摘要:
The present invention is a service request routing system and method. The system can include a model table configured to store resource models. A monitor can be coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router also can be coupled to the model table. Specifically, the router can be programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. In a preferred aspect of the invention, the associated service host can include a grid host in a grid computing system.
摘要:
Storage-Assisted QoS. To provide storage-assisted QoS, a discriminatory storage system able to enforce a service discrimination policy within the storage system can include re-writable media; a storage system controller; a cache; and, a QoS enforcement processor configured to selectively evict entries in the cache according QoS terms propagated into the storage system through the storage system controller.
摘要:
A method, system, computer program product, and method of doing business by improving the security of transactions performed using smart cards, and also a card with an integrated biometric sensor. The disclosed techniques also improve the security of transactions carried out with devices such as personal or nullpervasive computingnull devices. Biometric sensors are used for obtaining identifying information from users of smart cards. In one aspect, this may be done by securely attaching a smart card reader and a biometric sensor to a security core which authenticates these devices using public key infrastructure techniques, and which securely controls information exchanged with these devices. In another aspect, this is done by integrating a biometric sensor with a smart card.
摘要:
A grid coordinator which has been configured for autonomic failover can include a monitor communicatively linked to a multiplicity of grid hosts in a services grid. A metrics store can be coupled to the monitor and configured to store service metrics for individual service instances in the grid hosts. Optimization logic can be programmed to compute a best-fit between metrics stored for a set of service instances in a failed grid host, and platform metrics determined for a proposed replacement grid host. Finally, a failover processor can be coupled to the monitor and the optimization logic and communicatively linked to the grid hosts to create a new set of service instances in the proposed replacement grid host to replace the set of service instances in the failed grid host according to the best-fit in the optimization logic.
摘要:
An adaptive data replication and caching system configured to enforce service terms at the network edge. Service terms can include, but are not limited to established quality of service (QoS) terms, as well as the terms of a service level agreement (SLA). This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system based upon the service terms.
摘要:
An adaptive data replication and caching system configured for deployment at the network edge. This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system.
摘要:
A method for managing multi-tier SLA relationships. The method can include first computing costs of utilizing edge server resources in a CDN, costs of dedicating content host resources in a content host in lieu of the utilization, and prospective revenues which can be generated by the content host providing services based on the resources to content consumers. Minimum QoS levels can be identified which must be maintained when providing the services to the content consumers according to QoS terms in established SLAs between the content host and individual ones of the content consumers. Finally, a new SLA can be established between the content host and the CDN. Importantly, the new SLA can include QoS terms for selectively allocating resources in the CDN. Moreover, the QoS terms can optimize revenues generated by the content host providing services based on the selective allocation of resources and the computed costs.
摘要:
A method, system, computer program product, and method of doing business by providing a secure integrated device (such as a pervasive computing device) for which operating capabilities can be dynamically yet securely selected (including, but not limited to, pluggable connection of input/output devices and/or application processors that provide selected functions). Each input/output (I/O) device and application processor to be used is plugged in to a bus of a security core, and authenticates itself to the security core using public key infrastructure techniques, thereby creating a secure multi-function device. All of the multi-function device's input and output interactions with its environment necessarily traverse an I/O bus under the sole control of the security core. The only communication path between an application processor and the external environment (such as an I/O device) is through an application processor bus, which is likewise under control of the security core. Thus a user may dynamically yet securely select the capabilities of a multi-function device, and because each I/O device and application processor in use by that multi-function device is authenticated, the security of transactions or network services performed when using such devices is improved.
摘要:
Techniques are disclosed for addressing the name space mismatch between content servers (which use Uniform Resource Locators, or nullURLsnull) and content caching systems (which use file and path names). A file name-to-URL mapping is created for use by content caching systems, and data in protocol response messages (and optionally in protocol request messages) is augmented to transmit information for use in creating this mapping, enabling a content caching system to automatically and dynamically populate its file name-to-URL mapping. By having the file name available, the caching system can now respond to content management messages which identify the cached content by only the content's associated file name. Techniques for encoding the message extensions include: use of new directives on existing cache-control headers in Hypertext Transfer Protocol (nullHTTPnull) messages; addition of new headers in HTTP messages; and use of meta-data in markup languages such as Hypertext Markup Language (nullHTMLnull) or Extensible Markup Language (nullXMLnull) format.
摘要:
Methods, systems, computer program products, and methods of doing business by performing load balancing of content requests using information regarding the cost of dynamically creating the requested document content. Cost metrics are gathered by a server which generates requested content, and may reflect processing at one or more other servers. This cost information is provided to a load balancing host. Several alternative approaches for providing the cost metrics may be used, including defining new headers for response messages, specifying cookie values, and so forth. The load balancing host may choose to route a subsequent request for that content to the server which most recently generated the content, or to another available server, depending on the cost of re-generating the content and the current load on those servers.