Abstract:
Methods, systems, and computer program products for providing fault injection to Cloud-provisioned machines are provided herein. A method includes determining one or more fault conditions to be associated with a fault injection implementation based on one or more parameters associated with a request for the fault injection implementation; generating a specification for a lifecycle of the fault injection implementation based on the one or more fault conditions; and executing the fault injection implementation in a target system, wherein said executing comprises effecting the lifecycle of the fault injection implementation according to the generated specification.
Abstract:
Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings. For example, such a support system can be a business support system which may be employed in conjunction with a cloud computing environment.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
Techniques for model-based analysis of a data center. A method includes creating a metamodel based on domain knowledge to represent a type of object and/or relationship of a data center, using static and dynamic configuration and data analysis techniques to discover topology of elements of the data center and represent the topology as a model that is an instance of the metamodel, extending the metamodel, using the model to perform analysis of the data center in connection with a specified task, leveraging domain knowledge represented in nodes of the extended metamodel to guide the analysis in terms of determining guidelines to apply to each node and determining relationships to traverse to continue the analysis, extending the domain knowledge by updating the extended metamodel upon discovery of additional knowledge for use in improving analysis tasks, and extending the model on-demand using dynamic analysis techniques upon detection of multiple analysis failures.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
An approach for assisting a user with a service request is provided. In the approach, it is determined that an error has occurred on a computing device of a user. A processor identifies information about the computing device. A processor determines that the computing device corresponds to a group of one or more additional computing devices, within a predetermined threshold, based on at least, on the information about the computing device. A processor causes the user to enter into a communication with at least a second user of a second computing device, wherein the second computing device is one of the group of one or more additional computing devices.
Abstract:
A method, system, and computer program product are disclosed for merging search results. In one embodiment, the method comprises identifying a query, splitting the query into sub-queries, and calculating information content for each of the sub-queries. This method also comprises executing each of the sub-queries to obtain a plurality of search results, and combining the search results based on the information content calculated for the sub-queries. In an embodiment, the execution of each of the sub-queries includes identifying a multitude of search results for at least one of the sub-queries; and the combining includes grouping said multitude of search results into a plurality of clusters, and computing a relevance score for each of said clusters. In the embodiment the combining further includes merging the clusters based on the relevance scores computed for the clusters as well as the information content calculated for the sub-queries.
Abstract:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
Abstract:
A method for enabling resiliency for cloud computing systems is described. The method includes modifying a topology graph of a network architecture by mapping processes flows onto the topology graph. A resiliency graph is created based on the modified topology graph. The method includes modifying the resiliency graph by translating at least one SLA into the resiliency graph. Overlaps and dependencies in the modified resiliency graph are identified. Apparatus and computer readable instructions are also described.
Abstract:
Techniques for model-based analysis of a data center. A method includes creating a metamodel based on domain knowledge to represent a type of object and/or relationship of a data center, using static and dynamic configuration and data analysis techniques to discover topology of elements of the data center and represent the topology as a model that is an instance of the metamodel, extending the metamodel, using the model to perform analysis of the data center in connection with a specified task, leveraging domain knowledge represented in nodes of the extended metamodel to guide the analysis in terms of determining guidelines to apply to each node and determining relationships to traverse to continue the analysis, extending the domain knowledge by updating the extended metamodel upon discovery of additional knowledge for use in improving analysis tasks, and extending the model on-demand using dynamic analysis techniques upon detection of multiple analysis failures.