摘要:
Methods and systems are provided for coordinating a project-commitment process for an organization. An interface is provided to a computational system for coordinating communications among personnel of the organization. A request is received from a customer or an agent of the customer at the organization. The request includes specification of project parameters for a project. A series of communications within the organization are coordinated using the computational system to evaluate a capacity of the organization to implement the project in accordance with the project parameters. From the evaluated capacity, it is determined whether the organization may commit to performing the project on behalf of the customer.
摘要:
Disclosed are methods and systems for analyzing images of specimens processed by a programmable quantitative assay or more specifically a robust programmable quantitative dot assay, PDQA, that enable specimens to be imaged and assessed across a wide variety of conditions and applications. Specific embodiments directed to immunohistochemical applications provide more quantitative methods of imaging and assessing biological samples including tissue samples.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for training a mathematical model to predict whether a future software update will be applied to one of the one or more computing devices using information collected from the devices, the collected information including the following for each of a plurality of software updates made available during the one or more time periods: an identification of software to which the update applies, whether the software update was installed on any of the computing devices, and, if so, whether the software installation was successful.
摘要:
Apparatus and methods to engage in accessing informational content in a data hub server, where the informational content is identified as public or partially public to a group registered in the data hub server with permission to access the informational content made public or partially public in the data hub server by another entity, provide a mechanism to enhance the communication capabilities among mobile electronic devices. Additional apparatus, systems, and methods are disclosed.
摘要:
A system and methods for providing guarantees about faithful execution of databases that run under the control of an untrusted entity—such as a cloud computing service provider—that is different than the owner of the data and applications being outsourced; or runs on a server that may be compromised by unauthorized users. Specifically, the system and methods establishes that an untrusted database is being faithfully hosted and provides indemnity for the service provider from false claims, enabling the server to prove its innocence against untrue claims of faulty operation. The invention also provides assured provenance for all changes made to the database.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for high-level language for specifying configurations of cloud-based deployments. In one aspect, a method includes receiving a configuration specification for configuring a cloud-based deployment, the configuration specification being written in a specification language and requiring instantiation of respective class definitions of one or more classes, each class modeling a respective data or functional component of the cloud-based deployment using a group of configurable class parameters, and the respective class definition of each class representing a requested state of the data or functional component modeled by the class; deriving a plurality of application programming interface (API) calls for configuring the cloud-based deployment based on the class definitions of the one or more classes; causing the plurality of API calls to be executed to configure the cloud-based deployment.
摘要:
A high-level object-oriented specification language allows configurable components of a cloud-based deployment to be modeled by a class definition that includes a group of configurable class parameters. The object-oriented specification language supports extension of an existing base class definition to create new class definitions, and supports inheritance of class parameters from the existing base class definition by the new class definitions. A cloud-based deployment can be customized based on class definitions used in configuring one or more generic deployments, such as by modifying class parameter values of the class definitions, varying interrelationships between the classes, and supplementing existing class parameters with new class parameters. The high-level object-oriented specification language supports class definitions that model hardware and virtual resources as well as software roles and service roles served by software applications and services in a cloud-based deployment. Syntax for specifying dependency and connectivity between classes is also provided.
摘要:
A system and methods for providing guarantees about faithful execution of databases that run under the control of an untrusted entity—such as a cloud computing service provider—that is different than the owner of the data and applications being outsourced; or runs on a server that may be compromised by unauthorized users. Specifically, the system and methods establishes that an untrusted database is being faithfully hosted and provides indemnity for the service provider from false claims, enabling the server to prove its innocence against untrue claims of faulty operation. The invention also provides assured provenance for all changes made to the database.
摘要:
In a computer system running a primary virtual machine (VM) on virtualization software on a primary virtualized computer system (VCS) and running a secondary VM on virtualization software on a secondary VCS, a method for the secondary VM to provide quasi-lockstep fault tolerance for the primary VM includes: as the primary VM is executing a workload, virtualization software in the primary VCS is: (a) causing predetermined events to be recorded in an event log, (b) keeping output associated with the predetermined events pending, and (c) sending the log entries to the virtualization software in the secondary VCS; as the secondary VM is replaying the workload, virtualization software in the secondary VCS is: (a) sending acknowledgements indicating that log entries have been received; (b) when the virtualization software encounters one of the predetermined events, searching the log entries to determine whether a log entry corresponding to the same event was received from the primary VCS, and if so, comparing data associated with the predetermined event produced by the secondary VM with that of the primary VM; if there is a match, the virtualization software in the secondary VCS transmitting an acknowledgement to the virtualization software in the primary VCS; one of the virtualization software in the primary or secondary VCS dropping the event and the other dispatching the output; and if there is no match, performing a checkpoint resynchronization.
摘要:
Formulating an integrated disaster recovery (DR) plan based upon a plurality of DR requirements for an application by receiving a first set of inputs identifying one or more entity types for which the plan is to be formulated, such as an enterprise, one or more sites of the enterprise, the application, or a particular data type for the application. At least one data container representing a subset of data for an application is identified. A second set of inputs is received identifying at least one disaster type for which the plan is to be formulated. A third set of inputs is received identifying a DR requirement for the application as a category of DR Quality of Service (QoS) class to be applied to the disaster type. A composition model is generated specifying one or more respective DR QoS parameters as a function of a corresponding set of one or more QoS parameters representative of a replication technology solution. The replication technology solution encompasses a plurality of storage stack levels. A solution template library is generated for mapping the application to each of a plurality of candidate replication technology solutions. The template library is used to select a DR plan in the form of a replication technology solution for the application.