摘要:
A method, data processing system, and computer program product for managing images. A processor unit divides an image for a virtual machine into blocks. The processor unit determines whether to compress the blocks prior to transmitting the blocks to a destination for the image. In response to a determination to compress the blocks, the processor unit compresses the blocks to form a compressed set of blocks. The processor unit sends the compressed set of blocks and any uncompressed blocks remaining in the blocks to the destination for the image.
摘要:
Method, apparatus and computer program product are configured to perform computer monitoring activities; to collect information regarding computer system status during the computer monitoring activities; to detect a problem in dependence on the information collected during the computer monitoring activities; and to determine whether to launch a diagnostic probe when the problem is detected. The monitoring activities may be performed on a periodic or event-driven basis. The determination whether to launch a diagnostic probe is based on a rule included in a hierarchy of rules. The hierarchy of rules is based on problem tickets; system logs; and computer system configuration information.
摘要:
A system and method for determining application dependent components includes capturing interactions of an application stored in memory of a first environment with other components at runtime. The interactions are parsed and categorized to determine dependency information. The application is migrated to a new environment using the dependency information to reconfigure the application after migration without application-specific knowledge.
摘要:
In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
摘要:
A system, method and program product for siting charging stations. A mobility detection module collects traffic data from vehicle sensors distributed in an area. A map matching module maps detected traffic in the area. A vehicle flow module temporally characterizes mapped traffic flow. An electric vehicle (EV) requirements (EVR) evaluator determines an optimal number of charging stations and respective locations for siting the charging stations.
摘要:
A computer implemented method of virtual machine migration with filtered network connectivity includes enforcing network security and routing at a hypervisor layer which is independent of guest operating systems via dynamic updating of routing controls initiated by a migration of said virtual machine from a first device to a second device.
摘要:
A method of estimating a transit demand graph includes collecting conditional information that includes at least one condition that when satisfied converts at least one non-rider into a rider, generating a non-rider transit demand graph by satisfying one of the conditions, and generating a normalized transit demand graph from the non-rider transit demand graph and a rider transit demand graph. The riders use public transit and the non-riders do not use public transit. The non-rider transit demand graph shows the demand of the non-riders for a public transit route. The rider transit demand graph shows the demand of riders for the same public transit route.
摘要:
A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer.
摘要:
A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task.
摘要:
A method of clustering communication nodes based on network attributes such as network delays and forwarding capacity; on communication interest attributes; and on application attributes such as quality of service preferences/constraints in providing communications between users and application servers. A multi-attribute communication feature vector is formed. That vector is comprised of network attributes, communication interests attributes, and quality of service requirements and is used to form efficient group communication mechanisms for distributed collaborative applications. Then the multi-attribute communication feature vectors are clustered. The clustering methods for multi-type attribute feature vectors are: iterative clustering using a generalized distance space with normalized attribute subspace metrics; fusion clustering, and nested clustering.