Abstract:
A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task.
Abstract:
A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer.
Abstract:
A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order.
Abstract:
A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode.
Abstract:
A computer program product includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes, upon receiving utility consumption data of a group of elements, defining clusters of elements by like geography and like utility consumption, evaluating a significance of each cluster by comparing an average utility consumption within the cluster with utility consumption of elements neighboring the cluster and determining from a result of the evaluating which clusters exhibit significant differences in utility consumption from the neighboring elements and defining those clusters as regional outliers.
Abstract:
Method, apparatus and computer program product manage a plurality of networks with a single tenant network management tool using virtualization and implement control plane virtualization of the single tenant management tool; data storage virtualization of a data storage apparatus and network address virtualization of an available address range. A virtual machine may be implemented for each network of the plurality of networks to contain an instance of the single tenant management tool. In one implementation, a proxy is used to implement data storage virtualization. In another implementation, separate data storage is maintained for each network and data storage virtualization is achieved by managing the network protocol stack virtualization. The network address virtualization may be implemented using machine-level virtualization or operating-system-level virtualization.
Abstract:
Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.
Abstract:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
Abstract:
A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services.
Abstract:
A method of estimating a transit demand graph includes collecting conditional information that includes at least one condition that when satisfied converts at least one non-rider into a rider, generating a non-rider transit demand graph by satisfying one of the conditions, and generating a normalized transit demand graph from the non-rider transit demand graph and a rider transit demand graph. The riders use public transit and the non-riders do not use public transit. The non-rider transit demand graph shows the demand of the non-riders for a public transit route. The rider transit demand graph shows the demand of riders for the same public transit route.