Patent application number | Description | Published |
20080216098 | SYSTEMS, METHODS AND COMPUTER POROGRAMS FOR DETERMINING DEPENDENCIES BETWEEN LOGICAL COMPONENTS IN A DATA PROCESSING SYSTEM OR NETWORK - Described are methods, apparatus and computer programs for determining run-time dependencies between logical components of a data processing environment. Components of the data processing environment are monitored by monitoring agents accessing run-time activity data via APIs of the managed system. A dependency generator identifies correlations between the run-time activity of the monitored components. For synchronous monitored systems, the dependency generator calculates an activity period for monitored components and determines which component's activity periods contain the activity periods of other components. Containment is used as an indicator of a likely dependency relationship, and a weighting is computed for each dependency relationship based on the consistency of containment. | 09-04-2008 |
20090193078 | METHOD FOR FACILITATING A REAL-TIME VIRTUAL INTERACTION - Techniques for facilitating a real-time virtual interaction between two or more users are provided. The techniques include extracting a dynamically changing context from two or more users, wherein the context comprises at least one of user-provided information and one or more items related to at least one of current activity and past activity of the two or more users, analyzing the context from each user to create a classification for each user, comparing the classification for each user with a classification for each additional user, wherein comparing comprises ordering each user in terms of closeness to each additional user, and using the ordering of each user in terms of closeness to each additional user to facilitate a real-time virtual interaction between two or more users. Techniques are also provided for generating a database of one or more user classifications. | 07-30-2009 |
20090193079 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR FACILITATING A REAL-TIME VIRTUAL INTERACTION - Techniques for facilitating a real-time virtual interaction between two or more users are provided. The techniques include extracting a dynamically changing context from two or more users, wherein the context comprises at least one of user-provided information and one or more items related to at least one of current activity and past activity of the two or more users, analyzing the context from each user to create a classification for each user, comparing the classification for each user with a classification for each additional user, wherein comparing comprises ordering each user in terms of closeness to each additional user, and using the ordering of each user in terms of closeness to each additional user to facilitate a real-time virtual interaction between two or more users. Techniques are also provided for generating a database of one or more user classifications. | 07-30-2009 |
20100095297 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SOLUTION REPLICATION - A configuration model for an existing software solution, which is distributed over a plurality of existing machines, is discovered. The model includes a plurality of configuration items, which in turn include a plurality of independent attributes and a plurality of dependent attributes, with the plurality of dependent attributes being derivable from the plurality of independent attributes based on a plurality of constraints. The configuration model is stored in a repository, together with disk images, resource configuration details, and logical names of pertinent ones of the existing machines. Specifications of new values of the independent attributes are obtained, and new values of the dependent attributes are computed from the new values of the independent attributes, based on executing the constraints on the configuration model. The images are deployed onto a plurality of new machines for operation in accordance with the new values of the independent attributes and the new values of the dependent attributes, to obtain a re-deployed solution. The machines can be virtual machines or physical machines. | 04-15-2010 |
20100218031 | ROOT CAUSE ANALYSIS BY CORRELATING SYMPTOMS WITH ASYNCHRONOUS CHANGES - An indication of a problem in at least one component of a computing system is obtained. A relevant change set associated with a directed dependency graph is analyzed. The computing system is configured to proactively overcome a root cause of the problem. The relevant change set includes a list of past changes to the computing system which are potentially relevant to the problem. The directed dependency graph includes dependency information regarding given components of the computing system invoked by transactions in the computing system. The analyzing includes identifying at least one of the past changes to the computing system that is the root cause of the problem. | 08-26-2010 |
20100281455 | DETERMINING SYSTEM LEVEL DEPENDENCIES - Techniques for co-relating at least one of a functional design and at least one implementation artifact of a solution with at least one infrastructure component of a target deployment environment for the solution are provided. The techniques include obtaining at least one of a functional design and at least one implementation artifact of a solution, obtaining at least one infrastructure component of a target deployment environment for the solution, and co-relating at least one of a functional design and at least one implementation artifact of a solution with at least one infrastructure component of a target deployment environment for the solution, wherein co-relating comprises discovering at least one system level dependency among the at least one of a functional design and at least one implementation artifact and the at least one infrastructure component. | 11-04-2010 |
20100293168 | DETERMINING CONFIGURATION PARAMETER DEPENDENCIES VIA ANALYSIS OF CONFIGURATION DATA FROM MULTI-TIERED ENTERPRISE APPLICATIONS - Configuration parameter name-value pairs are obtained for each of a plurality of component instances in a deployed software solution. A candidate set of configuration dependencies between different ones of the plurality of component instances in the deployed software solution is identified, based on the configuration parameter name-value pairs. The candidate set of configuration dependencies includes true dependencies and false dependencies. The candidate set of configuration dependencies is rank-ordered to obtain a rank-ordered list, such that a probability of the true dependencies getting a higher rank is greater than a probability of the false dependencies getting a higher rank. | 11-18-2010 |
20110054964 | Automatic Documentation of Ticket Execution - Techniques for automatically documenting activity data in connection with execution of a ticket are provided. The techniques include receiving activity data in connection with execution of a ticket, processing the activity data to generate an output, and appending the processed activity data output to the ticket for ticket enrichment. Techniques for identifying a wrong choice of resolution code in connection with a ticket are also provided. The techniques include analyzing one or more previous tickets to determine a category in which a ticket belongs, determining whether a user-defined code is in variance with a system-suggested code, and sending an alert to a system administrator if the user-defined code is different than the system-suggested code. | 03-03-2011 |
20110060946 | METHOD AND SYSTEM FOR PROBLEM DETERMINATION USING PROBE COLLECTIONS AND PROBLEM CLASSIFICATION FOR THE TECHNICAL SUPPORT SERVICES - A system and method for problem determination using probe collections and problem classification for the technical support services monitor and collect data associated with a computer system, raise an alarm based on the monitored and collected data, probe the computer system for additional information, filter the monitored and collected data based on the additional information established from probing, and use the filtered data to label a problem associated with the raised alarm. | 03-10-2011 |
20110107340 | Clustering Threads Based on Contention Patterns - Techniques for grouping two or more threads based on lock contention information are provided. The techniques include determining lock contention information with respect to two or more threads, using the lock contention information with respect to the two or more threads to determine lock affinity between the two or more threads, using the lock affinity between the two or more threads to group the two or more threads into one or more thread clusters, and using the one or more thread clusters to perform scheduling of one or more threads. | 05-05-2011 |
20110246830 | Creating Virtual Appliances - Techniques for creating a virtual appliance in a virtualization environment are provided. The techniques include implementing a framework, wherein the framework comprises a knowledge representation scheme for describing library knowledge to specify one or more libraries that are used for interaction between two or more appliance components, and using the framework to instrument the one or more libraries via use of the library knowledge, record each of one or more communication parameter values in an original environment, and package one or more disk images, wherein the one or more disk images contain the one or more instrumented libraries, the one or more communication parameter values, and translation logic, to create a virtual appliance. | 10-06-2011 |
20110258478 | FACADE FOR BUSINESS RISK MINIMIZATION IN CHANGE ADMINISTRATION VIA RISK ESTIMATION AND MISTAKE IDENTIFICATION BY TICKET ANALYSIS - A system and method of employing a façade to intercept change action commands to be carried out on a target IT endpoint resource. The intercepted commands are compared to information on a corresponding change ticket and any differences, along with the information such as target history, are used to compute a risk assessment of the risk in allowing the intercepted change action commands to be executed. Where the risk exceeds a predetermined threshold, the intercepted change action commands may be modified or eventually aborted. | 10-20-2011 |
20120096457 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PREPROVISIONING VIRTUAL MACHINES - According to one aspect of the present disclosure, a method and technique for preprovisioning virtual machines is disclosed. The method includes analyzing requests for a plurality of different virtual machine (VM) configurations where each VM configuration has a plurality of configuration attributes. The method also includes determining a request frequency corresponding to each requested VM configuration, determining a configuration of each provisioned VM, and responsive to determining the configuration of each provisioned VM, determining a configuration for a preprovisioned VM based on a request frequency of the different VM configurations and the configurations of the provisioned VMs. The method further includes creating the preprovisioned VM. | 04-19-2012 |
20120151198 | System and Method for Instantiation of Distributed Applications from Disk Snapshots - A framework instantiates an application from its disk snapshots taken from a different network environment and migrated to a virtualized environment. Modifications to operating systems and hypervisors are avoided, and no special network isolation support is required. The framework is extensible and plug-in based, allowing product experts to provide knowledge about discovering, updating, starting and stopping of software components. This knowledge base is compiled into a plan that executes various interleaved configuration discovery, updates and start tasks such that a required configuration model can be discovered with minimal start and update task execution. The plan generation automatically stitches together knowledge for the various products, thus significantly simplifying the knowledge specification. Once discovery is complete, the framework utilizes the discovered model to update stale network configurations across software stack and customize configurations beyond network settings. | 06-14-2012 |
20120198451 | PREPROVISIONING VIRTUAL MACHINES - According to one aspect of the present disclosure, a method and technique for preprovisioning virtual machines is disclosed. The method includes analyzing requests for a plurality of different virtual machine (VM) configurations where each VM configuration has a plurality of configuration attributes. The method also includes determining a request frequency corresponding to each requested VM configuration, determining a configuration of each provisioned VM, and responsive to determining the configuration of each provisioned VM, determining a configuration for a preprovisioned VM based on a request frequency of the different VM configurations and the configurations of the provisioned VMs. The method further includes creating the preprovisioned VM. | 08-02-2012 |
20130007538 | SYSTEMS AND METHODS FOR FAST DETECTION AND DIAGNOSIS OF SYSTEM OUTAGES - Methods and arrangements for detecting and diagnosing system outages. A system outage is ascertained and aberrant user activities are categorized, as possible contributors to the system outage, based on system impact. User activities and system impact are learned, and user activities and system impact are compared against predetermined rules. A system outage alert is generated, and a user activity responsible for the system outage is displayed. | 01-03-2013 |
20130054220 | ARRANGEMENTS FOR EXTENDING CONFIGURATION MANAGEMENT IN LARGE IT ENVIRONMENTS TO TRACK CHANGES PROACTIVELY - Methods and arrangements for tracking changes in an information technology environment. Configuration dependencies are learned in a production environment, and a model of the production environment is built. Events on a target system in the production environment are subscribed to. Events are received and correlated with the model to generate an enhanced model, and the enhanced model is thereupon employed to predict configuration errors. | 02-28-2013 |
20130055241 | Rapid Provisioning of Virtual Machines Based on Multi-Dimensional User Request Patterns in a Cloud - A method, an apparatus and an article of manufacture for pre-provisioning a virtual machine instance. The method includes deriving a weight function for at least one virtual machine request based on historical data of the at least one virtual machine request to create a weighted virtual machine request for each request, capturing at least one inter-arrival pattern of requests, and applying the at least one pattern to the at least one weighted request to create a prioritized ordering of the at least one weighted request, and pre-provisioning at least one instance of a virtual machine image based on the prioritized ordering of the at least one weighted request. | 02-28-2013 |
20130055258 | Rapid Provisioning of Virtual Machines Based on Multi-Dimensional User Request Patterns in a Cloud - A method for pre-provisioning a virtual machine instance includes deriving a weight function for at least one virtual machine request based on historical data of the at least one virtual machine request to create a weighted virtual machine request for each request, capturing at least one inter-arrival pattern of requests, and applying the at least one pattern to the at least one weighted request to create a prioritized ordering of the at least one weighted request, and pre-provisioning at least one instance of a virtual machine image based on the prioritized ordering of the at least one weighted request. | 02-28-2013 |
20130061092 | FAST DETECTION AND DIAGNOSIS OF SYSTEM OUTAGES - Methods and arrangements for detecting and diagnosing system outages. A system outage is ascertained and aberrant user activities are categorized, as possible contributors to the system outage, based on system impact. User activities and system impact are learned, and user activities and system impact are compared against predetermined rules. A system outage alert is generated, and a user activity responsible for the system outage is displayed. | 03-07-2013 |
20130179984 | method for controlling the execution of an application on a computer system - A method for controlling the execution of a software application on a computer system. The method includes the steps of generating a license map based on a given license for the application, the license map including the information on which user is allowed to execute the application, providing a license client on the computer system and providing a license server delivering the license map to the license client. When a user requests execution of the application, the license client decides whether the user is allowed to execute the application based on the license map. | 07-11-2013 |
20130198741 | COMPUTING REUSABLE IMAGE COMPONENTS TO MINIMIZE NETWORK BANDWIDTH USAGE - Methods and arrangements for facilitating virtual appliance image delivery. Virtual appliance image templates are stored at a caching location, based on a historical request pattern. A request is received for a virtual appliance image and there is provided, to a second location, a virtual appliance image responsive to the received request. A difference is determined between the requested virtual appliance image and stored virtual appliance image templates. | 08-01-2013 |
20130198745 | COMPUTING REUSABLE IMAGE COMPONENTS TO MINIMIZE NETWORK BANDWIDTH USAGE - Methods and arrangements for facilitating virtual appliance image delivery. Virtual appliance image templates are stored at a caching location, based on a historical request pattern. A request is received for a virtual appliance image and there is provided, to a second location, a virtual appliance image responsive to the received request. A difference is determined between the requested virtual appliance image and stored virtual appliance image templates. | 08-01-2013 |
20130326496 | Generating Super Templates to Obtain User-Requested Templates - Techniques for creating a virtual machine super template to create a user-requested virtual machine template. A method includes identifying at least one virtual machine super template to be created via analyzing at least one existing template in a repository and/or a user-defined combination of software, creating the super template by installing software requested by the user to be within the super template, and creating a user-requested virtual machine template by un-installing software from the super template that is not required in the user-requested template and/or adding software to the super template required in the user-requested template that is not present in the super template. | 12-05-2013 |
20130326503 | Generating Super Templates to Obtain User-Requested Templates - A method, an apparatus and an article of manufacture for creating a virtual machine super template to create a user-requested virtual machine template. The method includes identifying at least one virtual machine super template to be created via analyzing at least one existing template in a repository and/or a user-defined combination of software, creating the super template by installing software requested by the user to be within the super template, and creating a user-requested virtual machine template by un-installing software from the super template that is not required in the user-requested template and/or adding software to the super template required in the user-requested template that is not present in the super template. | 12-05-2013 |
20130339470 | Distributed Image Cache For Servicing Virtual Resource Requests in the Cloud - A method of provisioning in a cloud compute environment having a set of cloud hosts associated with one another. The method begins by forming a distributed, cooperative cache across the set of cloud hosts by declaring a portion of a data store associated with a cloud host as a cache, and storing template images and patches in the cache. Caching activity across the distributed, cooperated cache is coordinated by having the caches share information about their respective contents. A control routine at a cache receives requests for template images or patches, responds to the requests if the requested artifacts are available or, upon a cache miss, forwards the request to another one of the caches. Periodically, the composition of the distributed, cooperative cache is computed, and the template images and patches are populated into the caches using the computed cache composition. | 12-19-2013 |
20140019967 | PREPROVISIONING USING MUTATED TEMPLATES - A system, and computer program product for preprovisioning using a mutated template. A subset of templates is selected from a set of templates that can be provisioned to a data processing system, a template in the set of templates including data to create a virtual machine on the data processing system. The mutated template is constructed using the subset of templates. A manifest is constructed such that a template in the subset of templates can be reconstructed from the mutated template using the manifest. Instead of the subset of templates, the mutated template is preprovisioned to the data processing system. | 01-16-2014 |
20140059540 | USING PREPROVISIONED MUTATED TEMPLATES - Illustrative embodiments include a system, and computer program product for creating a virtual machine using a preprovisioned mutated template. A template to use for creating the virtual machine is identified, a template including data usable to create the virtual machine on a data processing system. A block of data is selected in the mutated template for reconstructing the template from the mutated template. The block of data is included in the mutated template at a location specified in a manifest associated with the mutated template. A data structure of the template is populated with the block of data such that the block of data occupies a predetermined position in the template, thereby reconstructing the template from the mutated template. The virtual machine is created on the data processing system using the template. | 02-27-2014 |
20140115577 | ESTIMATING DEMAND FOR NEWLY REGISTERED IMAGE TEMPLATES - Methods and arrangements for estimating demand for a newly registered virtual machine template. A newly registered virtual machine template is received, and prospective demand for the template is ascertained. Virtual machine instances are preprovisioned from the template. | 04-24-2014 |
20140196031 | PREPROVISIONING USING MUTATED TEMPLATES - Illustrative embodiments include a method for preprovisioning using a mutated template. A subset of templates is selected from a set of templates that can be provisioned to a data processing system, a template in the set of templates including data to create a virtual machine on the data processing system. The mutated template is constructed using the subset of templates. A manifest is constructed such that a template in the subset of templates can be reconstructed from the mutated template using the manifest. Instead of the subset of templates, the mutated template is preprovisioned to the data processing system. | 07-10-2014 |
20140196032 | USING PREPROVISIONED MUTATED TEMPLATES - Illustrative embodiments include a method for creating a virtual machine using a preprovisioned mutated template. A template to use for creating the virtual machine is identified, a template including data usable to create the virtual machine on a data processing system. A block of data is selected in the mutated template for reconstructing the template from the mutated template. The block of data is included in the mutated template at a location specified in a manifest associated with the mutated template. A data structure of the template is populated with the block of data such that the block of data occupies a predetermined position in the template, thereby reconstructing the template from the mutated template. The virtual machine is created on the data processing system using the template. | 07-10-2014 |
20150032959 | CACHE CONTROL ON HOST MACHINES - An approached is provided for monitoring data from a host machine running at least one virtual machine (VM); analyzing the monitored data from the host machine; conducting inferences from the analysis to determine a preferred size of a cache; and managing the cache size based upon the inferences for adapting the cache size on the host running the at least one VM. | 01-29-2015 |
20150089493 | TEMPLATE PROVISIONING IN VIRTUALIZED ENVIRONMENTS - In a method for provisioning a virtual machine, a processor rates a plurality of software images that include a first software image and a second software image. A processor provisions the virtual machine with the first software image in a first state and the second software image in a second state, wherein the second software image is rated higher than the first software image. | 03-26-2015 |