摘要:
A method and system for optimally scheduling an activity managed by a web application. Date and time ranges are initialized with predefined values. A tentative start date included in the date range and a tentative start time included in the time range are automatically calculated, and are included in a tentative schedule for the activity. A time period is determined by the tentative schedule and a duration of the activity. The automatic calculation prevents the time period from overlapping a time interval during which the web application is to experience a peak load. The tentative schedule is presented to the user via the interface, and is recalculated and redisplayed in response to the user updating a load-related parameter. The user selects a final schedule, which is the tentative schedule or a user-specified schedule different from the tentative schedule.
摘要:
An Information Technology (IT) system display method and computer program product. A description is provided of a configuration of devices, network segments, and vertical connectors relating to an IT structure. The devices are initially distributed to form a distribution of the devices in a matrix representing a display screen. A defined goal value of the configuration is a function of a length and weight of each network segment, a length and weight of each vertical connector, and a penalty for each crossing of a device by a network segment. An overlay pattern of the network segments and the vertical connectors overlayed on the matrix is displayed in accordance with the description and the final distribution of the devices in the matrix. The goal value for the final distribution is lower than for the initial distribution. The final distribution is displayed on the display screen together with the overlay pattern.
摘要:
A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.
摘要:
A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system, associated computer program products, and an associated processes for integrating computing infrastructure. The firewall rule generation method generates firewall rules allowing data transmission between a computer and a client, and subsequently assigns the firewall rules to firewalls of the IT system. The load balancing rule generation method assigns a load balancing mechanism to a load balanced group to which execution of an application is assigned, wherein the load balanced group has servers therein. For a client and computer having a communication protocol therebetween that is not allowed by a security policy, the wrapper generation method generates a communication protocol wrapper that opens a Transmission Control Protocol (TCP) connection between the client and the computer such that the TCP connection is allowed by the security policy.
摘要:
Method and system for verifying correctness of networking aspects of an Information Technology (IT) system that includes a host network of hosts. The hosts include servers and firewalls. A firewall connectivity indication of whether the host network includes an isolated firewall or a cross-zone connected firewall is determined. Determining for each host whether the host is isolated from a communication network to which the IT system is connected determines whether isolated network segments exit within the host network. For each host determined to be isolated from the communication network, the method identifies all network segments of the host network to which each host is connected, determines the unique network segments of the identified network segments, and designates the unique network segments as a set of isolated network segments. The firewall connectivity indication and the set of isolated network segments are stored in a storage medium of a computer system.
摘要:
A method for verifying correctness of an Information Technology (IT) structure instance D of an IT structure R, a method for detecting an unauthorized change in an operating instance X of an IT structure R, a method for verifying conformance of an IT structure to an IT delivery environment, associated computer program products, and associated processes for integrating computing infrastructure. The method for verifying correctness of an IT structure instance D determines whether a reverse specification RD for D differs from R. The method for detecting an unauthorized change in an operating instance X of an IT structure R determines whether authorized changes in R have occurred. The method for verifying conformance of an IT structure to an IT delivery environment verifies compliance of the IT structure relating to: product standard compliance, compliance of software elements of the IT structure primitive composition, software application type compliance, and network traffic compliance.
摘要:
A method and associated computer program product for developing an Information Technology (IT) system. An abstract IT structure for the IT system is provided. A virtual IT structure for the IT system is generated from the abstract IT structure by a translator. A real IT structure for the IT system is generated from the virtual IT structure.
摘要:
A computer-implemented method for optimizing an aspect of an Information Technology (IT) structure of an IT system, the aspect of the IT structure is optimized with respect to at least one control parameter. The IT structure includes a plurality of elements. Each element independently is a hardware element, a software element, or a combination of a hardware element and a software element. Each control parameter has a value that is specific to each element of the IT structure.
摘要:
A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system, associated computer program products, and an associated processes for integrating computing infrastructure. The firewall rule generation method generates firewall rules allowing data transmission between a computer and a client, and subsequently assigns the firewall rules to firewalls of the IT system. The load balancing rule generation method assigns a load balancing mechanism to a load balanced group to which execution of an application is assigned, wherein the load balanced group has servers therein. For a client and computer having a communication protocol therebetween that is not allowed by a security policy, the wrapper generation method generates a communication protocol wrapper that opens a Transmission Control Protocol (TCP) connection between the client and the computer such that the TCP connection is allowed by the security policy.
摘要:
A method and system for estimating a screen refresh rate of a computing unit participating in an Internet-based collaboration. The computing unit receives a test image that includes pixels located at predefined positions and blinking at predefined frequencies. Measurements of the number of blinks of the pixels in a specified time period are collected. An average of the measurements summed over the predefined frequencies is calculated. A screen refresh rate is estimated by comparing the calculated average to a sum of multiple sums of simulated blinks of pixels in the specified time period. The average is closer to the sum than any of the other sums and the sum is associated with the estimated screen refresh rate.