摘要:
A method for maximizing a utility of a service contract by optimizing target response time for a performance service level objective is provided. A set of criteria are provided to ensure that performance requirements for the service are met. The method comprises determining one or more usage windows for providing a service, wherein each usage window is associated with a performance requirement and a time period; extracting usage patterns for each usage window based on historical data provided from monitoring requests for service in each usage window; extracting response time per transaction associated with said requests based on historical data provided from monitoring responses provided to said requests in each usage window; and calculating optimal probability for breach in each usage window (Pi) and determining the associated target response time, based on the usage pattern for each window and the response time per transaction.
摘要:
A method for maximizing a utility of a service contract by optimizing target response time for a performance service level objective is provided. A set of criteria are provided to ensure that performance requirements for the service are met. The method comprises determining one or more usage windows for providing a service, wherein each usage window is associated with a performance requirement and a time period; extracting usage patterns for each usage window based on historical data provided from monitoring requests for service in each usage window; extracting response time per transaction associated with said requests based on historical data provided from monitoring responses provided to said requests in each usage window; and calculating optimal probability for breach in each usage window (Pi) and determining the associated target response time, based on the usage pattern for each window and the response time per transaction.
摘要:
Systems and methods for optimizing memory management in a runtime environment are provided. The method comprises monitoring one or more objects loaded into primary memory of a computing system to determine if at least a first object can be removed from the primary memory; instantiating a proxy object to replace the first object in the primary memory; removing the first object from the primary memory; and monitoring calls to the proxy object to determine whether the first object is invoked by a process.
摘要:
Systems and methods for optimizing performance in a computing environment are provided. The system comprises means for monitoring execution of annotated logic code associated with a software component to determine whether a condition has been satisfied, wherein annotations in the logic code provide one or more details about the software component, the details being useful to a healing agent to correct a problem associated with said condition during the execution of the logic code.
摘要:
Systems and methods for optimizing memory management in a runtime environment are provided. The method comprises monitoring one or more objects loaded into primary memory of a computing system to determine if at least a first object can be removed from the primary memory; instantiating a proxy object to replace the first object in the primary memory; removing the first object from the primary memory; and monitoring calls to the proxy object to determine whether the first object is invoked by a process.
摘要:
Systems and methods for optimizing performance in a computing environment are provided. The system comprises means for monitoring execution of annotated logic code associated with a software component to determine whether a condition has been satisfied, wherein annotations in the logic code provide one or more details about the software component, the details being useful to a healing agent to correct a problem associated with said condition during the execution of the logic code.
摘要:
Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.
摘要:
Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.
摘要:
A system and method for correlating events in data processing resources processing a workload. An event correlation service comprising an event correlation service software framework is provided on a processor unit. The event correlation service is configured, using the event correlation service software framework, for correlating the events from monitored data for the workload, wherein the workload is processed using the data processing resources provided by a provider of the data processing resources. The event correlation service receives monitored data for the workload as the workload is being processed. The monitored data is processed by the event correlation service to identify an occurrence of an event of interest for the workload as the workload is being processed. An output is provided in response to identifying the occurrence of the event of interest.
摘要:
Systems and methods for deploying a virtual machine (VM) on a host are provided. An exemplary method comprises notifying a host to download a master copy of a VM image from a remotely located network storage device, in response to a service provider providing a definition manifest for a service request supported by the VM, wherein the host deploys the VM directly from the VM image downloaded to a storage medium locally connected to the host machine, wherein deployment of the VM allows the host to locally service the service request associated with the definition manifest, wherein the host replicates copies of the VM image, in response to receiving additional service requests to create one or more VM clones; wherein the host customizes the one or more VM clones based on the definition manifest.