Abstract:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
Abstract:
A computer implemented method, apparatus, and computer usable program product for processing tasks. A set of one or more tasks is presented on a user interface, wherein the set of tasks are part of a process. A set of one or more policies are associated. Each respective policy is associated with one or more of the set of tasks in which at least one of the tasks in the set of tasks is associated with a policy restricting modification of the task. The set of tasks and set of policies are sent to a flow engine, wherein the flow engine enforces performance of the set of tasks according to the set of policies.
Abstract:
A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
Abstract:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
Abstract:
A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
Abstract:
A method and software for fulfilling a resource request in a data processing network includes specifying characteristics of the requested resource responsive to detecting the resource request. A set of attributes is then derived from the specified characteristics. The specified characteristics indicate broad or general properties of the needed resource while the derived attributes preferably indicate the hardware and software components of a resource ideally suited to fulfill the resource request. Attribute information associated an available resource is then evaluated against the attributes derived from the specified characteristics. An available resource is then selected, based on the evaluation, to satisfy the resource request. The attributes of the selected resource best match the attributes derived from the specified characteristics. The requested resource may be a server resource and specifying the characteristics of the requested resource may includes specifying a server type from a constrained set of server types.
Abstract:
An approach receives a request from a user, typically a change implementer, on a computer system. The request includes a user identifier and a requested action. A current timestamp corresponding to a computer system clock is retrieved. Scheduled changes are retrieved from a data store accessible by the processor. The current timestamp is compared to the scheduled change periods. The requested action is allowed if the comparison reveals that the current timestamp is within one of the retrieved scheduled changes, and the requested action is denied if the comparison reveals that the current timestamp is outside of the retrieved scheduled change periods.
Abstract:
Near clones for a set of targeted computing systems are provided by evaluating different configurations of the targeted computing systems including lists of installed hardware components and installed software components; determining a subset of components in common among the different configurations; determining an initial pseudo-clone configuration including the subset of components and excluding components which are not in common among the different target hardware configurations; for each of the targeted computing systems, producing a finish-out workflow of installation steps and components to be installed into an incompletely configured computer system according to the pseudo-clone configuration to produce an operational clone system; and outputting the pseudo-clone configuration and the workflow to a provisioning management system for subsequent realization of a pseudo-clone backup computing system and further subsequent realization of one or more operational clone systems.
Abstract:
A computer implemented method, apparatus, and computer usable program product for processing tasks. A set of one or more tasks is presented on a user interface, wherein the set of tasks are part of a process. A set of one or more policies are associated. Each respective policy is associated with one or more of the set of tasks in which at least one of the tasks in the set of tasks is associated with a policy restricting modification of the task. The set of tasks and set of policies are sent to a flow engine, wherein the flow engine enforces performance of the set of tasks according to the set of policies.
Abstract:
An approach receives a request from a user, typically a change implementer, on a computer system. The request includes a user identifier and a requested action. A current timestamp corresponding to a computer system clock is retrieved. Scheduled changes are retrieved from a data store accessible by the processor. The current timestamp is compared to the scheduled change periods. The requested action is allowed if the comparison reveals that the current timestamp is within one of the retrieved scheduled changes, and the requested action is denied if the comparison reveals that the current timestamp is outside of the retrieved scheduled change periods.