摘要:
Embodiments of the present invention provide an integrated host and subsystem port selection methodology that uses performance measurements combined with information about active data paths. This technique also helps in resilient fabric planning by selecting ports from redundant fabrics. In a typical embodiment, host port to storage port pairs that create a path between a host and a storage device will be identified. From these pairs, a set of host port to storage port candidates for communicate data from the host to the storage device will be identified based on a set of resiliency constraints. Then, a specific host port to storage port pair will be selected from the set based on a lowest joint workload measurement. A path will then be created between the specific host port and storage port, and data will be communicated from the host to the storage device via the path.
摘要:
A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks can be utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that can be serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence.
摘要:
A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario.
摘要:
Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented.
摘要:
An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing.
摘要:
The present invention provides technology neutral process integration (Cloud Resource Planning), and optimization methodology leveraging a business meta-schema format Cloud Data Interchange (CDI) to integrate, enable, and invoke Cloud services. One example is that the present invention provides a management layer at the process level. There can be multiple Cloud implementations/types within a govern enterprise—perhaps utilizing different infrastructure (e.g., hardware of one supplier versus that of another) or different areas of functionality (computing services, storage services, etc). This disclosure provides an abstraction or ‘resource planning’ layer above these core services such that a customer does not have to have knowledge or choose different Cloud types and/or understand or choose each underlying service. As such, it provides a ‘one stop’ portal.
摘要:
An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing.
摘要:
Embodiments of the present invention provide an integrated host and subsystem port selection methodology that uses performance measurements combined with information about active data paths. This technique also helps in resilient fabric planning by selecting ports from redundant fabrics. In a typical embodiment, host port to storage port pairs that create a path between a host and a storage device will be identified. From these pairs, a set of host port to storage port candidates for communicate data from the host to the storage device will be identified based on a set of resiliency constraints. Then, a specific host port to storage port pair will be selected from the set based on a lowest joint workload measurement. A path will then be created between the specific host port and storage port, and data will be communicated from the host to the storage device via the path.
摘要:
A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics.
摘要:
A solution for managing a service engagement is provided. A service delivery model for the service engagement is defined within an engagement framework. The engagement framework, and consequently the service delivery model, can include a hierarchy that comprises a service definition, a set of service elements for the service definition, and a set of element tasks for each service element. The set of element tasks can be selected from a set of base tasks, each of which defines a particular task along with its input(s), output(s), and related asset(s). As a result, service engagements can be managed in a consistent manner using a data structure that promotes reuse and is readily extensible.