Abstract:
Embodiments relate to systems and methods for de-populating a cloud data store. In one method, an identification of a set of cloud-populated data to be transported from a set of host storage clouds to at least one target data store is received. The method identifies a data transport pathway from the set of host storage clouds to the at least one target data store, the data transport pathway including a dedicated reverse staging connection between the set of host storage clouds and the at least one target data store. The method initiates the transport of the set of cloud-populated data to the at least one target data store in view of a set of de-population commands.
Abstract:
A record of computing resources for a cloud computing environment and an additional cloud computing environment may be maintained. Available computing resources in the cloud computing environment and the additional cloud computing environment may be determinable from the record of computing resources. A request to instantiate a virtual machine in the cloud computing environment may be received. The virtual machine may be instantiated in the additional cloud computing environment in response to determining that the cloud computing environment lacks the available computing resources and inactive reserve resources to support the virtual machine.
Abstract:
Embodiments relate to systems and methods for de-populating a cloud data store. In one method, an identification of a set of cloud-populated data to be transported from a set of host storage clouds to at least one target data store is received. The method identifies a data transport pathway from the set of host storage clouds to the at least one target data store, the data transport pathway including a dedicated reverse staging connection between the set of host storage clouds and the at least one target data store. The method initiates the transport of the set of cloud-populated data to the at least one target data store in view of a set of de-population commands.
Abstract:
A method of generating application build options in a cloud computing environment that includes receiving application usage data by a set of currently instantiated applications. The method further includes identifying, in view of the application usage data, a set of application resources in a cloud computing environment. The method further includes identifying additional application resources to be added to the set of application resources, to produce a modified set of application resources. The method further includes determining a cost of utilizing the modified set of application resources. The method further includes generating, in view of the cost of utilizing the modified set of application resources, a recommendation to modify the set of currently instantiated applications.
Abstract:
An example cloud resource provisioning method comprises: receiving a cloud resource usage data identifying a first cloud resource consumed, a first usage level associated with the first cloud resource, a second cloud resource consumed, and a second usage level associated with the second cloud resource; identifying a preference for the first cloud resource over the second cloud resource; and causing, in view of the analyzing, the first cloud resource to be provisioned at least at the first usage level and the second cloud resource to be provisioned at a reduced usage level below the second usage level.
Abstract:
Data migration among cloud-based storage networks is described. A method may include analyzing, by a processor, whether data from a data distribution service is consistent with a data payload of a host cloud provider. The method also includes determining, by the processor, in view of the analyzing, whether the data is a replica of the data payload of the host cloud provider. The method further includes determining, by the processor, whether to initiate a transport of the data to a resource associated with a target cloud provider.
Abstract:
Cloud resource provisioning is described. A cloud resource provisioning method may include obtaining cloud resource usage data by a process, wherein the cloud resource usage data identifies a cloud resource consumed by the process and a usage level associated with the cloud resource. The method may also include assigning an importance indicator to the cloud resource, and identifying a recommended cloud resource having available capacity with respect to the usage level in view of the importance indicator.
Abstract:
A processor replicates a request for a computer resource to a plurality of clouds, and updates a repository in view of resource offerings received from the plurality of clouds. The repository stores resource and service data for each cloud. The processor identifies resource and service data in the repository that match information specified in the request in view of the updated repository, and provides information to a requesting entity indicating resource and service data in the repository satisfy the request.
Abstract:
Systems and methods for cross-cloud computing resource usage tracking. An example method comprises: receiving a request comprising an operational specification of a computing resource; selecting a first provisioning cloud in view of the operational specification; receiving an updated operational specification of the computing resource; receiving a first provisioning offer from the first provisioning cloud and a second provisioning offer from a second provisioning cloud responsive to the updated operational specification; selecting the second provisioning cloud in view of the first and second provisioning offers; providing an interface between the first computing resource and a second computing resource residing in a second provisioning cloud; and tracking resource usage data of the first computing resource across the provisioning clouds.
Abstract:
A processor receives a request to access secure data. The processor translates the request in order to locate the secure data in a secure data store. The processor retrieves the secure data from the secure data store. The processor encodes the secure data to generate protected secure data. The processor transmits the protected secure data from the secure data store to at least one instantiated virtual machine in a cloud-based network.