Patent application number | Description | Published |
20080222638 | Systems and Methods for Dynamically Managing Virtual Machines - Techniques for dynamic management of virtual machine environments are disclosed. For example, a technique for automatically managing a first set of virtual machines being hosted by a second set of physical machines comprises the following steps/operations. An alert is obtained that a service level agreement (SLA) pertaining to at least one application being hosted by at least one of the virtual machines in the first set of virtual machines is being violated. Upon obtaining the SLA violation alert, the technique obtains at least one performance measurement for at least a portion of the machines in at least one of the first set of virtual machines and the second set of physical machines, and a cost of migration for at least a portion of the virtual machines in the first set of virtual machines. Based on the obtained performance measurements and the obtained migration costs, an optimal migration policy is determined for moving the virtual machine hosting the at least one application to another physical machine. | 09-11-2008 |
20090216697 | METHOD FOR PREDICTING PROBLEMATIC CONFIGURATIONS AND RECOMMENDING SAFE CONFIGURATIONS - A system and method for method for assessing configurations includes steps or acts of: receiving configuration data related to configuration items and problem data related to problem tickets; classifying the configuration data into configuration classes; computing a class probability of the configuration classes; associating each configuration class with the problem tickets related to said configuration class; computing a ticket probability distribution of the problem tickets based on number of incidents; evaluating problem ticket characteristics per configuration class to determine a coefficient of trouble value for each configuration class; ranking the configuration classes according to their coefficient of trouble; wherein a highest ranking has the least coefficient of trouble; determining potentially optimal configurations based on the rankings; and providing to a user migration paths corresponding to the potentially optimal configurations. | 08-27-2009 |
20090260007 | Provisioning Storage-Optimized Virtual Machines Within a Virtual Desktop Environment - A computer implemented method, a computer program product, and data processing system clone virtual machines in a virtual desktop environment. A request to clone a new virtual machine is intercepted, wherein the request was initially sent to a virtual management server. Responsive to intercepting the request, the new virtual machine is cloned from a snapshot of a master virtual machine. A delta file is created for the new virtual machine, wherein the delta file includes a base disk reference and a copied delta file. The new virtual machine is configured to read a base disk image from a snapshot of the master virtual machine. The new virtual machine is configured to write data to the copied delta file in the delta file. | 10-15-2009 |
20110131330 | COLLOCATING DESKTOP VIRTUAL MACHINES TO PROXIMITY OF THE USER - A plurality of master desktop images for a plurality of users are stored at a plurality of geographically diverse data centers. At a first one of the data centers, a virtual desktop is constructed for a remote client. The virtual desktop is constructed from a given one of the master desktop images at the first one of the data centers and an individualized delta image for a user associated with the remote client. When it is determined that the remote client is at a geographical location wherein the first one of the data centers is not the closest one of the data centers to the remote client, the virtual desktop for the remote client is reconstructed at a second, closest, one of the data centers. The virtual desktop is reconstructed from a given one of the master desktop images at the second one of the data centers and the individualized delta image for the user associated with the remote client. A copy of the individualized delta image is moved from the first one of the data centers to the second one of the data centers to facilitate reconstructing the virtual desktop. | 06-02-2011 |
20110225569 | AUTOMATED DESKTOP BENCHMARKING - A plurality of user interactions in a baseline computing system are intercepted and recorded, in an artifact file, with a benchmarking tool. The recorded user interactions from the artifact file are replayed and injected to a software stack of a system under test (whose performance is to be compared to the baseline system), using the benchmarking tool. During the replay, screen updates in the system under test are sequentially compared with expected screen images from the artifact file, until a match is observed in a given case. A response time associated with each of the matches is recorded. | 09-15-2011 |
20110320882 | ACCELERATED VIRTUAL ENVIRONMENTS DEPLOYMENT TROUBLESHOOTING BASED ON TWO LEVEL FILE SYSTEM SIGNATURE - Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern. | 12-29-2011 |
20120005318 | Network Problem Determination - Techniques for problem determination are provided. The techniques include identifying one or more configuration items in two or more systems connected to one or more networks, performing a comparison of one or more common configuration items from the one or more configuration items in the two or more systems connected to one or more networks, and using the comparison to detect deviation between one or more configuration items of one of the two or more systems and one or more respective configuration items in the other one or more systems. | 01-05-2012 |
20120036251 | METHOD AND SYSTEM FOR END-TO-END QUALITY OF SERVICE IN VIRTUALIZED DESKTOP SYSTEMS - A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective. | 02-09-2012 |
20120124124 | Centralized Rendering Of Collaborative Content - A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed. | 05-17-2012 |
20120203908 | HYBRID CLOUD INTEGRATOR PLUG-IN COMPONENTS - Integrating data processing resources across a hybrid cloud includes providing a plug-in software component configured to be installed in a software framework. When the plug-in software component is activated, it may generate an interface for a consumer of data processing resources. Using this interface, the consumer of data processing resources may request the use of data processing resources provided as a service on the hybrid cloud. In response, the plug-in software component may acquire the requested data processing resources via interfaces provided by the various data processing resources. A number of different data processing resources may have different interface requirements. However, the first interface generated by the plug-in software component may provide a single vendor neutral interface for accessing data processing resources on the hybrid cloud by the consumer of data processing resources. | 08-09-2012 |
20120221690 | Data Processing Environment Monitoring - A method, apparatus, and computer program product for monitoring operation of data processing resources in a data processing environment. A request to monitor a service instance may be received by a processor unit, wherein the service instance comprises a data processing resource provided as a service by a provider of the data processing resources. Responsive to receiving the request to monitor the service instance, the processor unit establishes communications to receive monitored data from the service instance. The processor unit receives the monitored data from the service instance and provides the monitored data to a monitoring infrastructure, wherein the monitoring infrastructure is configured to monitor operation of the data processing resources. | 08-30-2012 |
20120222084 | Virtual Securty Zones for Data Processing Environments - A method, apparatus, and computer program product for providing security and network isolation for service instances comprising data processing resources provided as a service by a provider of data processing resources. Individual service instances may be associated as members of one or more security zones. The security zones comprise security policies that define access of each service instance that is a member of a security zone. | 08-30-2012 |
20120272249 | Data Processing Environment Event Correlation - A system and method for correlating events in data processing resources processing a workload. An event correlation service comprising an event correlation service software framework is provided on a processor unit. The event correlation service is configured, using the event correlation service software framework, for correlating the events from monitored data for the workload, wherein the workload is processed using the data processing resources provided by a provider of the data processing resources. The event correlation service receives monitored data for the workload as the workload is being processed. The monitored data is processed by the event correlation service to identify an occurrence of an event of interest for the workload as the workload is being processed. An output is provided in response to identifying the occurrence of the event of interest. | 10-25-2012 |
20130185413 | Integrated Metering of Service Usage for Hybrid Clouds - An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider. | 07-18-2013 |
20130332609 | NETWORK COMPUTING OVER MULTIPLE RESOURCE CENTERS - A system for network computing includes a plurality of resource centers, each of the plurality of resource centers comprising one or more resource instances. The system also includes a resource manager that accesses a resource instance based on a user request, and a resource broker that facilitates communication between the resource manager and a respective resource center of the resource instance. | 12-12-2013 |
20130332611 | NETWORK COMPUTING OVER MULTIPLE RESOURCE CENTERS - A system for network computing includes a plurality of resource centers, each of the plurality of resource centers comprising one or more resource instances. The system also includes a resource manager that accesses a resource instance based on a user request, and a resource broker that facilitates communication between the resource manager and a respective resource center of the resource instance. | 12-12-2013 |
20140136689 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information. | 05-15-2014 |
20140136707 | SECURE METERING AND ACCOUNTING FOR CLOUD SERVICES - A method, apparatus, and computer program product for managing a service is disclosed. A computer system collects information about the use of a set of resources by the service. Responsive to receiving a request to verify information about the use of the set of resources by the service, the computer system generates a description of the use of the set of resources by the service using the information collected. The computer system then creates a response to the request using the generated description of the use of the set of resources by the service as proof of the validity of the information. | 05-15-2014 |