US10404551B2 - Automated event management - Google Patents
Automated event management Download PDFInfo
- Publication number
- US10404551B2 US10404551B2 US14/373,780 US201214373780A US10404551B2 US 10404551 B2 US10404551 B2 US 10404551B2 US 201214373780 A US201214373780 A US 201214373780A US 10404551 B2 US10404551 B2 US 10404551B2
- Authority
- US
- United States
- Prior art keywords
- events
- event
- cloud
- resources
- clients
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000009471 action Effects 0.000 claims abstract description 49
- 230000000246 remedial effect Effects 0.000 claims abstract description 5
- 238000000034 method Methods 0.000 claims description 56
- 238000003860 storage Methods 0.000 claims description 36
- 230000008569 process Effects 0.000 claims description 20
- 230000008859 change Effects 0.000 claims description 7
- 230000002596 correlated effect Effects 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 5
- 230000002401 inhibitory effect Effects 0.000 claims description 2
- 238000007726 management method Methods 0.000 abstract description 51
- 238000012544 monitoring process Methods 0.000 abstract description 17
- 230000004931 aggregating effect Effects 0.000 abstract description 2
- 238000012545 processing Methods 0.000 description 21
- 238000005067 remediation Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 230000002776 aggregation Effects 0.000 description 7
- 238000004220 aggregation Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 239000002609 medium Substances 0.000 description 7
- 238000013480 data collection Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000011176 pooling Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000002955 isolation Methods 0.000 description 4
- 230000000875 corresponding effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012706 support-vector machine Methods 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000002567 autonomic effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000003339 best practice Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013145 classification model Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000003066 decision tree Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000013341 scale-up Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
- 239000006163 transport media Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
Definitions
- cloud-based computing systems
- applications can be offered as hosted services.
- computing resources and storage resources of the data center are allocated to a user.
- cloud computing represents a robust computing model, wherein tasks can be assigned to a combination of connections, software and services accessed over a network.
- the powerful processing power of cloud computing is enabled via distributed, large-scale computing clusters, which typically operate in conjunction with server virtualization software, and parallel processing systems.
- the computing resources can be maintained within the client enterprise, or made available by a service provider. Such further enables client to benefit from supercomputer-level computing power, wherein clients can access the enormous and elastic resources whenever so is required.
- Such model of cloud Computing can further be considered an evolution from concepts of utility computing, autonomic computing, grid computing, and software as a service (SaaS). Moreover, as clients become more sophisticated, they require more than a mere aggregation of such hosted services and usage of pay-per-use resources, and further demand continuous management of the resources as they are consumed.
- FIG. 1 illustrates an example of a block diagram for an automated event management system according to an aspect of the subject disclosure.
- FIG. 2 illustrates another example for an automated event management system according to a further aspect of the subject disclosure.
- FIG. 3 illustrates a related example of a block diagram for an automated event management system, in accordance with an aspect of the subject disclosure.
- FIG. 4 illustrates an example of a methodology for automated event management according to an aspect of the subject disclosure.
- FIG. 5 illustrates a related methodology of automating event management according to a further aspect of the subject disclosure.
- FIG. 6 illustrates an inference component that interacts with an automated event management system according to a further aspect of subject disclosure.
- FIG. 7 provides a schematic diagram of an exemplary networked or distributed computing environment in which embodiments described herein can be implemented.
- FIG. 8 illustrates an example of a suitable computing environment in which one or aspects of the embodiments described herein can be implemented.
- clients or users can be provided the opportunity to opt-out of having information (e.g., personal information, sensitive information, location information, etc.) collected and/or shared with servers, devices, or applications.
- information e.g., personal information, sensitive information, location information, etc.
- embodiments can anonymize data collected from respective clients or users.
- Such system further includes a plurality of components, namely: 1) a policy management component—which identifies and receives controlled instructions and policies from clients; and enables authoritative control over autonomous or controlled event response to events (e.g., service events) as they occur; 2) an orchestration engine & cloud controller, which can distribute flow for responding proactively to service events and executing automations as a result of such events; 3) an element lifecycle automation component that controls resources at points of operations, and further executes the associated domain automation processes across the resources that are employed by the clients for servicing requirements, 4) a monitoring & data collection component that monitors resources as they are used (e.g., in real-time or substantially real time) and collects associated data, 5) an aggregation component that aggregates data that from across the event management system for preparing parsing/correlation, and to facilitate correlating data with patterns of events; 6) a correlation component that filters
- FIG. 1 illustrates an example of an automated event management system 110 that operates in a cloud computing environment 115 , according to an aspect of the subject disclosure.
- the automated event management system 110 can manage monitoring, aggregation, correlation, event mapping, and policy-driven remediation and scaling for problems, incidents, and business value-driven events for the clients 105 , 107 , 109 .
- support can be provided for model-driven (hosting provider) and/or client-driven (client specific) processes for horizontal and/or vertical scaling, as well as remediation and multi-site events (e.g., client services spanning multiple locations in the cloud computing environment 115 .)
- the cloud computing environment 115 can support applications that are enabled by virtualized computing resources 111 , which can be rapidly scaled up and down in a secure manner to deliver high quality of service. Moreover, clients 105 , 107 , 109 (and their associated end users) can gain seamless access to their applications from anywhere through their connected devices. For example, end user merely observes delivery of service, and not the implementation or infrastructure required for its delivery.
- the cloud computing environment 115 can include technology services such as storage, data protection, applications, business processes and even business and consumer services, such as email and office applications. Moreover, the cloud computing environment 115 can enable end users and clients, to employ the services and storage that they need, and when they so require, wherein end users and clients 105 , 107 , 109 can be charged based upon server utilization, processing power used or bandwidth consumed, and the like.
- the cloud computing environment 115 can implement various type of services such as: application services 121 , which resides in the cloud computing environment 115 (e.g., Web 2.0 application); platform services 123 that can hide virtual machine instances & computing resources 111 behind higher-level APIs; and infrastructure services that can supply raw virtual machine instances, storage, and computation at pay-as-you-go utility pricing
- the automated event management system 110 can further provide for closed-loop automation end-to-end system, wherein multiple clients 105 , 107 , 109 in the same system and/or the same data construct can be managed. This can include dynamically managing from initial monitoring to multi-client event processing and eventual client/provider policy-driven prescriptive event handling, up to actioning and to loop closure, for example. Moreover, multiple permutations of the various scaling scenarios can be accommodated, which can be dynamically updated based on multiple events, across various domains. Additional optimization can be provided based on ability to remediate incidents and problems based on client reservations, continuance of resource execution, and adherence to resource usage policy and thresholds.
- resources can be efficiently managed (e.g., dynamically and in real-time) and predicted (e.g., on-the-fly) based real-time event management updates to the system.
- Such system further mitigates (or eliminates) complexities associated with client responsibilities and managing of resources. It is noted that a client can still select and supply their administrative control.
- FIG. 2 illustrates an example of a block diagram 200 for an automated event management system, according to an aspect of the subject disclosure.
- the policy management component 212 can store customized customer-specific policies, thresholds, guidelines, and directives to govern autonomous actions on events handled within the automated event management system 200 .
- policies can include multidimensional—(e.g., both elemental and at the technology domain; and/or vertical and at the service level encompassing elemental and other composite domains) in support of a client industry-specific service level, for example.
- the policy management component 212 can be actively employed in real-time event processing and handling, to autonomously control remediation, scaling, and other event processing actions at various degrees of handling or go/no-go handling.
- the policy management component 212 can identify and receive controlled instructions and policies from clients; and further enable authoritative control over autonomous or controlled event response to events as they occur. It is noted that various data types and formats (e.g., relational models, XML formats, and the like) can be supported by the policy management component 212 of the subject disclosure.
- the orchestration engine & cloud controller 214 can represent an intelligent unit that can execute controlled actions against lower level processes within the overall cloud computing environment.
- Such intelligent unit can handle policy, workload management, interfaces between the Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) domains, which can readily facilitate DevOps interactions and the handoffs associated with development, deployment, and continuous run/operations of cloud services in the cloud computing environment.
- IaaS Infrastructure-as-a-Service
- PaaS Platform-as-a-Service
- the orchestration engine & cloud controller 214 can serve as an active participant—(e.g., when the automated event management system supplies intrinsic service management for its clients)—to execute proactive instructions to the other systems in the automation model (e.g., during occurrences of events and against policies governing autonomous controlled executions.) To this end, the orchestration engine & cloud controller 214 can distribute flow for responding proactively to service events and executing automations, as a result of occurrence of various events, for example. In one aspect, the orchestration engine & cloud controller 214 can control the element life cycle automation component, as they control the resources in a client service segment. And operating in conjunction with the policy management component 212 , the combination of client-controlled governance over automated executions can reach the resources used at the point of operations—thereby setting the stage for autonomous or controlled changes for the clients, for example.
- the element life cycle automation component 216 can execute automation processes that are associated with domains across the resources, which the clients employ for their service needs—hence controlling resources at point of operations.
- the monitoring and data collection component 218 can monitor (e.g., on-the-fly) resources being consumed by the clients, wherein real-time or substantially real-time data can be analyzed for resources associated with (e.g., in the zone) of such clients.
- the monitoring and data collection component 218 can provide for monitoring, collecting, aggregating, parsing, and processing complete event data from an aggregate client base that includes both information technology and applications/services to a multi-client database construct, which in turn pushes to a multitenant event handler component for client specific actions and client-specific, or provider-aggregate actions, reporting, auditing, and associated visibility.
- Such storage medium 225 can further include storage systems having a complex model based database structure, wherein an item, a sub-item, a property, and a relationship can be defined to allow representation of information within a database, for example.
- the storage medium 225 can further employ a set of basic building blocks for creating and managing rich, persisted objects and links between objects—wherein an item can be defined as the smallest unit of consistency within the data storage system, which can be independently secured, serialized, synchronized, copied, backup/restored, for example.
- the stored data can further include provider-prescriptive known remediations and known positive event actions that can relate to scaling, availability, and the like.
- FIG. 3 illustrates a related example block diagram 300 for an automated event management system associated with a cloud enabled system, according to an additional aspect of the subject disclosure.
- An aggregation component 305 can receive data acquired by the monitoring and data collection component, for further analyzing & parsing related to event management processing.
- the correlation component 306 can filter incoming monitored and aggregated events into relevant actionable events to be parsed against standard event prescribed in the automated event management system 302 .
- the event processing component 307 facilitates event automation/remediation/scaling by mapping correlated events 362 to standard prescriptive events 364 and actions.
- data sets associated with such mapping can include: known problems—which represent events from correlation being directly mapped to preexisting incidents that also have corresponding event actions to remediate them; known expected normal events—which represent events from correlation that map to actual positive or environmentally (usage-based) driven events that have corresponding event actions to perform positive event actions on behalf of the event, such as scaling up or down as usage takes place on the resources events occur; and new incidents—which represent the collection of incoming events that no known cause or remediable action has been established, and thereby may be a reason to analyze prior to establishing a remediable action to handle them.
- Such new incidents can also be automatically collected for these new unknown incidents, to show they have been identified and that they may have recurred, for example.
- the event hander component 308 can map the events to actions that correct or address them in a positive manner.
- the event handler component 308 can store an updatable data set consisting of: known remediation actions, which can represent operations to address correctable events, such as: restartCaaSUnits—that restarts one or more Compute as a Service (CaaS) units based on the event identification and reference to the unit IDs; replaceCaaSUnit—that replaces one or more dead CaaS units with another from the pooling model or additionally from space on the hypervisor that the virtual machine (VM) ran.
- known remediation actions can represent operations to address correctable events, such as: restartCaaSUnits—that restarts one or more Compute as a Service (CaaS) units based on the event identification and reference to the unit IDs; replaceCaaSUnit—that replaces one or more dead CaaS units with another from the pooling model or additionally from space on the hypervisor that the virtual machine (VM) ran.
- the event handler component 308 can store known normal environmental actions, which represent operations to address usage-based events that are governed by client policy, such as; scale up (e.g., adding a CaaS unit based on event action and capacity need identified in the event data); scale down (e.g., terminating a CaaS unit based on event action and capacity drop identified in the event data.)
- scale up e.g., adding a CaaS unit based on event action and capacity need identified in the event data
- scale down e.g., terminating a CaaS unit based on event action and capacity drop identified in the event data.
- various fine-grained (e.g., elemental) and/or coarse grained scaling functions such as scaling resources associated with a CaaS unit (storage, memory, CPUs) or a composite service (scaling web tier units in a 3-tiered service or database resources in such a service, and the like)—can further be implemented as part of various aspects of the subject disclosure.
- the automated event management system 302 can further include a pooling component 312 , which enables accessing resources that are available in the cloud computing environment.
- a pooling component 312 can further be communicatively coupled to an isolation component 314 , for supplying resources thereto.
- the pooling component 312 can feed client zones of operation that are defined by the isolation component 314 for operation of the clients—in response to initiations of client services and/or in response to the runtime events that are encountered.
- FIG. 4 illustrates a related methodology 400 for automated event management according to a further aspect of the subject disclosure. While this exemplary method is illustrated and described herein as a series of blocks representative of various events and/or acts, the subject innovation is not limited by the illustrated ordering of such blocks. For instance, some acts or events may occur in different orders and/or concurrently with other acts or events, apart from the ordering illustrated herein, in accordance with the invention. In addition, not all illustrated blocks, events or acts, may be required to implement a methodology in accordance with the subject innovation. Moreover, it will be appreciated that the exemplary method and other methods according to the innovation may be implemented in association with the method illustrated and described herein, as well as in association with other systems and apparatus not illustrated or described.
- the automated event management system receives a set of policies from the client.
- policies can be associated with reservation for a maximum number of CaaS units that can be employed by the client.
- Such limit can be used to govern thresholds for controlled and autonomous event management scaling.
- the policies can further include various service level agreements that relate to handling and management of negative events—such as failed virtual machines (VMs), client applications that cause VM failure, and the like.
- VMs virtual machines
- client applications that cause VM failure, and the like.
- the automated event management system can also supply a best practice auto-remediation policy to recover from all events, yet the client can specify circumstances that inhibit or over-ride the model's inherent remediation functionality.
- a record in the client service policy database as a governing mechanism (e.g., updatable) to control autonomic actions.
- the client can regularly perform policy changes, such as lowering or raising the reservation limit and enhance the ability to drive more business value, to the model by expanding their usage of available resources—while employing the automated event management system.
- up & down scaling can be provided, to optimally employ reservation policies based on services that are consumed by the clients.
- the orchestration engine & cloud controller can instantiate a client environment, which typically includes performing automated tasks through direct and delegated/orchestrate automation/actuation. Examples can include, but are not limited to; automating the startup instantiation of a client's cloud service runtime environment that itself further includes: actuating network automation (either through the orchestration engine or directly to setup the client compartment), actuating network segment or firewall(s) or load balancer(s) or tiers; preparing IP address management for CaaS resource setups, including preparing address reservations of public and private addressing for the client compartment, and the like.
- automating the startup instantiation of a client's cloud service runtime environment that itself further includes: actuating network automation (either through the orchestration engine or directly to setup the client compartment), actuating network segment or firewall(s) or load balancer(s) or tiers; preparing IP address management for CaaS resource setups, including preparing address reservations of public and private addressing for the client compartment, and the like.
- Another act relating to instantiation can include: actuating the server and virtualization automation lifecycle managers through the orchestration engine & cloud controller to setup the initial set of CaaS resources from the clients reservation policy, according to client startup order (e.g., the client reserves “one hundred” CaaS units with an initial running set at “ten”.)
- client startup order e.g., the client reserves “one hundred” CaaS units with an initial running set at “ten”.
- Such can further include configuration of CaaS units, standard security policies, and the like—which can also occur where the prescriptive monitoring agents are setup in order to be ready for real-time collection during full runtime.
- CaaS setups can also include IP addressing, backup settings, and routing (e.g., for both Internet and private Internet based), for example.
- IP addressing e.g., for both Internet and private Internet based
- routing e.g., for both Internet and private Internet based
- orchestrated apps loads on the CaaS resources during the Server/VM orchestration phase, to facilitate setting up third party or client-created inbound apps on the resources as required.
- the automated event system can initiate monitoring data and collection.
- the CaaS resources can in turn cause monitoring data to be generated.
- Such monitoring data can subsequently be collected and aggregated, to be further processed by the monitoring and data collection component. As with other areas, such process can remain concurrent across clients, to support multi-tenancy capabilities of the subject disclosure.
- the data can be collected using standard interfaces to the server, hypervisor, and VMs on which the client CaaS resources are instantiated—wherein protocols and formats, such as Web Based Enterprise Management (WBEM), Web Services Management (WS-MAN), Simple Network Management Protocol (SNMP), and the like can be employed, for example.
- protocols and formats such as Web Based Enterprise Management (WBEM), Web Services Management (WS-MAN), Simple Network Management Protocol (SNMP), and the like can be employed, for example.
- predetermined periods of data collection can be set (e.g., minute-by-minute, hourly, and the like), wherein an agent can transmit in-progress monitoring data to the aggregation component for aggregation.
- the correlation component can perform analytics on the aggregate data for each client and across all clients.
- Such analytics can further normalize the data that is intended to parse items, such as: false positive data—(which represents data generated by the system that result from root cause of the event, yet occurring only as a result of the root event); informational data—(which represents data generated by the systems and considered non-actionable, such as timestamp data.) Often, such can be related to the root event, but not the event to act on.
- Additional data can include root cause data—(which represents data that is directly responsible for events to be acted on.)
- root cause data (which represents data that is directly responsible for events to be acted on.)
- the event processing component and the correlation component can readily cooperate together, and parse such data into events, which can be subsequently be mapped to actions for the event handler component.
- the event handler component can acquire filtered events on a per client basis, which also can be mapped to automatable actions that are populated from the cloud architecture, delivery and offering teams.
- such events can be prescribed to handle known actions, updated actions, or creations of new actions from events, which are previously discovered and prescribed as an automatable action based on their repeated occurrence.
- verifications can be established for determining actionable and non-actionable events. This can include determining presence of actionable events, and if such actionable events are identified, the methodology 400 subsequently proceeds to act 460 , wherein actionable events are passed to the orchestration engine/cloud controller for further policy validation and subsequent automation execution.
- the methodology 400 proceeds to act 470 —wherein notifications can be raised to the cloud service desk for direct attention by the client and delivery teams, as well as consideration by the architecture/automation development teams for new action creation and placement into the event management system. To this end, the methodology 400 can serve as a feedback loop to trend itself as well as grow its event management knowledge base simultaneously.
- FIG. 5 illustrates a related methodology 500 for automated event management—wherein when receiving an actionable event at 510 , the cloud controller can check against client policy to verify whether an action should occur through autonomous automation. To this end, a decision is made at 520 whether the client service limit is in range (e.g., regardless of being high or low), and if so—authorize the action to change at 530 . Otherwise and if not within the range, the action is not authorized to autonomously change (e.g., inhibiting the change), and the methodology 500 bifurcates.
- the client service limit is in range (e.g., regardless of being high or low), and if so—authorize the action to change at 530 . Otherwise and if not within the range, the action is not authorized to autonomously change (e.g., inhibiting the change), and the methodology 500 bifurcates.
- the event can be raised to the service desk associated with the cloud environment at 540 (e.g., in a similar manner as event processing for event action).
- the context of the raised event can pertain to the nature of control on the event and client intermediation prior to performing it (e.g., raising the thresholds in the policy database; manually invoking the change from the associated portal, and the like)—as opposed to—creation of a new event handler of an unknown incident.
- the action can be readily handled and automated at 550 , wherein the controller can invoke the orchestrator and underlying element automation, to perform such action.
- the automated event management system of the subject disclosure can support both remediation events and scaling events, the actions can be directly related to the incoming action based on the identified event examples. Such can include; scaling up the client environment for a predetermined number of CaaS units; scaling down the client environment for a predetermined number of CaaS units; remediating a failed CaaS unit by replacing it with another, and the like.
- the orchestration engine & cloud controller can invoke the automated event management system, to perform sequence of steps against standard workflows for these actions. Examples can include: calling the VM lifecycle automation system to add/remove VMs to/from the hypervisor, (e.g., which the client's CaaS units execute against); or calling server lifecycle automation and virtualization lifecycle automation, to create a new server and hypervisor instance to add CaaS Units; or calling the network lifecycle automation system to change the network components per the added/deleted/remediated CaaS unit changes; or updating the client configurations in the associated cloud computing configuration databases on the updated state of running client components; or updating the related service interfaces for client change visibility, and the like. Subsequently and at 570 , the methodology 500 can submit the resources over to the client and client systems, so that runtime operations and client interactions can continue.
- the methodology 500 enables continuous operations for closed-looped process, and event management lifecycles (e.g., while client operations occur/continue), throughout automation of the cloud computing environment.
- the system flow can be designed to accommodate both the problem that causes the event itself, as well as the business value of event having the same architecture.
- various aspects of the subject disclosure enable clients to: setup threshold policies based on their reservation settings (maximum limit) and low setting (directly associated with reservation initial provisioning CaaS service counts); or employ the cloud computing portal to create changes to resources as normal; or add software, or upload virtual images, and the like.
- the automated event management functionality of the subject disclosure can dynamically (e.g., on-the-fly) monitor, or aggregate, or correlate, or map events and handle incidents and usage-based events for clients as their resources are employed within the computing environment. In this regard, a requirement for clients having to perform the automation work themselves can be mitigated or eliminated.
- various users with portal-based interfaces can provision resources, or configure monitoring, or observe the monitoring data—wherein based on such observations, resources can subsequently be added/changed/deleted from the resource pool.
- resources can subsequently be added/changed/deleted from the resource pool.
- Such can provide a close-looped automated approach to provider-driven service management for clients, via an intrinsic handling of monitoring, aggregation, correlation, event mapping, and policy-driven remediation and scaling for problems, incidents, and business value-driven events. It is noted that if clients so request, they can delay various autonomous functions (e.g., scaling, remediation) and opt-out as desired.
- FIG. 6 illustrates an inference component 630 (e.g., an artificial intelligence—AI) that can facilitate inferring and/or determining when, where, how to automate event management and/or train models that identify remedial actions in accordance with an aspect of the subject disclosure.
- AI artificial intelligence
- the term “inference” refers generally to the process of reasoning about or inferring states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can identify a specific context or action, or can generate a probability distribution over states, for example.
- the inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events.
- Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
- the system 600 with inference component 630 can employ any of a variety of suitable AI-based schemes as described supra in connection with facilitating various aspects of the herein described disclosure.
- a process for learning explicitly or implicitly how parameters are to be created for training models based on occurrence of events can be facilitated via an automatic classification system and process.
- Classification can employ a probabilistic and/or statistical-based analysis (e.g., factoring into the analysis utilities and costs) to prognose or infer an action that a user desires to be automatically performed.
- a support vector machine (SVM) classifier can be employed.
- Other classification approaches include Bayesian networks, decision trees, and probabilistic classification models providing different patterns of independence can be employed.
- Classification as used herein also is inclusive of statistical regression that is utilized to develop models of priority.
- classifiers that are explicitly trained (e.g., via a generic training data) as well as implicitly trained (e.g., via observing user behavior, receiving extrinsic information) so that the classifier is used to automatically determine according to a predetermined criteria which answer to return to a question.
- SVM's can be configured via a learning or training phase within a classifier constructor and feature selection module.
- the various embodiments described herein can be implemented in connection with any computer or other client or server device, which can be deployed as part of a computer network or in a distributed computing environment, and can be connected to any kind of data store where media may be found.
- the various embodiments described herein can be implemented in any computer system or environment having any number of memory or storage units, and any number of applications and processes occurring across any number of storage units. This includes, but is not limited to, an environment with server computers and client computers deployed in a network environment or a distributed computing environment, having remote or local storage.
- Distributed computing provides sharing of computer resources and services by communicative exchange among computing devices and systems. These resources and services include the exchange of information, cache storage and disk storage for objects, such as files. These resources and services can also include the sharing of processing power across multiple processing units for load balancing, expansion of resources, specialization of processing, and the like. Distributed computing takes advantage of network connectivity, allowing clients to leverage their collective power to benefit the entire enterprise. In this regard, a variety of devices may have applications, objects or resources that may participate in the various embodiments of this disclosure.
- FIG. 7 provides a schematic diagram of an exemplary networked or distributed computing environment 700 in which embodiments described herein can be implemented.
- the distributed computing environment includes computing objects 710 , 712 , etc. and computing objects or devices 720 , 722 , 724 , 726 , 728 , etc., which can include programs, methods, data stores, programmable logic, etc., as represented by applications 730 , 732 , 734 , 736 , 738 .
- computing objects 710 , 712 , etc. and computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. can include different devices, such as personal digital assistants (PDAs), audio/video devices, mobile phones, MPEG-1 Audio Layer 3 (MP3) players, personal computers, laptops, tablets, etc.
- PDAs personal digital assistants
- MP3 MPEG-1 Audio Layer 3
- Each computing object 710 , 712 , etc. and computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. can communicate with one or more other computing objects 710 , 712 , etc. and computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. by way of the communications network 740 , either directly or indirectly.
- communications network 740 can include other computing objects and computing devices that provide services to the system of FIG. 7 , and/or can represent multiple interconnected networks, which are not shown.
- computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. can also contain an application, such as applications 730 , 732 , 734 , 736 , 738 , that might make use of an application programming interface (API), or other object, software, firmware and/or hardware, suitable for communication with or implementation of the various embodiments of the subject disclosure.
- API application programming interface
- computing systems can be connected together by wired or wireless systems, by local networks or widely distributed networks.
- networks are coupled to the Internet, which provides an infrastructure for widely distributed computing and encompasses many different networks, though any network infrastructure can be used for exemplary communications made incident to the systems as described in various embodiments.
- the client can be a member of a class or group that uses the services of another class or group.
- a client can be a computer process, e.g., roughly a set of instructions or tasks, that requests a service provided by another program or process.
- a client can utilize the requested service without having to know all working details about the other program or the service itself.
- a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a computing device and/or the computing device can be a component.
- One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
- these components can execute from various computer-readable storage media having various data structures stored thereon.
- the components can communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal).
- the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B.
- the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- a client can be a computer that accesses shared network resources provided by another computer, e.g., a server.
- a server e.g., a server
- computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. can be thought of as clients and computing objects 710 , 712 , etc. can be thought of as servers where computing objects 710 , 712 , etc.
- any computer can be considered a client, a server, or both, depending on the circumstances. Any of these computing devices can process data, or request transaction services or tasks that can implicate the techniques for systems as described herein for one or more embodiments.
- a server can be typically a remote computer system accessible over a remote or local network, such as the Internet or wireless network infrastructures.
- the client process can be active in a first computer system, and the server process can be active in a second computer system, communicating with one another over a communications medium, thus providing distributed functionality and allowing multiple clients to take advantage of the information-gathering capabilities of the server.
- Any software objects utilized pursuant to the techniques described herein can be provided standalone, or distributed across multiple computing devices or objects.
- the computing objects 710 , 712 , etc. can be Web servers, file servers, media servers, etc. with which the client computing objects or devices 720 , 722 , 724 , 726 , 728 , etc. communicate via any of a number of known protocols, such as the hypertext transfer protocol (HTTP).
- HTTP hypertext transfer protocol
- Computing objects 710 , 712 , etc. can also serve as client computing objects or devices 720 , 722 , 724 , 726 , 728 , etc., as can be characteristic of a distributed computing environment.
- a suitable server can include one or more aspects of the below computer, such as a media server or other media management server components.
- embodiments can be partly implemented via an operating system, for use by a developer of services for a device or object, and/or included within application software that operates to perform one or more functional aspects of the various embodiments described herein.
- Software can be described in the general context of computer executable instructions, such as program modules, being executed by one or more computers, such as client workstations, servers or other devices.
- computers such as client workstations, servers or other devices.
- client workstations such as client workstations, servers or other devices.
- FIG. 8 thus illustrates an example of a suitable computing environment 800 in which one or aspects of the embodiments described herein can be implemented, although as made clear above, the computing environment 800 is only one example of a suitable computing environment and is not intended to suggest any limitation as to scope of use or functionality. Neither is the computing environment 800 to be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary computing environment 800 .
- an exemplary computing environment 800 for implementing one or more embodiments includes a computing device in the form of a computer 810 is provided.
- Components of computer 810 can include, but are not limited to, a processing unit 820 , a memory 830 , and a system bus 822 that couples various system components including the system memory to the processing unit 820 .
- Computer 810 can for example implement systems and/or components described in connection with various aspect of the subject disclosure.
- Computer 810 typically includes a variety of computer readable media and can be any available media that can be accessed by computer 810 .
- the memory 830 can include computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) and/or random access memory (RAM).
- ROM read only memory
- RAM random access memory
- memory 830 can also include an operating system, application programs, other program modules, and program data.
- a user can enter commands and information into the computer 810 through input devices 840 , non-limiting examples of which can include a keyboard, keypad, a pointing device, a mouse, stylus, touchpad, touch screen, trackball, motion detector, camera, microphone, joystick, game pad, scanner, video camera or any other device that allows the user to interact with the computer 810 .
- input devices 840 can include a keyboard, keypad, a pointing device, a mouse, stylus, touchpad, touch screen, trackball, motion detector, camera, microphone, joystick, game pad, scanner, video camera or any other device that allows the user to interact with the computer 810 .
- a monitor or other type of display device can be also connected to the system bus 822 via an interface, such as output interface 850 .
- computers can also include other peripheral output devices such as speakers and a printer, which can be connected through output interface 850 .
- the computer 810 can operate in a networked or distributed environment using logical connections to one or more other remote computers, such as remote computer 870 .
- the remote computer 870 can be a personal computer, a server, a router, a network PC, a peer device or other common network node, or any other remote media consumption or transmission device, and can include any or all of the elements described above relative to the computer 810 .
- the logical connections depicted in FIG. 8 include a network 872 , such local area network (LAN) or a wide area network (WAN), but can also include other networks/buses e.g., cellular networks.
- an appropriate API e.g., an appropriate API, tool kit, driver code, operating system, control, standalone or downloadable software object, etc. which enables applications and services to take advantage of the techniques detailed herein.
- embodiments herein are contemplated from the standpoint of an API (or other software object), as well as from a software or hardware object that implements one or more aspects described herein.
- various embodiments described herein can have aspects that are wholly in hardware, partly in hardware and partly in software, as well as in software.
- Computer-readable storage media can be any available storage media that can be accessed by the computer, can be typically of a non-transitory nature, and can include both volatile and nonvolatile media, removable and non-removable media.
- Computer-readable storage media can be implemented in connection with any method or technology for storage of information such as computer-readable instructions, program modules, structured data, or unstructured data.
- Computer-readable storage media can include, but are not limited to, RAM, ROM, electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible and/or non-transitory media which can be used to store desired information.
- Computer-readable storage media can be accessed by one or more local or remote computing devices, e.g., via access requests, queries or other data retrieval protocols, for a variety of operations with respect to the information stored by the medium.
- communications media typically embody computer-readable instructions, data structures, program modules or other structured or unstructured data in a data signal such as a modulated data signal (e.g., a carrier wave or other transport mechanism) and include any information delivery or transport media.
- modulated data signal or signals refers to a signal that has one or more of its characteristics set or changed in such a manner as to encode information in one or more signals.
- communication media include wired media, such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared and other wireless media.
- the embodiments described herein can be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof.
- the processing units can be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessor and/or other electronic units designed to perform the functions described herein, or a combination thereof.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGAs field programmable gate arrays
- processors controllers, micro-controllers, microprocessor and/or other electronic units designed to perform the functions described herein, or a combination thereof.
- a code segment can represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements.
- a code segment can be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. can be passed, forwarded, or transmitted using any suitable means including memory sharing, message passing, token passing, network transmission, etc.
- the techniques described herein can be implemented with modules or components (e.g., procedures, functions, and so on) that perform the functions described herein.
- the software codes can be stored in memory units and executed by processors.
- a memory unit can be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various structures.
- exemplary is used herein to mean serving as an example, instance, or illustration.
- the subject matter disclosed herein is not limited by such examples.
- any aspect or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art.
- the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, for the avoidance of doubt, such terms are intended to be inclusive in a manner similar to the term “comprising” as an open transition word without precluding any additional or other elements.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Manipulator (AREA)
Abstract
Description
Claims (14)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/035884 WO2013165369A1 (en) | 2012-04-30 | 2012-04-30 | Automated event management |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150081885A1 US20150081885A1 (en) | 2015-03-19 |
US10404551B2 true US10404551B2 (en) | 2019-09-03 |
Family
ID=49514636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/373,780 Active 2033-01-11 US10404551B2 (en) | 2012-04-30 | 2012-04-30 | Automated event management |
Country Status (5)
Country | Link |
---|---|
US (1) | US10404551B2 (en) |
EP (1) | EP2845116A4 (en) |
CN (1) | CN104067257B (en) |
BR (1) | BR112014018142A8 (en) |
WO (1) | WO2013165369A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11330068B2 (en) | 2020-07-24 | 2022-05-10 | Alibaba Group Holding Limited | Methods and systems for recording user operations on a cloud management platform |
US11374833B2 (en) * | 2012-09-07 | 2022-06-28 | Oracle International Corporation | System and method for providing a service management engine for use with a cloud computing environment |
Families Citing this family (136)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8675847B2 (en) | 2007-01-03 | 2014-03-18 | Cisco Technology, Inc. | Scalable conference bridge |
US10243875B2 (en) * | 2012-12-03 | 2019-03-26 | Hewlett Packard Enterprise Development Lp | Cloud service management system |
US9275004B2 (en) * | 2012-12-11 | 2016-03-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Hybrid firewall for data center security |
US9658983B1 (en) * | 2012-12-14 | 2017-05-23 | Amazon Technologies, Inc. | Lifecycle support for storage objects having multiple durability levels specifying different numbers of versions |
US9607074B2 (en) * | 2013-04-29 | 2017-03-28 | Moogsoft, Inc. | Alert dashboard system and method from event clustering |
US10133741B2 (en) | 2014-02-13 | 2018-11-20 | Amazon Technologies, Inc. | Log data service in a virtual environment |
WO2015167592A1 (en) | 2014-04-30 | 2015-11-05 | Hewlett-Packard Development Company, L.P. | Using a single deployer agent to deploy a plurality of programs on a server |
US10437624B2 (en) | 2014-06-10 | 2019-10-08 | Hewlett Packard Enterprise Development Lp | Service level based categorization of virtual machines |
US10291597B2 (en) | 2014-08-14 | 2019-05-14 | Cisco Technology, Inc. | Sharing resources across multiple devices in online meetings |
US10048974B1 (en) | 2014-09-30 | 2018-08-14 | Amazon Technologies, Inc. | Message-based computation request scheduling |
US9830193B1 (en) | 2014-09-30 | 2017-11-28 | Amazon Technologies, Inc. | Automatic management of low latency computational capacity |
US9323556B2 (en) | 2014-09-30 | 2016-04-26 | Amazon Technologies, Inc. | Programmatic event detection and message generation for requests to execute program code |
US9715402B2 (en) | 2014-09-30 | 2017-07-25 | Amazon Technologies, Inc. | Dynamic code deployment and versioning |
US9678773B1 (en) | 2014-09-30 | 2017-06-13 | Amazon Technologies, Inc. | Low latency computational capacity provisioning |
US9600312B2 (en) | 2014-09-30 | 2017-03-21 | Amazon Technologies, Inc. | Threading as a service |
US9699040B2 (en) | 2014-09-30 | 2017-07-04 | Vivint, Inc. | Systems and methods for monitoring globally distributed remote storage devices |
US9146764B1 (en) | 2014-09-30 | 2015-09-29 | Amazon Technologies, Inc. | Processing event messages for user requests to execute program code |
US9537788B2 (en) | 2014-12-05 | 2017-01-03 | Amazon Technologies, Inc. | Automatic determination of resource sizing |
US10542126B2 (en) | 2014-12-22 | 2020-01-21 | Cisco Technology, Inc. | Offline virtual participation in an online conference meeting |
US10664535B1 (en) | 2015-02-02 | 2020-05-26 | Amazon Technologies, Inc. | Retrieving log data from metric data |
US9733967B2 (en) | 2015-02-04 | 2017-08-15 | Amazon Technologies, Inc. | Security protocols for low latency execution of program code |
US9588790B1 (en) | 2015-02-04 | 2017-03-07 | Amazon Technologies, Inc. | Stateful virtual compute system |
US10270668B1 (en) * | 2015-03-23 | 2019-04-23 | Amazon Technologies, Inc. | Identifying correlated events in a distributed system according to operational metrics |
US9785476B2 (en) | 2015-04-08 | 2017-10-10 | Amazon Technologies, Inc. | Endpoint management system and virtual compute system |
US9930103B2 (en) | 2015-04-08 | 2018-03-27 | Amazon Technologies, Inc. | Endpoint management system providing an application programming interface proxy service |
US9948786B2 (en) * | 2015-04-17 | 2018-04-17 | Cisco Technology, Inc. | Handling conferences using highly-distributed agents |
US10652103B2 (en) * | 2015-04-24 | 2020-05-12 | Goldman Sachs & Co. LLC | System and method for handling events involving computing systems and networks using fabric monitoring system |
WO2016176414A1 (en) * | 2015-04-28 | 2016-11-03 | Solano Labs, Inc. | Cost optimization of cloud computing resources |
US20160321318A1 (en) * | 2015-04-30 | 2016-11-03 | Hewlett-Packard Development Company, L.P. | Service provider dependency mapping |
US9722951B2 (en) * | 2015-05-04 | 2017-08-01 | Saudi Arabian Oil Company | Systems, methods, and computer medium to provide adaptive priority scheduling of communications over a network and dynamic resources allocation among devices within the network |
US9736219B2 (en) | 2015-06-26 | 2017-08-15 | Bank Of America Corporation | Managing open shares in an enterprise computing environment |
CN105068794B (en) * | 2015-07-17 | 2018-04-13 | 浪潮软件股份有限公司 | A kind of implementation method for supporting that Web page is locally researched and developed |
CN110661647A (en) * | 2015-07-20 | 2020-01-07 | 华为技术有限公司 | Life cycle management method and device |
US9898321B2 (en) | 2015-07-23 | 2018-02-20 | At&T Intellectual Property I, L.P. | Data-driven feedback control system for real-time application support in virtualized networks |
US10042732B2 (en) * | 2015-08-17 | 2018-08-07 | Microsoft Technology Licensing, Llc | Dynamic data collection pattern for target device |
US9928108B1 (en) * | 2015-09-29 | 2018-03-27 | Amazon Technologies, Inc. | Metaevent handling for on-demand code execution environments |
US10042660B2 (en) | 2015-09-30 | 2018-08-07 | Amazon Technologies, Inc. | Management of periodic requests for compute capacity |
US10291762B2 (en) | 2015-12-04 | 2019-05-14 | Cisco Technology, Inc. | Docking station for mobile computing devices |
US10013267B1 (en) | 2015-12-16 | 2018-07-03 | Amazon Technologies, Inc. | Pre-triggers for code execution environments |
US10754701B1 (en) | 2015-12-16 | 2020-08-25 | Amazon Technologies, Inc. | Executing user-defined code in response to determining that resources expected to be utilized comply with resource restrictions |
US9811434B1 (en) | 2015-12-16 | 2017-11-07 | Amazon Technologies, Inc. | Predictive management of on-demand code execution |
US10002026B1 (en) | 2015-12-21 | 2018-06-19 | Amazon Technologies, Inc. | Acquisition and maintenance of dedicated, reserved, and variable compute capacity |
US9910713B2 (en) | 2015-12-21 | 2018-03-06 | Amazon Technologies, Inc. | Code execution request routing |
US10067801B1 (en) | 2015-12-21 | 2018-09-04 | Amazon Technologies, Inc. | Acquisition and maintenance of compute capacity |
US10764122B2 (en) * | 2016-02-26 | 2020-09-01 | Red Hat, Inc. | Managing computing infrastructure events having different event notification formats |
CN105701649A (en) * | 2016-02-26 | 2016-06-22 | 广州品唯软件有限公司 | Data management and control system |
US11132213B1 (en) | 2016-03-30 | 2021-09-28 | Amazon Technologies, Inc. | Dependency-based process of pre-existing data sets at an on demand code execution environment |
US10891145B2 (en) | 2016-03-30 | 2021-01-12 | Amazon Technologies, Inc. | Processing pre-existing data sets at an on demand code execution environment |
US10162672B2 (en) | 2016-03-30 | 2018-12-25 | Amazon Technologies, Inc. | Generating data streams from pre-existing data sets |
US10374872B2 (en) * | 2016-05-24 | 2019-08-06 | Apstra, Inc. | Configuring system resources for different reference architectures |
US10769641B2 (en) | 2016-05-25 | 2020-09-08 | Microsoft Technology Licensing, Llc | Service request management in cloud computing systems |
US10282229B2 (en) | 2016-06-28 | 2019-05-07 | Amazon Technologies, Inc. | Asynchronous task management in an on-demand network code execution environment |
US10574609B2 (en) | 2016-06-29 | 2020-02-25 | Cisco Technology, Inc. | Chat room access control |
US10102040B2 (en) | 2016-06-29 | 2018-10-16 | Amazon Technologies, Inc | Adjusting variable limit on concurrent code executions |
US10203990B2 (en) | 2016-06-30 | 2019-02-12 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
US10277708B2 (en) | 2016-06-30 | 2019-04-30 | Amazon Technologies, Inc. | On-demand network code execution with cross-account aliases |
EP3852424B1 (en) * | 2016-07-13 | 2023-11-22 | Huawei Technologies Co., Ltd. | Application resilience for applications deployed on a cloud platform |
US10817488B2 (en) * | 2016-09-16 | 2020-10-27 | Oracle International Corporation | Historical data representation in cloud service |
US10884787B1 (en) | 2016-09-23 | 2021-01-05 | Amazon Technologies, Inc. | Execution guarantees in an on-demand network code execution system |
US10061613B1 (en) | 2016-09-23 | 2018-08-28 | Amazon Technologies, Inc. | Idempotent task execution in on-demand network code execution systems |
US11119813B1 (en) | 2016-09-30 | 2021-09-14 | Amazon Technologies, Inc. | Mapreduce implementation using an on-demand network code execution system |
US10592867B2 (en) | 2016-11-11 | 2020-03-17 | Cisco Technology, Inc. | In-meeting graphical user interface display using calendar information and system |
US10263998B1 (en) * | 2016-12-14 | 2019-04-16 | EMC IP Holding Company LLC | Automated determination of relevance of a security alert to one or more other security alerts based on shared markers |
US10516707B2 (en) | 2016-12-15 | 2019-12-24 | Cisco Technology, Inc. | Initiating a conferencing meeting using a conference room device |
US11431792B2 (en) | 2017-01-31 | 2022-08-30 | Micro Focus Llc | Determining contextual information for alerts |
US11240256B2 (en) | 2017-01-31 | 2022-02-01 | Micro Focus Llc | Grouping alerts into bundles of alerts |
US11240263B2 (en) | 2017-01-31 | 2022-02-01 | Micro Focus Llc | Responding to alerts |
US10515117B2 (en) | 2017-02-14 | 2019-12-24 | Cisco Technology, Inc. | Generating and reviewing motion metadata |
US9942519B1 (en) | 2017-02-21 | 2018-04-10 | Cisco Technology, Inc. | Technologies for following participants in a video conference |
US10666713B2 (en) * | 2017-03-28 | 2020-05-26 | International Business Machines Corporation | Event processing |
US10440073B2 (en) | 2017-04-11 | 2019-10-08 | Cisco Technology, Inc. | User interface for proximity based teleconference transfer |
US10171377B2 (en) * | 2017-04-18 | 2019-01-01 | International Business Machines Corporation | Orchestrating computing resources between different computing environments |
US10375125B2 (en) | 2017-04-27 | 2019-08-06 | Cisco Technology, Inc. | Automatically joining devices to a video conference |
US10666715B2 (en) | 2017-05-08 | 2020-05-26 | International Business Machines Corporation | Incident management for complex information technology platforms |
US10404481B2 (en) | 2017-06-06 | 2019-09-03 | Cisco Technology, Inc. | Unauthorized participant detection in multiparty conferencing by comparing a reference hash value received from a key management server with a generated roster hash value |
US10375474B2 (en) | 2017-06-12 | 2019-08-06 | Cisco Technology, Inc. | Hybrid horn microphone |
US10477148B2 (en) | 2017-06-23 | 2019-11-12 | Cisco Technology, Inc. | Speaker anticipation |
US10516709B2 (en) | 2017-06-29 | 2019-12-24 | Cisco Technology, Inc. | Files automatically shared at conference initiation |
US10706391B2 (en) | 2017-07-13 | 2020-07-07 | Cisco Technology, Inc. | Protecting scheduled meeting in physical room |
US10091348B1 (en) | 2017-07-25 | 2018-10-02 | Cisco Technology, Inc. | Predictive model for voice/video over IP calls |
US10673831B2 (en) | 2017-08-11 | 2020-06-02 | Mastercard International Incorporated | Systems and methods for automating security controls between computer networks |
US10771621B2 (en) | 2017-10-31 | 2020-09-08 | Cisco Technology, Inc. | Acoustic echo cancellation based sub band domain active speaker detection for audio and video conferencing applications |
US10303492B1 (en) | 2017-12-13 | 2019-05-28 | Amazon Technologies, Inc. | Managing custom runtimes in an on-demand code execution system |
US10564946B1 (en) | 2017-12-13 | 2020-02-18 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10831898B1 (en) | 2018-02-05 | 2020-11-10 | Amazon Technologies, Inc. | Detecting privilege escalations in code including cross-service calls |
US10572375B1 (en) | 2018-02-05 | 2020-02-25 | Amazon Technologies, Inc. | Detecting parameter validity in code including cross-service calls |
US10733085B1 (en) | 2018-02-05 | 2020-08-04 | Amazon Technologies, Inc. | Detecting impedance mismatches due to cross-service calls |
US10353678B1 (en) | 2018-02-05 | 2019-07-16 | Amazon Technologies, Inc. | Detecting code characteristic alterations due to cross-service calls |
US10725752B1 (en) | 2018-02-13 | 2020-07-28 | Amazon Technologies, Inc. | Dependency handling in an on-demand network code execution system |
US10776091B1 (en) | 2018-02-26 | 2020-09-15 | Amazon Technologies, Inc. | Logging endpoint in an on-demand code execution system |
US10681164B2 (en) * | 2018-05-03 | 2020-06-09 | Microsoft Technology Licensing, Llc | Input and output schema mappings |
US10853115B2 (en) | 2018-06-25 | 2020-12-01 | Amazon Technologies, Inc. | Execution of auxiliary functions in an on-demand network code execution system |
US10649749B1 (en) | 2018-06-26 | 2020-05-12 | Amazon Technologies, Inc. | Cross-environment application of tracing information for improved code execution |
US11146569B1 (en) | 2018-06-28 | 2021-10-12 | Amazon Technologies, Inc. | Escalation-resistant secure network services using request-scoped authentication information |
US10949237B2 (en) | 2018-06-29 | 2021-03-16 | Amazon Technologies, Inc. | Operating system customization in an on-demand network code execution system |
US11099870B1 (en) | 2018-07-25 | 2021-08-24 | Amazon Technologies, Inc. | Reducing execution times in an on-demand network code execution system using saved machine states |
US11243953B2 (en) | 2018-09-27 | 2022-02-08 | Amazon Technologies, Inc. | Mapreduce implementation in an on-demand network code execution system and stream data processing system |
US11099917B2 (en) | 2018-09-27 | 2021-08-24 | Amazon Technologies, Inc. | Efficient state maintenance for execution environments in an on-demand code execution system |
US11943093B1 (en) | 2018-11-20 | 2024-03-26 | Amazon Technologies, Inc. | Network connection recovery after virtual machine transition in an on-demand network code execution system |
US10884812B2 (en) | 2018-12-13 | 2021-01-05 | Amazon Technologies, Inc. | Performance-based hardware emulation in an on-demand network code execution system |
US10951496B2 (en) * | 2018-12-24 | 2021-03-16 | Threat Stack, Inc. | System and method for cloud-based control-plane event monitor |
US11010188B1 (en) | 2019-02-05 | 2021-05-18 | Amazon Technologies, Inc. | Simulated data object storage using on-demand computation of data objects |
US20200259847A1 (en) * | 2019-02-08 | 2020-08-13 | Fortinet, Inc. | Providing secure data-replication between a master node and tenant nodes of a multi-tenancy architecture |
US11861386B1 (en) | 2019-03-22 | 2024-01-02 | Amazon Technologies, Inc. | Application gateways in an on-demand network code execution system |
US11119809B1 (en) | 2019-06-20 | 2021-09-14 | Amazon Technologies, Inc. | Virtualization-based transaction handling in an on-demand network code execution system |
US11115404B2 (en) | 2019-06-28 | 2021-09-07 | Amazon Technologies, Inc. | Facilitating service connections in serverless code executions |
US11190609B2 (en) | 2019-06-28 | 2021-11-30 | Amazon Technologies, Inc. | Connection pooling for scalable network services |
US11159528B2 (en) | 2019-06-28 | 2021-10-26 | Amazon Technologies, Inc. | Authentication to network-services using hosted authentication information |
US11023311B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | On-demand code execution in input path of data uploaded to storage service in multiple data portions |
US11106477B2 (en) | 2019-09-27 | 2021-08-31 | Amazon Technologies, Inc. | Execution of owner-specified code during input/output path to object storage service |
US11656892B1 (en) | 2019-09-27 | 2023-05-23 | Amazon Technologies, Inc. | Sequential execution of user-submitted code and native functions |
US11250007B1 (en) | 2019-09-27 | 2022-02-15 | Amazon Technologies, Inc. | On-demand execution of object combination code in output path of object storage service |
US11386230B2 (en) | 2019-09-27 | 2022-07-12 | Amazon Technologies, Inc. | On-demand code obfuscation of data in input path of object storage service |
US11550944B2 (en) | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
US11023416B2 (en) | 2019-09-27 | 2021-06-01 | Amazon Technologies, Inc. | Data access control system for object storage service based on owner-defined code |
US11055112B2 (en) | 2019-09-27 | 2021-07-06 | Amazon Technologies, Inc. | Inserting executions of owner-specified code into input/output path of object storage service |
US11416628B2 (en) | 2019-09-27 | 2022-08-16 | Amazon Technologies, Inc. | User-specific data manipulation system for object storage service based on user-submitted code |
US11360948B2 (en) | 2019-09-27 | 2022-06-14 | Amazon Technologies, Inc. | Inserting owner-specified data processing pipelines into input/output path of object storage service |
US10908927B1 (en) | 2019-09-27 | 2021-02-02 | Amazon Technologies, Inc. | On-demand execution of object filter code in output path of object storage service |
US10996961B2 (en) | 2019-09-27 | 2021-05-04 | Amazon Technologies, Inc. | On-demand indexing of data in input path of object storage service |
US11394761B1 (en) | 2019-09-27 | 2022-07-19 | Amazon Technologies, Inc. | Execution of user-submitted code on a stream of data |
US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
US11119826B2 (en) | 2019-11-27 | 2021-09-14 | Amazon Technologies, Inc. | Serverless call distribution to implement spillover while avoiding cold starts |
US10942795B1 (en) | 2019-11-27 | 2021-03-09 | Amazon Technologies, Inc. | Serverless call distribution to utilize reserved capacity without inhibiting scaling |
US12190135B2 (en) | 2019-12-23 | 2025-01-07 | UiPath, Inc. | On-demand cloud robots for robotic process automation |
US11321124B2 (en) | 2019-12-23 | 2022-05-03 | UiPath, Inc. | On-demand cloud robots for robotic process automation |
US11714682B1 (en) | 2020-03-03 | 2023-08-01 | Amazon Technologies, Inc. | Reclaiming computing resources in an on-demand code execution system |
US11188391B1 (en) | 2020-03-11 | 2021-11-30 | Amazon Technologies, Inc. | Allocating resources to on-demand code executions under scarcity conditions |
US11775640B1 (en) | 2020-03-30 | 2023-10-03 | Amazon Technologies, Inc. | Resource utilization-based malicious task detection in an on-demand code execution system |
WO2022041280A1 (en) * | 2020-08-31 | 2022-03-03 | Oppo广东移动通信有限公司 | Method and apparatus for generating file in internet of things, computer device, and storage medium |
US11550713B1 (en) | 2020-11-25 | 2023-01-10 | Amazon Technologies, Inc. | Garbage collection in distributed systems using life cycled storage roots |
US11593270B1 (en) | 2020-11-25 | 2023-02-28 | Amazon Technologies, Inc. | Fast distributed caching using erasure coded object parts |
US12081513B2 (en) * | 2020-12-14 | 2024-09-03 | UiPath, Inc. | Organizational modelling for routing RPA related services of an RPA cloud suite |
US11388210B1 (en) | 2021-06-30 | 2022-07-12 | Amazon Technologies, Inc. | Streaming analytics using a serverless compute system |
US11968280B1 (en) | 2021-11-24 | 2024-04-23 | Amazon Technologies, Inc. | Controlling ingestion of streaming data to serverless function executions |
US12015603B2 (en) | 2021-12-10 | 2024-06-18 | Amazon Technologies, Inc. | Multi-tenant mode for serverless code execution |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009155574A1 (en) | 2008-06-19 | 2009-12-23 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US20100088150A1 (en) | 2008-10-08 | 2010-04-08 | Jamal Mazhar | Cloud computing lifecycle management for n-tier applications |
US20100198960A1 (en) | 2007-10-31 | 2010-08-05 | Johannes Kirschnick | Automated test execution in a shared virtualized resource pool |
US20100198972A1 (en) | 2009-02-04 | 2010-08-05 | Steven Michael Umbehocker | Methods and Systems for Automated Management of Virtual Resources In A Cloud Computing Environment |
US20110029981A1 (en) | 2009-07-31 | 2011-02-03 | Devendra Rajkumar Jaisinghani | System and method to uniformly manage operational life cycles and service levels |
US20110055712A1 (en) | 2009-08-31 | 2011-03-03 | Accenture Global Services Gmbh | Generic, one-click interface aspects of cloud console |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
US8060773B1 (en) | 2009-12-16 | 2011-11-15 | Symantec Corporation | Systems and methods for managing sub-clusters within a multi-cluster computing system subsequent to a network-partition event |
US20110295727A1 (en) | 2010-05-28 | 2011-12-01 | James Michael Ferris | Systems and methods for aggregate monitoring of utilization data for vendor products in cloud networks |
CN102306020A (en) | 2011-06-27 | 2012-01-04 | 中国科学院深圳先进技术研究院 | Virtual modeling thing internet and cloud computing combining method and system |
US20120017112A1 (en) | 2010-07-19 | 2012-01-19 | Power Integrations, Inc. | System and method for provisioning and running a cross-cloud test grid |
CN102346484A (en) | 2011-07-12 | 2012-02-08 | 广州灿点信息科技有限公司 | Cloud deck equipment moving processing method and system |
CN102377739A (en) | 2010-08-11 | 2012-03-14 | 中兴通讯股份有限公司 | Mobile terminal as well as realization method, service system and cloud server thereof |
US20120072579A1 (en) | 2010-09-17 | 2012-03-22 | Microsoft Corporation | Monitoring cloud-runtime operations |
US20120084665A1 (en) | 2004-06-29 | 2012-04-05 | Blake Bookstaff | Method and system for intelligent processing of electronic information with cloud computing |
US20120185913A1 (en) * | 2008-06-19 | 2012-07-19 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
US20130060933A1 (en) * | 2011-09-07 | 2013-03-07 | Teresa Tung | Cloud service monitoring system |
-
2012
- 2012-04-30 US US14/373,780 patent/US10404551B2/en active Active
- 2012-04-30 WO PCT/US2012/035884 patent/WO2013165369A1/en active Application Filing
- 2012-04-30 EP EP12876027.9A patent/EP2845116A4/en not_active Withdrawn
- 2012-04-30 CN CN201280068636.9A patent/CN104067257B/en active Active
- 2012-04-30 BR BR112014018142A patent/BR112014018142A8/en not_active IP Right Cessation
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120084665A1 (en) | 2004-06-29 | 2012-04-05 | Blake Bookstaff | Method and system for intelligent processing of electronic information with cloud computing |
US20100198960A1 (en) | 2007-10-31 | 2010-08-05 | Johannes Kirschnick | Automated test execution in a shared virtualized resource pool |
WO2009155574A1 (en) | 2008-06-19 | 2009-12-23 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US20120185913A1 (en) * | 2008-06-19 | 2012-07-19 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
US20100088150A1 (en) | 2008-10-08 | 2010-04-08 | Jamal Mazhar | Cloud computing lifecycle management for n-tier applications |
US20100198972A1 (en) | 2009-02-04 | 2010-08-05 | Steven Michael Umbehocker | Methods and Systems for Automated Management of Virtual Resources In A Cloud Computing Environment |
US20110029981A1 (en) | 2009-07-31 | 2011-02-03 | Devendra Rajkumar Jaisinghani | System and method to uniformly manage operational life cycles and service levels |
US20110055712A1 (en) | 2009-08-31 | 2011-03-03 | Accenture Global Services Gmbh | Generic, one-click interface aspects of cloud console |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
US8060773B1 (en) | 2009-12-16 | 2011-11-15 | Symantec Corporation | Systems and methods for managing sub-clusters within a multi-cluster computing system subsequent to a network-partition event |
US20110295727A1 (en) | 2010-05-28 | 2011-12-01 | James Michael Ferris | Systems and methods for aggregate monitoring of utilization data for vendor products in cloud networks |
US20120017112A1 (en) | 2010-07-19 | 2012-01-19 | Power Integrations, Inc. | System and method for provisioning and running a cross-cloud test grid |
CN102377739A (en) | 2010-08-11 | 2012-03-14 | 中兴通讯股份有限公司 | Mobile terminal as well as realization method, service system and cloud server thereof |
US20120072579A1 (en) | 2010-09-17 | 2012-03-22 | Microsoft Corporation | Monitoring cloud-runtime operations |
CN102306020A (en) | 2011-06-27 | 2012-01-04 | 中国科学院深圳先进技术研究院 | Virtual modeling thing internet and cloud computing combining method and system |
CN102346484A (en) | 2011-07-12 | 2012-02-08 | 广州灿点信息科技有限公司 | Cloud deck equipment moving processing method and system |
US20130060933A1 (en) * | 2011-09-07 | 2013-03-07 | Teresa Tung | Cloud service monitoring system |
Non-Patent Citations (22)
Title |
---|
Amazon-Auto Scaling; https://web.archive.org/web/20140721153337/http://aws.amazon.com/autoscaling/; published on or before Jul. 21, 2014; (3 pages). |
Amazon—Auto Scaling; https://web.archive.org/web/20140721153337/http://aws.amazon.com/autoscaling/; published on or before Jul. 21, 2014; (3 pages). |
Amazon-CloudWatch-Cloud & Network Monitoring Services; https://web.archive.org/web/20140721155237//https://aws.amazon.com/cloudwatch/; published on or before Jul. 21, 2014; (5 pages). |
Amazon—CloudWatch—Cloud & Network Monitoring Services; https://web.archive.org/web/20140721155237//https://aws.amazon.com/cloudwatch/; published on or before Jul. 21, 2014; (5 pages). |
Chieu, T.C. et al.; "Dynamic Scaling of Web Applications in a Virtualized Cloud Computing Environment"; IBM T. J. Watson Research Center; Oct. 21-23, 2009, on pp. 281-286. |
DTS Solution; "Manage Change in Cloud and Data Center Infrastructure Seamlessly"; 4 pages. |
EP Search Report; 12876027.9/PCT/US2012/035884; dated Apr. 11, 2016; 11 pages. |
EPO; European Search Report; 2845116 PCT/US2012035884; dated Apr. 11 2016; 11 pages. |
International Search Report. dated Dec. 28, 2012. PCT Application No. PCT/US2012/035884. International filing date Apr. 30, 2012. |
Roy; N. et al.; "Efficient Autoscaling in the Cloud using Predictive Models for Workload Forecasting"; Department of EECS, Vanderbilt University; Jul. 4-9, 2011; on pp. 500-507. |
Wikipedia, Application Programming Interface, https://web.archive.org/web/20140721044121/https://en.wikipedia.org/wiki/Application_p.., published on or before Jul. 21, 2014, (8 pages). |
Wikipedia, Command-line interface, https://web.archive.org/web/20140702234101/https://en.wikipedia.org/wiki/Command-line; published on or before Jul. 2, 2014, (9 pages). |
Wikipedia, Common Information Model (computing); https://web.archive.org/web/20130506065213/https://en.wikipedia.org/wiki/Common_Info..; published on or before May 6, 2013, (3 pages). |
Wikipedia, DevOps; https://web.archive.org/web/20140717113449/https://en.wikipedia.org/wiki/DevOps;published on or before Jul. 14, 2014, (4 pages). |
Wikipedia, High-performance computing, https://web.archive.org/web/2014040173129/https://en.wikipedia.org/wiki/HPCC; published on or before Apr. 1, 2014, (5 pages). |
Wikipedia, HP ConvergedSystem, https://web.archive.org/web/2014071820122/https://en.wikipedia.org/wiki/HP_Converged_Systems; published on or before Jul. 20, 2014, (7 pages). |
Wikipedia, Incident management (ITSM); https://web.archive.org/web/20140606023213/https://en.wikipedia.org/wiki/Indicent_management; published on or before Jun. 6, 2014, (3 pages). |
Wikipedia, Information Technology Infrastructure Library; https://web.archive.org/web/20140408045019/https://en.wikipedia.org/wiki/ITIL; published on or before Aug. 8, 2014, (12 pages). |
Wikipedia, Service-level agreement; https://web.archive.orgiweb/20140401165744/https://en.wikipedia.org/wiki/Service-level; published on or before Apr. 1, 2014 (4 pages). |
Wikipedia, Simple Network Management Protocol; https://web.archive.org/web/20140627101418/https://en.wikipedia.org/wiki/Simple_Network..; published on or before Jun. 27, 2014, (6 pages). |
Wikipedia, Web-Based Enterprise Management; https://web.archive.org/web/20131221130903/https://en.wikipedia.org/wiki/Web-Based_E..; published on or before Dec. 21, 2013, (3 pages). |
Wikipedia, WS-Management, https://web.archive.org/web/20130514083137/https://en.wikipedia.org/wiki//WS-Management.., published on or before May 14, 2013, (1 page). |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11374833B2 (en) * | 2012-09-07 | 2022-06-28 | Oracle International Corporation | System and method for providing a service management engine for use with a cloud computing environment |
US12009999B2 (en) | 2012-09-07 | 2024-06-11 | Oracle International Corporation | System and method for providing a service management engine for use with a cloud computing environment |
US11330068B2 (en) | 2020-07-24 | 2022-05-10 | Alibaba Group Holding Limited | Methods and systems for recording user operations on a cloud management platform |
Also Published As
Publication number | Publication date |
---|---|
BR112014018142A8 (en) | 2017-07-11 |
CN104067257B (en) | 2018-01-12 |
EP2845116A4 (en) | 2016-05-11 |
EP2845116A1 (en) | 2015-03-11 |
US20150081885A1 (en) | 2015-03-19 |
CN104067257A (en) | 2014-09-24 |
WO2013165369A1 (en) | 2013-11-07 |
BR112014018142A2 (en) | 2017-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10404551B2 (en) | Automated event management | |
US10931599B2 (en) | Automated failure recovery of subsystems in a management system | |
Weerasiri et al. | A taxonomy and survey of cloud resource orchestration techniques | |
US9128773B2 (en) | Data processing environment event correlation | |
Povedano-Molina et al. | DARGOS: A highly adaptable and scalable monitoring architecture for multi-tenant Clouds | |
US20210157622A1 (en) | Orchestration of kubernetes master node | |
US9009697B2 (en) | Hybrid cloud integrator | |
Dogani et al. | Auto-scaling techniques in container-based cloud and edge/fog computing: Taxonomy and survey | |
US10476949B2 (en) | Predictive autoscaling in computing systems | |
US20170171026A1 (en) | Configuring a cloud from aggregate declarative configuration data | |
WO2019062304A1 (en) | Method, device and system for managing computing resources of block chain node | |
US20130069950A1 (en) | Data Processing Environment Integration Control Interface | |
US20120204187A1 (en) | Hybrid Cloud Workload Management | |
US20120203908A1 (en) | Hybrid cloud integrator plug-in components | |
CN102594919B (en) | Information technology (IT) resource supporting system | |
US20180314549A1 (en) | Operational micro-services design, development, deployment | |
Kranas et al. | Elaas: An innovative elasticity as a service framework for dynamic management across the cloud stack layers | |
Procaccianti et al. | Green architectural tactics for the cloud | |
Procaccianti et al. | A catalogue of green architectural tactics for the cloud | |
Bachmann | Design and implementation of a fog computing framework | |
US9565130B2 (en) | Cloud-based resource availability calculation of a network environment | |
Deng et al. | Cloud-native computing: A survey from the perspective of services | |
Zahra et al. | Analyzing the Limitations and Efficiency of Configuration Strategies in Hybrid Cloud Environments | |
Gonçalves et al. | D-CRAS: Distributed cloud resource allocation system | |
US11625285B2 (en) | Assigning workloads in a multi-node processing environment using feedback from each node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:THOMAS, JEFFERY DARREL;WEISS, JEFFERY LEE;SIGNING DATES FROM 20120427 TO 20141211;REEL/FRAME:034684/0838 |
|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |
|
AS | Assignment |
Owner name: ENTIT SOFTWARE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP;REEL/FRAME:042746/0130 Effective date: 20170405 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SECOND INVENTOR'S NAME PREVIOUSLY RECORDED AT REEL: 034684 FRAME: 0838. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:THOMAS, JEFFERY DARREL;WEISS, JEFFREY LEE;SIGNING DATES FROM 20120427 TO 20141211;REEL/FRAME:043775/0519 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ENTIT SOFTWARE LLC;ARCSIGHT, LLC;REEL/FRAME:044183/0577 Effective date: 20170901 Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ATTACHMATE CORPORATION;BORLAND SOFTWARE CORPORATION;NETIQ CORPORATION;AND OTHERS;REEL/FRAME:044183/0718 Effective date: 20170901 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
AS | Assignment |
Owner name: MICRO FOCUS LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:ENTIT SOFTWARE LLC;REEL/FRAME:050004/0001 Effective date: 20190523 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0577;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:063560/0001 Effective date: 20230131 Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: SERENA SOFTWARE, INC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |