Abstract:
A running of an application resource of a first site of at least two sites is stopped from accessing a storage device of the first site. A running of a replication resource is brought to a stop. The replication resource is configured to control a replication of data between the storage device on the first site on which data from the running application resource on the first site are stored to the storage device on the second site. A replication request is submitted to the automation engine for changing a replication direction to run from the second site to the first site. The application resource is started on the second site only after changing the replication direction to start from the storage device on the second site instead of from the storage device of the first site.
Abstract:
A system and associated method for determining a recovery time for a resource in a heterogeneous computing environment comprising interdependent resources. A graph for the resource representing all sequence dependencies and all group relations are created. The recovery time may be a cumulative startup time or a cumulative shutdown time of the resource considering interdependencies of the resource to other resources. The recovery time for all support resources having sequence dependencies with the resource is calculated and each node representing the support resources are removed from the graph. Then the recovery time for all member resources left in the graph that have group relations with the resource is calculated per a group type of the resource. The recovery time for the resource is a sum of the recovery time of all support resources, the recovery time of all member resources, and a unit recovery time of the resource.
Abstract:
The present invention provides a system and method for the execution of jobs in a distributed computing architecture that uses worker clients which are characterized by a checkpointing mechanism component for generating checkpointing information being assigned to at least one worker client, at least one failover system being assigned to the worker client, a component (failover system selection component) for automatically assigning at least one existing or newly created failover system to the failure system being assigned to a worker client in the case said worker clients fails, wherein the assigned failover system provides all function components in order to take over the execution of the job when said assigned worker client fails, wherein the assigned failover system further includes at least a failover monitor component for detecting failover situations of said assigned worker client.
Abstract:
A mechanism is provided for determining an incident of a resource in a computing environment. An event pertaining to the resource is processed by a system automation module. The event is represented as an associated event data having parameters of a target state, a target state prior to the event, a current state, and a current state prior to the event. First, the target state is compared to the target state prior to the event to assure that the target state is steady. Wherein a determination that the event is an incident cannot be made after comparing the target state and the current state, the system automation module compares the current state to the current state prior to the event. Upon determining that the event is an incident, the event data is marked and stored in a repository.
Abstract:
A running of an application resource of a first site of at least two sites is stopped from accessing a storage device of the first site. A running of a replication resource is brought to a stop. The replication resource is configured to control a replication of data between the storage device on the first site on which data from the running application resource on the first site are stored to the storage device on the second site. A replication request is submitted to the automation engine for changing a replication direction to run from the second site to the first site. The application resource is started on the second site only after changing the replication direction to start from the storage device on the second site instead of from the storage device of the first site.
Abstract:
An autonomic computing system and method determine that a desired end state cannot be reached, determine that an acceptable sub-state can be reached using at least one of priority ratings, conditional relationship specifications, and alternative relationship specifications, and place the computing system in an acceptable sub-state. The priority ratings can contain an attribute assigned to a policy definition that determines a sequence for applying the policy definition. The attribute can be “mandatory”, a numerical value, or “not required”. The conditional relationship specifications have policy definitions that are applied when the state of a specified resource meets a predetermined requirement. An alternative relationship specification has policy definitions and/or conditional relationship specifications that are applied when the state of a specified resource does not meet a predetermined requirement.
Abstract:
A system and associated method for determining a recovery time for a resource in a heterogeneous computing environment comprising interdependent resources. A graph for the resource representing all sequence dependencies and all group relations are created. The recovery time may be a cumulative startup time or a cumulative shutdown time of the resource considering interdependencies of the resource to other resources. The recovery time for all support resources having sequence dependencies with the resource is calculated and each node representing the support resources are removed from the graph. Then the recovery time for all member resources left in the graph that have group relations with the resource is calculated per a group type of the resource. The recovery time for the resource is a sum of the recovery time of all support resources, the recovery time of all member resources, and a unit recovery time of the resource.
Abstract:
A method and apparatus for retrieving information about an object of interest to an observer. A position sensor wearable by the observer generates position information indicating the position of the observer relative to a fixed position. A direction sensor wearable by the observer generates direction information indicating the orientation of the observer relative to a fixed orientation. An object database stores position information and descriptive information for each of one or more objects. An identification and retrieval unit uses the position and direction information to identify from the object database an object being viewed by the observer by determining whether the object is along a line of sight of the observer and retrieves information about the object from the database. The identification and retrieval unit retrieves the descriptive information stored for the object in the database for presentation to the observer via an audio or video output device. Either two-dimensional (2D) or three-dimensional (3D) data is stored and processed, depending on the necessity to discriminate between vertically spaced objects.
Abstract:
This invention describes a method to verify non-looping properties of programs implemented as rule-based expert systems. Our method detects conditions under which the expert system enters erroneous infinite program loops, which lead to non-terminating or oscillating computations, or otherwise proves the absence of such conditions. Our automatic procedure also gives advice on how to correct these errors. The expert systems considered consist of condition-action rules (IF-THEN-statements), where the conditions are logical expressions (formulas of a propositional finite domain logic), and the actions modify the value of a single variable which in turn can be part of other logical expressions. There may be additional (external) variables not controlled by the expert system, and each rule may have an associated evaluation priority.
Abstract:
A method for dynamically creating a high availability policy based upon entries in a configuration management database (CMDB) and a best practices template can be provided. The method can include directing resource discovery in a CMDB for a selected application to discover components and dependencies of the selected application. The method also can include mapping the components and dependencies discovered for the selected application in the CMDB to a best practices template specifying a parameterized high availability topology for the selected application. Finally, the method can include storing the best practices template with mapped components and dependencies as a high availability policy for the selected application.