摘要:
Techniques for problem determination are provided. The techniques include identifying one or more configuration items in two or more systems connected to one or more networks, performing a comparison of one or more common configuration items from the one or more configuration items in the two or more systems connected to one or more networks, and using the comparison to detect deviation between one or more configuration items of one of the two or more systems and one or more respective configuration items in the other one or more systems.
摘要:
Techniques for problem determination are provided. The techniques include identifying one or more configuration items in two or more systems connected to one or more networks, performing a comparison of one or more common configuration items from the one or more configuration items in the two or more systems connected to one or more networks, and using the comparison to detect deviation between one or more configuration items of one of the two or more systems and one or more respective configuration items in the other one or more systems.
摘要:
Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern.
摘要:
Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern.
摘要:
Installation files are annotated, which annotations may trigger system snapshots to be taken at a plurality of points during the execution of the installation files and/or collected. During a test run, the generated snapshots are examined incrementally to determine whether the installation is success or failure at that point. Checkpoint snapshots are stored, and those indicating failure are recorded with description of the error and/or remediation that suggest how the errors may be resolved or fixed. During a production run, the annotated installation files may be executed and the checkpoint snapshots generated during the production run may be compared with those stored of the test run to incrementally identify and resolve potential problems in the production run.
摘要:
Installation files are annotated, which annotations may trigger system snapshots to be taken at a plurality of points during the execution of the installation files and/or collected. During a test run, the generated snapshots are examined incrementally to determine whether the installation is success or failure at that point. Checkpoint snapshots are stored, and those indicating failure are recorded with description of the error and/or remediation that suggest how the errors may be resolved or fixed. During a production run, the annotated installation files may be executed and the checkpoint snapshots generated during the production run may be compared with those stored of the test run to incrementally identify and resolve potential problems in the production run.
摘要:
A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed.
摘要:
A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed.
摘要:
An exemplary method (which can be computer implemented) for problem determination and resolution includes the steps of detecting anomalous changes in an environment for which a problem diagnosis is to be provided, generating domain specific key words and predicates based, at least in part, on the detected anomalous changes, searching in a knowledge resolution repository for solutions related to the generated key words and predicates, and generating a particular solution for the problem, based, at least in part, on the solutions from the knowledge resolution repository
摘要:
A plurality of master desktop images for a plurality of users are stored at a plurality of geographically diverse data centers. At a first one of the data centers, a virtual desktop is constructed for a remote client. The virtual desktop is constructed from a given one of the master desktop images at the first one of the data centers and an individualized delta image for a user associated with the remote client. When it is determined that the remote client is at a geographical location wherein the first one of the data centers is not the closest one of the data centers to the remote client, the virtual desktop for the remote client is reconstructed at a second, closest, one of the data centers. The virtual desktop is reconstructed from a given one of the master desktop images at the second one of the data centers and the individualized delta image for the user associated with the remote client. A copy of the individualized delta image is moved from the first one of the data centers to the second one of the data centers to facilitate reconstructing the virtual desktop.