Abstract:
A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.
Abstract:
Techniques for content management in wireless mobile networks are provided. In one aspect, a method of managing content stored on a plurality of mobile nodes in a mobile ad hoc network (MANET) is provided. The method includes the following step. The content is bound to one or more geographical locations such that, at any given time, the content is stored on at least one of the nodes at the geographical location.
Abstract:
Embodiments of the present invention provide a method, system and computer program product for bot detection for network distributable markup. In accordance with an embodiment of the present invention, a page request for distributed markup can be processed to incorporate embedded fragment within the requested page. For instance, the fragment can include a script enabled to detect human activity within the requested page such as a mouse movement. Alternatively, the fragment can include an extraneous markup artifact. The requested page subsequently can be returned to the requestor and the embedded fragment can be monitored to detect the presence of a bot depending upon the activation of the artifact. For example, where human activity can be detected within the page or where the extraneous markup artifact becomes activated despite the extraneous nature of the artifact, a human requestor can be concluded. However, where no human activity is detected in the requested page, or where the extraneous markup artifact remains unactivated, a bot requestor can be determined.
Abstract:
A system for and process of is provided for calculating SCR conversion efficiency by applying a reference control signal by which a urea dosing module is controlled to an NOx conversion value respectively in absorption and release modes of NH3 according to a loading amount of the NH3 determined from the SCR efficiency map. The system and process may include a process of determining the NOx conversion value according to a loading amount of NH3, a process of detecting the reference control signal of the dosing module injecting the urea solution, and a process of calculating the SCR conversion efficiency based on the determined NOx conversion value and reference control signal of the dosing module.
Abstract:
Embodiments of the present invention provide a method, system and computer program product for bot detection for network distributable markup. In accordance with an embodiment of the present invention, a page request for distributed markup can be processed to incorporate embedded fragment within the requested page. For instance, the fragment can include a script enabled to detect human activity within the requested page such as a mouse movement. Alternatively, the fragment can include an extraneous markup artifact. The requested page subsequently can be returned to the requestor and the embedded fragment can be monitored to detect the presence of a bot depending upon the activation of the artifact. For example, where human activity can be detected within the page or where the extraneous markup artifact becomes activated despite the extraneous nature of the artifact, a human requestor can be concluded. However, where no human activity is detected in the requested page, or where the extraneous markup artifact remains unactivated, a bot requestor can be determined.
Abstract:
A method for validating that a networked system of modules conforms to at least one interoperability rule pertinent to interoperability of at least two of the modules includes the steps of obtaining the at least one interoperability rule, the at least one rule being encoded in computer-operable format; obtaining configuration information pertinent to at least one of the modules, the configuration information being encoded in computer-operable format; and comparing the at least one interoperability rule to the configuration information to validate whether the system conforms to the at least one interoperability rule
Abstract:
A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
Abstract:
Arrangements and methods for configuring at least one computing device using at least one reference group. In a preferred embodiment, a reference group of peer devices is identified, configuration settings of the peer devices are extracted, the extracted configuration settings are analyzed and at least one configuration template is provided. A recommended configuration template is then selected for the at least one computing device.
Abstract:
Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system.
Abstract:
Mechanisms are provided for broadcasting data to a plurality of receiver devices. A data broadcast transmission rate and a level of error correction to be used when broadcasting data are determined based on prior feedback received from the plurality of receiver devices. The feedback comprises channel condition information specifying conditions of one or more connections of a channel over which data was previously broadcast to the receiver devices. Data to be broadcast to the plurality of receivers is encoded in accordance with the determined level of error correction. The encoded data is broadcast at the determined data broadcast transmission rate over the channel to the plurality of receiver devices.