Abstract:
An approach for managing memory usage in cloud and traditional environments using usage analytics is disclosed. The approach may be implemented in a computer infrastructure including a combination of hardware and software. The approach includes determining that space is available within one or more tables which have schema definitions with string fields having a predefined length. The approach further includes creating a virtual table and mapping the available space to the virtual table for population by one or more records.
Abstract:
Embodiments for managing a wireless communication network by one or more processors are described. The presence of a plurality of mobile electronic devices within a wireless communication network is detected. A device-to-device (D2D) connectability score for each of the plurality of mobile electronic devices is calculated. A signal representative of the calculated D2D connectability score for each of the plurality of mobile electronic devices is generated.
Abstract:
An approach for managing memory usage in cloud and traditional environments using usage analytics is disclosed. The approach may be implemented in a computer infrastructure including a combination of hardware and software. The approach includes determining that space is available within one or more tables which have schema definitions with string fields having a predefined length. The approach further includes creating a virtual table and mapping the available space to the virtual table for population by one or more records.
Abstract:
Dynamic allocation of memory in a hybrid system is provided. In particularly, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes a method comprises dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure.
Abstract:
Exemplary embodiments for increased in-line deduplication efficiency in a computing environment are provided. Embodiments include incrementing the size of data samples from fixed size data chunks for each nth iteration for reaching a full size of an object requested for in-line deduplication, calculating in nth iterations hash values on data samples from fixed size data chunks extracted from the object, and matching in a nth hash index table the calculated nth iteration hash values for the data samples from the fixed size data chunks with a corresponding hash value of existing objects in storage, wherein the nth hash index table is built for each nth iteration of the data samples belonging to the fixed data chunks.
Abstract:
Methods, systems, and computer program products are provided for optimizing selection of files for eviction from a first storage pool to free up a predetermined amount of space in the first storage pool. A method includes analyzing an effective space occupied by each file of a plurality of files in the first storage pool, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for eviction, based on the identified one or more data blocks, and evicting the one or more candidate files for eviction from the first storage pool to a second storage pool.
Abstract:
Embodiments for managing a wireless communication network by one or more processors are described. The presence of a plurality of mobile electronic devices within a wireless communication network is detected. A device-to-device (D2D) connectability score for each of the plurality of mobile electronic devices is calculated. The calculating of the D2D connectability score for each of the plurality of mobile electronic devices is based on a security posture of the respective mobile electronic device, a privacy posture of the respective mobile electronic device, or a combination thereof. A signal representative of the calculated D2D connectability score for each of the plurality of mobile electronic devices is generated.
Abstract:
Embodiments for medical condition communication management by one or more processors. A maturity score and medical condition acceptance score relating to a medical condition of a user may be estimated according to data collected from one or more devices associated with the user. The maturity score may represent a measure of an emotional state, age, and cognitive reasoning ability. The medical condition acceptance score may represent a measure of understanding and acceptance capability of the medical condition. One or more search results responsive to a search query related to the medical condition submitted by the user may be adjusted according to the maturity score, the medical condition acceptance score, and an appropriateness of communications for the one or more search results based on a plurality of identified contextual factors.
Abstract:
Methods, systems, and computer program products are provided for performing a secure delete operation in a wide area network (WAN) including a cache site and a home site. A method includes identifying a file for deletion at the cache site, determining whether the file has a copy stored at the home site, detecting a location of the copy at the home site prior to a disconnection event of the cache site from the home site, deleting the file from the cache site during the disconnection event, and in response to the secure deletion of the file not being complete during the disconnection event, indicating on a table a remote inode number assigned to the copy associated with the file at the home site, a name under which the copy is saved, and a list of data chunk tuples specifying selected data of the copy to undergo secure deletion.
Abstract:
A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information.