Patent application number | Description | Published |
20080301698 | SERVICE ENGAGEMENT MANAGEMENT USING A STANDARD FRAMEWORK - A solution for managing a service engagement is provided. A service delivery model for the service engagement is defined within an engagement framework. The engagement framework, and consequently the service delivery model, can include a hierarchy that comprises a service definition, a set of service elements for the service definition, and a set of element tasks for each service element. The set of element tasks can be selected from a set of base tasks, each of which defines a particular task along with its input(s), output(s), and related asset(s). As a result, service engagements can be managed in a consistent manner using a data structure that promotes reuse and is readily extensible. | 12-04-2008 |
20110010343 | OPTIMIZATION AND STAGING METHOD AND SYSTEM - An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing. | 01-13-2011 |
20110138391 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics. | 06-09-2011 |
20110145439 | RESOURCE PLANNING AND DATA INTERCHANGE FUNCTIONALITY WITHIN A CLOUD COMPUTING ENVIRONMENT - The present invention provides technology neutral process integration (Cloud Resource Planning), and optimization methodology leveraging a business meta-schema format Cloud Data Interchange (CDI) to integrate, enable, and invoke Cloud services. One example is that the present invention provides a management layer at the process level. There can be multiple Cloud implementations/types within a govern enterprise—perhaps utilizing different infrastructure (e.g., hardware of one supplier versus that of another) or different areas of functionality (computing services, storage services, etc). This disclosure provides an abstraction or ‘resource planning’ layer above these core services such that a customer does not have to have knowledge or choose different Cloud types and/or understand or choose each underlying service. As such, it provides a ‘one stop’ portal. | 06-16-2011 |
20110314069 | DATA LIFECYCLE MANAGEMENT WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide lifecycle storage management for data within a Cloud computing environment. Specifically, a set of policies can be defined that allow for automatic valuation of the data and migration of the data between a set of storage tiers. Before a policy set is deployed, it can be assessed to determine effects it will have on cost, performance, and data location. Based on data characteristics and access patterns, a set of policy recommendations can be provided that predict the value of the data over time, and offer an improved migration strategy for moving the data between the set of storage tiers as the value of the data changes. | 12-22-2011 |
20110314164 | INTELLIGENT NETWORK STORAGE PLANNING WITHIN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an integrated host and subsystem port selection methodology that uses performance measurements combined with information about active data paths. This technique also helps in resilient fabric planning by selecting ports from redundant fabrics. In a typical embodiment, host port to storage port pairs that create a path between a host and a storage device will be identified. From these pairs, a set of host port to storage port candidates for communicate data from the host to the storage device will be identified based on a set of resiliency constraints. Then, a specific host port to storage port pair will be selected from the set based on a lowest joint workload measurement. A path will then be created between the specific host port and storage port, and data will be communicated from the host to the storage device via the path. | 12-22-2011 |
20120011316 | INTELLIGENT STORAGE PROVISIONING WITHIN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for intelligent storage planning and planning within a clustered computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention will first determine/identify a set of storage area network volume controllers (SVCs) that is accessible from a host that has submitted a request for access to storage. Thereafter, a set of managed disk (mdisk) groups (i.e., corresponding to the set of SVCs) that are candidates for satisfying the request will be determined. This set of mdisk groups will then be filtered based on available space therein, a set of user/requester preferences, and optionally, a set of performance characteristics. Then, a particular mdisk group will be selected from the set of mdisk groups based on the filtering. | 01-12-2012 |
20120042033 | MIGRATING VIRTUAL MACHINES ACROSS NETWORK SEPARATED DATA CENTERS - Embodiments of the present invention provide an approach for migrating virtual machines across network (e.g., WAN) separated data centers (e.g., storage clouds). Specifically, under embodiments of the present invention, a first storage system associated with a first data center is synchronized with a second storage system associated with a second data center via a storage system link. Then, a minimal state of a virtual machine is migrated from a first computer in the first data center to a second computer in the second data center via a WAN link. Using the minimal state, the virtual machine is stored in the second computer. Thereafter, the storage system link is terminated. In addition, as updated pages are received in memory of the first computer, they are migrated to the second computer via the WAN link. Once this migration is complete, the WAN link can be terminated. Therefore, embodiments of the present invention provide at least two forms of synchronization: computational synchronization and storage synchronization. | 02-16-2012 |
20120042055 | END-TO-END PROVISIONING OF STORAGE CLOUDS - Embodiments discussed in this disclosure provide an integrated provisioning framework that automates the process of provisioning storage resources, end-to-end, for an enterprise storage cloud environment. Such embodiments configure and orchestrate the deployment of a user's workload and, at the same time, provide optimization across a multitude of storage cloud resources. Along these lines, input is received in the form of workload requirements and configuration information for available system resources. Based on the input, a set (at least one) of storage cloud configuration plans is developed that satisfy the workload requirements. A set of scripts is then generated that orchestrate the deployment and configuration of different software and hardware components based on the plans. | 02-16-2012 |
20120042061 | CALIBRATING CLOUD COMPUTING ENVIRONMENTS - In general, embodiments of present invention provide an approach for calibrating a cloud computing environment. Specifically, embodiments of the present invention provide an empirical approach for obtaining end-to-end performance characteristics for workloads in the cloud computing environment (hereinafter the “environment”). In a typical embodiment, different combinations of cloud server(s) and cloud storage unit(s) are determined. Then, a virtual machine is deployed to one or more of the servers within the cloud computing environment. The virtual machine is used to generate a desired workload on a set of servers within the environment. Thereafter, performance measurements for each of the different combinations under the desired workload will be taken. Among other things, the performance measurements indicate a connection quality between the set of servers and the set of storage units, and are used in calibrating the cloud computing environment to determine future workload placement. Along these lines, the performance measurements can be populated into a table or the like, and a dynamic map of a data center having the set of storage units can be generated. | 02-16-2012 |
20120110260 | AUTOMATED STORAGE PROVISIONING WITHIN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for automatic storage planning and provisioning within a clustered computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention will receive planning input for a set of storage area network volume controllers (SVCs) within the clustered computing environment, the planning input indicating a potential load on the SVCs and its associated components. Along these lines, analytical models (e.g., from vendors) can be also used that allow for a load to be accurately estimated on the storage components. Regardless, configuration data for a set of storage components (i.e., the set of SVCs, a set of managed disk (Mdisk) groups associated with the set of SVCs, and a set of backend storage systems) will also be collected. Based on this configuration data, the set of storage components will be filtered to identify candidate storage components capable of addressing the potential load. Then, performance data for the candidate storage components will be analyzed to identify an SVC and an Mdisk group to address the potential load. This allows for storage provisioning planning to be automated in a highly accurate fashion. | 05-03-2012 |
20120116743 | OPTIMIZING STORAGE CLOUD ENVIRONMENTS THROUGH ADAPTIVE STATISTICAL MODELING - Embodiments of the present invention provide an approach for adapting an information extraction middleware for a clustered computing environment (e.g., a cloud environment) by creating and managing a set of statistical models generated from performance statistics of operating devices within the clustered computing environment. This approach takes into account the required accuracy in modeling, including computation cost of modeling, to pick the best modeling solution at a given point in time. When higher accuracy is desired (e.g., nearing workload saturation), the approach adapts to use an appropriate modeling algorithm. Adapting statistical models to the data characteristics ensures optimal accuracy with minimal computation time and resources for modeling. This approach provides intelligent selective refinement of models using accuracy-based and operating probability-based triggers to optimize the clustered computing environment, i.e., maximize accuracy and minimize computation time. | 05-10-2012 |
20120191661 | OPTIMIZATION AND STAGING - An optimization method and system. The method includes receiving by a computing system a data footprint associated with data and a human resource model. The data footprint comprises a primary data section, a secondary data section, and an archive data section. A plurality of data storage strategies are associated with the primary data section, said secondary data section, and said archive data section. The plurality of data storage strategies are compared to each other. A data staging orchestrator software module is executed. The computing system determines based on results of executing the data staging orchestrator software module, an optimal migration time, an optimal migration speed, and an optimal migration cost for managing storage for portions of the data. The computing system executes a risk modulation software module and determines a risk associated with the managing. | 07-26-2012 |
20120254640 | ALLOCATION OF STORAGE RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT BASED ON ENERGY UTILIZATION - Embodiments of the present invention provide an approach to provision storage resources (e.g., across an enterprise storage system (ESS) such as a general parallel file system (GPFS) or the like) for different workloads in an energy efficient manner. The system evaluates different energy profiles/workloads' energy consumption characteristics of storage devices to determine an allocation plan that reduces the energy cost (e.g., results in the lowest cost/energy consumption for handling a storage workload). In a typical embodiment, energy consumption characteristics for handling a particular storage workload will be determined. Thereafter, a type of storage device capable of handling the workload will be determined. Then, an allocation plan that results in the most efficient energy consumption for handling the workload will be developed. In general, the allocation plan is based upon the energy consumption characteristics and an energy efficiency algorithm. The energy efficiency algorithm serves to identify storage device(s) that can handle the workload in such a way as to reduce total energy consumption and, accordingly, costs. Along these lines, the energy efficiency algorithm may also consider other factors such as capacity and load of storage devices and service level agreement (SLA) terms in addition to energy costs (e.g., over times of day and/or days of week). In any event, at least one storage device can then be selected for handling the storage workload according to the allocation plan. | 10-04-2012 |
20120304182 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics. | 11-29-2012 |
20120330895 | TRANSITIONING APPLICATION REPLICATION CONFIGURATIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented. | 12-27-2012 |
20130006943 | HYBRID DATA BACKUP IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. | 01-03-2013 |
20130110793 | DATA DE-DUPLICATION IN COMPUTER STORAGE SYSTEMS | 05-02-2013 |
20130219033 | END-TO-END PROVISIONING OF STORAGE CLOUDS - Embodiments discussed in this disclosure provide an integrated provisioning framework that automates the process of provisioning storage resources, end-to-end, for an enterprise storage cloud environment. Such embodiments configure and orchestrate the deployment of a user's workload and, at the same time, provide optimization across a multitude of storage cloud resources. Along these lines, input is received in the form of workload requirements and configuration information for available system resources. Based on the input, a set (at least one) of storage cloud configuration plans is developed that satisfy the workload requirements. A set of scripts is then generated that orchestrate the deployment and configuration of different software and hardware components based on the plans. | 08-22-2013 |
20130282910 | INTELLIGENT STORAGE PROVISIONING WITHIN A CLUSTERED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for intelligent storage planning and planning within a clustered computing environment (e.g., a cloud computing environment). Specifically, embodiments of the present invention will first determine/identify a set of storage area network volume controllers (SVCs) that is accessible from a host that has submitted a request for access to storage. Thereafter, a set of managed disk (mdisk) groups (i.e., corresponding to the set of SVCs) that are candidates for satisfying the request will be determined. This set of mdisk groups will then be filtered based on available space therein, a set of user/requester preferences, and optionally, a set of performance characteristics. Then, a particular mdisk group will be selected from the set of mdisk groups based on the filtering. | 10-24-2013 |
20130290258 | TRANSITIONING APPLICATION REPLICATION CONFIGURATIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented. | 10-31-2013 |
20130298131 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A method and associated system for continuously optimizing data archive management scheduling. A flow network is modeled. The flow network represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices such that an optimal path in the flow network from a task of at least one archive management task to a worker program of the archive management system represents an optimal initial schedule for the worker program to perform the task. | 11-07-2013 |
20130326279 | RESOURCE PLANNING FOR DATA PROTECTION VALIDATION - A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario. | 12-05-2013 |
20140074794 | OPTIMIZING RESTORATION OF DEDUPLICATED DATA - A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks can be utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that can be serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence. | 03-13-2014 |
20140122435 | INTELLIGENT RESTORE-CONTAINER SERVICE OFFERING FOR BACKUP VALIDATION TESTING AND BUSINESS RESILIENCY - An existing data protection environment is analyzed to determine a plurality existing infrastructure containers. A popular infrastructure container is identified from the plurality of existing infrastructure containers. Responsive to determining that the popular infrastructure container does not exist within a central repository, the restore container is created within the central repository to match the popular infrastructure container. | 05-01-2014 |
20140129717 | ALLOCATION OF STORAGE RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT BASED ON ENERGY UTILIZATION - The present invention provides an approach to provision storage resources (e.g., across an enterprise storage system) for different workloads in an energy efficient manner. Typically, energy consumption characteristics for handling a particular storage workload will be determined. Thereafter, a type of storage device capable of handling the workload will be determined. Then, an allocation plan that results in the most efficient energy consumption for handling the workload will be developed. The allocation plan is based upon the energy consumption characteristics and an energy efficiency algorithm. The energy efficiency algorithm serves to identify storage device(s) that can handle the workload in such a way as to reduce total energy consumption and, accordingly, costs. The energy efficiency algorithm may also consider other factors such as capacity and load of storage devices and service level agreement (SLA) terms. At least one storage device can then be selected for handling the storage workload. | 05-08-2014 |
20140143207 | MANAGING REPLICATED DATA - An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and corresponding confidence score(s) are determined. The confidence score(s) indicate respective likelihood(s) that the candidate replica(s) include the data item. | 05-22-2014 |
20140156926 | AUTOMATED STORAGE PROVISIONING WITHIN A CLUSTERED COMPUTING ENVIRONMENT - The present invention provides an approach for automatic storage planning and provisioning within a clustered computing environment (e.g., a cloud computing environment). The present invention will receive planning input for a set of storage area network volume controllers (SVCs), the planning input indicating a potential load on the SVCs and its associated components. Configuration data for a set of storage components (i.e., the set of SVCs, a set of managed disk (Mdisk) groups associated with the set of SVCs, and a set of backend storage systems) will also be collected. Based on this configuration data, the set of storage components will be filtered to identify candidate storage components capable of addressing the potential load. Then, performance data for the candidate storage components will be analyzed to identify an SVC and an Mdisk group to address the potential load. | 06-05-2014 |
20140223012 | CLUSTER-AWARE RESOURCE PROVISIONING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing cluster-aware (storage) resource provisioning in a networked computing environment (e.g., a cloud computing environment) based upon policies, best practices, and/or storage cluster/environment configurations. In a typical embodiment, a set of characteristics (e.g., computing resources/components, etc.) of a storage environment will be determined. A set of requirements for a set of workloads to be processed by the components of the storage environment will then be identified. A set of policies and a set of best practices will then be determined to identify a configuration of the storage environment to optimize the processing of the set of workloads according to the set of requirements. Based on the configuration, a plan will be generated that indicates a data path through the set of computing resources that minimizes a potential for error in processing the set of workloads. | 08-07-2014 |
20140223122 | MANAGING VIRTUAL MACHINE PLACEMENT IN A VIRTUALIZED COMPUTING ENVIRONMENT - A method for determining that first and second virtual machines, that currently execute in first and second host computing systems, respectively, should both execute within a same host computing system. The method includes determining that the first and second virtual machines have accessed same data more often than a third and fourth virtual machines have accessed said same data. Based in part on this determination, the method includes determining that the first and second virtual machines should execute in a same host computing system having a same cache memory for both the first and second virtual machines and that the third and fourth virtual machines should execute on one or more different host computing systems than said same host computing system. | 08-07-2014 |
20140244590 | HYBRID DATA BACKUP IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. | 08-28-2014 |
20140330795 | OPTIMIZING RESTORATION OF DEDUPLICATED DATA - A computer identifies a plurality of data retrieval requests that may be serviced using a plurality of unique data chunks. The computer services the data retrieval requests by utilizing at least one of the unique data chunks. At least one of the unique data chunks is utilized for servicing two or more of the data retrieval requests. The computer determines a servicing sequence for the plurality of data retrieval requests such that the two or more of the data retrieval requests that are serviced utilizing the at least one of the unique data chunks are serviced consecutively. The computer services the plurality of data retrieval requests according to the servicing sequence. | 11-06-2014 |
20150026129 | MANAGING REPLICATED DATA - An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and confidence score(s) indicating likelihood(s) that the candidate replica(s) include the data item are determined. Based on temporal distance(s) and percent change(s) between first and second replica(s), confidence score(s) of the second replica(s) are determined. | 01-22-2015 |
20150058069 | RESOURCE PLANNING FOR DATA PROTECTION VALIDATION - A solution for validating a set of data protection solutions is provided. A validation scenario can be defined, which can include data corresponding to a set of attributes for the validation scenario. The attributes can include a time frame for the validation scenario. The validation scenario also can include a set of backup images to be validated, each of which is generated using one of the set of data protection solutions. The set of backup images can be identified using the time frame. A set of resource requirements for implementing the validation scenario can be determined based on the set of backup images and the set of attributes for the validation scenario. | 02-26-2015 |