Patent application number | Description | Published |
20100114977 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR ENABLING FILE SYSTEM TAGGING BY APPLICATIONS - A method for enabling file system tagging by an application includes creating tag associations for the file system by associating a tag with a file object. The association includes allocating a file association structure (FAS) in the storage device, which FAS has attributes including a pointer to a file handle of the file object and a list of names of tags associated with the file object. Associating the tag with a file object also includes allocating a tag structure for each tag in the file system. The tag structure includes a tag name and file associations for the tag. In response to a request for a read directory operation, the method includes retrieving the tag associations to identify the file object, dynamically assembling a directory entry structure that includes a hierarchical view of tags identified from the tag associations and corresponding file object, and returning the directory entry structure to the application. | 05-06-2010 |
20100125624 | COUPLING STATE AWARE SYSTEMS - A method of coupling asynchronous process interaction between computer systems integrated within an overall system of interconnected systems includes receiving a set of information describing an invocation call for execution of a first process on a first system integrated within the overall system; correlating a first callback argument received upon completion of the first process that includes a first unique identifier for the first process generated by the first system with the set of information according to the first unique identifier for the first process; and sending a notification message to a callback endpoint in a second process implemented to receive notification upon completion of the first process by the first system indicating completion of the first process. The second process executing on a second system integrated within the overall system makes the invocation call. The set of information specifies the first unique identifier and the callback endpoint. | 05-20-2010 |
20100241978 | DYNAMIC GENERATION OF USER INTERFACES AND AUTOMATED MAPPING OF INPUT DATA FOR SERVICE-ORIENTED ARCHITECTURE-BASED SYSTEM MANAGEMENT APPLICATIONS - A method and system for dynamically generating a semantically correct user interface (UI) panel for a service request and automatically mapping input data for service-oriented architecture-based system management applications. A document is received that includes semantic annotations specifying semantics of elements of a service request input message. During runtime, a UI panel is generated based on the semantics and by interpreting metadata generated by interpreting hints included in the document Further, the semantic annotations may include a mapping definition of information technology (IT) resource selections. Based on the mapping definition, the IT resource selections are extracted from a registry and automatically mapped to a UI input element in a UI panel. In response to selecting an IT resource from the UI panel, properties of the selected IT resource are automatically mapped to an element of the service request input message according to the semantic annotations. | 09-23-2010 |
20110153687 | DETERMINING A STORAGE LOCATION BASED ON FREQUENCY OF USE - Aspects of the invention provide a solution for determining a storage location for a data item from among a set of persistent storage locations having varying access speeds. Each data item is associated with a score that is based on the frequency with which the data item has been accessed, as well as possible other factors such as open time and/or close time of the data item, the amount of data in the data item, the period from the last time the data item was closed to the next time that the data item is opened and/or the total amount of data in the data item. Data items with high scores relative to other data items are assigned to faster access storage location while data items with lower scores are assigned to slower access storage locations. | 06-23-2011 |
20120254370 | METHOD FOR DISTRIBUTING A PLURALITY OF DATA PORTIONS - A method and computer system are provided for distributing a plurality of data portions from a server system to one or more client systems. The method includes receiving one or more first requests at the server, each first request being submitted by a client system and including a portion identifier, wherein a portion identifier is assigned to each data portion; in response to receiving the first request(s), transmitting a list of chunk identifiers to the requesting client systems, wherein the list of chunk identifiers specifies the data chunks whose meta-data includes the portion identifier contained in the first request; and transmitting some or all data chunks of a data chunk library to each of the requesting client systems. At the requesting client system, the client specifically selects the data chunks of the transmitted data chunks which are specified by the received list of chunk identifiers. | 10-04-2012 |
20130097601 | OPTIMIZING VIRTUAL MACHINES PLACEMENT IN CLOUD COMPUTING ENVIRONMENTS - Placement of instances of virtual machine (VM) images in a cloud computing environment is optimized. A request is received to deploy a new VM image instance. User-specific and generic VM resource usage profiles are read that include resource consumption data. Resource pool profiles for multiple resource pools are read that include resource consumption data for the resource pools. For each of the resource pool profiles, a selected VM resource usage profile is analyzed and aligned with the resource pool profiles. An aggregated resource consumption profile is calculated. A determination is made of one of multiple resource pools with the least aggregated resource consumption. | 04-18-2013 |
20140006626 | ALLOCATING INSTANTIATED RESOURCES TO AN IT-SERVICE | 01-02-2014 |
20140006627 | INSTANTIATING RESOURCES OF AN IT-SERVICE | 01-02-2014 |
20140047012 | METHOD FOR DISTRIBUTING A PLURALITY OF DATA PORTIONS - A method and computer system are provided for distributing a plurality of data portions from a server system to one or more client systems. The method includes receiving one or more first requests at the server, each first request being submitted by a client system and including a portion identifier, wherein a portion identifier is assigned to each data portion; in response to receiving the first request(s), transmitting a list of chunk identifiers to the requesting client systems, wherein the list of chunk identifiers specifies the data chunks whose meta-data includes the portion identifier contained in the first request; and transmitting some or all data chunks of a data chunk library to each of the requesting client systems. At the requesting client system, the client specifically selects the data chunks of the transmitted data chunks which are specified by the received list of chunk identifiers. | 02-13-2014 |
20140095720 | ALLOCATING INSTANTIATED RESOURCES TO AN IT-SERVICE - Allocating an instance of a resource to an IT-service includes: analyzing a service model specifying the structure of an IT-service and comprising nodes and resource management rules specifying the management of said node's resource. For each node, the method includes: determining a resource type indicated by said node; determining one or more resource management rules assigned to said node; evaluating the resource management rules assigned to said node on a resource instance catalog and the determined resource type for computing selection criteria; applying the selection criteria on a service provider catalog for selecting one of the one or more resource managers, the service provider catalog being indicative of one or more of the resource managers respectively being operable to provide a resource instance of a given resource type to the IT-service; creating an instance of the resource provided by the selected resource manager; and allocating said instance to the IT-service. | 04-03-2014 |
20140095721 | INSTANTIATING RESOURCES OF AN IT-SERVICE - Instantiating a resource of an IT-service includes: analyzing a service model including nodes representing resources and being indicative of a resource type, each node comprising a generic API providing at least one abstract method for instantiating the resource represented by the respective node. For each node, determining the resource type indicated by the node; evaluating a service provider catalog indicative of a resource manager operable to provide a resource of a given resource type and determining an address of the resource manager; selecting a resource manager; sending a request to the address of the selected resource manager for a description of a resource-manager-specific API of the resource manager; receiving the requested description from the selected resource manager; overriding the abstract method by a resource-manager specific method of the resource-manager-specific API for instantiating the resource; and executing the overridden abstract method for instantiating the resource represented by the node. | 04-03-2014 |
20150106952 | PROVIDING ISOLATED ENTROPY ELEMENTS - Embodiments of the invention relate to providing isolated entropy elements for a virtual machine to increase entropy in a computing environment. At least one virtual machine is deployed on a hypervisor. The hypervisor generates entropy elements based on triggers related to a virtual machine. Identifiers are assigned to the entropy elements based on the triggers and the virtual machine. Use of the entropy elements is restricted for the virtual machine based on the assigned identifiers. The increase in entropy through providing isolated entropy elements for a virtual machine deployed on a hypervisor reduces the success of external attacks on data residing within the computing environment. | 04-16-2015 |
20150277883 | EXTENSIONS FOR DEPLOYMENT PATTERNS - Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns. | 10-01-2015 |
20150277884 | EXTENSIONS FOR DEPLOYMENT PATTERNS - Extension patterns are deployed to core deployment patterns stored in a first software repository. An event relating to registration of a component is detected. In response to detecting the event, a tool registry can be queried to identify one or more extension deployment patterns for use with one or more core deployment patterns. Based upon the query, one or more extension deployment components can be retrieved from a second software repository. The one or more extension deployment components can be deployed on top of one or more instances of the one or more core deployment patterns. | 10-01-2015 |
20150355895 | REMEDIATION OF KNOWN DEFECTS AND VULNERABILITIES IN CLOUD APPLICATION PACKAGES - A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version. | 12-10-2015 |
20150356000 | REMEDIATION OF KNOWN DEFECTS AND VULNERABILITIES IN CLOUD APPLICATION PACKAGES - A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. It begins by comparing information from a deployment description against a data set of known problems associated with the one or more of the components. The deployment description represents the set of components and their interrelationships. For each of the one or more components, one or more known problems that satisfy a given severity and/or complexity criteria are identified. Thereafter, and with respect to at least one of the components for which one known problem satisfying the given criteria has been identified, the remediation policy (e.g., an update, a replacement, a patch, an additional installable) is applied to attempt to rectify the known problem. After applying the policy, the old version of the package is replaced with the new version. | 12-10-2015 |
20160072661 | INSTANTIATING RESOURCES OF AN IT-SERVICE - Instantiating a resource of an IT-service includes: analyzing a service model including nodes representing resources and being indicative of a resource type, each node comprising a generic API providing at least one abstract method for instantiating the resource represented by the respective node. For each node, determining the resource type indicated by the node; evaluating a service provider catalog indicative of a resource manager operable to provide a resource of a given resource type and determining an address of the resource manager; selecting a resource manager; sending a request to the address of the selected resource manager for a description of a resource-manager-specific API of the resource manager; receiving the requested description from the selected resource manager; overriding the abstract method by a resource-manager specific method of the resource-manager-specific API for instantiating the resource; and executing the overridden abstract method for instantiating the resource represented by the node. | 03-10-2016 |
Patent application number | Description | Published |
20120102075 | MANAGEMENT OF CONFIGURATION DATA STRUCTURES IN MULTI-LAYER DATA MODELS - In one embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code being configured to: map a template-level configuration-management data structure to a discovery-level configuration-management data structure by a first mapping using mapping information included in the template-level configuration-management data structure, map a customized-level configuration-management data structure to the discovery-level configuration-management data structure by a second mapping using mapping information included in the customized-level configuration-management data structure, and determine a third mapping between the template-level configuration-management data structure and the customized-level configuration-management data structure using the first mapping and the second mapping. | 04-26-2012 |
20120102160 | Automatic Management of Configuration Parameters and Parameter Management Engine - A mechanism is provided for an automatic management of configuration parameters of computing resources between related computing systems. Services instances of computing systems are generated according to associated configuration parameter sets and respective corresponding configuration parameter values. A determination is made of configuration parameter value changes in the configuration parameter sets for each generated service instance of the computing systems. The configuration parameter value changes for each generated service instance are compared with a first subset configuration parameter values and with a second subset configuration parameter values. The determined configuration parameter value changes in one service instance are then propagated to another service instance according to a definition of rules for mapping configuration parameters and their values between second subsets of configuration parameters. | 04-26-2012 |
20120137045 | EFFICIENTLY DETERMINING IDENTICAL PIECES OF MEMORY USED BY VIRTUAL MACHINES - Efficiently determining identical pieces of memory within a computer memory area, which is occupied by a virtual machine manager hosting multiple guests and the computer memory area being logically separated into memory pages of a unique size. Each guest is inspected for its structural characteristics by the virtual machine manager. The structural characteristics of each guest are compared by the virtual machine manager, wherein memory regions of guests having a similar structure are identified; and the identical memory pages are identified by the virtual machine manager by comparing hash values of memory pages located within memory regions of guests having a similar structure, wherein identical memory pages are determined by comparing hash values calculated over the contents of the memory pages. | 05-31-2012 |
20120137291 | PLACING A VIRTUAL MACHINE ON A TARGET HYPERVISOR - A method is provided for placing a virtual machine on a target virtual machine manager out of multiple virtual machine managers. System management software is connected to the virtual machine managers and selects the target virtual machine manager for placing the virtual machine. The method includes: the system management software creating a memory profile for all virtual machines hosted on the multiple virtual machine managers, the system management software evaluating probabilities for samepage mapping of the virtual machine to be placed on the multiple virtual machine managers based on the memory profiles of the virtual machines, the system management software selecting under consideration of the probabilities for samepage mapping a most appropriate virtual machine manager as the target virtual machine manager, and the system management software placing the virtual machine on the target virtual machine manager. | 05-31-2012 |
20120265572 | METHOD FOR EXECUTING A BUSINESS PROCESS BY A STANDARD BUSINESS PROCESS ENGINE - Executing a business process can include providing a context data object including a payload data structure for storing a payload data and automatically splitting an annotated context data object into one or more utility data objects. Responsive to creating a second utility data object, a pre-processing task can be injected into the business process, the pre-processing task using a copy of a first mapping to read data from the predefined data structure instance and to store the read data as payload data in the payload data structure of the first utility data object. Responsive to creating a third utility object, a post-processing task can be injected into the business process. The post-processing task can use a copy of the second mapping to write the payload data of the first utility data object to elements of a predefined data structure instance. | 10-18-2012 |
20120290346 | EXECUTING A BUSINESS PROCESS BY A STANDARD BUSINESS PROCESS ENGINE - Executing a business process can include providing a context data object including a payload data structure for storing a payload data and automatically splitting an annotated context data object into one or more utility data objects. Responsive to creating a second utility data object, a pre-processing task can be injected into the business process, the pre-processing task using a copy of a first mapping to read data from the predefined data structure instance and to store the read data as payload data in the payload data structure of the first utility data object. Responsive to creating a third utility object, a post-processing task can be injected into the business process. The post-processing task can use a copy of the second mapping to write the payload data of the first utility data object to elements of a predefined data structure instance. | 11-15-2012 |
20130080608 | Automatic Management of Configuration Parameters and Parameter Management Engine - A mechanism is provided for an automatic management of configuration parameters of computing resources between related computing systems. Services instances of computing systems are generated according to associated configuration parameter sets and respective corresponding configuration parameter values. A determination is made of configuration parameter value changes in the configuration parameter sets for each generated service instance of the computing systems. The configuration parameter value changes for each generated service instance are compared with a first subset configuration parameter values and with a second subset configuration parameter values. The determined configuration parameter value changes in one service instance are then propagated to another service instance according to a definition of rules for mapping configuration parameters and their values between second subsets of configuration parameters. | 03-28-2013 |
20140058788 | EXECUTING A BUSINESS PROCESS BY A STANDARD BUSINESS PROCESS ENGINE - Executing a business process can include providing a context data object including a payload data structure for storing a payload data and automatically splitting an annotated context data object into one or more utility data objects. Responsive to creating a second utility data object, a pre-processing task can be injected into the business process, the pre-processing task using a copy of a first mapping to read data from the predefined data structure instance and to store the read data as payload data in the payload data structure of the first utility data object. Responsive to creating a third utility object, a post-processing task can be injected into the business process. The post-processing task can use a copy of the second mapping to write the payload data of the first utility data object to elements of a predefined data structure instance. | 02-27-2014 |