Patent application number | Description | Published |
20080240150 | METHOD AND APPARATUS FOR NETWORK DISTRIBUTION AND PROVISIONING OF APPLICATIONS ACROSS MULTIPLE DOMAINS - Techniques are disclosed for network distribution and provisioning of applications, such as transactional applications and parallel applications, across multiple administrative domains that ensure compliance with service level agreements. For example, a method of provisioning one or more resources in a distributed computing network to ensure compliance with a service level agreement associated with a computer application includes the following steps. Network performance is monitored between a local domain and one or more cooperating domains connected to the local domain by network paths. A present or predicted violation of the service level agreement is identified based on at least a portion of results of the monitoring step. One or more cooperating domains are selected that can effect compliance with the service level agreement by instantiating one or more network resources within at least one of the selected cooperating domains in response to a request from the local domain. Reconfiguration of the local domain is effectuated to allow the computer application to make use of the one or more newly instantiated network resources within the selected cooperating domain. | 10-02-2008 |
20090055274 | METHOD AND APPARATUS FOR DISTRIBUTED APPLICATION EXECUTION - This invention provides methods and apparatus for executing applications in a distributed manner employing one or more proxy servers and one origin server. The invention allows the applications to be executed primarily at the proxy servers rather than at the origin servers, thereby gaining in scalability and improved user response time. A redirection mechanism is used to direct requests to one of the proxy servers. The proxy server uses caching techniques to bring information records needed for application execution to the proxy servers. The code required for application execution is also obtained from the origin server. The invention discusses applying this technique to three Web-based applications, namely Web-based auctions, generating personalized content for Web-users, and creating advertisements for users accessing a Web page. | 02-26-2009 |
20090198720 | METHOD FOR CREATING A PROCESS NOMENCLATURE - Techniques for creating a nomenclature to represent one or more groups within a process are provided. The techniques include obtaining a process, wherein the process comprises one or more groups, and creating a nomenclature to represent the one or more groups, wherein the nomenclature facilitates usability of the process in at least one of an operation and design environment. Techniques are also provided for generating a database of one or more processes, wherein each process is represented by a nomenclature. | 08-06-2009 |
20100010790 | SYSTEM & METHOD FOR DYNAMIC STRUCTURING OF PROCESS ANNOTATIONS - A plurality of base templates are generated. Each of the base templates models a corresponding process. A plurality of instances of each of the base templates are instantiated. Each of the plurality of instances corresponds to an application of the corresponding process to a particular environment. Each of the instances of each of the base templates is annotated, based, in each case, upon observation of functioning of the instance in the particular environment. | 01-14-2010 |
20100017244 | METHOD FOR ORGANIZING PROCESSES - Techniques for generating a target process are provided. The techniques include identifying at least one of one or more steps and one or more artifacts within a target process and one or more other processes, pre-fetching the at least one of one or more atomic steps, one or more decision steps and splits and one or more merges to be used in the target process from the one or more other processes, and associating the at least one of one or more atomic steps, one or more decision steps and splits and one or more merges to be used in the target process at one or more decision points to generate the target process. | 01-21-2010 |
20100082620 | METHOD FOR EXTRACTING SIGNATURE FROM PROBLEM RECORDS THROUGH UNSTRUCTURED AND STRUCTURED TEXT MAPPING, CLASSIFICATION AND RANKING - The structure attributes and unstructured attributes of a ticket are used to generate a problem signature. For structured attributes, correlation between field values is determined and fields with the highest weight are identified. For unstructured attributes, data mining techniques are applied to generate a plurality of keywords with a ranking for each ticket by identifying keywords, and commonly used acronyms and corpus variances. The set of structured attributes and the plurality of keywords from unstructured attributes form the signature of a given problem ticket. | 04-01-2010 |
20100100774 | AUTOMATIC SOFTWARE FAULT DIAGNOSIS BY EXPLOITING APPLICATION SIGNATURES - A method monitors non-faulty application traces of a computer application with the runtime environment during fault-free activities to create non-faulty runtime signatures for the computer application. Once obtained, the method stores the non-faulty runtime signatures. The method then detects a faulty application trace of the computer application and compares the faulty application trace with the non-faulty runtime signatures by comparing a call graph of the faulty application trace with call graphs of non-faulty application traces of the application signatures to identify differences between the two (e.g., fault attributes). Then the invention outputs the fault attributes to allow the user to identify a fault cause. | 04-22-2010 |
20100115340 | METHOD AND APPARATUS FOR PROACTIVE ALERT GENERATION VIA EQUIVALENT MACHINE CONFIGURATION DETERMINATION FROM PROBLEM HISTORY DATA - A method, and system employing the method, initiates proactive maintenance of computer systems and/or devices in a computer network. The method determines the subsystems of the computers and network devices and analyzes their configuration data including their respective subsystems. The method generates maintenance characteristics for the devices, and determines a maintenance event for devices using the maintenance characteristics and the configuration data of the devices. The method initiates a maintenance solution of a device determined to have a problematic configuration. | 05-06-2010 |
20100318608 | SYSTEMS AND METHODS FOR EFFICIENT LIVE APPLICATION MIGRATION WITHIN BANDWIDTH CONSTRAINED NETWORKS - A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order. | 12-16-2010 |
20100318990 | METHOD AND APPARATUS FOR SCALABLE MONITORING OF VIRTUAL MACHINE ENVIRONMENTS - A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The monitoring agent monitors performance of the multiple virtual computing devices. The method measures simple operating characteristics of only a base level virtual computing device. The method monitors complex operating characteristics using the monitoring agent by: measuring the complex operating characteristics for each of the multiple virtual computing devices (using each of the multiple virtual computing devices); recording the complex operating characteristics of each of the multiple virtual computing devices on a corresponding memory page of each of the multiple virtual computing devices; and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics and outputs the simple events and the complex events for each of the multiple virtual computing devices. | 12-16-2010 |
20110179415 | ENABLEMENT AND ACCELERATION OF LIVE AND NEAR-LIVE MIGRATION OF VIRTUAL MACHINES AND THEIR ASSOCIATED STORAGE ACROSS NETWORKS - A virtual machine is migrated between a source cloud and a destination cloud. A temporary storage is mounted to a partition management firmware of the source cloud and to a partition management firmware of the destination cloud. A first storage location migration migrates the virtual machine from the source cloud to the at least one temporary storage. A second storage location migration migrates the virtual machine from the at least one temporary storage to final destination storage of the destination cloud. The temporary storage is then unmounted from the partition management firmware of the source cloud and from the partition management firmware of the destination cloud. | 07-21-2011 |
20110296021 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-01-2011 |
20110307887 | DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS - Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep state, implementing a virtual machine surrogate, wherein the virtual machine surrogate listens to network traffic, enabling the virtual machine to handle network traffic that is capable of being handled by the virtual machine, and enabling the virtual machine to queue network traffic and wake-up the virtual machine in the sleep state for network traffic that the virtual machine surrogate is incapable of handling. | 12-15-2011 |
20120180044 | Communications Between Virtual Machines That Have Been Migrated - A method, apparatus, and computer program product for managing communications between a plurality of applications are presented. A determination is made as to whether an address in a message is a prior address for a second application in the plurality of applications in response to receiving a message from a first application in the plurality of applications. The message is sent onto a virtual network configured to handle prior addresses for the plurality of applications in response to the address in the message being the prior address for the second application being located on another virtual machine from the first application. | 07-12-2012 |
20120192175 | Method and System to Accelerate Copying of Virtual Machine Images - A system, program product, and method are provided for copying a virtual machine image. An image library comprising a plurality of system images is provided by a target data processing system. A source image selection is received at the target data processing system. A given image from the image library is selected by the target system based on the received source image. The selected given image is transformed into a copy of the virtual machine image by receiving blocks from a source system that are part of the virtual machine image but not a part of the selected given image, such that only the blocks missing from the selected given image are transferred from the source system to the target system in order to form the copy of the virtual machine image. The source image is preferably a virtual data processing system image. | 07-26-2012 |
20120203703 | Method for Negotiating Information Technology Service Processes - Techniques for establishing a performance metric are provided for facilitating a negotiation between a provider and a user. The techniques include the following steps. Resource utilization is calculated, wherein resource utilization comprises system capacity utilized for executing a task. Work lost is calculated, wherein work lost comprises an amount of work lost as a result of a potential failure. Quality of service (QoS) is calculated, wherein QoS comprises a probability of success for executing the task by a deadline. User behavior is calculated, wherein user behavior comprises an amount of risk that the user is willing to accept. Also the calculated resource utilization, work lost, QoS and user behavior are used to establish a performance metric, wherein the performance metric facilitates a negotiation between a provider and a user. | 08-09-2012 |
20120324116 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-20-2012 |
20130247136 | Automated Validation of Configuration and Compliance in Cloud Servers - A method, an apparatus and an article of manufacture for automated validation of compliance in a cloud server. The method includes remotely accessing a target cloud server to discover at least one configuration setting of the target cloud server, integrating the at least one configuration setting from the target cloud server with information from at least one back-end tool to produce compliance evidence, and automatically answering a set of at least one checklist question for activation compliance validation of the target cloud server based on the compliance evidence. | 09-19-2013 |
20130262923 | EFFICIENT APPLICATION MANAGEMENT IN A CLOUD WITH FAILURES - A method of deploying a software application on the Internet cloud that is failure-tolerant includes identifying those aspects of a software application that need to be persisted in the event of failure, and those aspects of the application that do not need to be persisted, and deploying the application where aspects that need to be persisted are deployed to persistent storage and aspects that aspects that do not need to be persisted are deployed ton non-persistent virtual partitions, where when a virtual partition or an application component fails, an instance of the application is recreatable from those application aspects that were deployed to persistent storage. | 10-03-2013 |
20150043576 | SOFTWARE DEFINED NETWORK (SDN) SWITCH CLUSTERS HAVING LAYER-3 DISTRIBUTED ROUTER FUNCTIONALITY - According to one embodiment, Layer-3 (L3) distributed router functionality is provided to a switch cluster by receiving an address resolution protocol (ARP) request packet from a first host at an entry switch in a switch cluster, a switch controller being in communication with the entry switch, and the ARP request packet including a virtual router IP address of the switch controller as a target, forwarding the ARP request packet to the switch controller after adding a header that adheres to a communication protocol used by the switch controller, receiving an ARP response packet from the switch controller indicating: a source IP address corresponding to a virtual router of the switch controller and a SMAC corresponding to the switch controller, forwarding the ARP response packet to the first host after stripping the communication protocol header, and setting the virtual router as a default gateway for traffic received from the first host. | 02-12-2015 |