2006
DOI: 10.1535/itj.1004.03
|View full text |Cite
|
Sign up to set email alerts
|

Standards for Autonomic Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The desired end state is a server that, right out of the box, and once plugged into the data center network infrastructure, without any manual intervention whatsoever, becomes a full active participant (an "infrastructure as a service") of the data center resource management layer, capable of interacting with data center management components in a vendor independent fashion, using standard management/automation technologies [33] such as the Distributed Management Task Force's (DMTF) Common Information Model (CIM) [10], CIM-XML [13] or WSManagement [9], and the Service Location Protocol (SLP) [14] over reliable communication protocols like TCP.…”
Section: Problem Statementmentioning
confidence: 99%
“…The desired end state is a server that, right out of the box, and once plugged into the data center network infrastructure, without any manual intervention whatsoever, becomes a full active participant (an "infrastructure as a service") of the data center resource management layer, capable of interacting with data center management components in a vendor independent fashion, using standard management/automation technologies [33] such as the Distributed Management Task Force's (DMTF) Common Information Model (CIM) [10], CIM-XML [13] or WSManagement [9], and the Service Location Protocol (SLP) [14] over reliable communication protocols like TCP.…”
Section: Problem Statementmentioning
confidence: 99%
“…As a consequence, AM S will be informed of the decision as it will receive a proposal for a new application graph with the extra node n w 5 and the related new arcs (n e , n w 5 ), (n w 5 , n c ). The node will have associated some metadata stating where it will be placed 13 . Two cases arise: either the metadata already includes the kind of node (secure, non-secure), or the AM S will be able to determine such information from the metadata and from the other information it already has (or it can derive by monitoring).…”
Section: Sample Case Studymentioning
confidence: 99%
“…It is mostly likely that the AM W will conclude the consensus phase with a NACK and this will be handled with the techniques described above in the context of a NACK coming from AM S . However, in this case alternative 13 generated by the query to the resource manager hidden in the f indN ewResource action strategies can be implemented. In fact, unlike the security concern, the power saving concern is not a binary issue.…”
Section: Sample Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…OOB interfaces are commonly independent of the host operating environment, which could be an OS or a Virtual Machine Monitor (VMM) with one or more OSs. In the article "Standards for Autonomic Computing" [12], in this issue of the Intel Technology Journal, a more detailed overview is given of the importance of standardization in autonomic computing and the benefits of using Web services as external interfaces.…”
Section: Standard Out-of-band External Interfacesmentioning
confidence: 99%