摘要:
Embodiments herein present a method, system, computer program product, etc. for automated management using a hybrid of prediction models and feedback-based systems. The method begins by calculating confidence values of models. Next, the method selects a first model based on the confidence values and processes the first model through a constraint solver to produce first workload throttling values. Following this, workloads are repeatedly processed through a feedback-based execution engine, wherein the feedback-based execution engine is controlled by the first workload throttling values. The first workload throttling values are applied incrementally to the feedback-based execution engine, during repetitions of the processing of the workloads, with a step-size that is proportional to the confidence values. The processing of the workloads is repeated until an objective function is maximized, wherein the objective function specifies performance goals of the workloads.
摘要:
A technique of allocating shared resources in a computer network-based storage system comprises taking periodic performance samples on a running storage system; evaluating an objective function that takes as input the performance samples to quantify how aligned a current state of the storage system is with organizational objectives; building and maintaining models of behavior and capabilities of the storage system by using the performance samples as input; determining how resources of the storage system should be allocated among client computers in the storage system by selecting one among many possible allocations based on predictions generated by the models in order to maximize a value of the objective function; calculating a confidence statistic value for a chosen resource allocation based on an accuracy of the models; and enforcing the chosen resource allocation on the running storage system when the confidence statistic value is at or above a predetermined threshold value.
摘要:
A system and method of creating domain knowledge-base models required for automated system management, wherein the method comprises defining data storage system designer specifications comprising input/output parameters; analyzing a runtime system performance log of a data storage system; identifying relationship functions between different ones of the input/output parameters; deriving knowledge-base models from the designer specifications, the runtime system performance log, and the relationship functions; refining the knowledge-base models at system runtime using newly monitored system performance logs; and improving the accuracy of the knowledge-base models by detecting incomplete designer specifications, wherein the knowledge-base models are preferably generated by data mining techniques.
摘要:
When an alarm condition relating to a performance goal of a storage system is detected, a storage management system invokes an N-step lookahead engine for simulating operation of the storage system when there are multiple actions that could be taken by the storage system for eliminating the alarm condition. The N-step lookahead engine generates N possible system states based on a current state of the storage system. The N possible states are based on a cost model of each of the multiple actions. Each cost model is based on an action, a behavior implication of the action, a resource implication of the action and a transient cost of the action. An action is selected that generates a system state that optimizes the stability, a prerequisite and a transient cost of invoking the selected action.
摘要:
An RFID system and method for communicating between a host computer, one or more interrogators connected to the host computer, and a large body of transponders distributed within an area covered by the interrogators. Each transponder originally has a common identification code, and upon initialization by the host computer internally generates a unique identification code based upon an internally generated random number. The host, through the interrogators, reads each of the identification codes associated with each transponder by iteratively transmitting a read identification code command along with a controlled variable. Each transponder compares the received controlled variable to an internally generated random number, and selectively transmits its identification code based upon the outcome of this comparison. After the completion of each read identification code iteration, the host adjusts the controlled variable based upon the responses received in the previous iteration. Preferably, communications between the interrogators and the transponders are DSSS signals in TDMA format, and the transponders use the random number generator to assign a time slot for transmission of their response. Each interrogator includes an antenna system utilizing a switch matrix to connect multiple antennas having different polarizations, which ensures that all transponders within the range of the interrogator receive the signals from the interrogator. In a further aspect, the interrogators are arranged in groups, each group in nearest neighbor format, to reduce the time for reading the transponders and the emissions generated when more than one interrogator is active at the same time.
摘要:
A method for reducing data loss and unavailability by integrating multiple levels of a storage hierarchy is provided. The method includes receiving a read request. In addition, the method includes recognizing a data failure in response to the read request. The method further includes locating an alternate source of the data to be read in response to recognizing the data failure. The alternate source includes data cached at devices in the storage hierarchy, data in a backup system, and cumulative changes to the data since the last backup. Moreover, the method includes responding to the read request with data from the alternate source.
摘要:
A sacrificial circuit connector for interposition between male and female connector terminals for applications in which the expected connect and disconnect cycles may exceed the rated cycle limits of at least one of the connector terminals. The structure of sacrificial connector is largely determined by the need for connection compatibility between the sacrificial connector and the connector terminals. By making repeated disconnections at the sacrificial connector rather. than between the connector terminals, the usable life of at least one connector terminal can be significantly increased, thereby adding efficiency and reliability while decreasing costs.
摘要:
Methods and systems for creating an advanced virtual sports platform over a computer network by establishing and storing input data sources for a real-world competition; receiving, querying, and storing user account credentials from users; querying and generating user leagues the one real-world competition; receiving and storing user teams for the competition user league; operating a live draft for the competition user leagues and teams, including draft timer and nonresponse autopick features; querying and receiving stage data for the competition from input data sources; establishing bonus specifiers for the user leagues; outputting stage data scores; assigning user team points based on the output stage data scores; generating rankings for the user teams; and displaying rankings for the user teams. Other aspects include analyzing the platform data for significant variations between expected and actual performance.
摘要:
A clamp assembly including: a clamp frame including a first portion including a first opening which accepts a fastener, and a second portion interposed between the first portion and a third portion, wherein the third portion includes a second opening and a third opening, each of which accepts a fastener, a threaded rod disposed through the first portion of the clamp frame; and a clamp pad on an inner end of the clamp rod.
摘要:
A method of caching faceted search results includes providing a rule set and receiving system criteria. The method further includes generating at least one faceted search result based on a first faceted search using a plurality of search terms, and maintaining at least a portion of the faceted search results in a denormalized database based on the rule set and system criteria. A computer readable medium including computer readable code for executing the method steps, as well as a system including means for executing the method steps is also disclosed.