Abstract:
Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.
Abstract:
Embodiments of the present invention provide systems and methods for the discovery of facets. A search query over sets of data (e.g., a set of documents) leads to search results. The search results are organized by facets. Responsive to receiving new queries, facets are dynamically extracted from the search results. Furthermore, user profiles are dynamically updated. The order of presentation of facets, as displayed in a graphical user interface, can be modified based on the extracted facets.
Abstract:
Identify individual machines of a multi-machine computing system. Construct a graph of dependencies among the machines. Obtain estimated total administration times and administration priorities for each of the machines. Identify availability of administration resources to assist in administration of one or more of the machines. Select a first set of machines for administration in response to the graph, administration priorities, estimated total administration times, and availability of the first set of administration resources, and administer the first set of machines in parallel using the first set of administration resources. Update the graph in response to administration of the first set of machines. Select a subsequent set of machines for administration in response to the updated graph, administration priorities, estimated total administration times, and availability of a subsequent set of administration resources. Administer the subsequent set of machines in parallel using the subsequent set of administration resources.
Abstract:
Evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.
Abstract:
A method for evaluating the performance of an application when migrated from a first environment in which the application is currently executing to a different second environment includes generating a configuration file using data obtained from the application executing in the first environment, installing the configuration file in a virtual machine residing in the second environment, launching the application in the virtual machine after the installing, and obtaining a metric indicative of the performance from the virtual machine.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
Methods, systems, and computer program products for providing fault injection to Cloud-provisioned machines are provided herein. A method includes determining one or more fault conditions to be associated with a fault injection implementation based on one or more parameters associated with a request for the fault injection implementation; generating a specification for a lifecycle of the fault injection implementation based on the one or more fault conditions; and executing the fault injection implementation in a target system, wherein said executing comprises effecting the lifecycle of the fault injection implementation according to the generated specification.
Abstract:
Methods, systems, and computer program products for storage system-based replication for disaster recovery in virtualized environments are provided herein. A computer-implemented method includes identifying, among multiple storage aggregation units within a virtualized environment, one or more of the storage aggregation units to undergo a change in disaster recovery replication status from (i) enabled to disabled or (ii) disabled to enabled; determining one of multiple mechanisms to execute the change in disaster recovery replication status for each of the identified storage aggregation units by (i) implementing an optimization algorithm to each of the multiple mechanisms and (ii) identifying the one of the multiple mechanisms that minimizes data copy overhead based on the optimization algorithm; and executing the change in disaster recovery replication status for each of the identified storage aggregation units within the virtualized environment in accordance with the one of the multiple mechanisms that minimizes data copy overhead.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.