摘要:
A system and method used to characterize query results and retrieve the query results based on the characterization. An informational resource is queried and query results are received. The filter arguments, filter values, data set names and data item labels of the query are determined. The query results are stored locally, such as in cache, and registered based on the determined filter arguments, filter values, data set names and data item labels. Using the registration, all or a portion of the stored query results can be retrieved. Information and notification may be automatically sent to senders when responsive query data is modified in one or more external or local data stores. Moreover, senders may customize how long queries remain within the cache or data store, and when the responsive data associated with the queries are to be updated within the cache or the data store.
摘要:
Techniques for distributed cache management are provided. A server having backend resource includes a global cache and a global cache agent. Individual clients each have client cache agents and client caches. When data items associated with the backend resources are added, modified, or deleted in the client caches, the client cache agents report the changes to the global cache agent. The global cache agent records the changes and notifies the other client cache agents to update a status of the changes within their client caches. When the changes are committed to the backend resource each of the statuses in each of the caches are updated accordingly.
摘要:
Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network.
摘要:
Techniques for policy and identity-based workload provisioning are presented. Identities for requestors or workloads and identities for workloads are tied to specific policies. The specific policies are evaluated based on a stage of readiness for resources within a resource pool and based on resource identities for the resources within the resource pool. Resources are then dynamically provisioned based on the identity-based policy evaluation to handle workloads from the resource pool.
摘要:
Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
摘要:
Techniques for schema production and transformation are presented. Enterprise data from a plurality of data sources is analyzed to produce patterns to types of enterprise data. Merging rules group patterns together with entries across multiple schemas. Each schema associated with one of the data sources. A single entry is then produced within a single generic schema for each group of patterns. The generic schema can then be used to suggest changes to enterprise data policy and to make the enterprise data interoperable across the enterprise in an automated fashion.
摘要:
Techniques for evaluating and managing cloud networks are provided. Geographical locations for cloud processing environments are combined with attributes and usage metrics to form associations between each cloud processing environment's geographical location and that cloud's corresponding attributes and usage metrics. A map is organized for the associations to form a cloud network. The map is dynamically updated, supplied to services, and rendered for evaluation of the cloud network.
摘要:
The methods, systems, and data structures are taught for federating disparate calendaring systems into composite calendaring systems and composite calendars. First and second calendaring systems are bridged to a composite calendaring system using a bridging communication. The composite calendaring system tracks and presents selective information within a composite calendar.
摘要:
Techniques for secure channel messaging are provided. Resources communicate with one another over temporary and secure communication channels. The channels come in and out of existence or switch between different channels using a variety of information and based on dynamic policy evaluation. In some situations, the channels are randomly generated using a variety of the information. Authorized resources are informed of the channels to use and when to use them for purposes of delivering and receiving messages to communicate.
摘要:
In a computing environment, an association and layout of virtual machines exist as a system of multiple applications instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. In that every application need not always be operational or have applicability in every scenario, applications are only instantiated upon actionable requests for various services. Representatively, a communication channel is initialized between at least two applications, but instantiation of one of the applications is delayed until an actionable request between the applications occurs. In this manner, policy or governance can be enforced and/or computing resources can be conserved. Various features relate to defined incoming and outgoing connectors of virtual machines of the applications and their functional interaction to satisfy initial connectivity issues and to later instantiate needed applications. Libraries, software program products, and policy management are other features, to name a few.