Patent application number | Description | Published |
20080270971 | APPLICATION-REQUIREMENT BASED CONFIGURATION DESIGNER FOR DISTRIBUTED COMPUTING SYSTEMS - Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system. | 10-30-2008 |
20090187518 | AUTOMATICALLY IDENTIFYING AN OPTIMAL SET OF ATTRIBUTES TO FACILITATE GENERATING BEST PRACTICES FOR CONFIGURING A NETWORKED SYSTEM - A method and system for automatically identifying an optimal set of attributes of entities included in a networked system. Entity types are ranked based on information gain. A first classification accuracy relative to a first entity type is determined. The first entity type is the top-ranked entity type or a first aggregate entity type. A second entity type is selected base on the ranking. A database join of a first set of attributes associated with the first entity type and a second set of attributes associated with the second entity type is performed. A second classification accuracy relative to a second aggregate entity type generated by the join is determined. In response to determining that the second classification accuracy is not greater than the first classification accuracy, an optimal set of attributes contributing to a problem in the networked system is identified as the first set of attributes. | 07-23-2009 |
20090187533 | AUTOMATICALLY IDENTIFYING AN OPTIMAL SET OF ATTRIBUTES TO FACILITATE GENERATING BEST PRACTICES FOR CONFIGURING A NETWORKED SYSTEM - A method and system for automatically identifying an optimal set of attributes of entities included in a networked system. Entity types are ranked based on information gain. A first classification accuracy relative to a first entity type is determined. The first entity type is the top-ranked entity type or a first aggregate entity type. A second entity type is selected basal on the ranking. A database join of a first set of attributes associated with the first entity type and a second set of attributes associated with the second entity type is performed. A second classification accuracy relative to a second aggregate entity type generated by the join is determined. In response to determining that the second classification accuracy is not greater than the first classification accuracy, an optimal set of attributes contributing to a problem in the networked system is identified as the first set of attributes. | 07-23-2009 |
20090271415 | STORAGE AREA NETWORK MANAGEMENT MODELING SIMULATION - A method, system and computer program product are disclosed for simulating a storage area network including a set of correlated devices, each of the devices having a device agent. The method comprises the step of forming a set of simulation agents representing said device agents, including the steps of, (i) for each of the simulation agents, obtaining a set of agent profiles, and storing said agent profiles in a data store, and (ii) obtaining files describing class definitions for the simulation agents, and storing said files in the data store. With this information and data, a Visual Workbench is used to generate a display of said simulation agents. The preferred embodiment provides a framework and implementation that simulates the CIM agent of any SAN device. Each individual device CIM agent can be simulated in this framework based on the specification defined in an XML file and/or through snapshot mechanism. | 10-29-2009 |
20090307166 | METHOD AND SYSTEM FOR AUTOMATED INTEGRATED SERVER-NETWORK-STORAGE DISASTER RECOVERY PLANNING - An automated disaster recovery (DR) planning system for a computing environment is provided. A discovery module discovers servers, networks, and storage devices in a computing environment. An expert knowledge base module captures best practices in planning, and capabilities, interoperability, limitation and boundary values for different DR technologies. A match-making module determines multiple DR plans as combinations of one or more replication technologies that can be used to satisfy DR requirements. And, an optimizer configured for assessing a feasible DR plan from said multiple DR plans, to deploy for DR planning of a primary computing environment. | 12-10-2009 |
20100251252 | POLICY MANAGEMENT FRAMEWORK IN MANAGED SYSTEMS ENVIRONMENT - A method, system, and computer program product for implementing policies in a managed systems environment is provided. A plurality of the heterogeneous entities is organized into a system resource group (SRG). Each of the plurality of heterogeneous entities is visible to an application operable on the managed systems environment. The system resource group is subject to at least one membership requirement, defines a relationship between at least two of the heterogeneous entities, contains at least one policy defining an operation as to be performed on the system resource group for a domain of the managed systems environment, and defines at least a portion of a policy framework between the system resource group and an additional system resource group organized from an additional plurality of the heterogeneous entities. The system resource group expands according to an action performed incorporating the relationship, policy, or policy framework. | 09-30-2010 |
20110077997 | METHOD AND SYSTEM FOR CHARGEBACK ALLOCATION IN INFORMATION TECHNOLOGY SYSTEMS - The invention provides a system and method for chargeback cost allocation in an information technology (IT) system including multiple resources. The method includes categorizing cost attributes of different resources into multiple levels defining a cost attribute hierarchy, defining different chargeback groups for resources with similar cost attributes and chargeback policies at different levels of the hierarchy, and performing chargeback cost allocation by allocating the cost for resources at each hierarchy level independently using chargeback policies defined for the resources at that hierarchy level. | 03-31-2011 |
20110167424 | INTEGRATED DIFFERENTIATED OPERATION THROTTLING - A method and system for throttling a plurality of operations of a plurality of applications that share a plurality of resources. A difference between observed and predicted workloads is computed. If the difference does not exceed a threshold, a multi-strategy finder operates in normal mode and applies a recursive greedy pruning process with a look-back and look-forward optimization to select actions for a final schedule of actions that improve the utility of a data storage system. If the difference exceeds the threshold, the multi-strategy finder operates in unexpected mode and applies a defensive action selection process to select actions for the final schedule. The selected actions are performed according to the final schedule and include throttling of a CPU, network, and/or storage. | 07-07-2011 |
20110296237 | SELECTING A DATA RESTORE POINT WITH AN OPTIMAL RECOVERY TIME AND RECOVERY POINT - Embodiments of the invention relate to selecting a data restore point with an optimal recovery time and recovery point. An exemplary embodiment includes generating a problem search criterion for an entity with corrupted data. Dependencies relied on by the entity to function are determined. At least one event signature match is found that comprises information for an event being logged in a event log, and is associated with the dependencies. At least one data restore point created prior to an occurrence of a particular event in the at least one event signature match is selected. The particular event having caused the data to be corrupted. The at least one data restore point is selected to restore data to a storage system with the corrupted data. | 12-01-2011 |
20120203742 | REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Under embodiments of the present invention, data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level. | 08-09-2012 |
20130067472 | ORGANIZATION OF HETEROGENEOUS ENTITIES INTO SYSTEM RESOURCE GROUPS FOR DEFINING POLICY MANAGEMENT FRAMEWORK IN VIRTUAL CLUSTER MANAGED SYSTEMS ENVIRONMENT - Policies are implemented in a virtual cluster managed systems. Heterogeneous entities are organized into system resource group (SRG) hosted on a virtual volume that is accessed via a virtual machine. Each of the heterogeneous entities is visible to an application operable on the virtual cluster managed systems environment. The system resource group is subject to at least one membership requirement, defines a relationship between at least two of the heterogeneous entities, contains at least one policy defining an operation as to be performed on the system resource group for a domain of the virtual cluster managed systems environment, and defines at least a portion of a policy framework between the system resource group and an additional system resource group organized from additional heterogeneous entities. The system resource group expands according to an action performed incorporating the relationship, policy, or policy framework. | 03-14-2013 |