Abstract:
A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
Abstract:
Software components migrated from a source server to a target server may be compared before and after a migration. In one aspect, discovery tools may be used to discover the source server's configurations before the migration. Similarly, discovery tools may be used to discover the target server's configurations after the migration. A migration design or plan may be applied to the discovered source server configurations to generate a desired target server configuration. The desired target server configurations may be compared with the discovered target server configurations. Deviations or differences between the discovered target server configurations and the desired target server configurations may be determined. A database of common or typical changes, which might not be specified in the migration plan, may be used to identify the common changes that occur as part of a migration process, from the deviations.
Abstract:
A system and method for application migration include matching an infrastructure of a source application with a plurality of multi-image work sets from a catalog by selecting a mapping of components of the infrastructure with components in the multi-image work sets to provide one or more selected multi-images. The source application is migrated to a target environment using the one or more selected multi-images.
Abstract:
Calls to stop functions are identified in a computer program file. The stop functions are functions that interact with external resources. Parameters of the calls to the stop functions that are references to the external resources are identified. An analysis is performed over the computer program file to find out possible values of the parameters of the calls.