Patent classifications
G06F8/00
Methods and systems to determine container costs and attribute container costs to applications
Methods and system to calculate a total container cost of each container of a data center are described. Methods compute a direct container cost of each container running in the data center based on container resource utilization and a resource utilization rate of each resource of a host. Methods also compute an indirect container cost of each container is calculated as a sum of indirect cost of each resource of the host used by the container and each resource of the host used by a monitor container that monitors each container utilization of host resources. For each container, a total container cost of the container is calculated as the sum of the direct container cost and the indirect container cost of the container. Total container costs are used to determine the cost of applications miming on the containers.
Methods and systems to determine container costs and attribute container costs to applications
Methods and system to calculate a total container cost of each container of a data center are described. Methods compute a direct container cost of each container running in the data center based on container resource utilization and a resource utilization rate of each resource of a host. Methods also compute an indirect container cost of each container is calculated as a sum of indirect cost of each resource of the host used by the container and each resource of the host used by a monitor container that monitors each container utilization of host resources. For each container, a total container cost of the container is calculated as the sum of the direct container cost and the indirect container cost of the container. Total container costs are used to determine the cost of applications miming on the containers.
Failure handling for lifecycle blueprint workflows
An information-technology (IT) blueprint is an executable document that, when executed, can be used to create an IT application such as an e-commerce site. An IT lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an IT application. To this end, an automation engine for the blueprint can include idempotent methods to generate workflows that achieve the same result whether starting from a blank (real or virtual) infrastructure or from a previously populated infrastructure. If a workflow task fails, the workflow that included the task can be re-executed; alternatively, a new workflow can be generated based in part on the application configuration following a fix for the failure.
Failure handling for lifecycle blueprint workflows
An information-technology (IT) blueprint is an executable document that, when executed, can be used to create an IT application such as an e-commerce site. An IT lifecycle blueprint can further be used to manage (e.g., modify) and, ultimately, destroy such an IT application. To this end, an automation engine for the blueprint can include idempotent methods to generate workflows that achieve the same result whether starting from a blank (real or virtual) infrastructure or from a previously populated infrastructure. If a workflow task fails, the workflow that included the task can be re-executed; alternatively, a new workflow can be generated based in part on the application configuration following a fix for the failure.
System for providing ATE test programming by utilizing drag-and-drop workflow editing in a time domain environment
A drag-and-drop workflow editor in an Automated Test Equipment (ATE) environment to create coherent time domain aligned test programs. This includes graphical interface channel diagrams with channel headers, channel timelines, designer items defining test operations, measurement references and trigger references to define temporal relationships in a time domain environment.
System and method to connect a user of a product to contacts of the user who are promoters
A method for connecting users of a software application, including registering a first version of the software application. The method further includes transmitting, to a matching server, a contact list including personally identifiable information of users of the software application. The method further includes receiving, from the matching server, a promoter contact selected, according to a promotion criterion, from the users of the software application in the contact list. The method further includes displaying the promoter contact.
System and method to connect a user of a product to contacts of the user who are promoters
A method for connecting users of a software application, including registering a first version of the software application. The method further includes transmitting, to a matching server, a contact list including personally identifiable information of users of the software application. The method further includes receiving, from the matching server, a promoter contact selected, according to a promotion criterion, from the users of the software application in the contact list. The method further includes displaying the promoter contact.
Assessing computing environment changes using specification documents
According to one embodiment of the present invention, a system analyzes an environment specification document that specifies a proposed configuration of a full-stack environment for a computing system and that describes infrastructure, middleware, and application elements. The system correlates the environment specification document with an environment instantiated on the computing system from the environment specification document. The system determines an impact of changes in the proposed configuration on the environment instantiated on the computing system, and configures the computing system in accordance with the proposed configuration based on the determined impact. Embodiments of the present invention further include a method and computer program product for analyzing an environment specification document in substantially the same manners described above.
Assessing computing environment changes using specification documents
According to one embodiment of the present invention, a system analyzes an environment specification document that specifies a proposed configuration of a full-stack environment for a computing system and that describes infrastructure, middleware, and application elements. The system correlates the environment specification document with an environment instantiated on the computing system from the environment specification document. The system determines an impact of changes in the proposed configuration on the environment instantiated on the computing system, and configures the computing system in accordance with the proposed configuration based on the determined impact. Embodiments of the present invention further include a method and computer program product for analyzing an environment specification document in substantially the same manners described above.
Simplified entity lifecycle management
The technology disclosed offers a declarative framework that implements a machine for multi-step progression of interaction with an entity. The declarative framework is usable over and over for a broad range of applications because it provides a simple rule-based authoring tool that can be used for specifying different elements and components of a complex state machine, including state definitions, state transition triggers, state transition conditions and state transition actions. Once defined, the state machine is automatically generated and implemented based on the declarative input provided by a non-technical user.