摘要:
A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
摘要:
Goal-based availability and change management are handled over groups of heterogeneous storage controllers. Probabilistic and deterministic methods are employed to determine the allocation and placement of storage volumes to storage controllers, as well as the degree of data redundancy necessary to achieve data availability goals The probabilistic methods can take into account past observations of controller availability, and operator beliefs, as well as the state of storage controller configuration, in coming up with a probabilistic estimate of future availability.
摘要:
A method, apparatus, and computer program product for planning changes to network data processing systems. A number of processes performed in a current network data processing system and labor used to perform the number processes are identified. Resources in the current network data processing system used by the number of processes are identified. A first cost for labor used to perform the number of processes using the current network data processing system is calculated. A second cost for the resources in the current network data processing system is calculated. A first change in the first cost for labor in a new network data processing system based on a number of changes to the number of processes when the number of processes is performed in the new network data processing system is identified. A second change in the second cost for the resources in the new network data processing system is identified.
摘要:
A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information technology resources required for achieving of such mission, such method used for optimization of provisioning for information technology resources and for prioritizing of control of data and application security and integrity of such mission.
摘要:
Embodiments of the invention are directed to a method and system for rapidly identifying workloads that are and are not appropriate for transformation and processing on a cloud computing environment. One embodiment comprises a method for providing a user entity with a measurement of at least one of the value which will be realized, and the effort which will be required, if a given workload selected from one or more workloads associated with a user entity is delivered to a cloud computing environment for processing thereby, instead of being processed by the user entity processing system. The method comprises specifying a plurality of attributes, wherein each attribute pertains to a characteristic that the user entity processing system possesses to some extent, with respect to the given workload. The method further comprises acquiring input data for each attribute, wherein input data for a given attribute provides a measurement, on a prespecified scale, that represents the extent to which the user entity processing system possesses the given attribute. The input data for each attribute is employed to derive a corresponding numerical parameter value, which are used in a specified mathematical model to compute a final score, wherein the final score comprises the measurement, selectively, of the value which will be realized, or the effort which will be required.
摘要:
A method, system, and computer program product are disclosed for merging search results. In one embodiment, the method comprises identifying a query, splitting the query into sub-queries, and calculating information content for each of the sub-queries. This method also comprises executing each of the sub-queries to obtain a plurality of search results, and combining the search results based on the information content calculated for the sub-queries. In an embodiment, the execution of each of the sub-queries includes identifying a multitude of search results for at least one of the sub-queries; and the combining includes grouping said multitude of search results into a plurality of clusters, and computing a relevance score for each of said clusters. In the embodiment the combining further includes merging the clusters based on the relevance scores computed for the clusters as well as the information content calculated for the sub-queries.
摘要:
A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server.
摘要:
Techniques for selectively off-loading workload across multiple data centers are disclosed. For example, a technique for processing a user request in accordance with a multiple data center environment comprises the following steps/operations. A user request is obtained at a first data center. The user request is classified based on one or more classification criterion. At least a portion of a workload associated with the classified user request is off-loaded to at least a second data center to be processed, wherein the off-loading step/operation is at least based on one or more administrative policies associated with at least one of the first data center and the second data center. The workload is processed such that the user request is at least substantially satisfied in accordance with a service level agreement for the requesting user.
摘要:
A policy for a computer system is transformed into a plurality of sub-policies, at least one synchronization step, and a final action. The sub-policies are distributed to corresponding sub-components in the computer system. The sub-policies are evaluated, wherein each sub-component evaluates its corresponding one or more sub-policies as other sub-components evaluate their corresponding one or more sub-policies. The sub-policies are synchronized by using the at least one synchronization step. The final action is performed in response to synchronizing the sub-policies. The computer system can be singular or distributed.
摘要:
Provided are data structures for use in storing data. A plurality of data structures are defined in a computer readable medium, wherein each data structure indicates a plurality of attributes and at least one function of a storage resource to store data. Policies are defined in the computer readable medium that associate data characteristics to data structures based on a correspondence of data characteristics and the attributes defined in the data structures, wherein each defined data structure is adapted to provide requirements to determine a storage resource to store associated data, and wherein the defined data structure is adapted to provide the storage resource with requirements for storing the data.