Patent application number | Description | Published |
20080256535 | Tessellated virtual machines for common computing goals - In a computing environment, an association and layout of virtual machines exist as a system instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. Irrespective of physical computing devices, a template exists for each of the virtual machines according to a role of the common computing goal, including a definition for external connectivity with other virtual machines. From a template library, certain of the virtual machine templates are selected and tessellated into an application functioning to accomplish the computing goal. Collections of tessellated applications may be reposited in a library so that more than one application may be combined with another to achieve yet another computing goal, for example. Ultimately, tessellated applications provide a new computing paradigm to counter present-day computing complexities and cumbersomeness as systems evolve and become more regulated. | 10-16-2008 |
20080256538 | Storage configurations for tessellated virtual machines - In a computing environment, an association and layout of virtual machines is provided as a system instantiated for a common computing goal, such as providing a data center with an email system for an enterprise. Irrespective of physical computing devices, a template exists for each of the virtual machines according to a role of the common computing goal, including a definition for external connectivity with other virtual machines. From a template library, certain of the virtual machine templates are selected and tessellated into an application functioning to accomplish the computing goal. Storage configurations contemplate physical storage devices variously arranged over the near and short term relative to each of the virtual machine templates and to the tessellated application as a whole. Managers coordinate, allocate and oversee same. | 10-16-2008 |
20080281654 | Data center life cycle management - Managing a data center life cycle of an enterprise begins with a policy defining stages of the life cycle and criteria indicating a successful evaluation of each stage. Evaluators, according to a predetermined identity, attest to whether the policy is satisfied for a single stage of the life cycle until all stages are evaluated, but advancement from one stage to the next only occurs upon the policy being satisfactorily met. If the policy is not met, corrective action is taken, including an optional step of notifying personnel of a stage failure. Documenting the attestation is another consideration as is auditing the documenting. In this manner, troubleshooting is enhanced or an historical record is achieved. In the event of multiple evaluators, each may attest to the satisfaction of a portion of the policy. Further definitions include computing configurations per a single machine and/or an entirety of the data center. | 11-13-2008 |
20100115098 | Dynamic and automatic colocation and combining of service providers and service clients in a grid of resources - A method for providing a servicing operation in a computing environment includes providing a plurality of resources including at least a client resource requiring a periodic servicing operation, a service provider resource capable of providing that servicing operation. At least one of the client resource and the service provider resource are defined by virtual machines. The client resource and the service provider resource are transparently co-located by transferring the resource defined by a virtual machine, and the service provider resource performs the servicing operation. Methods, computer systems, and computer programs available as a download or on a computer-readable medium for installation according to the invention are provided. | 05-06-2010 |
20110010339 | TECHNIQUES FOR CLOUD CONTROL AND MANAGEMENT - Techniques for cloud control and management are provided. The control, creation, and management of workloads in distributed infrastructures are coordinated via a master Configuration Management Database (CMDB). The master CMDB is also used to unify the multiple distributed infrastructures so that the workloads are rationalized. Moreover, data centers are coordinated with the distributed infrastructures so the configuration settings and policies included in the master CMDB are enforced and synchronized throughout the network. | 01-13-2011 |
20110041126 | MANAGING WORKLOADS IN A VIRTUAL COMPUTING ENVIRONMENT - Methods and apparatus involve continuous management of workloads, including regular monitoring, profiling, tuning and fault analysis by way of instrumentation in the workloads themselves. Broadly, features contemplate collecting current state information from remote or local workloads and correlating it to predefined operational characteristics to see if such defines an acceptable operating state. If so, operation continues. If not, remediation action occurs. In a virtual environment with workloads performing under the scheduling control of a hypervisor, state information may also come from a hypervisor as well as any guest user and kernel spaces of an attendant operating system. Executable instructions in the form of probes gather this information from items of the stack available for control and deliver it to the management system. Other features contemplate supporting/auditing third party cloud computing services, validating service level agreements, and consulting independent software vendors. Security, computing systems and computer program products are other embodiments. | 02-17-2011 |
20110093850 | DYNAMIC AND AUTOMATIC COLOCATION AND COMBINING OF SERVICE PROVIDERS AND SERVICE CLIENTS IN A GRID OF RESOURCES - A method for providing a servicing operation in a computing environment includes providing a plurality of resources including at least a client resource requiring a periodic servicing operation, a service provider resource capable of providing that servicing operation. At least one of the client resource and the service provider resource are defined by virtual machines. The client resource and the service provider resource are transparently co-located by transferring the resource defined by a virtual machine, and the service provider resource performs the servicing operation. Methods, computer systems, and computer programs available as a download or on a computer-readable medium for installation according to the invention are provided. | 04-21-2011 |
20130254768 | SYSTEM AND METHOD FOR PROVIDING ANNOTATED SERVICE BLUEPRINTS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for providing annotated service blueprints in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for creating annotated service blueprints to provision and manage tessellated services distributed within an information technology infrastructure. For example, in response to a request to provision a service, a service blueprint describing one or more virtual machines may be created. The service blueprint may then be annotated to apply various parameters to the virtual machines, and the annotated service blueprint may then be instantiated to orchestrate the virtual machines with the one or more parameters and deploy the orchestrated virtual machines on information technology resources allocated to host the requested service, thereby provisioning the requested service. | 09-26-2013 |
20140237550 | SYSTEM AND METHOD FOR INTELLIGENT WORKLOAD MANAGEMENT - The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads, wherein the management threads may converge information for managing identities and access credentials, enforcing policies, providing compliance assurances, managing provisioned and requested services, and managing physical and virtual infrastructure resources. In one implementation, an authentication server may generate authentication tokens defining access credentials for managed entities across a plurality of authentication domains, wherein the authentication tokens may control access to resources in an information technology infrastructure. For example, a management infrastructure may create service distributions for the managed entities, which may include virtual machine images hosted on physical resources. Further, the authentication tokens may be embedded in the service distributions, whereby the embedded authentication tokens may control access to the resources in the information technology infrastructure. | 08-21-2014 |