摘要:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. The invention determines, at each layer of the IT stack, a required utility and warranty (RUW) value for each of a set of services, wherein the RUW value represents a desired solution for implementing a business process; determines, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack; and compares the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
摘要:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
摘要:
Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for adjusting cooling settings. The computer implemented method comprises analyzing a set of instructions of an application to determine a number of degrees by which a set of instructions will raise a temperature of at least one processor core. The computer implemented method further calculates a cooling setting for at least one cooling system for the at least one processor core. The computer implemented method adjusts the at least one cooling system based on the cooling setting. The step of analyzing the set of instructions is performed before the set of instructions is executed on the at least one processor core. The step of adjusting the at least one cooling system is performed before the set of instructions is executed on the at least one processor core.
摘要:
Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for adjusting cooling settings. The computer implemented method comprises analyzing a set of instructions of an application to determine a number of degrees by which a set of instructions will raise a temperature of at least one processor core. The computer implemented method further calculates a cooling setting for at least one cooling system for the at least one processor core. The computer implemented method adjusts the at least one cooling system based on the cooling setting. The step of analyzing the set of instructions is performed before the set of instructions is executed on the at least one processor core. The step of adjusting the at least one cooling system is performed before the set of instructions is executed on the at least one processor core.
摘要:
A pass-through module in a blade chassis receives an incoming message that utilizes a transmission protocol from one of multiple transmission protocols. The pass-through module determines which of the multiple transmission protocols is used by the incoming message by: comparing a physical component of the transmission protocol used by the incoming message with known physical components of the multiple transmission protocols, and, if necessary, comparing a logical component of the transmission protocol used by the incoming message with known logical components of the multiple transmission protocols. The incoming message is then routed to an optimal blade that is specifically adapted to process messages that utilize the transmission protocol used by the incoming message.
摘要:
Biometric data, which identifies a set of biometric patterns, is received from a set of biometric sensors. The biometric data is processed to form digital biometric data that identifies attributes of the biometric data. Thereafter, a biometric cohort is generated using the digital biometric data. Each member of the set of biometric cohorts shares at least one biometric attribute in common.
摘要:
A computer implemented method, system, and/or computer program product generates an audio cohort. Audio data from a set of audio sensors is received by an audio analysis engine. The audio data, which is associated with a plurality of objects, comprises a set of audio patterns. The audio data is processed to identify audio attributes associated with the plurality of objects to form digital audio data. This digital audio data comprises metadata that describes the audio attributes of the set of objects. A set of audio cohorts is generated using the audio attributes associated with the digital audio data and cohort criteria, where each audio cohort in the set of audio cohorts is a cohort of accompanied customers in a store, and where processing the audio data identifies a type of zoological creature that is accompanying each of the accompanied customers.
摘要:
Generating synthetic events based on a vast amount of data. First and second data are received. The first data is organized into a first cohort. The second data is organized into a second cohort. The first cohort and the second cohort are processed to generate a synthetic event. The synthetic event comprises third data representing a result of a mathematical computation defined by S(p1)==>F(p2), wherein S comprises input facts with probability p1, wherein the input facts comprise the first cohort and the second cohort, and wherein F comprises an inferred event with probability p2. The term “event” means a particular set of data that represents, encodes, or records at least one of a thing or happening. Each of the first data, the second data, the first cohort, the second cohort, the synthetic event, and subcomponents thereof all comprise different events. The synthetic event is stored.
摘要:
A method of tracking a status of a catalytic process in a mixture incorporates the use of Radio Frequency Identification (RFID) tags that have corrosive-sensitive coatings. The coatings are removable, by a corrosive in the mixture, at a rate that tracks with the rate at which a catalytic-driven process progresses. As coatings on the RFID tags are removed by the corrosive in the mixture, the digital signatures returned by the RFID tags change, in response to the corrosive damaging the RFID tags. By quantifying the number of damaged RFID tags, a determination can be made as to the progress status of the catalytic process.
摘要:
A Genetically Modified Organism (GMO) is tracked using Radio Frequency Identification (RFID) tags. A bulk load of GMOs, which is intended for consumption by livestock only, is laced with RFID tags at or near a time of harvest. If the RFID tags appear in a product that is intended for human consumption, then the product is pulled from distribution, since it contains GMOs that are potentially harmful to humans if eaten.