine-readable specification of a model or template that describes use and transformation of data by software components. The method additionally utilizes a model of system configuration and appropriate runtime support to mine information available from systems management software present in enterprise systems. The application-data association discovery process performs a traversal of the distributed system configuration graph with actions taken during this traversal driven by the contents of the templates for the software components present in the system. The results of the application-data association discovery process are stored in a database and may be used to specify application-specific information lifecycle management (ILM) policy or as input to impact analysis tools in access control and antivirus systems.
摘要:
A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information technology resources required for achieving of such mission, such method used for optimization of provisioning for information technology resources and for prioritizing of control of data and application security and integrity of such mission.