摘要:
A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability rule
摘要:
Various embodiments for efficiently provisioning a storage area network (SAN) are provided. In one embodiment, SAN information is provided to an engine for optimization. The SAN information includes at least one of SAN configuration information, SAN usage information, at least one cost profile, and at least one chargeback model. Based on the SAN information, those of an available plurality of storage resources not meeting at least one storage criterion are filtered. The filtered storage resources are ranked on a cost basis. A resource configuration graph is constructed based on the ranked storage resources. The resource configuration graph is traversed to obtain a plurality of possible SAN configuration plans. At least one power profile is applied to the plurality of possible SAN configuration plans to rank the plurality of possible SAN configuration plans by energy consumption.
摘要:
The invention provides an enterprise administration system and method. The system includes a user interface module configured to enter administration terms or select a predetermined script of administration terms, a knowledge base configured to store system information, a meta information module configured to use the system information to store entity-objective indexes, and a workflow mapping module configured to map the administration terms to system information extraction tasks to extract relevant entities and objectives and apply a rule to the extracted entities and objectives for presenting the extracted entities and objectives in a ranked order.
摘要:
The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.
摘要:
A method, system, and computer program product for automatically generating best practices for configuring a networked system of entities are provided. The method includes identifying a networked system configuration problem and determining a set of problematic entities. The set of problematic entities includes the entities reporting the networked system configuration problem. The method further includes determining a set of problem associated entities, where the set of problem associated entities includes the entities with a common association having a strongest correlation to the set of problematic entities. The method additionally includes classifying the set of problem associated entities on an attribute basis to determine one or more attributes of the entities that contribute to the networked system configuration problem, and reporting the best practices for configuring the networked system of entities as avoiding the one or more attributes of the entities that contribute to the networked system configuration problem.
摘要:
Techniques for determining one or more disaster recovery (DR) service level agreements (SLAs) for each of one or more components of an application are provided. The techniques include identifying one or more components of an application, capturing one or more intra-application data dependencies between the one or more components, and mapping each of the one or more components to a DR profile to determine one or more DR SLAs for each of the one or more components of an application.
摘要:
Various embodiments for efficiently provisioning a storage area network (SAN) are provided. In one embodiment, SAN information is provided to an engine for optimization. The SAN information includes at least one of SAN configuration information, SAN usage information, at least one cost profile, and at least one chargeback model. Based on the SAN information, those of an available plurality of storage resources not meeting at least one storage criterion are filtered. The filtered storage resources are ranked on a cost basis. A resource configuration graph is constructed based on the ranked storage resources. The resource configuration graph is traversed to obtain a plurality of possible SAN configuration plans. At least one power profile is applied to the plurality of possible SAN configuration plans to rank the plurality of possible SAN configuration plans by energy consumption.
摘要:
Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated.
摘要:
Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated.
摘要:
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.