摘要:
A method, apparatus, and computer instructions for installing software in a network data processing system. An event is detected in the network data processing system indicating that a software module is to be installed in a set of data processing systems in the network data processing system. A configuration of each data processing system in the set of data processing systems is discovered, and a set of instructions is created using a knowledge base of prior installations. The set of instructions is tailored for each data processing system in the set of data processing systems based on the configuration for the each data processing system in the set of data processing systems. The set of instructions for the software module to be installed is sent to the set of data processing systems.
摘要:
A method, apparatus, and computer instructions for installing software in a network data processing system. An event is detected in the network data processing system indicating that a software module is to be installed in a set of data processing systems in the network data processing system. A configuration of each data processing system in the set of data processing systems is discovered, and a set of instructions is created using a knowledge base of prior installations. The set of instructions is tailored for each data processing system in the set of data processing systems based on the configuration for the each data processing system in the set of data processing systems. The set of instructions for the software module to be installed is sent to the set of data processing systems.
摘要:
A method, apparatus, and computer instructions for installing software in a network data processing system. An event is detected in the network data processing system indicating that a software module is to be installed in a set of data processing systems in the network data processing system. A configuration of each data processing system in the set of data processing systems is discovered, and a set of instructions is created using a knowledge base of prior installations. The set of instructions is tailored for each data processing system in the set of data processing systems based on the configuration for the each data processing system in the set of data processing systems. The set of instructions for the software module to be installed is sent to the set of data processing systems.
摘要:
Enabling automated provisioning on a data processing network includes providing the network with access to an automated provisioning controller. The controller enables a user to specify resource allocation priorities and uses the user-specified priorities, in conjunction with a resource stabilization policy, to resolve conflicting resource requests. The resource allocation priorities include priorities for demand-based resource requests and maintenance-based resource requests. The stabilization policy includes a policy for constraining allocation of a resource based on forecasted demand and a policy for constraining allocation of a resource based on a scheduled maintenance task.
摘要:
Environment asset inventories of computing environment assets are arranged into computing environments, and at least one collector interface is disposed between the environments to detect movement of an asset and to produce asset movement reports. Upon receipt of a movement report, one or more backup copies of a environment asset inventory are accessed, and compared a modified environment asset inventory. A history of each asset in each inventory is maintained. A history report regarding the life of an asset from first introduction into an environment throughout movements between environments is produced, including any applicable patches and upgrades configured into an environment. A discrepancy report is generated including assets, locations, status, and a revision level indicators.
摘要:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
摘要:
The present invention provides a method, apparatus, and computer instructions for testing compatibility of software versions, the method comprising the computer implemented steps of performing an inventory on an existing set of software modules resident in the data processing system responsive to an installation of a new software module in a data processing system; referring to a knowledge base of versions of respective software modules to determine whether the new software module is compatible with the existing set of software modules; and testing the new software module in a test data processing system in combination with the existing set of software modules in response to a negative determination.
摘要:
A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
摘要:
A method and software for fulfilling a resource request in a data processing network includes specifying characteristics of the requested resource responsive to detecting the resource request. A set of attributes is then derived from the specified characteristics. The specified characteristics indicate broad or general properties of the needed resource while the derived attributes preferably indicate the hardware and software components of a resource ideally suited to fulfill the resource request. Attribute information associated an available resource is then evaluated against the attributes derived from the specified characteristics. An available resource is then selected, based on the evaluation, to satisfy the resource request. The attributes of the selected resource best match the attributes derived from the specified characteristics. The requested resource may be a server resource and specifying the characteristics of the requested resource may includes specifying a server type from a constrained set of server types.
摘要:
A message is received with an encoding of a group universal resource identifier that identifies a resource group and of a plurality of member universal resource identifiers for a plurality of resources that constitute the resource group. The message is received subsequent to requesting the resource group with the group universal resource identifier. For each of the plurality of member universal resource identifiers in an order designated by the message, the member universal resource identifier is extracted. The member universal resource identifier comprises a member resource name and a universal resource identifier that identifies a corresponding one of the plurality of resources. The member universal resource identifier is inserted into navigation history of a web browser. The member universal resource identifier is inserted into the navigation history in accordance with the order.