US20130124669A1 - System for monitoring eleastic cloud-based computing systems as a service - Google Patents
System for monitoring eleastic cloud-based computing systems as a service Download PDFInfo
- Publication number
- US20130124669A1 US20130124669A1 US13/293,751 US201113293751A US2013124669A1 US 20130124669 A1 US20130124669 A1 US 20130124669A1 US 201113293751 A US201113293751 A US 201113293751A US 2013124669 A1 US2013124669 A1 US 2013124669A1
- Authority
- US
- United States
- Prior art keywords
- computing
- data
- analytics
- monitored
- instance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/301—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is a virtual computing platform, e.g. logically partitioned systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3072—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
- G06F11/3082—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting the data filtering being achieved by aggregating or compressing the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3089—Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3419—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment by assessing time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3442—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for planning or managing the needed capacity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3452—Performance evaluation by statistical analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/81—Threshold
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/815—Virtual
Abstract
Description
- 1. Field of the Invention
- The present invention relates generally to computing systems, and more specifically, to monitoring the operation of computing systems.
- 2. Description of the Related Art
- Systems management programs are often used for monitoring groups of computing devices, such as a group of personal computers deployed within a company's local area network. Generally, some systems management programs are configured to monitor the performance, usage, configuration, and network activity of each of the computing devices in the system. Some such systems management programs obtain data from programs, referred to as agents, executed by each of the computing devices. The agents gather data at the computing device, and the systems management program generally coordinates the operation of the agents by establishing connections with the agents and requesting the agents to report data back to the systems management program, often by periodically polling the agents for data.
- Generally, existing systems management programs are not well-suited for monitoring the operation of relatively large computing systems, multiple computing systems, or computing systems in which constituent computing devices are frequently added or removed. Configuring system management programs is often relatively labor-intensive, as certain such programs require an operator to identify, and configure the program for, each new computing device added to the system. Further, relatively large computing systems or multiple computing systems generally yield relatively large amounts of data, as each computing device in the system may be an additional potential source of information to be monitored.
- These inadequacies are particularly challenging for those monitoring computing systems in a data center or other scalable computing system, such as computing systems operating in a cloud-based virtual data center. Often such computing systems are designed to be scalable, such that new computing devices or virtual machines are provisioned based on the load placed on the computing system. As a result, in some use cases, new computing devices or new virtual machines (that is, computing instances of the computing system) are added and removed relatively frequently as demand fluctuates. These transient computing instances are difficult for certain existing system management programs to effectively monitor, as the amount of data generated can be potentially relatively large and the new instances often go unnoticed and unmonitored by the systems management program until the systems management program is reconfigured to establish a connection with the new computing instances and request data from them. Further, systems management programs are often configured by technicians with relatively specialized knowledge, but such persons are often not in the employ of entities operating cloud-based virtual data centers, which are often specifically designed to be used by entities without specialized expertise in the operation and maintenance of such computing systems. Moreover, because such computing systems are often accessed over the Internet, rather than a local area network under the control of a single entity, the connection between the systems management program and the monitored computing instances is often less reliable, which can result in uneven data flows that could potentially overwhelm the systems management program or cause data to be lost. Finally, those operating computing systems often rely on those computing systems continuing to operate and perform with certain characteristics without fail over relatively long periods of time, for instance over months or years. Relatively short deviations in performance or operation are therefore of interest to such users, but many existing systems management programs either do not monitor data indicative of performance with sufficient granularity or do not monitor data indicative of performance with frequency speed to inform users of events briefly affecting performance.
- The aspects of the present techniques will be better understood when the application is read in view of the following figures in which like numbers indicate similar or identical elements:
-
FIG. 1 shows an embodiment of an analytics-platform computing system for monitoring a plurality of monitored computing systems; -
FIG. 2 shows an embodiment of a collector executed on computing instances of monitored computing systems ofFIG. 1 ; -
FIG. 3 shows an embodiment of a process for initiating a monitoring session with an analytics platform from a computing instance to be monitored; -
FIG. 4 shows an embodiment of a process for outputting metrics of a monitored computing instance to an analytics platform; -
FIG. 5 shows an embodiment of a process for preparing gathered data to be transmitted to an analytics platform; -
FIG. 6 shows an embodiment of a process for transmitting gathered data indicative of performance of a monitored computing instance to an analytics platform; -
FIG. 7 shows details of the analytics-platform computing system ofFIG. 1 ; -
FIG. 8 shows an embodiment of a receive engine of the analytics-platform computing system ofFIG. 7 ; -
FIG. 9 shows an embodiment of an analytics engine of the analytics-platform computing system ofFIG. 7 ; -
FIG. 10 shows an embodiment of a web user interface engine of the analytics-platform computing system ofFIG. 7 ; -
FIG. 11 shows an embodiment of a platform engine of the analytics-platform computing system ofFIG. 7 ; -
FIG. 12 shows an embodiment of a process for analyzing data received from a monitored computing system; and -
FIG. 13 is an example of a computing device. - While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. The drawings may not be to scale. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention, e.g., as defined by the appended claims.
-
FIG. 1 shows an embodiment of an analytics-platform computing system that may address some or all of the deficiencies described above. In certain embodiments, as described below, the analytics-platform computing system 12 may be configured to output results within less than (or substantially less than, e.g., in real time) approximately 120 seconds of when the events upon which the results are based occur, e.g., an even occurring on a monitored computing instance. Further, some embodiments may be capable of monitoring a plurality of different computing systems, each associated with a different account, for example on behalf of a plurality of different entities having accounts, such that monitoring is provided as a service to account holders who are relieved of the burden of hosting a computer system management program. Some embodiments, as described below, may also be relatively easy to configure to monitor new computing instances added to a monitored computing system because, in some instances, the new computing instances may initiate a monitoring session with the analytics platform and push data to the analytics platform, without the analytics platform being pre-configured to communicate with each specific new computing instance. Additionally, in some embodiments described below, the analytics-platform computing system 12 may be a scalable computing system operable to provision additionalmonitoring computing instances 26 or other additional computing resources based upon need, thereby potentially reducing the hardware costs associated with the system. Not all embodiments, however, provide all of these benefits, as various trade-offs may be made using the techniques described herein in pursuit of other objectives, and some embodiments may provide other benefits, some of which are described below. - In the embodiment of
FIG. 1 , acomputing environment 10 includes the analytics-platform computing system 12; a plurality of monitoredcomputing systems client devices network 25. The illustrated analytics-platform computing system 12 includes a plurality ofmonitoring computing instances 26 which may serve a variety of different functions, examples of which are described below with reference toFIG. 7 , and the number of which may be variable based on the computing load placed on the analytics-platform computing system 12, as described below with reference toFIG. 11 . - In some embodiments, the analytics-
platform computing system 12 is a computing system having a plurality ofmonitoring computing instances 26, each of which may be a different physical computing device operating an operating system on one or more processors connected to memory, for example operating in a single memory address space. Or themonitoring computing instances 26 may be virtual machines, e.g., virtual machines executed by a virtualization host, and several virtual machines may be hosted on a single physical computing device, or some instances may host a single virtual machine on multiple physical computing devices. In either case, the computing devices may be one of the examples of computing devices described below with reference toFIG. 13 , such as laptops, desktops, or rack-mounted computing devices, for example. Eachmonitoring computing instance 26 may have an operating system upon which an application may be loaded and within which the application may be executed, and in some embodiments, somemonitoring computing instances 26 may include one or more physical and virtual machines. - In certain embodiments, the analytics
platform computing system 12 may be embodied as a cloud-based distributed application, such as an application deployed in a public cloud (e.g., the elastic compute cloud service offered by Amazon.com, Inc. of Seattle, Wash.), or in a private cloud operated as a virtualized infrastructure within an enterprise data center (for instance, based on the open-source KVM hypervisor). Some embodiments of the cloud-based analytics-platform computing system 12 may scale (e.g., by adding or subtracting monitoring computing instances 26) based on the computing load of the analytics-platform computing system 12. For example, scaling may be performed automatically based solely on the computing load or based on the computing load and other factors, such as the cost of marginal computing instances, bandwidth, or other resources, or scaling may be performed based solely (or partially) on one of these other factors, independent of load, or a combination thereof, e.g., a subset. An analytics-platform computing system that is configured to scale based on load is expected to accommodate a variable number of monitored computing systems and monitored computing systems of variable size without incurring the cost of provisioning computing resources for the maximum expected load. Examples of such scaling are described below with reference toFIG. 7 . In other embodiments, the analyticsplatform computing system 12 does not scale, does not scale automatically, or is not cloud-based and may be executed by a single computing device, which is not to suggest that any other feature described herein may not also be omitted in some embodiments. - The analytics-
platform computing system 12, in some embodiments, may be operable to monitor or managecomputing systems client devices computing systems computing systems computing systems client devices client devices platform computing system 12 is operable to serve a web-based interface to users via the web browser. Advantageously, some embodiments may provide a computing system management service to each of a plurality of different users, each monitoring one of a plurality of different computing systems, thereby potentially reducing or eliminating the need of such users to host or maintain their own computing system management program. Some embodiments, however, may have one analytics-platform computing system for each monitored computing system, and both systems may be operated by the same entity, which is not to suggest that any other feature described herein may not also be omitted in some embodiments. - The monitored
computing systems platform computing system 12. In some embodiments, some or all of the monitoredcomputing systems platform computing system 12 or on different systems. Some embodiments of the monitoredcomputing systems computing systems - In some embodiments, the
computing systems platform computing system 12 may be capable of verifying whether these service-level agreements are met. - The
computing systems monitoring computing instances 26 of the analytics-platform computing system 12 or the monitoredcomputing instances 28 of each of the monitoredcomputing systems computing instances - In the course of executing these applications, the number of computing instances may change. For example, some cloud computing systems are operable to increase or decrease the number of computing instances based on the computing load, for example based on the amount of data to be processed by the above-mentioned applications or the speed of such processing, which in some use cases correlates with the number of users interacting with the services provided by the monitored
computing systems platform computing system 12 may be capable of tracking newly added computing instances as those newly added computing instances identify themselves to the analytics-platform computing system 12. - Further, as the monitored
computing systems platform computing system 12 such that a user operating one of theclient devices computing system client devices computing instances 28, e.g., a virtual machine operating a web browser by which performance of thatcomputing instance 28 andother computing instances 28 is displayed.) - In some embodiments, some, all, or substantially all of the
computing instances 28 of a monitoredcomputing system collector 30. As described in greater detail below with reference toFIG. 2 , the collectors may be capable of introducing new computing instances to be monitored to the analytics-platform computing system 12 and initiating a monitoring session with the analytics-platform computing system 12 to monitor the new computing instance. Further, as described in greater detail below with reference toFIGS. 5 and 6 , thecollectors 30 may be capable of bundling, compressing, encrypting, buffering, and then pushing gathered data to the analytics-platform computing system 12 in a manner that is relatively robust to interruptions in network connections between thecollector 30 and the analytics-platform computing system 12 and bursts of traffic over such connections. Thecollectors 30 may be executed within the operating system of each of the monitoredcomputing instances 28, for example as a parallel thread or process to those threads or processes executing the above-described applications for each of the monitoredcomputing systems - In some embodiments, each monitored
computing system collector 30. Upon booting of this image on the new computing instance to be monitored, as described in greater detail below with reference toFIG. 3 , thecollector 30 may initiate communication with the analytics-platform computing system 12, identify the new computing instance to the analytics-platform computing system 12, and then push data about the operation of the new computing instance to the analyticsplatform computing system 12. - The illustrated embodiment includes three monitored
computing systems computing system platform computing system 12. In some embodiments one (or one and only one) account may be associated with each monitored computing system by the analytics-platform computing system 12. In other embodiments, one account may be associated with one or more monitored computing systems, and each such monitored computing system may be associated with a system identifier also associated with the account that distinguishes among the various monitored computing systems of the account. As explained in greater detail below with reference toFIG. 10 , users associated with such accounts may receive data indicative of the operation of corresponding monitored computing systems through one of theclient devices platform computing system 12, for instance by entering an account identifier and a password in a web user interface. - The
client devices FIG. 13 , such as personal computers, laptops, smart phones, or other devices having a user interface capable of presenting data about the operation of a monitored computing system. In some embodiments, some or all of theclient devices client devices computing systems platform computing system 12. For instance, theclient devices - The
network 25 may include a variety of different types of networks, either individually or in combination. In some embodiments, thenetwork 25 may include the Internet. In another example, thenetwork 25 may include a wide area network or a local area network, such as an Ethernet. Thenetwork 25 may span a relatively large geographic area, in some embodiments. For example, the analytic-platform computing system 12 may be remote from the monitoredcomputing systems systems client devices - Like the other features and embodiments of other figures described herein, embodiments are not limited to systems having the same number of features as those illustrated in
FIG. 1 . For example, other embodiments may include multiple analytics-platform computing systems 12, a single or many moremonitoring computing instances 26, a single or many moremonitored computing systems monitored computing instances 28 within each of the monitoredcomputing systems collector 30 within each monitored computinginstance 28, and zero, one, or many more than oneclient devices computing system -
FIG. 2 illustrates an embodiment of thecollector 30 described above with reference toFIG. 1 . Thesame collector 30 may be executed in each of the above-described monitoredcomputing instances 28, or in some embodiments, different collectors may be configured fordifferent computing instances 28. Thecollector 30 may be operated in combination with the other components described above with reference toFIG. 1 , or thecollector 30 may be used to collect data in other computer systems, such as networking systems or storage systems, for other computer system management programs. - As described in greater detail below, in some embodiments, the
collector 30 may be capable of identifying a new computing instance to the analytics-platform computing system 12, which may lower labor costs and reduce response time associated with configuring the analytics-platform computing system 12 to monitor a new computing instance relative to systems in which the analytics-platform computing system 12 initiates communication or polls data from the computing instance. Further, as is also described in greater detail below, thecollector 30 may be capable of compressing gathered data in a manner that tends to reduce overhead associated with transmission of the data to the analytics-platform computing system 12. Embodiments ofcollectors 30 are also capable of buffering and modulating the transmission of the gathered data such that data is retained in the event of a network failure, or failure of any other component existing in-between the collector and functioningmonitoring computing instance 26 including a component or process of the analytics-platform itself, and such that surges in the transmission of data are mitigated following recovery of thenetwork 25 after such a failure. Thecollector 30 may also be capable of receiving updates of collector software from the analytics-platform computing system 12, thereby potentially lowering the burden on users of monitored computing systems desiring to keep collector software up-to-date. - In some embodiments, the
collector 30 includes anoperating system interface 32, an input/output module 34, adata acquisition module 36, asession initiator module 38, acollector updater module 40, and acollector controller module 42. These modules are described and depicted as separate functional blocks; however hardware or software implementing the corresponding functions may be intermingled, conjoined, separated, or otherwise organized relative to the functional blocks described herein. - The
collector 30, in some embodiments, may be capable of collecting or measuring performance, configuration, and resource utilization data (referred to as metrics) from the operating system executing on the monitored computing instance via theoperating system interface 32. The metrics may be gathered by thedata acquisition module 36 and may be referred to as metrics of the monitored computing instance. The metrics may be indicative of performance, resource utilization, component hardware and software component identities and versions, costs of use, and other attributes. The resulting metric data, in some embodiments, may be pre-processed by the input/output module 34 by packaging the data into time-based buckets or other batches aggregated according to other criteria, for example based on a predetermined quantum of data, thereby potentially reducing the amount of data to be transmitted to the analytics-platform computing system 12 and reducing operating costs and network usage. Other embodiments, however, may not pre-process the data, which is not to suggest that any other feature described herein may not also be omitted in some embodiments. In this embodiment, theoperating system interface 32 may be capable of making calls to an application programming interface of the operating system of the monitored computing instance, for example in response to requests for data or commands from the other components of thecollector 30. - In some embodiments, the input/
output module 34 is capable of communicating with the other components of thecollector 30 and with the analytics-platform computing system 12 via the network 25 (FIG. 1 ). As illustrated byFIG. 2 , this embodiment of an input/output module 34 includes athrottle module 44, abuffer module 46, anencryption module 48, and acompression module 50. Other embodiments may include additional modules or fewer modules, again which is not to suggest that other features may not also be omitted. -
FIG. 2 illustrates some of these modules as being spatially interspersed between other modules, butFIG. 2 is not limited to a particular topology, and the components ofFIG. 2 , as is the case with the other block diagrams herein, may communicate with one another, in some use cases and some embodiments bi-directionally, either directly or indirectly through other modules or components. Such communication may occur through a variety of techniques at a variety of different layers of abstraction, including via a wired or wireless network, via a bus within a computing device, by way of calling module or component application program interfaces (APIs), or via reference to value stored in memory, such as values associated with variables within a program, or via copies of such values passed between processes or sub-programs. - The input/
output module 34 and itscomponents FIG. 3 andFIG. 4 and the processes described below with reference toFIG. 5 andFIG. 6 , in some embodiments. As explained in greater detail below with reference to these figures, thethrottle module 44 may be capable of throttling the output of thecollector 30 to the analyticsplatform computing system 12 such that sudden spikes in network traffic to the analytics-platform computing system 12, for instance following a systemic failure or recovery from a network failure, are mitigated, thereby potentially reducing the likelihood of a spike in traffic from one monitored computing system impeding the flow of data from another monitored computing system. Thebuffer module 46 may be capable of storing (e.g., buffering) metrics such that data losses are avoided or mitigated when the throttle module 44 (or a network outage) causes the input/output module 34 to transmit data at a slower rate than thecollector 30 is gathering data. Theencryption module 48 may be operative to encrypt data from thecollector 30, such that an entity monitoring network traffic, for example an entity performing deep packet inspection of traffic to the analytics-platform computing system 12, may be impeded from inferring details about the operation of a monitoredcomputing system 14, thereby potentially satisfying some regulatory requirements for the security of data relating to certain systems and potentially limiting the likelihood of certain types of attacks on system security, such as attacks based on changes in resource usage in response to more or fewer characters of a password being correct. Thecompression module 50 of this embodiment may be operative to reduce the amount of network traffic used to convey a given amount of information from thecollector 30 to the analytics-platform computing system 12. Examples of compression are described below with reference toFIG. 5 . - In this embodiment, the
data acquisition module 36 includes an operating systemstatus interface module 52, a network-usage interface module 54, asensor interface module 56, adata pre-processor module 58, and adata aggregator module 60. Other embodiments may include additional modules or fewer modules, again which is not suggest that other features may not also be omitted or supplemented. - In some embodiments, the operating system
status interface module 52, the networkusage interface module 54, and thesensor interface module 56 may be capable of gathering metrics about the monitored computing instance. For example, the operating systemstatus interface module 52 may be capable of commanding the operating system, via theoperating system interface 32, to return data indicative of resource utilization, configuration, and performance of the operating system, resources of the operating system, or software executed in the operating system, including resource utilization and performance of applications and other processes. Examples of such metrics include utilization of system memory, for instance utilization of random-access memory, utilization of various other types of memory, such as cache memory, persistent storage memory (e.g., hard disk drive memory, solid-state drive memory, and the like), graphics memory, and other forms of special-purpose memory, such as buffer memory in a network interface card. In another example, the metrics may include utilization of various types of processors, such as utilization of one or more cores of a central processing unit, and utilization of a graphics processing unit, for example. Utilization may be expressed in a variety of formats, for example a percentage of a capacity (such as in comparison to historic averages, peaks and troughs where the historic data was previously recorded by the analytics platform computing system, in comparison to historic data gathered from a wide variety of time and date ranges, in comparison to aggregate historic data previously gathered from similar or different instances, running in the same or different cloud/data center/virtual infrastructure), an absolute amount of utilization, for instance in megabytes or cycles of a CPU, or a binary indicator of whether some condition has been obtained or not been obtained. Metrics may include data logged by the operating system, including error conditions, and data indicative of which processes are running Metrics may also include performance metrics, for example data indicative of the amount of time various tasks take, such as the time taken to retrieve data from memory or write data to memory, or time taken to perform certain processing tasks, such as the time taken to iterate a portion of an application or time taken to yield some results. Other metrics may include metrics that are application or process specific, such as the above-described metrics that are attributable to a given process or application, and a list of such processes or applications. Some embodiments may be capable of obtaining metrics indicative of the configuration of the monitored computing instance, for example a size of a memory space of the monitored computing instance, for instance whether the monitored computing instance is a 32-bit or 64-bit system, system information about allocated or present processing power and memory, and the like. Gathered data may also include data indicative of versions of applications, drivers, and firmware. Metrics may also include cost data associated with the operation of the computing instance, for instance cost data associated with electrical power, cost data of units of processing, costs data of units of memory, and cost data of network transmissions or reception of data. - In some embodiments, the network-
usage interface module 54 may be capable of obtaining information relating to network usage via theoperating system interface 32 by transmitting commands to theoperating system interface 32 and receiving data retrieved via theoperating system interface 32. Examples of network usage data include data indicative of a rate or amount of network traffic received by or transmitted by the monitored computing instance and data indicative of performance of network traffic, such as packet loss, latency, bandwidth, routes, and data indicative of recipients of network traffic or transmitters of network traffic to the monitored computing instance. The data indicative of network traffic may also include data that is specific to particular types of network traffic, for example network traffic encoded according to particular protocols, data particular to certain applications, data particular to network traffic received through or transmitted through a particular port, and data indicative of network traffic received from or transmitted to some other computing device. The data indicative of network traffic may also include data indicative of the operation of a network interface card, physical or virtual, such as data indicative of an amount of data stored in a buffer of the network interface card and data indicative of the capabilities of the network interface card, such as supported protocols, an amount of memory, supported features, and firmware versions. In some embodiments, the networkusage interface module 54 is also operable to gather data indicative of information encoded in network traffic, such as data available through deep packet inspection of network traffic, from which can be derived transaction information including transaction response times, for example the response times for various application or storage protocol transactions. - In some embodiments, the
sensor interface module 56 is operable to obtain data from various sensors of the computing device providing the monitored computing instance by transmitting requests for such data to theoperating system interface 32 and receiving results retrieved by theoperating system interface 32 from sensors. Examples of such data include temperature data indicative of the temperature of various components of the physical computer provided by the monitored computing instance, such as the temperature of a processor (e.g. a central processing unit, a digital signal processor, a graphics processing unit, a memory controller, a hard disk drive controller, and the like), the temperature of memory (e.g., random-access memory, cache memory, or a hard disk drive memory, such as a solid-state drive), the temperature of a power supply, or (i.e., and/or) the ambient temperature within a case or rack in which the monitored computing instance is disposed. Other examples of sensor data may include audio data or motion sensor data indicative of vibration of components of the physical computer providing the monitored computing instance (e.g., capacitor or fan vibrations) or a current draw or a voltage of various components, such as fans, processors, memory, or a power supply. In some embodiments, obtaining sensor data may include accessing some form of clock chip or other component that provides, or can be made to provide signals or indications on a regular basis, either absolutely or relative to the ‘virtual clock’ of virtual machines. - The metrics gathered by the
interface modules data pre-processor module 58, in some embodiments. In embodiments having adata pre-processor module 58, this module may perform certain analyses on the gathered data to identify certain metrics that are discernible within the subsequently described batches of data formed by thedata aggregator 60. For instance, thedata pre-processor 58 may be capable of identifying within data associated with these batches a maximum value, a minimum value, an average value, a median value, a standard deviation, a variance, a count of some events, and the like. Thedata pre-processor 58 may also be capable of reducing the granularity of metrics, for example by sampling the data obtained by themodule - The
data aggregator module 60, in this embodiment, may be capable of receiving metrics from thedata pre-processor 58 or directly from theinterfaces collector 30. In another example, the batches may be defined based on an amount of data, for example each batch may contain a predefined or dynamically determined amount of data, such as one kilobyte, 10 kilobytes, or 1 megabyte, for instance. In another example, the batches may be defined based on the occurrence of events, for example a batch may begin when a process executed by the monitored computing instance starts and end when the process ends. Batching the data is expected to reduce the amount of data transmitted to the analytics-platform computing system 12 while still providing data indicative of the operation of the monitored computing instance over the batching duration. In some embodiments, the batches may be relatively small in order to provide a relatively high resolution view of the operation of the monitored computing instance, for example the batches may span an amount of time less than or approximately equal to 30 seconds, 20 seconds, 10 seconds, 5 seconds, one second, or 100 microseconds or less. Other embodiments, however, may not batch data, and some or all of the gathered data may be transmitted to the analyticsplatform computing system 12, which is not to suggest that any other feature described herein may not also be omitted in some embodiments. - In some embodiments, the
data aggregator module 60 may include an input, a buffer, a batch manager, and an output. The input may receive data from thedata pre-processor module 58 and store the data in the buffer. The batch manager may determine when a batch is complete and, in response, instruct the output to transmit the batch to the input/output module 34 and clear the buffer. - As noted above, the
controller 30 may also include thesession initiator module 38, in some embodiments, which may include aninstance identifier generator 62 and anaccount identifier module 64. Details of the operation of thesession initiator module 38 are described in greater detail below with reference toFIG. 3 . Thesession initiator module 38 may be capable of requesting identifiers from thesemodules platform computing system 12. - In some embodiments, the
session initiator 38 is capable of initiating communication with the analytics-platform computing system 12, without the analytics-platform computing system 12 first communicating with thecollector 30 or the new monitored computing instance. In some embodiments, thesession initiator 38 is capable of alerting the analytics-platform computing system 12 to the existence of a new computing instance to be monitored without the analytics-platform computing system 12 otherwise receiving instructions indicating the existence. Thesession initiator 38 may be characterized as being capable of self identifying thecollector 30 or the monitored computing instance to the analytics-platform computing system 12. Thesession initiator module 38 is expected to simplify the burden associated with configuring an analytics-platform computing system 12 to monitor a computing system by automatically informing the analytics-platform computing system 12 of which computing instances are to be monitored. However, other embodiments may not include asession initiator module 38, and some embodiments may include an analytics-platform computing system 12 that is configured to identify a new monitored computing instance based on signals received from some other source, for example signals received from one ofclient devices computing instances 28 tasked with requesting a new computing instances from a cloud service provider, which again is not to suggest that any other feature herein is required in all instances. - The instance
identifier generator module 62 may be capable of forming an identifier, such as an identification number, code, or other string, that is unique to (or likely to be unique to, for example more likely than one in 100,000) each monitored computing instance within a monitored computing system or each monitored computing instance. Further, in some embodiments, the instanceidentifier generator module 62 is capable of forming such an identifier without receiving information from the analytics-platform computing system 12, for example prior to initiating contact with the analytics-platform computing system 12. The instance identifier may be formed based on a variety of attributes of the monitored computing instance, for example some operating systems alone, or by way of interaction with another component may provide a unique identifier which may be used, a network address of the monitored computing instance, a MAC address of the monitored computing instance, serial numbers of components of the monitored computing instance, or attributes likely to vary, such as a pseudorandom number generated by the monitored computing instance, less significant digits of a temperature of the monitored computing instance, and less significant digits of a voltage measured by the monitored computing instance. In some embodiments, these values may be inputs to a hash function that generates the instance identifier. - Drawing on these sources of values that are likely to vary among the monitored computing instances is expected to yield instance identifiers that are likely to be unique among the monitored computing instances, thereby potentially providing an identifier with which the
collector 30 may initiate a session with the analytics-platform computing system 12 without the analytics-platform computing system 12 centrally coordinating the allocation of instance identifiers, and potentially relieving users of the burden of configuring the analytics-platform computing system 12 for such central coordination. In other embodiments, however, the instance identifier may be received from some other source, for example from aclient device platform computing system 12, which is not to suggest that other features cannot also be omitted in some embodiments. - Similarly, the
account identifier module 64 may obtain an identifier that is unique to (or likely to be unique to) an account associated with the monitored computing system of the monitored computing instance. The account identifier, in some embodiments, may be obtained from a computing instance controlling the instantiation and termination of new computing instances of a monitored computing system, for example. Other embodiments may not include an account identifier, for instance, some embodiments may include an identifier for a monitored computing system that is not associated with an account. - The
session initiator module 38 may also include an address of the analytics-platform computing system 12, for example an address reachable through the network 25 (FIG. 1 ). The address may take a variety of forms, for example the address may be an Internet protocol address, such as an Internet protocol version 4 or version 6 address, or the address may be a uniform resource identifier associated with the network address of the analytics-platform computing system 12 and resolvable through a domain name service. Thesession initiator 38 may also be operative to establish a secure connection with the analytics-platform computing system 12, for example by exchanging encryption keys. - The
collector updater module 40 may be capable of determining the version or configuration of thecollector 30, requesting data indicative of newer versions or a newest version of a collector from the analytics-platform computing system 12, determining based on this data whether to upgrade thecollector 30, requesting data encoding instructions for a new collector corresponding to the newer version or newest version from the analytics-platform computing system 12, and launching a module configured to uninstall the old version of thecollector 30 and install the new version or newer version. In some embodiments the determination to upgrade may be made at the analytics-platform computing system 12 or in some other computing system or device. - The
updater module 40 may, in some embodiments, receive a signal from thesession initiator module 38 indicating that a new monitoring session has been established with the analytics-platform computing system 12, and in response, thecollector updater 40 may perform the steps described above to determine whether to upgrade. In some embodiments, thecollector updater module 40 may perform a similar determination repeatedly during the operation of thecollector 30, for example upon the hour, once a day, once a week, or once a month. Thecollector updater module 40 may be capable of updating thecollector 30 to a new version during the operation of a monitored computing instance without losing data measured by the monitored computing instance, or with losing relatively little data monitored by thecollector 30. For example, thecollector updater 40 may be capable of installing a new collector embodying the new version while thecollector 30 continue to operate, determining that the new collector is operative and has established a monitoring session, instructing the older version of thecollector 30 to stop gathering data, determining that the remaining data stored in the buffers of the older version of thecollector 30 have been transmitted, and then terminating the older version of thecollector 30. - The
collector controller 42 may be capable of coordinating the operation of the components of the input-output module 34, thedata acquisition module 36, thesession initiator module 38, thecollector updater module 40, and the operatingsystem interface module 32. For example, thecollector controller 42 may instantiate and terminate each of thesemodules collector controller module 42, for instance by passing values by reference or as copies of values as parameters returned to thecollector controller 42, which may then pass these values or references to other modules. In some embodiments, thecollector controller 42 may be executed in response to a new computing instance booting or a new version of thecollector 30 being installed, and upon (in response to) being executed, thecollector controller module 42 may launch thesession initiator module 38 to establish a monitoring session with the analytics-platform computing system 12, then launch theupdate module 40 to determine whether thecollector 30 is the correct version, then upon determining that thecollector 30 is the correct version, launch thedata acquisition module 36 and the input/output module 34 to begin gathering and reporting data to the analytics-platform computing system 12. - The
collector 30, in some embodiments, is expected to automatically reconfigure the analytics-platform computing system 12 to monitor new computing instances as new computing instances are added to a monitored computing system and automatically update the collector as new versions are promulgated. These techniques, either individually or in isolation, are expected to reduce the burden on those attempting to monitor computing systems, particularly those attempting to monitor scalable computing systems formed within a cloud computing service that supports automatic provisioning of additional computing resources based on load or other needs. These techniques may be prohibited in specific use cases for a variety of reasons, such as security concerns. Thecollector 30 in some embodiments may have the automated reconfiguration and automated update capabilities permanently disabled. In such embodiments, reconfiguration and collector updates may be carried out by manual intervention. Other embodiments, however, may not necessarily provide these advantages, and various engineering trade-offs may be made to use the techniques described herein to obtain other objectives. -
FIG. 3 illustrates an embodiment of aprocess 66 for initiating a monitoring session, for instance with the analytics-platform computing system 12, upon the launch of a new computing instance. Some, all, or substantially all of theprocess 66 may be performed by thesession initiator module 38, for instance in cooperation with the other components of thecollector 30 ofFIGS. 1 and 2 . Applications of theprocess 66, however, are not limited to these configurations. - The
process 66 begins with operating a monitored computing system, as indicated byblock 68. Operating a monitored computing system may include operating one or more monitored computing instances of the monitored computing system. In some embodiments, the instances may be formed by uploading from a main instance, or a controlling client device, a machine image including an operating system, the above-described collector, and applications to be executed by the instance to perform the tasks that the computing system is intended to perform for a user. New instances may be obtained, in some embodiments, by transmitting a request for a new instance to a cloud service provider or other system for dynamically allocating computing resources, such as an elastic data center or virtualized computing infrastructure provider. The request may include specifications of the requested computing instance, for example an amount of addressable memory supported, processor specifications such as 32 bits or 64 bits, memory specifications and the like. Some requests may also specify an operating system. - Next, in some embodiments, the
process 66 includes determining whether a new computing instance has launched, as indicated byblock 70. In some embodiments, this and the subsequent steps may be performed by thecollector 30, which may be launched upon the boot of the new computing instance, thereby determining that the new computing instance has launched. In other embodiments, software or hardware external to the new computing instance may determine that a new computing instance has launched. For example, a computing device that requests the launch of the new computing instance may make this determination upon having made the request or upon having received confirmation that the request was satisfied. Upon determining that a new computing instance has not launched, in response, theprocess 66 may return to block 68. Alternatively, upon determining that a new computing instance has launched, in response, theprocess 66 may proceed to the next step described. - Next, in some embodiments of
process 66, an instance identifier of the new computing instance may be obtained, as indicated byblock 72. Obtaining an instance identifier may be performed with the instanceidentifier generator module 62 described above with reference toFIG. 2 . In some embodiments, the instance identifier may be a number, code, or other string that is unique or likely to be unique to the new computing instance, and in some embodiments, the new instance identifier may be obtained based on attributes of the new computing instance, such that the instance identifier is formed without central coordination from, for example, an analytics platform. - Next, in some embodiments of
process 66, an account identifier of an account associated with the computing system of the new computing instance may be obtained, as indicated by block 74. This step may be performed with the above-describedaccount identifier module 64 ofFIG. 2 . Theprocess 66 also includes obtaining an address of an analytics platform, as indicated byblock 76, which may include the above described techniques for obtaining an Internet protocol address or a uniform resource identifier. In some embodiments, the address may be obtained by recalling the address from memory allocated to a collector, and the address may be encoded as a constant in code executed as the collector. In some embodiments, each collector of each monitored computing instance of each monitored computing system may obtain the same address. - The
process 66 in some embodiments includes initiating a session with the analytics platform by transmitting a request to monitor the computing instance to the obtained address, as indicated byblock 78. Initiating a session may include transmitting a signal indicative of the existence of a new computing instance to be monitored to the analytics platform. In some embodiments, the signal indicative of the new instance may constitute a request. In certain embodiments, the first communication between the analytics platform and the new computing instance may be a transmission by the collector or other transmissions from the new computing instance to the analytics platform. Initiating communication from the new computing instance is expected to simplify configuration of the analytics platform, as the analytics platform, in some embodiments, may not need to be reconfigured manually for each new computing instance, though not all embodiments necessarily provide this benefit. The initiated session, in some embodiments, may include transmissions from a monitored computing instance to the analytics platform and transmissions from the analytics platform to the monitored computing instance. As explained in greater detail below, data received at the analytics platform may be associated with the session, and the session may be associated with the monitored computing instance, for example with the identifier of the new computing instance, such that session data received at the analytics platform may be associated with the monitored computing instance and, in some embodiments, the account identifier. - The
process 66 also includes, in this embodiment, transmitting the instance identifier and the account identifier to the analytics platform for association with the session, as indicated byblock 80. In some embodiments, this transmission may be a transmission by which a session is initiated, as described above with reference to block 78. In other embodiments, the session may be initiated, and the identifier is may be transmitted subsequently, for example by the collector controller either in response to confirmation from the analytics-platform computing system 12 that the session has been established or in response to a request for the identifiers from the analytics-platform computing system 12. - Embodiments of the
process 66, like the other processes described herein, are not limited to the particular sequence illustrated in the figure. For example, in some embodiments, account identifiers and instance identifiers may be obtained after initiating a session. Further, like the other systems, devices, and processes described herein, not all embodiments necessarily include all the features ofprocess 66, for instance some embodiments may omit certain steps or include additional steps. -
FIG. 4 illustrates an embodiment of aprocess 82 for reporting data from a monitored computing instance. Theprocess 82 may be performed by thecollector 30 described above with reference toFIG. 2 , though embodiments are not limited to the variations of thecollector 30 described above. As described in greater detail below, theprocess 82 may convey data from the monitored computing instance to the analytics platform in a fashion that is relatively easy for users to configure, is relatively robust to interruptions in network communication, and is relatively parsimonious with bandwidth, while providing relatively high resolution indicators of the performance of a monitored computing instance. - The illustrated
process 82, in some embodiments, begins with initiating a session between a computing instance of a monitored computing system and an analytics platform, as indicated byblock 84. This step, in some embodiments, may be performed by the above-describedsession initiator 88 ofFIG. 2 by executing theprocess 66 ofFIG. 3 . In some embodiments, the session is initiated by the monitored computing instance, and in other embodiments, the session is initiated by the analytics platform or by some other computing device. - Next, in some embodiments, the
process 82 includes updating a collector of the monitored computing instance, as indicated byblock 86. Updating the collector may be performed by the above-describedcollector updater module 40 ofFIG. 2 using the techniques described with reference to the operation of thismodule 40. - The
process 82, in some embodiments, also includes obtaining collector parameters, as illustrated byblock 88. Obtaining collector parameters may include obtaining user configurable parameters that control the operation of the collector. Examples of user configurable parameters include selections by a user of the monitored computing system (for instance a user who controls or builds the monitored computing system in order to serve customers of the user) regarding which data is transmitted from the monitored computing instance, how the data is pre-processed and processed, and how the data is identified and grouped. For instance, the collector parameters may include a parameter that specifies how data is to be batched, for example the duration of a subsequently described aggregation period, such as the above-described time-based batches of metrics. - Other examples include data indicative of which metrics are to be transmitted to the analytics platform and the format for those transmissions. For instance, some embodiments may specify that different categories of metrics be transmitted in a particular sequence, such that the categories of the metrics can be identified at the analytics-
platform computing system 12 based on the sequence without also transmitting labels for the categories, thereby potentially reducing the amount of data exchanged between the collector and the analytics platform. By way of example, the collector parameters may specify that a processor usage metric is transmitted first, followed by a delimiter, such as a comma, followed by a memory usage metric, then a delimiter, followed by a network usage metric, and so on. The collector parameters, including sequences for data transmission, may be obtained from the analytics-platform computing system 12, which may retrieve the collector parameters based on an account identifier received upon the initiation of a session instep 84 and may transmit the collector parameters to the collector. Establishing such a sequence based on collector parameters is expected to reduce network usage relative to systems that transmit parameters using various markup languages, such as extensible markup language (XML) or JavaScript object notation (JSON). In other embodiments, the transmitted data may be labeled with each transmission, and this benefit may not be provided. - Next, in some embodiments of
process 82, metrics of the computing instance may be obtained, as indicated byblock 90. Obtaining metrics may be performed with the above-describeddata acquisition module 36 using the techniques described with reference to the operation of that module. In particular, some embodiments may obtain metrics with the above-describedinterface modules operating system interface 32. - Some embodiments of the
process 82 include determining whether an aggregation period has elapsed, as illustrated bydecision block 92. The aggregation period may be a period of time within which obtained data is packaged or otherwise grouped into time-based buckets or other batches. The duration of the aggregation period may be one of the obtained collector parameters obtained instep 88. In some embodiments, the duration may be one of the durations described above with reference to thedata aggregator 60. The duration may be selected based on trade-offs between the amount of data to be conveyed between the analytics platform and the monitored computing instance and the desired resolution of analyses performed by the analytics platform, as described below. - Upon determining that the aggregation period has not elapsed, in response, the
process 82 may return to block 90. Alternatively, upon determining that the aggregation period has elapsed, in response, theprocess 82 may proceed to block 94. - As illustrated by
block 94, theprocess 82 in some embodiments includes forming a metric data batch indicative of metrics obtained during the aggregation. Forming a metric data batch may include the steps described above with reference to the operation of thedata pre-processor module 58 and thedata aggregator module 60 ofFIG. 2 . In some embodiments, forming metric data batches includes calculating various statistics such as maximum values, minimum values, median values, average values, counts, or binary alarms, and the like. Forming a metric data batch may also include sequencing the data according to the sequence obtained with the collector parameters, including inserting delimiters between data values, as described above with reference to step 88. Alternatively or additionally, some embodiments may include encoding the data in a markup language, such as XML or JSON, for instance, encoding the data in a hierarchical tree data structure having metadata descriptive of nodes of the tree. - Next, in the present embodiment of
process 82, the formed metric data batch may be output to the analytics platform, as indicated byblock 96. Outputting the data may include outputting the data with the above-described input/output module 34 ofFIG. 2 using the techniques described above with reference to the operation of this module. In some embodiments, the data is output with the process described below with reference toFIGS. 5 and 6 . Other embodiments, however, may output the data without performing some or all of the steps ofFIGS. 5 and 6 , which is not to suggest that other features described herein may not also be omitted, and some embodiments may perform theprocess 82 in a different order from the steps depicted, without including some of the steps depicted, or by including additional steps, as is the case with the other processes described herein. -
FIGS. 5 and 6 illustrateprocesses processes processes processes - The
process 98, in some embodiments, begins with obtaining a metric data batch, as indicated byblock 102. Obtaining a metric data batch may include obtaining a metric data batch through the steps up to and including thestep 94 ofprocess 82 described above. The obtained metric data batch may include a batch of data obtained over some time period, such as over an approximately or exactly 0.5 second, 1 second, 5 second, 20 second, or 5 minute or less window of time. - In some embodiments, the
process 98 includes compressing the metric data batch, as illustrated byblock 104. The data may be compressed with a variety of techniques, for example using the above-describedcompression module 50 ofFIG. 2 . In some embodiments, the data may be compressed by identifying patterns existing within the data, such as a long string of repeating characters, associating the pattern with a shorter string, replacing the pattern with the shorter string, and outputting the result. For instance, a string of zeros may be replaced with a string that identifies the character zero and the number of zeros. Similar techniques may be used for other repeating patterns, such as repeating patterns of zeros and ones. - In some embodiments, the
process 98 includes encrypting the compressed metric data batch, as illustrated byblock 106, and which may be performed in some embodiments by the above-describedencryption module 48 ofFIG. 2 . Encrypting the compressed metric data batch may include encrypting the data based on an encryption key obtained during the above-described process for initiating a session between a computing instance and an analytics platform. Encryption may also include salting the data with a random number of leading or trailing values to impede efforts to measure an amount of data being transmitted. Encryption, like many of the other steps described herein, may be performed at a different part of theprocess 98 or theprocess 100. For example, encryption may be performed on a group of metric data batches retrieved from a buffer during theprocess 100, as described in greater detail below. Encrypting a larger collection of such data is expected to result in greater obfuscation of the encrypted data. - Next, some embodiments of the
process 98 may store the encrypted metric data batch in a buffer. The buffer may be, or may be controlled by, thebuffer module 46 described above with reference toFIG. 2 . In some embodiments, the buffer is a first-in first-out buffer, for example a ring buffer having memory for storing data, memory for storing an input pointer value that is incremented through addresses of the ring buffer each time a new value is written to one of the addresses of the ring buffer, and memory for storing an output pointer value that is incremented through addresses of the ring buffer each time a value is read from one of the addresses of the ring buffer. Embodiments having a ring buffer may also include an input counter for incrementing the input pointer and an output counter for incrementing the output pointer. A ring buffer is expected to occupy a predetermined amount of memory of the computing instance, potentially preventing the collector from causing a memory error by consuming excess memory of the computing instance. Other embodiments, however, may not use a ring buffer. For example, some embodiments may consume additional memory as additional data is buffered. In other embodiments, the buffer is a last-in first-out buffer. The selection between these types of buffers may depend upon whether a user prefers more up-to-date data to be delivered first or whether the data arrive in the sequence with which it was acquired. The buffer is expected to store data during periods in which data is acquired faster than it can be transmitted, for example during periods in which network traffic is slow, during periods in which the analytics-platform computing system 12 is overloaded, or during periods in which the acquisition of data surges, for example when the computing instance being monitored has a systemic error. Other embodiments, however, may not include a buffer, and data may be transmitted as it is acquired, which is not to suggest that any other feature may not also be omitted in some embodiments. - The buffer data may be transmitted by executing the
process 100 ofFIG. 6 . In some embodiments, theprocess 100 begins with retrieving encrypted metric data batches from the buffer, as illustrated byblock 110. A single batch may be obtained, a portion of a single batch may be obtained, or multiple batches may be obtained from the buffer per retrieval request. As described above, the obtained batches may be the last batches input into the buffer or the oldest batches in the buffer, or the batches may be prioritized with some other technique, for example based on the content of the data within the batch. - Some embodiments of the
process 100 include determining whether a latency of transmissions to the analytics platform (which may include time taken for the platform to process receipt of the data) is greater than a threshold, as illustrated byblock 112. This determination may be performed by the above-describedthrottle module 44 ofFIG. 2 . High latency is expected to be indicative of surges in network traffic, issues with the transmission of data across the network, or the analytics-platform computing system 12 being overloaded. The latency may be determined based on a variety of techniques. For example, receipt of transmissions to the analytics platform by a monitored computing instance may be confirmed by the analytics platform transmitting an acknowledgment signal to the monitored computing instance. The transmission to the analytics platform may include a transmission identifier, and the acknowledgment signal may reference that transmission identifier, such that thethrottle module 44 may identify which acknowledgment signal is associated with which transmission and calculate a difference between the time at which the transmission was sent and the time at which the acknowledgment signal was received to determine a latency. In other embodiments, the acknowledgment signal may include data indicative of the time at which the acknowledgment signal was received, or data requesting a delay. - The threshold may be a predetermined threshold or a dynamic threshold that changes based on any of a variety of factors. In some embodiments, the threshold is one of the obtained collector parameters described above with reference to step 88 of
FIG. 4 . The threshold, in some embodiments, may be adjusted based on an amount of data stored in thebuffer module 46 ofFIG. 2 . For example, the threshold may be increased in response to an increase in the amount of data in the buffer, in response to the amount of data in the buffer exceeding some buffer threshold, or some other factor. The threshold may be decreased based on similar factors decreasing. - Upon determining that the latency is greater than the threshold, in response, some embodiments of the
process 100 may proceed to decision block 114, in which theprocess 100 may wait until a transmission delay has elapsed before attempting to transmit additional metric data. The determination ofblock 114 may be performed by thethrottle module 44 described above with reference toFIG. 2 . In some embodiments, the transmission delay may be a predetermined value or a dynamically determined value that varies based on one or more factors. For example, the transmission delay may be adjusted along with the latency threshold in the manner described above based on the amount of data stored in thebuffer module 46 ofFIG. 2 . In another example, the delay may be adjusted based on variability, such as a standard deviation, range, or variance, of the latency of transmissions to the analytics platform, a technique which is expected to exploit relatively frequent periods of low latency intermingled with periods of higher latency. - Waiting until the transmission delay has elapsed is expected to throttle data received by the analytics-
platform computing system 12, thereby potentially preventing the analytics-platform computing system 12 from being swamped by a spike in network traffic following a network outage and potentially avoiding the loss of data, without the analytics-platform computing system 12 centrally controlling transmission times. Further, such throttling is expected to protect the analytics-platform computing system 12 from sudden burst of traffic during a systemic failure, for example during a failure affecting multiple monitored computing systems within a data center of a cloud service provider. Throttling the transmission of metric data based on latency is also expected to coordinate the operation of multiple collectors across multiple monitored computing systems, without necessarily requiring centralized control by the analytics-platform computing system 12 to coordinate the transmission of the various collectors. This is expected to reduce the complexity of configuring the analytics platform and facilitate use of the analytics platform as a service. Other embodiments, however, do not throttle network traffic or centrally control transmission. - Upon determining that the transmission delay has not elapsed, the
process 100 returns to block 114 and continues to wait. Alternatively, upon determining that the transmission delay has elapsed, theprocess 100 of this embodiment proceeds to block 116. Similarly, in the decision step ofblock 112, upon determining that latency of transmissions to the analytics platform is not greater than the latency threshold, theprocess 100 of this embodiment also proceeds to block 116. - Embodiments of the
process 100 include transmitting metric data batches to the analytics platform, as illustrated byblock 116. Transmitting the metric data batch may include encoding the metric data batch in various networking protocols. In some embodiments, the data may be encoded in a file transfer protocol, in a hypertext transfer protocol (e.g., HTTP Secure), or in SPDY, for instance. - Some embodiments of the
process 100 include determining whether the transmission was successful, as indicated bydetermination block 118. Determining whether the transmission was successful may include determining whether an acknowledgment signal is received from the analytics platform indicating that the transmitted data was received. In some embodiments, this determination may include determining whether such a signal is received within a timeout threshold. Upon determining that transmission was not successful, some embodiments of theprocess 100 may return to decision block 112 in response. Alternatively, upon determining that transmission was successful, in response, some embodiments of theprocess 100 may return to block 110, and additional data may be retrieved for transmission. - The
processes platform computing system 12 to process data, and is relatively unlikely to lose data. Not all embodiments, however, provide some or all of these benefits. -
FIG. 7 illustrates details of an embodiment of the analytics-platform computing system 12 introduced inFIG. 1 . In some embodiments, the analytics-platform computing system 12 is a scalable cloud-based computer system management program capable of providing computer system management as a service to a plurality of accounts each having computer systems with a plurality of monitored computing instances. Further, some embodiments of the analytics-platform computing system 12 may be capable of providing real-time or near real-time analyses and reports of the operation of the monitored computing systems. Not all embodiments, however, provide some or all of these benefits. - Some embodiments of the analytics-
platform computing system 12 are implemented on a cloud computing system having a plurality of computing instances and capable of provisioning additional computing instances dynamically, for example based on load, a desired response time, or other factors. Such implementations are expected to reduce costs relative to systems that statically include sufficient computing power for maximum expected loads, as such systems often include computing resources that remain unused for much of the time. However, embodiments are not limited to cloud-based implementations or scalable implementations. - In some embodiments, the analytics-
platform computing system 12 includes one or more receiveengines 120, one ormore analytics engines 122, one ormore platform engines 124, one or more webuser interface engines 126, one ormore service engines 128, and one ormore database engines 130. In some embodiments, theengines engines monitoring computing instances 26 or separate processes executing on the samemonitoring computing instance 26. In some embodiments, the analytics-platform computing system 12 may be characterized as a distributed computing system in which theengines engines platform computing system 12 may be capable of communicating bi-directionally with thenetwork 25, for example sending data to and receiving data from the above-describedcollectors 30 andclient devices - The illustrated embodiment includes an equal number of each engine and three of each
engine FIG. 7 . For example, some embodiments may includeadditional database engines 130 that are added in response to increases in the amount of data stored by the analytics-platform computing system 12, increases in response to the amount of requests for data to be stored or retrieved from the analytics-platform computing system 12, or other factors. Similarly,other engines - While the illustrated
engines - In some embodiments, each of the
engines monitoring computing instance 26 within an operating system of the monitoring computing instance. And each of theengines platform computing system 12 may receive data via a load balancer server, which may route tasks and data to various instances of theengines -
FIG. 8 illustrates additional details of an embodiment of the receiveengine 120 ofFIG. 7 . In this embodiment, the receiveengine 120 includes aninput 132, adecryption module 134, adecompression module 136, anaccount management module 138, aparser module 140, aqueue output module 142, and anoutput module 144 to thedatabase engine 130 ofFIG. 7 . As described in greater detail below, the receiveengine 120, in some embodiments, may be capable of receiving data from the collectors 30 (FIG. 1 ), decrypting the received data, decompressing the received data, associating the received data with an account and with a computing instance, parsing the received data, and outputting the parsed data to a queue for subsequent processing by theanalytics engine 122 and to thedatabase engine 130 for storage in memory. The receiveengine 120 may also be capable of maintaining a session with one or more collectors, associating the received data with the corresponding session, and transmitting data (e.g., acknowledgement signals) to the appropriate collector of the corresponding session. In some embodiments, the receive engine may decode the above-described network transfer protocols and validate the status of an account and credentials associated with the account for the monitored computing system, for example by querying theservice engine 128 for a subscription status and determining whether a subscription is current or lapsed. Some embodiments may not process data that is received without a corresponding active subscription. - Some embodiments may include one instance of the receive engine per session, or other embodiments may include a single receive engine that processes multiple sessions. In certain embodiments, sessions may be managed by the
platform engine 124 or theservice engine 128 described below, and the receiveengine 120 may receive data that is already associated with a session or a corresponding collector. - In some embodiments, the
decryption module 134 may receive data from theinput 132, such as encrypted metric batches from the collectors and decrypt the received data. In some embodiments, the receiveengine 120 may obtain a decryption key associated with the corresponding collector, monitored computing instance, monitored computing system, or account (e.g., from the service engine 128), and thedecryption engine 134 may decrypt data based on this obtained (e.g., received) encryption key. - The
decryption module 134 may output the decrypted data to thedecompression module 136, which may decompress the received data, such as the received metric batches from thecollectors 30. Decompression may include identifying strings in the decrypted data corresponding to larger patterns in the uncompressed metric data and replacing the identified strings with the corresponding larger pattern. In some embodiments, data indicative of these patterns and the corresponding identifying strings may be transmitted to the receive engine from the collector or from theplatform engine 124. - The decompressed data may be transmitted from the
decompression module 136 to theaccount management module 138, which may associate the decompressed data with an account, a monitored computing system, or a monitored computing instance (for example with each of these entities). In some embodiments, the account management module may attach metadata to the decompressed data indicating the association. Some embodiments of theaccount management module 138 may also retrieve or otherwise obtain configuration data of thecollector 30 indicative of the formatting of the metric data batches transmitted from thecollector 30. For example, theaccount management module 138 may obtain data indicating delimiters and which fields are transmitted in which sequence and, in response, theaccount management module 138 may label the uncompressed data with metadata indicating the corresponding fields, for example by inserting XML tags and attributes or JSON names for name-value pairs and removing delimiters. - The output of the
account management module 138 may be transmitted to theparser module 140, which may parse the received data. The input to theparser module 140 may be a serialized data-structure, e.g., a document or string expressed in XML or JSON. In some embodiments, theparser 140 may de-serialize the input data into a hierarchical or graph data structure held in random access memory, such as a tree, an object within an object oriented programming environment, a multi-dimensional array, or the like. In some embodiments, theparser module 140 may parse the received data into a data structure that, when accessed with the appropriate tools, can be queried, iterated through, or otherwise interrogated. A de-serialized data structure is expected to provide faster analysis and storage of data than a serialized string or document, as data can be accessed and manipulated without potentially having to iterate through every character of the string or document, though some embodiments may leave the data in a serialized format or some other format. - The output of the
parser 140 may be transmitted to thequeue output module 142 and theoutput module 144 to the database engine 130 (FIG. 7 ). In some embodiments, theoutputs queue output module 142 may transmit the received data to a buffer (e.g., a queue) from which the subsequently describedanalytics engine 120 pulls tasks or to a queue in theplatform engine 124 that assigns tasks to theanalytics engine 120. The output module to thedatabase engine 130 may be capable of transmitting the received data to thedatabase engine 130 and instructing thedatabase engine 130 to write the data to memory. - An embodiment of the
analytics engine 122 is shown in greater detail inFIG. 9 . In some embodiments, the analytics engine may include a plurality of analysis functions, examples of which are described below, that vary according to the priority of their activities. The analytics engine may receive signals (including metric data) from the receiveengine 120, for example signals from thequeue output module 142 indicating that data is available to be analyzed or other tasks are available to be performed, or some embodiments of theanalysis engine 122 may include a set of processes or threads that remove tasks from a queue hosted by theplatform engine 124. Some embodiments may include one analysis engine per session with a collector, one analysis engine for multiple sessions, one analysis engine per monitored computing system, one analysis engine per account, or one analysis engine for multiple monitored computing systems, depending upon the computing load and the computing power of theanalysis engine 122. - In some embodiments, the
analysis engine 122 may include a metric data input/output 146, a command input/output 148 by which new commands or tasks are identified or transmitted, a plurality ofwindow analyzers window analyzers 152 through 154, as described in greater detail below. - The window analyzers 150, 152, and 154 may each be configured to analyze a different temporal window of data, for
example window analyzer 150 may be configured to analyze 20-second windows of data, thewindow analyzer 152 may be configured to analyze 10-minute windows of data, and thewindow analyzer 154 may be configured to analyze one-month windows of data. Details of the operation of thewindow analyzers FIG. 12 . The window analyzers 150, 152, and 154 may receive data from thedatabase engine 130 by transmitting queries to thedatabase 130 or may receive data directly from the receiveengine 120 via the input/output path 146. Similarly, thewindow analyzers database engines 130 by transmitting results and write commands via the input/output path 146 to thedatabase engines 130. - The operation of the
window analyzers window analyzer window analyzers 152 through 154 may be started based on a signal from a window analyzer tasked with analyzing a smaller window, the signal indicating that a new instance of the larger window has started. Starting window analyzers in this fashion, based on signals from more frequently operated window analyzers, is expected to conserve computing power and reduce the degree to which the operation of a process or thread analyzing one month windows of data, for example, interferes with the operation of processes or threads analyzing shorter windows of data. This technique is expected to expedite results from thefirst window analyzer 150, resulting in real-time or near real-time reporting of analyses of received metrics of monitored computing instances. Not all embodiments, however, provide this benefit or use this technique. For example, some embodiments may operate separate processes or threads for each of thewindow analyzers - Each
window analyzer more statistics calculators 162 and one or more criteria evaluators 164. In operation, upon instantiation of each of thewindow analyzers window analyzer database engine 130 for data measured within that closing window, data that arrived within that window, or results of calculations byother window analyzers statistics calculators 162 may calculate statistics based on the results of the request. For example,statistics calculators 162 may calculate a maximum, a minimum, an average, a median, a mode, a count, a standard deviation, a range, a variance, or other statistics. Similarly, the criteria evaluators 164 may evaluate the data received from the query against various criteria, such as whether thresholds are crossed, whether certain trending rules have been satisfied (e.g., five or more consecutive increasing data points or two out of three data points outside of three standard deviations from a mean), or whether various states have obtained in the monitored computing instances, such as whether various error conditions have occurred in the monitored computing instances. - In some embodiments,
window analyzers 152 through 154 may calculate statistics and evaluate criteria based on the result of calculated statistics or evaluated criteria from more frequently operated window analyzers. For example,window analyzer 152 may retrieve from thedatabase engine 130 the results of statistics calculated by thefirst window analyzer 150. Retrieving results from other window analyzers is expected to reduce the amount of data processed by each of the window analyzers and speed operation of theanalytics engine 122. However, some embodiments may retrieve all data received within an analyzed window for some or all of the calculated statistics or evaluated criteria within some or all of the windows. - Upon calculating statistics and evaluating criteria, the results may be written to the
database engine 130. The results may include statistics by which various data visualizations, such as charts, may be formed and binary outputs, such as alarms. The window analyzers 150, 152, and 154 may also determine whether the next longer window has closed or is about to close. Upon determining that the next longer window has closed or is about to close, thewindow analyzers new task flag longer window analyzer 152 through 154 may begin an analysis based on the change in state of thenew task flag first window analyzer 150 may determine that a window to be analyzed by thesecond window analyzer 152 has closed, and in response,first window analyzer 150 may setnew task flag 156 to true. In response to this change innew task flag 156, thesecond window analyzer 152 may begin analyzing the next longer window and reset thenew task flag 156 to false. This process may be repeated for each of thewindow analyzers 152 through 154. Thefirst window analyzer 150 may analyze each metric data batch received from the receiveengine 120, or thefirst window analyzer 150 may receive commands from theplatform engine 124, for example, indicating that a new window is ready for analysis. In other embodiments, a separate process or thread, such as a job scheduler operated by theplatform engine 124 may schedule tasks for thewindow analyzers window analyzers output 148. - In some embodiments, the
analytics engine 122 may be capable of obtaining an account identifier, an identifier of a monitored computing instance, or an identifier of a monitored computing system associated with the data to be analyzed, and based on these identifier(s) obtain user-configurable statistics, criteria, and window periods by which the data is to be analyzed. In some embodiments, analysis criteria may be stored in thedatabase engine 130 and indexed according to an account identifier, an analysis identifier, a monitored computing instance identifier, or a monitored computing system identifier. Some embodiments may receive analysis specifications from users, for example via theclient devices statistics calculators 162, window durations, and the criteria evaluators 164 may be configured to perform the requested calculations and criteria evaluations. - An embodiment of the web
user interface engine 126 is illustrated in greater detail with reference toFIG. 10 . The webuser interface engine 126 may be configured to interface withclient devices FIG. 1 , for example by providing an interface by which users of the analytics platform may monitor the performance of monitored computing systems and configure the operation of the analytics-platform computing system 12. - In some embodiments, the web
user interface engine 126 may include an applicationprogram interface server 162, aweb server 164, and a hypertext transport protocolsecure service module 166. TheHTTPS module 166 may encode and decode commands and data for transmission via a network protocol, such as the network protocols described herein, via thenetwork 25 to and from theclient devices user interface engine 126 may be capable of validating credentials and accounts for users attempting to interface with the analytics-platform computing system 12. For example, the webuser interface engine 126 may be operative to transmit request to theservice engine 128 including user provided account identifiers and credentials and selectively allow access to particular account data based on whether theservice engine 128 indicates the account identifiers and credentials are valid and whether a subscription is current. - The application
program interface server 162 may be a server capable of parsing calls to the application program interface received over thenetwork 25, for example fromclient devices API server 162 may be capable of querying data from thedatabase engine 130 based on API calls requesting such a query, changing the configuration of monitoring or analyses of metrics based on API calls requesting such a change, or perform other tasks. - The
web server 164 may be operative to generate instructions (e.g., instructions encoded in HTML, CSS, and JavaScript) for forming a user interface on theclient devices web server 164 may also be capable of outputting a interactive user interface by which users may enter commands, for example by clicking, dragging, touching, speaking, or otherwise interacting with theclient devices web server 164 may be capable of responding to these commands by requesting additional data or different data and instructing a change in the user interface responsive to the command. - The web
user interface engine 126 is expected to facilitate interactions with the analytics-platform computing system 12 by users who use the analytics-platform computing system 12 as a service, rather than operating their own instance of the analytics-platform computing system 12, thereby potentially reducing labor and equipment costs associated with monitoring a computing system. Other embodiments, however, may have a special-purpose application for displaying results and configuring the analytics-platform computing system 12. - An embodiment of the
platform engine 124 is illustrated in greater detail inFIG. 11 . In some embodiments, theplatform engine 124 may be capable of coordinating some or all of the operation of theother engines platform engine 124 includes anupdate manager module 168, ascheduler module 170, adatabase maintenance module 172, and aninstance manager 174. - The
update manager module 168 may be operative to cooperate with thecollector updater module 40 described above with reference toFIG. 2 to manage the version of collectors executed by monitored computing instances. In some embodiments, theupdate manager 168 may be operative to receive data indicative of the current version of a collector executed by a monitored computing instance, determine whether the current version is the latest version or is a version specified by a user of an account associated with the monitored computing instance, and in response to determining that the current version is not the correct version, transmit the correct version to the monitored computing instance. In other embodiments, theupdate manager 168 may be capable of receiving a request for data indicative which version is correct, identifying the correct version, and if requested by a collector, the transmitting the correct version to the requesting entity, which may itself determine whether to upgrade. - In some embodiments, the
platform engine 124 includes thescheduler 170, which may schedule operations of thewindow analyzers scheduler 170 schedules the operation of thewindow analyzer 150, for example by signaling that a new window of data is available to be analyzed, and theother window analyzers 152 through 154 may begin their analyses based on the new task flags 156 through 160. Or in some embodiments, thescheduler 170 may schedule the operation of more, or all, of the window analyzes 150, 152, and 154. - The
database maintenance module 172, in some embodiments, may coordinate and schedule certain activities of thedatabase engine 30. For example, thedatabase maintenance module 172 may schedule or coordinate the removal of data within thedatabase engine 130 that is older than some date threshold and certain activities to improve performance, for example indexing of the database. - The
instance manager 174, in some embodiments, may scale the analytics-platform computing system 12, for example, automatically, based on need for additional resources. In some embodiments, theinstance manager 174 may periodically, or on some other schedule, determine a response speed of the analytics-platform computing system 12 to certain tasks, determine an amount of data received or analyzed by the analytics-platform computing system 12, determine a number of monitored computing instances or monitored computing systems, or some combination thereof, and based on this determined data, theinstance manager 174 may request additional instances ofvarious engines instance manager 174 may include machine images including an operating system and applications for instantiating thevarious engines platform computing system 12 based on need is expected to reduce the cost of operating the analytics-platform computing system 12, as resources are procured as needed rather than being purchased and operated in anticipation of a worst-case scenario. However, some embodiments do not automatically scale, or other embodiments may scale automatically but provide other benefits. - As noted above with reference to
FIG. 7 , some embodiments of the analytics-platform computing system 12 may include theservice engine 128. Theservice engine 128 may contain components related to customer accounting. For example, account identifiers, credentials associated with accounts, collector configurations associated with accounts, and analysis configurations associated with accounts. The service engine may also include data indicative of subscriptions, such as data indicative of account balances, data indicative of service-level agreements, data indicative of account duration, and data indicative of costs. The service engine may also be operative to generate reports based on these accounts and signal other components of the analytics-platform computing system 12 when such components are in need of data indicative of the accounts or account related data. - The
database engine 130, in some embodiments, may be a relational or a non-relational database. Non-relational databases are expected to provide certain benefits relating to the speed, flexibility, and the scalability of the analytics-platform computing system 12. In some embodiments, thedatabase engine 130 hosts a non-relational database without external load-balancing that is schema free, or is capable of storing data in non-predetermined fields and organization. Some embodiments may include a database capable of storing data in the form of documents, rather than in the form of tables, such as XML documents or JSON documents. - In some embodiments, the database engine includes an instance of Mongo DB or other non-relational databases. For example, some embodiments may include a non-relational database that organizes data hierarchically, in a tree structure, or a data structure in which nodes have a parent and child relationship with each child having only one parent, but some parents potentially having multiple children. For instance, the field “processors” may be a node, with multiple child fields named “processor,” one for each processor, each of which may have child nodes named “processor usage,” “processor temperature,” and “processes.” Some embodiments may store the data in a network model, for example as a graph database in which child nodes are not limited to a single parent node.
- A non-relational database is expected to be relatively flexible, as the relationship between various stored fields need not necessarily be predefined by a user to begin collecting data, and a non-relational database is expected to scale relatively readily. However, embodiments are not limited to the above-described non-relational databases. Some embodiments may include a relational database, a memory image, a document repository, or other organization of data.
-
FIG. 12 illustrates an example of aprocess 176 for analyzing data received from monitored computing instances. Theprocess 176, in some embodiments, may be performed by theanalytics engine 122 described above with reference toFIG. 9 , but embodiments of theprocess 176 are not limited to this configuration. In this embodiment, theprocess 176 begins with determining whether a first window has elapsed, as stated bydecision block 178. Upon determining that a first window has not elapsed, theprocess 176 continues to wait and thedetermination 178 is repeated. In some embodiments, the first window ofdecision block 178 may be a shortest window of the windows analyzed by theprocess 176, for example a window of less than or approximately equal to 2 minutes, 1 minute, 30 seconds, 20 seconds, 10 seconds, 5 seconds, one second, or a half second. In some embodiments, a determination that the first window has elapsed may be made in response to the arrival of a batch of metrics collected during a time period corresponding to the first window by a collector. - Upon determining that the first window has elapsed, in response, the
process 176 may proceed to obtain metrics measured within the window, as indicated byblock 180, and calculate statistics based on the obtained metrics, as indicated byblock 182. Thesesteps window analyzer 150 described above with reference toFIG. 9 , in some embodiments. The metrics may be obtained by querying a database or receiving a parallel flow of metrics data transmitted to thewindow analyzer 150. The statistics may be calculated with the above-describedstatistics calculator module 162, in some embodiments. - The
process 176 may also include storing the calculated statistics, as indicated byblock 184, evaluating criteria based on obtained metrics, as indicated byblock 186, and storing results of the evaluation, as indicated byblock 188. The criteria may be evaluated with thecriteria valuator modules 164 described above with reference toFIG. 9 , and the stored statistics and results of the evaluation may be stored by the above-describeddatabase engine 130. - Some embodiments of the
process 176 may include determining whether a next-longer window has elapsed, as indicated bydecision block 190. Determining whether a next-longer window has elapsed may include comparing a value indicative of the beginning of the next-longer window to a current time and determining whether the difference is approximately equal to or greater than a threshold of the duration of the next longest window. In some embodiments, thefirst window analyzer 150 ofFIG. 9 may determine whether the window to be analyzed by thesecond window analyzer 152 has elapsed in thedecision block 190. Upon determining that the next-longer window has elapsed, in response, theprocess 176 may proceed to start an analysis of the next longer window, as indicated byinitiation block 192. Alternatively, upon determining that the next longer window has not elapsed, theprocess 176 may return todecision block 178. - As indicated by
initiation block 192, theprocess 176 may include starting a sub process for analyzing the next longer window. Analyzing the next longer window may include analyzing metrics of monitored computing instances that arrive during (or were measured during) the next longer window, for example during the window to be analyzed bywindow analyzer 152 ofFIG. 9 . - The
process 176 includes, in some embodiments, upon the start ofinitiation block 192, obtaining calculated statistics and results of criteria evaluated within the new window, or the next longer window that initiated theprocess block 192, as indicated byblock 194. For example, multiple instances of the window analyzed by thefirst window analyzer 150 may occur during the window analyzed by thesecond window analyzer 152, and the results of these multiple analyses may be obtained instep 194, for instance by querying thedatabase engine 130. In some embodiments, the metric data obtained from the collector may also be obtained instep 194. After obtaining this data, some embodiments ofprocess 176 include calculating statistics based on the obtained data, as indicated byblock 196 storing the calculated statistics, as indicated byblock 198, evaluating criteria based on the obtained data, as indicated byblock 200, and storing the results of the evaluation, as indicated byblock 202. Thesesteps steps second window analyzer 152 through thenth window analyzer 154, depending upon the identity of the next longer window, for example whether the next longer window is the window corresponding to thesecond window analyzer 152, a third window analyzer, or thenth window analyzer 154. - Some embodiments of
process 176 further include determining whether the next longer window has elapsed (relative to the window analyzed insteps decision block 204. For example, in a use case in which the steps 194-202 are evaluated for data corresponding to a window of thesecond window analyzer 152, a determination may be made whether the window corresponding to the third window analyzer has elapsed, and during an iteration ofsteps 194 through 202 in which the third window analyzer window is analyzed, a determination may be made indecision block 204 whether a window corresponding to a fourth window analyzer has elapsed, and so on. Upon determining that the next longer window has elapsed, theprocess 176 may return to (e.g., recurs to, or initiate a parallel thread or process)initiation block 192, and steps 194 through 204 may be repeated from the perspective of the next longer window, analyzing data that arrive during the next longer window and determining whether the next longer window after that window has elapsed. Upon determining that the next longer window has not elapsed, in response, theprocess 176 may return todecision block 178. - The
process 176, particularly when used in combination with the above-described embodiments of adatabase engine 130 based on a non-relational database, is expected to facilitate real-time or near real-time displays of, and alerts to, data indicative of the operation of monitored computing instances. For example, some embodiments may be capable of displaying statistics indicative of a change in the operation of a monitored computing instance within an amount of time approximately equal to or less than 2 minutes, 1 minute, 30 seconds, 20 seconds, 10 seconds, 5 seconds, one second, or a half second of a change. This real-time or near real-time response is helpful for users attempting to verify whether a cloud service provider hosting a monitored computing system is meeting a service level agreement. Service-level agreements often specify uptimes on the order of 99.999% uptime, or similar amounts of uptime, and verifying whether this agreement has been met is often easier when real-time, relatively high-resolution data indicative of the operation of monitored computing instances is available, as relatively short interruptions or decreases in performance are more likely to be depicted in a visualization of performance in a user interface or detected with an alarm. Not all embodiments, however, necessarily provide this benefit or provide real-time or near real-time results. - In some embodiments, the computing instances described herein may be executed by a computing device (for example, as the computing device itself or as a virtual machine hosted by the computing device) described below with reference to
FIG. 13 . Further, the modules, applications, and various functions described above may be implemented by such computing devices having instructions for executing these acts stored in a tangible, non-transitory machine readable medium, e.g., memory, and having one or more processors that, when executing these instructions, cause the computing devices to perform the above-described acts. -
FIG. 13 is a diagram that illustrates anexemplary computing device 1000 in accordance with embodiments of the present technique. Various portions of systems and methods described herein, may include or be executed on one or more computer devices similar tocomputing device 1000. Further, processes and modules described herein may be executed by one or more processing devices similar to that ofcomputing device 1000. -
Computing device 1000 may include one or more processors (e.g., processors 1010 a-1010 n) coupled todevice memory 1020, an input/output I/O device interface 1030 and anetwork interface 1040 via an input/output (I/O)interface 1050. A processor may include a single processor or a plurality of processors (e.g., distributed processors). A processor may be any suitable processor capable of executing or otherwise performing instructions. A processor may include a central processing unit (CPU) that carries out program instructions to perform the arithmetical, logical, and input/output operations ofcomputing device 1000. A processor may execute code (e.g., processor firmware, a protocol stack, a database management system, an operating system, or a combination thereof) that creates an execution environment for program instructions. A processor may include a programmable processor. A processor may include general or special purpose microprocessors. A processor may receive instructions and data from a memory (e.g., system memory 1020).Computing device 1000 may be a uni-processor device including one processor (e.g.,processor 1010 a), or a multi-processor device including any number of suitable processors (e.g., 1010 a-1010 n). Multiple processors or multi-core processors may be employed to provide for parallel or sequential execution of one or more portions of the techniques described herein. Processes, such as logic flows, described herein may be performed by one or more programmable processors executing one or more computer programs to perform functions by operating on input data and generating corresponding output. Processes described herein may be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).Computing device 1000 may include a plurality of computing sub-devices (e.g., distributed computer systems) to implement various processing functions. - I/
O device interface 1030 may provide an interface for connection of one or more I/O devices 1060 tocomputing device 1000. I/O devices may include devices that receive input (e.g., from a user) or output information (e.g., to a user). I/O devices 1060 may include, for example, graphical user interface presented on displays (e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor), pointing devices (e.g., a computer mouse or trackball), keyboards, keypads, touchpads, scanning devices, voice recognition devices, gesture recognition devices, printers, audio speakers, microphones, cameras, or the like. I/O devices 1060 may be connected tocomputing device 1000 through a wired or wireless connection. I/O devices 1060 may be connected tocomputing device 1000 from a remote location. I/O devices 1060 located on remote computer system, for example, may be connected tocomputing device 1000 via a network andnetwork interface 1040. -
Network interface 1040 may include a network adapter that provides for connection ofcomputing device 1000 to a network. Network interface may 1040 may facilitate data exchange betweencomputing device 1000 and other devices connected to the network.Network interface 1040 may support wired or wireless communication. The network may include an electronic communication network, such as the Internet, a local area network (LAN), a wide area (WAN), a cellular communications network or the like. -
System memory 1020 may be configured to storeprogram instructions 1100 ordata 1110.Program instructions 1100 may be executable by a processor (e.g., one or more of processors 1010 a-1010 n) to implement one or more embodiments of the present techniques.Instructions 1100 may include modules of computer program instructions for implementing one or more techniques described herein with regard to various processing modules. Program instructions may include a computer program (which in certain forms is known as a program, software, software application, script, or code). A computer program may be written in a programming language, including compiled or interpreted languages, or declarative or procedural languages. A computer program may include a unit suitable for use in a computing environment, including as a stand-alone program, a module, a component, a subroutine. A computer program may or may not correspond to a file in a file system. A program may be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program may be deployed to be executed on one or more computer processors located locally at one site or distributed across multiple remote sites and interconnected by a communication network. -
System memory 1020 may include a tangible program carrier having program instructions stored thereon. A tangible program carrier may include a non-transitory computer readable storage medium. A non-transitory computer readable storage medium may include a machine readable storage device, a machine readable storage substrate, a memory device, or any combination thereof. Non-transitory computer readable storage medium may include, non-volatile memory (e.g., flash memory, ROM, PROM, EPROM, EEPROM memory), volatile memory (e.g., random access memory (RAM), static random access memory (SRAM), synchronous dynamic RAM (SDRAM)), bulk storage memory (e.g., CD-ROM and/or DVD-ROM, hard-drives), or the like.System memory 1020 may include a non-transitory computer readable storage medium may have program instructions stored thereon that are executable by a computer processor (e.g., one or more of processors 1010 a-1010 n) to cause the subject matter and the functional operations described herein. A memory (e.g., device memory 1020) may include a single memory device and/or a plurality of memory devices (e.g., distributed memory devices). In some embodiments, the program may be conveyed by a propagated signal, such as a carrier wave or digital signal conveying a stream of packets. - I/
O interface 1050 may be configured to coordinate I/O traffic between processors 1010 a-1010 n,device memory 1020,network interface 1040, I/O devices 1060 and/or other peripheral devices. I/O interface 1050 may perform protocol, timing or other data transformations to convert data signals from one component (e.g., device memory 1020) into a format suitable for use by another component (e.g., processors 1010 a-1010 n). I/O interface 1050 may include support for devices attached through various types of peripheral buses, such as a variant of the Peripheral Component Interconnect (PCI) bus standard or the Universal Serial Bus (USB) standard. - Some embodiments of the techniques described herein may be implemented using a single instance of
computer system 1000, ormultiple computer systems 1000 configured to host different portions or instances of embodiments.Multiple computer systems 1000 may provide for parallel or sequential processing/execution of one or more portions of the techniques described herein. - Those skilled in the art will appreciate that
computing device 1000 is merely illustrative and is not intended to limit the scope of the techniques described herein.Computing device 1000 may include any combination of devices or software that may perform or otherwise provide for the performance of the techniques described herein. For example,computing device 1000 may include or be a combination of a cloud-computing system, a data center, a server rack, a server, a virtual server, a desktop computer, a laptop computer, a tablet computer, a server device, a client device, a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a vehicle-mounted computer, or the like.Computing device 1000 may also be connected to other devices that are not illustrated, or may operate as a stand-alone device. In addition, the functionality provided by the illustrated components may in some embodiments be combined in fewer components or distributed in additional components. Similarly, in some embodiments, the functionality of some of the illustrated components may not be provided or other additional functionality may be available. - Those skilled in the art will also appreciate that, while various items are illustrated as being stored in memory or on storage while being used, these items or portions of them may be transferred between memory and other storage devices for purposes of memory management and data integrity. Alternatively, in other embodiments some or all of the software components may execute in memory on another device and communicate with the illustrated computer system via inter-computer communication. Some or all of the system components or data structures may also be stored (e.g., as instructions or structured data) on a computer-accessible medium or a portable article to be read by an appropriate drive, various examples of which are described above. In some embodiments, instructions stored on a computer-accessible medium separate from
computing device 1000 may be transmitted tocomputing device 1000 via transmission media or signals such as electrical, electromagnetic, or digital signals, conveyed via a communication medium such as a network or a wireless link. Various embodiments may further include receiving, sending or storing instructions or data implemented in accordance with the foregoing description upon a computer-accessible medium. Accordingly, the present invention may be practiced with other computer system configurations. - It should be understood that the description and the drawings are not intended to limit the invention to the particular form disclosed, but to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims. Further modifications and alternative embodiments of various aspects of the invention will be apparent to those skilled in the art in view of this description. Accordingly, this description and the drawings are to be construed as illustrative only and are for the purpose of teaching those skilled in the art the general manner of carrying out the invention. It is to be understood that the forms of the invention shown and described herein are to be taken as examples of embodiments. Elements and materials may be substituted for those illustrated and described herein, parts and processes may be reversed or omitted, and certain features of the invention may be utilized independently, all as would be apparent to one skilled in the art after having the benefit of this description of the invention. Changes may be made in the elements described herein without departing from the spirit and scope of the invention as described in the following claims. Headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description.
- As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). The words “include”, “including”, and “includes” and the like mean including, but not limited to. As used throughout this application, the singular forms “a”, “an” and “the” include plural referents unless the content explicitly indicates otherwise. Thus, for example, reference to “an element” or “an element” includes a combination of two or more elements, notwithstanding use of other terms and phrases for one or more elements. The term “or” is, unless indicated otherwise, non-exclusive, i.e., encompassing both “and” and “or.” Terms relating to causal relationships, e.g., “in response to,” “upon,” “when,” and the like, encompass both causes that are a necessary causal condition and causes that are a sufficient causal condition, e.g., “state X occurs upon condition Y obtaining” is generic to “X occurs solely upon Y” and “X occurs upon Y and Z.” Similarly, unless otherwise indicated, statements that one value or action is “based on” another condition or value encompass both instances in which the condition or value is the sole factor and instances in which the condition or value is one factor among a plurality of factors. Unless specifically stated otherwise, as apparent from the discussion, it is appreciated that throughout this specification discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining” or the like refer to actions or processes of a specific apparatus, such as a special purpose computer or a similar special purpose electronic processing/computing device. In the context of this specification, a special purpose computer or a similar special purpose electronic processing or computing device is capable of manipulating or transforming signals, for instance signals represented as physical electronic, optical, or magnetic quantities within memories, registers, or other information storage devices, transmission devices, or display devices of the special purpose computer or similar special purpose processing or computing device.
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/293,751 US8447851B1 (en) | 2011-11-10 | 2011-11-10 | System for monitoring elastic cloud-based computing systems as a service |
US13/863,838 US8996695B2 (en) | 2011-11-10 | 2013-04-16 | System for monitoring elastic cloud-based computing systems as a service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/293,751 US8447851B1 (en) | 2011-11-10 | 2011-11-10 | System for monitoring elastic cloud-based computing systems as a service |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/863,838 Continuation US8996695B2 (en) | 2011-11-10 | 2013-04-16 | System for monitoring elastic cloud-based computing systems as a service |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130124669A1 true US20130124669A1 (en) | 2013-05-16 |
US8447851B1 US8447851B1 (en) | 2013-05-21 |
Family
ID=48281701
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/293,751 Expired - Fee Related US8447851B1 (en) | 2011-11-10 | 2011-11-10 | System for monitoring elastic cloud-based computing systems as a service |
US13/863,838 Expired - Fee Related US8996695B2 (en) | 2011-11-10 | 2013-04-16 | System for monitoring elastic cloud-based computing systems as a service |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/863,838 Expired - Fee Related US8996695B2 (en) | 2011-11-10 | 2013-04-16 | System for monitoring elastic cloud-based computing systems as a service |
Country Status (1)
Country | Link |
---|---|
US (2) | US8447851B1 (en) |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130219042A1 (en) * | 2012-02-16 | 2013-08-22 | International Business Machines Corporation | Managing cloud services |
US20140052837A1 (en) * | 2012-08-20 | 2014-02-20 | Cisco Technology, Inc. | Prioritzed branch computing system |
US20140095633A1 (en) * | 2012-09-28 | 2014-04-03 | Avaya Inc. | Intelligent notification of requests for real-time online interaction via real-time communications and/or markup protocols, and related methods, systems, and computer-readable media |
US20140136952A1 (en) * | 2012-11-14 | 2014-05-15 | Cisco Technology, Inc. | Improving web sites performance using edge servers in fog computing architecture |
US20140215057A1 (en) * | 2013-01-28 | 2014-07-31 | Rackspace Us, Inc. | Methods and Systems of Monitoring Failures in a Distributed Network System |
US20140359348A1 (en) * | 2013-05-30 | 2014-12-04 | Cleversafe, Inc. | Adjusting dispersed storage network traffic due to rebuilding |
US20150039576A1 (en) * | 2013-07-30 | 2015-02-05 | International Business Machines Corporation | Managing Transactional Data for High Use Databases |
US20150089077A1 (en) * | 2012-03-14 | 2015-03-26 | Amazon Technologies, Inc. | Managing data transfer using streaming protocols |
US20150234672A1 (en) * | 2012-09-19 | 2015-08-20 | Nec Corporation | Information processing device that generates machine disposition plan, and method for generating machine disposition plan |
US20150242379A1 (en) * | 2012-09-28 | 2015-08-27 | Telefonaktiebolaget L M Ericsson (Publ) | Measuring web page rendering time |
US20160055116A1 (en) * | 2014-08-21 | 2016-02-25 | GM Global Technology Operations LLC | Dynamic vehicle bus subscription |
US20160110421A1 (en) * | 2014-10-20 | 2016-04-21 | Xerox Corporation | Matching co-referring entities from serialized data for schema inference |
US20160139973A1 (en) * | 2014-11-18 | 2016-05-19 | Bull Sas | Method and sequencer for detecting a malfunction occurring in major it infrastructures |
US9389916B1 (en) * | 2015-04-24 | 2016-07-12 | International Business Machines Corporation | Job scheduling management |
US9397902B2 (en) | 2013-01-28 | 2016-07-19 | Rackspace Us, Inc. | Methods and systems of tracking and verifying records of system change events in a distributed network system |
US20160219106A1 (en) * | 2015-01-22 | 2016-07-28 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US9483334B2 (en) | 2013-01-28 | 2016-11-01 | Rackspace Us, Inc. | Methods and systems of predictive monitoring of objects in a distributed network system |
US9495211B1 (en) * | 2014-03-04 | 2016-11-15 | Google Inc. | Allocating computing resources based on user intent |
US20170063597A1 (en) * | 2015-08-31 | 2017-03-02 | Ca, Inc. | Api provider insights collection |
US9600501B1 (en) * | 2012-11-26 | 2017-03-21 | Google Inc. | Transmitting and receiving data between databases with different database processing capabilities |
US9628355B1 (en) * | 2011-07-20 | 2017-04-18 | Google Inc. | System for validating site configuration based on real-time analytics data |
US20170111240A1 (en) * | 2014-07-04 | 2017-04-20 | Huawei Technologies Co., Ltd. | Service Elastic Method and Apparatus in Cloud Computing |
EP3220270A1 (en) * | 2016-03-14 | 2017-09-20 | AirMagnet, Inc. | System and method to configure distributed measuring devices and treat measurement data |
US9785474B2 (en) | 2015-07-23 | 2017-10-10 | International Business Machines Corporation | Managing a shared pool of configurable computing resources using a set of scaling factors and a set of workload resource data |
US20170317914A1 (en) * | 2016-04-27 | 2017-11-02 | Electronics And Telecommunications Research Institute | Apparatus for testing and developing products of network computing based on open-source virtualized cloud |
US9888078B2 (en) | 2015-01-22 | 2018-02-06 | International Business Machines Corporation | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment |
US9917899B2 (en) | 2015-01-22 | 2018-03-13 | International Business Machines Corporation | Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment |
US10169086B2 (en) * | 2015-09-13 | 2019-01-01 | International Business Machines Corporation | Configuration management for a shared pool of configurable computing resources |
US20190191265A1 (en) * | 2017-12-18 | 2019-06-20 | Toyota Jidosha Kabushiki Kaisha | Managed Selection of a Geographical Location for a Micro-Vehicular Cloud |
US10332156B2 (en) | 2010-03-31 | 2019-06-25 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US10354276B2 (en) | 2017-05-17 | 2019-07-16 | Mediamath, Inc. | Systems, methods, and devices for decreasing latency and/or preventing data leakage due to advertisement insertion |
US10467659B2 (en) | 2016-08-03 | 2019-11-05 | Mediamath, Inc. | Methods, systems, and devices for counterfactual-based incrementality measurement in digital ad-bidding platform |
US10505857B1 (en) * | 2017-07-14 | 2019-12-10 | EMC IP Holding Company LLC | Maximizing network throughput between deduplication appliances and cloud computing networks |
US10554516B1 (en) * | 2016-06-09 | 2020-02-04 | Palantir Technologies Inc. | System to collect and visualize software usage metrics |
US10592910B2 (en) | 2010-07-19 | 2020-03-17 | Mediamath, Inc. | Systems and methods for determining competitive market values of an ad impression |
US10628859B2 (en) | 2010-03-31 | 2020-04-21 | Mediamath, Inc. | Systems and methods for providing a demand side platform |
US10659327B2 (en) | 2015-06-19 | 2020-05-19 | Cisco Technology, Inc. | Network traffic analysis |
US20200167190A1 (en) * | 2020-01-29 | 2020-05-28 | Intel Corporation | Adaptive data shipment based on burden functions |
US10721146B2 (en) * | 2012-07-31 | 2020-07-21 | Micro Focus Llc | Monitoring for managed services |
CN111475555A (en) * | 2020-03-12 | 2020-07-31 | 咪咕文化科技有限公司 | Data acquisition method, electronic device and computer-readable storage medium |
US11133997B2 (en) * | 2019-05-30 | 2021-09-28 | Ncr Corporation | Edge system health monitoring and auditing |
US11144604B1 (en) * | 2015-07-17 | 2021-10-12 | EMC IP Holding Company LLC | Aggregated performance reporting system and method for a distributed computing environment |
US11182829B2 (en) | 2019-09-23 | 2021-11-23 | Mediamath, Inc. | Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing |
US11348142B2 (en) | 2018-02-08 | 2022-05-31 | Mediamath, Inc. | Systems, methods, and devices for componentization, modification, and management of creative assets for diverse advertising platform environments |
US20220269504A1 (en) * | 2020-06-25 | 2022-08-25 | Segment.io, Inc. | Client-side enrichment and transformation via dynamic logic for analytics |
US11487623B2 (en) * | 2019-06-07 | 2022-11-01 | Kyocera Document Solutions Inc. | Information processing system |
Families Citing this family (163)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9456054B2 (en) | 2008-05-16 | 2016-09-27 | Palo Alto Research Center Incorporated | Controlling the spread of interests and content in a content centric network |
US8923293B2 (en) | 2009-10-21 | 2014-12-30 | Palo Alto Research Center Incorporated | Adaptive multi-interface use for content networking |
US8775638B2 (en) * | 2012-02-02 | 2014-07-08 | Siemens Aktiengesellschaft | Method, computer readable medium and system for scaling medical applications in a public cloud data center |
US9379903B1 (en) * | 2012-03-16 | 2016-06-28 | Google Inc. | Distributed scheduler |
US9100289B2 (en) | 2012-11-02 | 2015-08-04 | Juniper Networks, Inc. | Creating searchable and global database of user visible process traces |
US8438654B1 (en) | 2012-09-14 | 2013-05-07 | Rightscale, Inc. | Systems and methods for associating a virtual machine with an access control right |
US9286047B1 (en) | 2013-02-13 | 2016-03-15 | Cisco Technology, Inc. | Deployment and upgrade of network devices in a network environment |
AU2014235300B2 (en) | 2013-03-15 | 2018-04-12 | Vmware, Inc. | Multi-layered storage administration for flexible placement of data |
US9335932B2 (en) * | 2013-03-15 | 2016-05-10 | Bracket Computing, Inc. | Storage unit selection for virtualized storage units |
US9612949B2 (en) * | 2013-06-13 | 2017-04-04 | Arm Limited | Memory allocation in a multi-core processing system based on a threshold amount of memory |
US9584395B1 (en) | 2013-11-13 | 2017-02-28 | Netflix, Inc. | Adaptive metric collection, storage, and alert thresholds |
US20150142955A1 (en) * | 2013-11-20 | 2015-05-21 | Wefi Inc. | Methods and systems for facilitating network switching |
US9674042B2 (en) * | 2013-11-25 | 2017-06-06 | Amazon Technologies, Inc. | Centralized resource usage visualization service for large-scale network topologies |
US10098051B2 (en) | 2014-01-22 | 2018-10-09 | Cisco Technology, Inc. | Gateways and routing in software-defined manets |
US9954678B2 (en) | 2014-02-06 | 2018-04-24 | Cisco Technology, Inc. | Content-based transport security |
US9836540B2 (en) | 2014-03-04 | 2017-12-05 | Cisco Technology, Inc. | System and method for direct storage access in a content-centric network |
US9626413B2 (en) | 2014-03-10 | 2017-04-18 | Cisco Systems, Inc. | System and method for ranking content popularity in a content-centric network |
US20150319050A1 (en) * | 2014-03-14 | 2015-11-05 | Avni Networks Inc. | Method and apparatus for a fully automated engine that ensures performance, service availability, system availability, health monitoring with intelligent dynamic resource scheduling and live migration capabilities |
US9680708B2 (en) | 2014-03-14 | 2017-06-13 | Veritas Technologies | Method and apparatus for cloud resource delivery |
US20150263960A1 (en) * | 2014-03-14 | 2015-09-17 | Avni Networks Inc. | Method and apparatus for cloud bursting and cloud balancing of instances across clouds |
US20150281006A1 (en) * | 2014-03-14 | 2015-10-01 | Avni Networks Inc. | Method and apparatus distributed multi- cloud resident elastic analytics engine |
US20150271023A1 (en) * | 2014-03-20 | 2015-09-24 | Northrop Grumman Systems Corporation | Cloud estimator tool |
US9996442B2 (en) * | 2014-03-25 | 2018-06-12 | Krystallize Technologies, Inc. | Cloud computing benchmarking |
US9716622B2 (en) | 2014-04-01 | 2017-07-25 | Cisco Technology, Inc. | System and method for dynamic name configuration in content-centric networks |
US9473576B2 (en) | 2014-04-07 | 2016-10-18 | Palo Alto Research Center Incorporated | Service discovery using collection synchronization with exact names |
US9992281B2 (en) | 2014-05-01 | 2018-06-05 | Cisco Technology, Inc. | Accountable content stores for information centric networks |
US9609014B2 (en) | 2014-05-22 | 2017-03-28 | Cisco Systems, Inc. | Method and apparatus for preventing insertion of malicious content at a named data network router |
US9367384B2 (en) | 2014-06-12 | 2016-06-14 | International Business Machines Corporation | Admission control based on the end-to-end availability |
US9426113B2 (en) * | 2014-06-30 | 2016-08-23 | Palo Alto Research Center Incorporated | System and method for managing devices over a content centric network |
US20160006793A1 (en) * | 2014-07-04 | 2016-01-07 | Boe Technology Group Co., Ltd. | Osd subject file obtaining and providing method and device, updating system |
US9699198B2 (en) | 2014-07-07 | 2017-07-04 | Cisco Technology, Inc. | System and method for parallel secure content bootstrapping in content-centric networks |
US9621354B2 (en) | 2014-07-17 | 2017-04-11 | Cisco Systems, Inc. | Reconstructable content objects |
US9729616B2 (en) | 2014-07-18 | 2017-08-08 | Cisco Technology, Inc. | Reputation-based strategy for forwarding and responding to interests over a content centric network |
US9590887B2 (en) | 2014-07-18 | 2017-03-07 | Cisco Systems, Inc. | Method and system for keeping interest alive in a content centric network |
US9882964B2 (en) | 2014-08-08 | 2018-01-30 | Cisco Technology, Inc. | Explicit strategy feedback in name-based forwarding |
US9729662B2 (en) | 2014-08-11 | 2017-08-08 | Cisco Technology, Inc. | Probabilistic lazy-forwarding technique without validation in a content centric network |
US9800637B2 (en) | 2014-08-19 | 2017-10-24 | Cisco Technology, Inc. | System and method for all-in-one content stream in content-centric networks |
WO2016033173A1 (en) * | 2014-08-26 | 2016-03-03 | Harper, Matthew, Hayden | Multi-node distributed network access server designed for large scalability |
US10069933B2 (en) | 2014-10-23 | 2018-09-04 | Cisco Technology, Inc. | System and method for creating virtual interfaces based on network characteristics |
US10127383B2 (en) * | 2014-11-06 | 2018-11-13 | International Business Machines Corporation | Resource usage optimized auditing of database shared memory |
US10002058B1 (en) * | 2014-11-26 | 2018-06-19 | Intuit Inc. | Method and system for providing disaster recovery services using elastic virtual computing resources |
US9495193B2 (en) | 2014-12-05 | 2016-11-15 | International Business Machines Corporation | Monitoring hypervisor and provisioned instances of hosted virtual machines using monitoring templates |
US9590948B2 (en) | 2014-12-15 | 2017-03-07 | Cisco Systems, Inc. | CCN routing using hardware-assisted hash tables |
US10237189B2 (en) | 2014-12-16 | 2019-03-19 | Cisco Technology, Inc. | System and method for distance-based interest forwarding |
US10003520B2 (en) | 2014-12-22 | 2018-06-19 | Cisco Technology, Inc. | System and method for efficient name-based content routing using link-state information in information-centric networks |
US9660825B2 (en) | 2014-12-24 | 2017-05-23 | Cisco Technology, Inc. | System and method for multi-source multicasting in content-centric networks |
US9832291B2 (en) | 2015-01-12 | 2017-11-28 | Cisco Technology, Inc. | Auto-configurable transport stack |
US9916457B2 (en) | 2015-01-12 | 2018-03-13 | Cisco Technology, Inc. | Decoupled name security binding for CCN objects |
US9946743B2 (en) | 2015-01-12 | 2018-04-17 | Cisco Technology, Inc. | Order encoded manifests in a content centric network |
US9954795B2 (en) | 2015-01-12 | 2018-04-24 | Cisco Technology, Inc. | Resource allocation using CCN manifests |
US10469346B2 (en) | 2015-01-30 | 2019-11-05 | Splunk Inc. | Correlating performance data of client and host to identify performance issue of a third device |
US10333840B2 (en) | 2015-02-06 | 2019-06-25 | Cisco Technology, Inc. | System and method for on-demand content exchange with adaptive naming in information-centric networks |
US10075401B2 (en) | 2015-03-18 | 2018-09-11 | Cisco Technology, Inc. | Pending interest table behavior |
GB201506327D0 (en) * | 2015-04-14 | 2015-05-27 | Microsoft Technology Licensing Llc | Analytics system architecture |
US10374904B2 (en) | 2015-05-15 | 2019-08-06 | Cisco Technology, Inc. | Diagnostic network visualization |
US9800497B2 (en) | 2015-05-27 | 2017-10-24 | Cisco Technology, Inc. | Operations, administration and management (OAM) in overlay data center environments |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US10033766B2 (en) | 2015-06-05 | 2018-07-24 | Cisco Technology, Inc. | Policy-driven compliance |
US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
US9967158B2 (en) | 2015-06-05 | 2018-05-08 | Cisco Technology, Inc. | Interactive hierarchical network chord diagram for application dependency mapping |
US10089099B2 (en) | 2015-06-05 | 2018-10-02 | Cisco Technology, Inc. | Automatic software upgrade |
US10075402B2 (en) | 2015-06-24 | 2018-09-11 | Cisco Technology, Inc. | Flexible command and control in content centric networks |
US10853141B2 (en) * | 2015-06-29 | 2020-12-01 | British Telecommunications Public Limited Company | Resource provisioning in distributed computing environments |
US10257049B2 (en) * | 2015-06-30 | 2019-04-09 | International Business Machines Corporation | Dynamic highlight |
US10701038B2 (en) | 2015-07-27 | 2020-06-30 | Cisco Technology, Inc. | Content negotiation in a content centric network |
US9986034B2 (en) | 2015-08-03 | 2018-05-29 | Cisco Technology, Inc. | Transferring state in content centric network stacks |
US9853913B2 (en) | 2015-08-25 | 2017-12-26 | Accenture Global Services Limited | Multi-cloud network proxy for control and normalization of tagging data |
US9832123B2 (en) | 2015-09-11 | 2017-11-28 | Cisco Technology, Inc. | Network named fragments in a content centric network |
CN106548262B (en) | 2015-09-21 | 2020-11-06 | 阿里巴巴集团控股有限公司 | Scheduling method, device and system for resources for processing tasks |
US10355999B2 (en) | 2015-09-23 | 2019-07-16 | Cisco Technology, Inc. | Flow control with network named fragments |
US9977809B2 (en) | 2015-09-24 | 2018-05-22 | Cisco Technology, Inc. | Information and data framework in a content centric network |
US10313227B2 (en) | 2015-09-24 | 2019-06-04 | Cisco Technology, Inc. | System and method for eliminating undetected interest looping in information-centric networks |
US10454820B2 (en) | 2015-09-29 | 2019-10-22 | Cisco Technology, Inc. | System and method for stateless information-centric networking |
US10263965B2 (en) | 2015-10-16 | 2019-04-16 | Cisco Technology, Inc. | Encrypted CCNx |
US9912776B2 (en) | 2015-12-02 | 2018-03-06 | Cisco Technology, Inc. | Explicit content deletion commands in a content centric network |
US10097346B2 (en) | 2015-12-09 | 2018-10-09 | Cisco Technology, Inc. | Key catalogs in a content centric network |
US10257271B2 (en) | 2016-01-11 | 2019-04-09 | Cisco Technology, Inc. | Chandra-Toueg consensus in a content centric network |
US10043016B2 (en) | 2016-02-29 | 2018-08-07 | Cisco Technology, Inc. | Method and system for name encryption agreement in a content centric network |
US10003507B2 (en) | 2016-03-04 | 2018-06-19 | Cisco Technology, Inc. | Transport session state protocol |
US10051071B2 (en) | 2016-03-04 | 2018-08-14 | Cisco Technology, Inc. | Method and system for collecting historical network information in a content centric network |
US10038633B2 (en) | 2016-03-04 | 2018-07-31 | Cisco Technology, Inc. | Protocol to query for historical network information in a content centric network |
US10742596B2 (en) | 2016-03-04 | 2020-08-11 | Cisco Technology, Inc. | Method and system for reducing a collision probability of hash-based names using a publisher identifier |
US10447562B2 (en) * | 2016-03-06 | 2019-10-15 | Nice Ltd. | System and method for detecting screen connectivity monitoring application malfunctions |
US9832116B2 (en) | 2016-03-14 | 2017-11-28 | Cisco Technology, Inc. | Adjusting entries in a forwarding information base in a content centric network |
US10212196B2 (en) | 2016-03-16 | 2019-02-19 | Cisco Technology, Inc. | Interface discovery and authentication in a name-based network |
EP3430768B1 (en) * | 2016-03-17 | 2020-05-13 | Telefonaktiebolaget LM Ericsson (PUBL) | Management of analytics tasks in a programmable network |
US10067948B2 (en) | 2016-03-18 | 2018-09-04 | Cisco Technology, Inc. | Data deduping in content centric networking manifests |
US11436656B2 (en) | 2016-03-18 | 2022-09-06 | Palo Alto Research Center Incorporated | System and method for a real-time egocentric collaborative filter on large datasets |
US10091330B2 (en) | 2016-03-23 | 2018-10-02 | Cisco Technology, Inc. | Interest scheduling by an information and data framework in a content centric network |
US10033639B2 (en) | 2016-03-25 | 2018-07-24 | Cisco Technology, Inc. | System and method for routing packets in a content centric network using anonymous datagrams |
US10320760B2 (en) | 2016-04-01 | 2019-06-11 | Cisco Technology, Inc. | Method and system for mutating and caching content in a content centric network |
US9930146B2 (en) | 2016-04-04 | 2018-03-27 | Cisco Technology, Inc. | System and method for compressing content centric networking messages |
US10425503B2 (en) | 2016-04-07 | 2019-09-24 | Cisco Technology, Inc. | Shared pending interest table in a content centric network |
US10027578B2 (en) | 2016-04-11 | 2018-07-17 | Cisco Technology, Inc. | Method and system for routable prefix queries in a content centric network |
US10191800B2 (en) * | 2016-04-29 | 2019-01-29 | Cisco Technology, Inc. | Metric payload ingestion and replay |
US10404450B2 (en) | 2016-05-02 | 2019-09-03 | Cisco Technology, Inc. | Schematized access control in a content centric network |
US10320675B2 (en) | 2016-05-04 | 2019-06-11 | Cisco Technology, Inc. | System and method for routing packets in a stateless content centric network |
US10547589B2 (en) | 2016-05-09 | 2020-01-28 | Cisco Technology, Inc. | System for implementing a small computer systems interface protocol over a content centric network |
US10084764B2 (en) | 2016-05-13 | 2018-09-25 | Cisco Technology, Inc. | System for a secure encryption proxy in a content centric network |
US10063414B2 (en) | 2016-05-13 | 2018-08-28 | Cisco Technology, Inc. | Updating a transport stack in a content centric network |
US10171357B2 (en) | 2016-05-27 | 2019-01-01 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10931629B2 (en) | 2016-05-27 | 2021-02-23 | Cisco Technology, Inc. | Techniques for managing software defined networking controller in-band communications in a data center network |
US10103989B2 (en) | 2016-06-13 | 2018-10-16 | Cisco Technology, Inc. | Content object return messages in a content centric network |
US10289438B2 (en) | 2016-06-16 | 2019-05-14 | Cisco Technology, Inc. | Techniques for coordination of application components deployed on distributed virtual machines |
US10305865B2 (en) | 2016-06-21 | 2019-05-28 | Cisco Technology, Inc. | Permutation-based content encryption with manifests in a content centric network |
WO2017221182A1 (en) * | 2016-06-22 | 2017-12-28 | Martin Kuster | Advanced communication computer |
US10148572B2 (en) | 2016-06-27 | 2018-12-04 | Cisco Technology, Inc. | Method and system for interest groups in a content centric network |
US10009266B2 (en) | 2016-07-05 | 2018-06-26 | Cisco Technology, Inc. | Method and system for reference counted pending interest tables in a content centric network |
US9992097B2 (en) | 2016-07-11 | 2018-06-05 | Cisco Technology, Inc. | System and method for piggybacking routing information in interests in a content centric network |
US10708183B2 (en) | 2016-07-21 | 2020-07-07 | Cisco Technology, Inc. | System and method of providing segment routing as a service |
US10122624B2 (en) | 2016-07-25 | 2018-11-06 | Cisco Technology, Inc. | System and method for ephemeral entries in a forwarding information base in a content centric network |
US11435713B2 (en) * | 2016-07-28 | 2022-09-06 | Aveva Software, Llc | Summarization retrieval in a process control environment |
US10069729B2 (en) | 2016-08-08 | 2018-09-04 | Cisco Technology, Inc. | System and method for throttling traffic based on a forwarding information base in a content centric network |
US10956412B2 (en) | 2016-08-09 | 2021-03-23 | Cisco Technology, Inc. | Method and system for conjunctive normal form attribute matching in a content centric network |
US10223234B2 (en) | 2016-08-15 | 2019-03-05 | Microsoft Technology Licensing, Llc | Monitoring a web application using an outside-in strategy |
US9582781B1 (en) | 2016-09-01 | 2017-02-28 | PagerDuty, Inc. | Real-time adaptive operations performance management system using event clusters and trained models |
US10515323B2 (en) * | 2016-09-12 | 2019-12-24 | PagerDuty, Inc. | Operations command console |
US10033642B2 (en) | 2016-09-19 | 2018-07-24 | Cisco Technology, Inc. | System and method for making optimal routing decisions based on device-specific parameters in a content centric network |
US10642852B2 (en) * | 2016-09-26 | 2020-05-05 | Splunk Inc. | Storing and querying metrics data |
US10212248B2 (en) | 2016-10-03 | 2019-02-19 | Cisco Technology, Inc. | Cache management on high availability routers in a content centric network |
US10447805B2 (en) | 2016-10-10 | 2019-10-15 | Cisco Technology, Inc. | Distributed consensus in a content centric network |
US10135948B2 (en) | 2016-10-31 | 2018-11-20 | Cisco Technology, Inc. | System and method for process migration in a content centric network |
US10243851B2 (en) | 2016-11-21 | 2019-03-26 | Cisco Technology, Inc. | System and method for forwarder connection information in a content centric network |
US10972388B2 (en) | 2016-11-22 | 2021-04-06 | Cisco Technology, Inc. | Federated microburst detection |
WO2018148135A1 (en) * | 2017-02-10 | 2018-08-16 | Intel IP Corporation | Systems, methods and devices for virtual resource metric management |
US10708152B2 (en) | 2017-03-23 | 2020-07-07 | Cisco Technology, Inc. | Predicting application and network performance |
US10523512B2 (en) | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US10764141B2 (en) | 2017-03-27 | 2020-09-01 | Cisco Technology, Inc. | Network agent for reporting to a network policy system |
US10250446B2 (en) | 2017-03-27 | 2019-04-02 | Cisco Technology, Inc. | Distributed policy store |
US10594560B2 (en) | 2017-03-27 | 2020-03-17 | Cisco Technology, Inc. | Intent driven network policy platform |
US10873794B2 (en) | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
US10728324B2 (en) | 2017-05-01 | 2020-07-28 | Servicenow, Inc. | Selective server-side execution of client-side scripts |
US10826820B2 (en) | 2017-05-09 | 2020-11-03 | Cisco Technology, Inc. | Routing network traffic based on DNS |
US10505832B2 (en) * | 2017-05-10 | 2019-12-10 | Sap Se | Resource coordinate system for data centers |
US10680887B2 (en) | 2017-07-21 | 2020-06-09 | Cisco Technology, Inc. | Remote device status audit and recovery |
CN107332708A (en) * | 2017-07-28 | 2017-11-07 | 上海德衡数据科技有限公司 | A kind of multi-modal decision-making sensory perceptual system of O&M based on polycaryon processor |
US10554501B2 (en) | 2017-10-23 | 2020-02-04 | Cisco Technology, Inc. | Network migration assistant |
US10523541B2 (en) | 2017-10-25 | 2019-12-31 | Cisco Technology, Inc. | Federated network and application data analytics platform |
US10594542B2 (en) | 2017-10-27 | 2020-03-17 | Cisco Technology, Inc. | System and method for network root cause analysis |
WO2019125258A1 (en) * | 2017-12-21 | 2019-06-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Agent, server, core network node and methods therein for handling an event of a network service deployed in a cloud environment |
US11233821B2 (en) | 2018-01-04 | 2022-01-25 | Cisco Technology, Inc. | Network intrusion counter-intelligence |
US11765046B1 (en) | 2018-01-11 | 2023-09-19 | Cisco Technology, Inc. | Endpoint cluster assignment and query generation |
US10873593B2 (en) | 2018-01-25 | 2020-12-22 | Cisco Technology, Inc. | Mechanism for identifying differences between network snapshots |
US10917438B2 (en) | 2018-01-25 | 2021-02-09 | Cisco Technology, Inc. | Secure publishing for policy updates |
US10999149B2 (en) | 2018-01-25 | 2021-05-04 | Cisco Technology, Inc. | Automatic configuration discovery based on traffic flow data |
US10798015B2 (en) | 2018-01-25 | 2020-10-06 | Cisco Technology, Inc. | Discovery of middleboxes using traffic flow stitching |
US10574575B2 (en) | 2018-01-25 | 2020-02-25 | Cisco Technology, Inc. | Network flow stitching using middle box flow stitching |
US10826803B2 (en) | 2018-01-25 | 2020-11-03 | Cisco Technology, Inc. | Mechanism for facilitating efficient policy updates |
US11128700B2 (en) | 2018-01-26 | 2021-09-21 | Cisco Technology, Inc. | Load balancing configuration based on traffic flow telemetry |
WO2019152942A2 (en) * | 2018-02-05 | 2019-08-08 | Harmonic, Inc. | Dynamic software architecture reconfiguration for converged cable access platform (ccap) |
US10880194B2 (en) * | 2018-03-29 | 2020-12-29 | Wipro Limited | Method and system for performing intelligent orchestration within a hybrid cloud |
KR102042431B1 (en) * | 2018-05-24 | 2019-11-08 | 주식회사 티맥스소프트 | Method for recording metadata for web caching in cloud environment and web server using the same |
US20200236163A1 (en) * | 2019-01-18 | 2020-07-23 | Servicenow, Inc. | Scale out network-attached storage device discovery |
US10897405B2 (en) * | 2019-01-31 | 2021-01-19 | Salesforce.Com, Inc. | Target availability threshold calculation mechanism |
US10949322B2 (en) | 2019-04-08 | 2021-03-16 | Hewlett Packard Enterprise Development Lp | Collecting performance metrics of a device |
CN110245171A (en) * | 2019-05-10 | 2019-09-17 | 上海德衡数据科技有限公司 | A kind of information sensing method based on O&M scenarios knowledge base |
US11036612B1 (en) * | 2019-12-12 | 2021-06-15 | Vmware, Inc. | Centralized application resource determination based on performance metrics |
US11334461B2 (en) * | 2019-12-12 | 2022-05-17 | Vmware, Inc. | Distributed application resource determination based on performance metrics |
US11520602B2 (en) * | 2020-01-27 | 2022-12-06 | Red Hat, Inc. | Generating configuration corrections for applications using a classifier model |
US11575763B2 (en) * | 2020-04-03 | 2023-02-07 | Vmware, Inc. | System and method for managing configuration data of monitoring agents |
US11372692B2 (en) | 2020-06-18 | 2022-06-28 | Capital One Services, Llc | Methods and systems for application program interface call management |
CN112988505A (en) * | 2021-02-08 | 2021-06-18 | 深圳阿帕云计算有限公司 | Cloud computing-based general real-time big data monitoring and early warning system |
US11799822B2 (en) * | 2022-01-21 | 2023-10-24 | Google Llc | Proxyless network address translation with dynamic port allocation |
Citations (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5958008A (en) * | 1996-10-15 | 1999-09-28 | Mercury Interactive Corporation | Software system and associated methods for scanning and mapping dynamically-generated web documents |
US20030065986A1 (en) * | 2001-05-09 | 2003-04-03 | Fraenkel Noam A. | Root cause analysis of server system performance degradations |
US20030135611A1 (en) * | 2002-01-14 | 2003-07-17 | Dean Kemp | Self-monitoring service system with improved user administration and user access control |
US20030204588A1 (en) * | 2002-04-30 | 2003-10-30 | International Business Machines Corporation | System for monitoring process performance and generating diagnostic recommendations |
US20040148237A1 (en) * | 2003-01-29 | 2004-07-29 | Msafe Ltd. | Real time management of a communication network account |
US20050182960A1 (en) * | 2002-02-19 | 2005-08-18 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages via throttling and delaying delivery |
US20060059568A1 (en) * | 2004-09-13 | 2006-03-16 | Reactivity, Inc. | Metric-based monitoring and control of a limited resource |
US20060075093A1 (en) * | 2004-10-05 | 2006-04-06 | Enterasys Networks, Inc. | Using flow metric events to control network operation |
US20080275980A1 (en) * | 2007-05-04 | 2008-11-06 | Hansen Eric J | Method and system for testing variations of website content |
US20080301282A1 (en) * | 2007-05-30 | 2008-12-04 | Vernit Americas, Inc. | Systems and Methods for Storing Interaction Data |
US20090010277A1 (en) * | 2007-07-03 | 2009-01-08 | Eran Halbraich | Method and system for selecting a recording route in a multi-media recording environment |
US20090222551A1 (en) * | 2008-02-29 | 2009-09-03 | Daniel Neely | Method and system for qualifying user engagement with a website |
US20090287814A1 (en) * | 2008-05-14 | 2009-11-19 | Microsoft Corporation | Visualization of streaming real-time data |
US20100027552A1 (en) * | 2008-06-19 | 2010-02-04 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US20100057400A1 (en) * | 2008-09-04 | 2010-03-04 | Sonics, Inc. | Method and system to monitor, debug, and analyze performance of an electronic design |
US20100138291A1 (en) * | 2008-12-02 | 2010-06-03 | Google Inc. | Adjusting Bids Based on Predicted Performance |
US20100169567A1 (en) * | 2007-02-12 | 2010-07-01 | Juniper Networks, Inc. | Dynamic disk throttling in a wide area network optimization device |
US20100169477A1 (en) * | 2008-12-31 | 2010-07-01 | Sap Ag | Systems and methods for dynamically provisioning cloud computing resources |
US20100174782A1 (en) * | 2003-06-13 | 2010-07-08 | Brilliant Digital Entertainment, Inc. | Monitoring of computer-related resources and associated methods and systems for allocating and disbursing compensation |
US20100223256A1 (en) * | 2009-03-02 | 2010-09-02 | Vikram Chalana | Adaptive query throttling system and method |
US20110047287A1 (en) * | 2009-08-19 | 2011-02-24 | Opanga Networks, Inc | Systems and methods for optimizing media content delivery based on user equipment determined resource metrics |
US20110082946A1 (en) * | 2009-10-06 | 2011-04-07 | Openwave Systems Inc. | Managing network traffic using intermediate flow control |
US7930381B2 (en) * | 2007-12-04 | 2011-04-19 | International Business Machines Corporation | Efficient monitoring of heterogeneous applications |
US20110145836A1 (en) * | 2009-12-12 | 2011-06-16 | Microsoft Corporation | Cloud Computing Monitoring and Management System |
US20110179165A1 (en) * | 2010-01-15 | 2011-07-21 | Endurance International Group, Inc. | Unaffiliated web domain hosting service product mapping |
US20110179162A1 (en) * | 2010-01-15 | 2011-07-21 | Mayo Mark G | Managing Workloads and Hardware Resources in a Cloud Resource |
US7991876B2 (en) * | 2006-12-19 | 2011-08-02 | International Business Machines Corporation | Management of monitoring sessions between monitoring clients and monitoring target server |
US20110238781A1 (en) * | 2010-03-25 | 2011-09-29 | Okun Justin A | Automated transfer of bulk data including workload management operating statistics |
US20110258683A1 (en) * | 2006-10-24 | 2011-10-20 | Cicchitto Nelson A | Apparatus and method for access validation |
US20110258621A1 (en) * | 2010-04-14 | 2011-10-20 | International Business Machines Corporation | Autonomic Scaling Of Virtual Machines In A Cloud Computing Environment |
US20110276951A1 (en) * | 2010-05-05 | 2011-11-10 | Microsoft Corporation | Managing runtime execution of applications on cloud computing systems |
US20110296000A1 (en) * | 2010-05-28 | 2011-12-01 | James Michael Ferris | Systems and methods for exporting usage history data as input to a management platform of a target cloud-based network |
US20110295651A1 (en) * | 2008-09-30 | 2011-12-01 | Microsoft Corporation | Mesh platform utility computing portal |
US20110295999A1 (en) * | 2010-05-28 | 2011-12-01 | James Michael Ferris | Methods and systems for cloud deployment analysis featuring relative cloud resource importance |
US20110302296A1 (en) * | 2010-06-04 | 2011-12-08 | David Garrett | Method and system for providing secure transactions via a broadband gateway |
US20110314148A1 (en) * | 2005-11-12 | 2011-12-22 | LogRhythm Inc. | Log collection, structuring and processing |
US20110320564A1 (en) * | 2007-02-28 | 2011-12-29 | Microsoft Corporation | Health-related opportunistic networking |
US20120016981A1 (en) * | 2010-07-15 | 2012-01-19 | Alexander Clemm | Continuous autonomous monitoring of systems along a path |
US20120017156A1 (en) * | 2010-07-19 | 2012-01-19 | Power Integrations, Inc. | Real-Time, multi-tier load test results aggregation |
US20120054301A1 (en) * | 2010-08-31 | 2012-03-01 | Sap Ag | Methods and systems for providing a virtual network process context for network participant processes in a networked business process |
US20120054335A1 (en) * | 2010-08-31 | 2012-03-01 | Sap Ag | Methods and systems for managing quality of services for network participants in a networked business process |
US20120130781A1 (en) * | 2010-11-24 | 2012-05-24 | Hong Li | Cloud service information overlay |
US20120151047A1 (en) * | 2010-12-09 | 2012-06-14 | Wavemarket, Inc. | Communication monitoring system and method enabling designating a peer |
US20120167081A1 (en) * | 2010-12-22 | 2012-06-28 | Sedayao Jeffrey C | Application Service Performance in Cloud Computing |
US20120185913A1 (en) * | 2008-06-19 | 2012-07-19 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
US20120208495A1 (en) * | 2010-06-23 | 2012-08-16 | Twilio, Inc. | System and method for monitoring account usage on a platform |
US20120209568A1 (en) * | 2011-02-14 | 2012-08-16 | International Business Machines Corporation | Multiple modeling paradigm for predictive analytics |
US20120222084A1 (en) * | 2011-02-25 | 2012-08-30 | International Business Machines Corporation | Virtual Securty Zones for Data Processing Environments |
US20120221626A1 (en) * | 2011-02-28 | 2012-08-30 | James Michael Ferris | Systems and methods for establishing upload channels to a cloud data distribution service |
US20120226808A1 (en) * | 2011-03-01 | 2012-09-06 | Morgan Christopher Edwin | Systems and methods for metering cloud resource consumption using multiple hierarchical subscription periods |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8543681B2 (en) | 2001-10-15 | 2013-09-24 | Volli Polymer Gmbh Llc | Network topology discovery systems and methods |
US7580905B2 (en) * | 2003-12-15 | 2009-08-25 | Intel Corporation | Adaptive configuration of platform |
US8856346B2 (en) | 2004-01-15 | 2014-10-07 | Unwired Planet, Llc | Stateful push notifications |
US20100100778A1 (en) | 2007-05-11 | 2010-04-22 | Spiceworks, Inc. | System and method for hardware and software monitoring with integrated troubleshooting |
EP2139164A1 (en) | 2008-06-24 | 2009-12-30 | France Telecom | Method and system to monitor equipment of an it infrastructure |
US8200163B2 (en) | 2008-12-30 | 2012-06-12 | Carrier Iq, Inc. | Distributed architecture for monitoring mobile communication in a wireless communication network |
US20100306767A1 (en) | 2009-05-29 | 2010-12-02 | Dehaan Michael Paul | Methods and systems for automated scaling of cloud computing systems |
US20100325206A1 (en) * | 2009-06-18 | 2010-12-23 | Umeshwar Dayal | Providing collaborative business intelligence |
US9442810B2 (en) | 2009-07-31 | 2016-09-13 | Paypal, Inc. | Cloud computing: unified management console for services and resources in a data center |
US20110161338A1 (en) | 2009-12-22 | 2011-06-30 | Carrier Iq, Inc | Dynamic tasking-masking server apparatus, system, and method for dynamically configuring adaptive agents in wireless devices |
US8745397B2 (en) | 2010-01-04 | 2014-06-03 | Microsoft Corporation | Monitoring federation for cloud based services and applications |
US8639989B1 (en) * | 2011-06-30 | 2014-01-28 | Amazon Technologies, Inc. | Methods and apparatus for remote gateway monitoring and diagnostics |
US10200363B2 (en) * | 2011-10-12 | 2019-02-05 | Nokia Technologies Oy | Method and apparatus for providing identification based on a multimedia signature |
-
2011
- 2011-11-10 US US13/293,751 patent/US8447851B1/en not_active Expired - Fee Related
-
2013
- 2013-04-16 US US13/863,838 patent/US8996695B2/en not_active Expired - Fee Related
Patent Citations (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5958008A (en) * | 1996-10-15 | 1999-09-28 | Mercury Interactive Corporation | Software system and associated methods for scanning and mapping dynamically-generated web documents |
US20030065986A1 (en) * | 2001-05-09 | 2003-04-03 | Fraenkel Noam A. | Root cause analysis of server system performance degradations |
US20030135611A1 (en) * | 2002-01-14 | 2003-07-17 | Dean Kemp | Self-monitoring service system with improved user administration and user access control |
US20050182960A1 (en) * | 2002-02-19 | 2005-08-18 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages via throttling and delaying delivery |
US20030204588A1 (en) * | 2002-04-30 | 2003-10-30 | International Business Machines Corporation | System for monitoring process performance and generating diagnostic recommendations |
US20040148237A1 (en) * | 2003-01-29 | 2004-07-29 | Msafe Ltd. | Real time management of a communication network account |
US20100174782A1 (en) * | 2003-06-13 | 2010-07-08 | Brilliant Digital Entertainment, Inc. | Monitoring of computer-related resources and associated methods and systems for allocating and disbursing compensation |
US20060059568A1 (en) * | 2004-09-13 | 2006-03-16 | Reactivity, Inc. | Metric-based monitoring and control of a limited resource |
US20060075093A1 (en) * | 2004-10-05 | 2006-04-06 | Enterasys Networks, Inc. | Using flow metric events to control network operation |
US20110314148A1 (en) * | 2005-11-12 | 2011-12-22 | LogRhythm Inc. | Log collection, structuring and processing |
US20110258683A1 (en) * | 2006-10-24 | 2011-10-20 | Cicchitto Nelson A | Apparatus and method for access validation |
US7991876B2 (en) * | 2006-12-19 | 2011-08-02 | International Business Machines Corporation | Management of monitoring sessions between monitoring clients and monitoring target server |
US20100169567A1 (en) * | 2007-02-12 | 2010-07-01 | Juniper Networks, Inc. | Dynamic disk throttling in a wide area network optimization device |
US20110320564A1 (en) * | 2007-02-28 | 2011-12-29 | Microsoft Corporation | Health-related opportunistic networking |
US20080275980A1 (en) * | 2007-05-04 | 2008-11-06 | Hansen Eric J | Method and system for testing variations of website content |
US20080301282A1 (en) * | 2007-05-30 | 2008-12-04 | Vernit Americas, Inc. | Systems and Methods for Storing Interaction Data |
US20090010277A1 (en) * | 2007-07-03 | 2009-01-08 | Eran Halbraich | Method and system for selecting a recording route in a multi-media recording environment |
US7930381B2 (en) * | 2007-12-04 | 2011-04-19 | International Business Machines Corporation | Efficient monitoring of heterogeneous applications |
US20090222551A1 (en) * | 2008-02-29 | 2009-09-03 | Daniel Neely | Method and system for qualifying user engagement with a website |
US20090287814A1 (en) * | 2008-05-14 | 2009-11-19 | Microsoft Corporation | Visualization of streaming real-time data |
US20100027552A1 (en) * | 2008-06-19 | 2010-02-04 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US20120185913A1 (en) * | 2008-06-19 | 2012-07-19 | Servicemesh, Inc. | System and method for a cloud computing abstraction layer with security zone facilities |
US20100057400A1 (en) * | 2008-09-04 | 2010-03-04 | Sonics, Inc. | Method and system to monitor, debug, and analyze performance of an electronic design |
US20110295651A1 (en) * | 2008-09-30 | 2011-12-01 | Microsoft Corporation | Mesh platform utility computing portal |
US20100138291A1 (en) * | 2008-12-02 | 2010-06-03 | Google Inc. | Adjusting Bids Based on Predicted Performance |
US20110252137A1 (en) * | 2008-12-31 | 2011-10-13 | Sap Ag | Systems and Methods for Dynamically Provisioning Cloud Computing Resources |
US20100169477A1 (en) * | 2008-12-31 | 2010-07-01 | Sap Ag | Systems and methods for dynamically provisioning cloud computing resources |
US20100223256A1 (en) * | 2009-03-02 | 2010-09-02 | Vikram Chalana | Adaptive query throttling system and method |
US20110047287A1 (en) * | 2009-08-19 | 2011-02-24 | Opanga Networks, Inc | Systems and methods for optimizing media content delivery based on user equipment determined resource metrics |
US20110082946A1 (en) * | 2009-10-06 | 2011-04-07 | Openwave Systems Inc. | Managing network traffic using intermediate flow control |
US20110145836A1 (en) * | 2009-12-12 | 2011-06-16 | Microsoft Corporation | Cloud Computing Monitoring and Management System |
US20110179162A1 (en) * | 2010-01-15 | 2011-07-21 | Mayo Mark G | Managing Workloads and Hardware Resources in a Cloud Resource |
US20110179165A1 (en) * | 2010-01-15 | 2011-07-21 | Endurance International Group, Inc. | Unaffiliated web domain hosting service product mapping |
US20110238781A1 (en) * | 2010-03-25 | 2011-09-29 | Okun Justin A | Automated transfer of bulk data including workload management operating statistics |
US20110258621A1 (en) * | 2010-04-14 | 2011-10-20 | International Business Machines Corporation | Autonomic Scaling Of Virtual Machines In A Cloud Computing Environment |
US20110276951A1 (en) * | 2010-05-05 | 2011-11-10 | Microsoft Corporation | Managing runtime execution of applications on cloud computing systems |
US20110295999A1 (en) * | 2010-05-28 | 2011-12-01 | James Michael Ferris | Methods and systems for cloud deployment analysis featuring relative cloud resource importance |
US20110296000A1 (en) * | 2010-05-28 | 2011-12-01 | James Michael Ferris | Systems and methods for exporting usage history data as input to a management platform of a target cloud-based network |
US20110302296A1 (en) * | 2010-06-04 | 2011-12-08 | David Garrett | Method and system for providing secure transactions via a broadband gateway |
US20120208495A1 (en) * | 2010-06-23 | 2012-08-16 | Twilio, Inc. | System and method for monitoring account usage on a platform |
US20120016981A1 (en) * | 2010-07-15 | 2012-01-19 | Alexander Clemm | Continuous autonomous monitoring of systems along a path |
US20120017156A1 (en) * | 2010-07-19 | 2012-01-19 | Power Integrations, Inc. | Real-Time, multi-tier load test results aggregation |
US20120054301A1 (en) * | 2010-08-31 | 2012-03-01 | Sap Ag | Methods and systems for providing a virtual network process context for network participant processes in a networked business process |
US20120054335A1 (en) * | 2010-08-31 | 2012-03-01 | Sap Ag | Methods and systems for managing quality of services for network participants in a networked business process |
US20120130781A1 (en) * | 2010-11-24 | 2012-05-24 | Hong Li | Cloud service information overlay |
US20120151047A1 (en) * | 2010-12-09 | 2012-06-14 | Wavemarket, Inc. | Communication monitoring system and method enabling designating a peer |
US20120167081A1 (en) * | 2010-12-22 | 2012-06-28 | Sedayao Jeffrey C | Application Service Performance in Cloud Computing |
US20120209568A1 (en) * | 2011-02-14 | 2012-08-16 | International Business Machines Corporation | Multiple modeling paradigm for predictive analytics |
US20120222084A1 (en) * | 2011-02-25 | 2012-08-30 | International Business Machines Corporation | Virtual Securty Zones for Data Processing Environments |
US20120221626A1 (en) * | 2011-02-28 | 2012-08-30 | James Michael Ferris | Systems and methods for establishing upload channels to a cloud data distribution service |
US20120226808A1 (en) * | 2011-03-01 | 2012-09-06 | Morgan Christopher Edwin | Systems and methods for metering cloud resource consumption using multiple hierarchical subscription periods |
Non-Patent Citations (1)
Title |
---|
Merv Adrian and Colin White, "Analytic Platforms: Beyond the Traditional Data Warehouse," Beye Network Global Coverage of the Business Intelligence Ecosystem, TechTarget, BI Research, IT Market Strategy, 2010. * |
Cited By (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11055748B2 (en) | 2010-03-31 | 2021-07-06 | Mediamath, Inc. | Systems and methods for providing a demand side platform |
US10332156B2 (en) | 2010-03-31 | 2019-06-25 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US10628859B2 (en) | 2010-03-31 | 2020-04-21 | Mediamath, Inc. | Systems and methods for providing a demand side platform |
US10636060B2 (en) | 2010-03-31 | 2020-04-28 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US11720929B2 (en) | 2010-03-31 | 2023-08-08 | Mediamath, Inc. | Systems and methods for providing a demand side platform |
US11080763B2 (en) | 2010-03-31 | 2021-08-03 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US11308526B2 (en) | 2010-03-31 | 2022-04-19 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US11610232B2 (en) | 2010-03-31 | 2023-03-21 | Mediamath, Inc. | Systems and methods for using server side cookies by a demand side platform |
US10592910B2 (en) | 2010-07-19 | 2020-03-17 | Mediamath, Inc. | Systems and methods for determining competitive market values of an ad impression |
US11049118B2 (en) | 2010-07-19 | 2021-06-29 | Mediamath, Inc. | Systems and methods for determining competitive market values of an ad impression |
US11195187B1 (en) | 2010-07-19 | 2021-12-07 | Mediamath, Inc. | Systems and methods for determining competitive market values of an ad impression |
US11521218B2 (en) | 2010-07-19 | 2022-12-06 | Mediamath, Inc. | Systems and methods for determining competitive market values of an ad impression |
US9628355B1 (en) * | 2011-07-20 | 2017-04-18 | Google Inc. | System for validating site configuration based on real-time analytics data |
US20130219042A1 (en) * | 2012-02-16 | 2013-08-22 | International Business Machines Corporation | Managing cloud services |
US9100306B2 (en) * | 2012-02-16 | 2015-08-04 | International Business Machines Corporation | Managing cloud services |
US20150089077A1 (en) * | 2012-03-14 | 2015-03-26 | Amazon Technologies, Inc. | Managing data transfer using streaming protocols |
US9516087B2 (en) * | 2012-03-14 | 2016-12-06 | Amazon Technologies, Inc. | Managing data transfer using streaming protocols |
US10721146B2 (en) * | 2012-07-31 | 2020-07-21 | Micro Focus Llc | Monitoring for managed services |
US9152465B2 (en) * | 2012-08-20 | 2015-10-06 | Cisco Technology, Inc. | Prioritzed branch computing system |
US20140052837A1 (en) * | 2012-08-20 | 2014-02-20 | Cisco Technology, Inc. | Prioritzed branch computing system |
US9244718B2 (en) * | 2012-09-19 | 2016-01-26 | Nec Corporation | Virtual machine resource allocation based on connection time coverage exceeding a minimum threshold |
US20150234672A1 (en) * | 2012-09-19 | 2015-08-20 | Nec Corporation | Information processing device that generates machine disposition plan, and method for generating machine disposition plan |
US10164929B2 (en) * | 2012-09-28 | 2018-12-25 | Avaya Inc. | Intelligent notification of requests for real-time online interaction via real-time communications and/or markup protocols, and related methods, systems, and computer-readable media |
US20140095633A1 (en) * | 2012-09-28 | 2014-04-03 | Avaya Inc. | Intelligent notification of requests for real-time online interaction via real-time communications and/or markup protocols, and related methods, systems, and computer-readable media |
US20150242379A1 (en) * | 2012-09-28 | 2015-08-27 | Telefonaktiebolaget L M Ericsson (Publ) | Measuring web page rendering time |
US9940309B2 (en) * | 2012-09-28 | 2018-04-10 | Telefonaktiebolaget L M Ericsson (Publ) | Measuring web page rendering time |
US20140136952A1 (en) * | 2012-11-14 | 2014-05-15 | Cisco Technology, Inc. | Improving web sites performance using edge servers in fog computing architecture |
US9600501B1 (en) * | 2012-11-26 | 2017-03-21 | Google Inc. | Transmitting and receiving data between databases with different database processing capabilities |
US9397902B2 (en) | 2013-01-28 | 2016-07-19 | Rackspace Us, Inc. | Methods and systems of tracking and verifying records of system change events in a distributed network system |
US10069690B2 (en) | 2013-01-28 | 2018-09-04 | Rackspace Us, Inc. | Methods and systems of tracking and verifying records of system change events in a distributed network system |
US9483334B2 (en) | 2013-01-28 | 2016-11-01 | Rackspace Us, Inc. | Methods and systems of predictive monitoring of objects in a distributed network system |
US20140215057A1 (en) * | 2013-01-28 | 2014-07-31 | Rackspace Us, Inc. | Methods and Systems of Monitoring Failures in a Distributed Network System |
US9813307B2 (en) * | 2013-01-28 | 2017-11-07 | Rackspace Us, Inc. | Methods and systems of monitoring failures in a distributed network system |
US10108493B2 (en) | 2013-05-30 | 2018-10-23 | International Business Machines Corporation | Adjusting dispersed storage network traffic due to rebuilding |
US9424132B2 (en) * | 2013-05-30 | 2016-08-23 | International Business Machines Corporation | Adjusting dispersed storage network traffic due to rebuilding |
US20140359348A1 (en) * | 2013-05-30 | 2014-12-04 | Cleversafe, Inc. | Adjusting dispersed storage network traffic due to rebuilding |
US9917885B2 (en) * | 2013-07-30 | 2018-03-13 | International Business Machines Corporation | Managing transactional data for high use databases |
US20150039576A1 (en) * | 2013-07-30 | 2015-02-05 | International Business Machines Corporation | Managing Transactional Data for High Use Databases |
US9774662B2 (en) | 2013-07-30 | 2017-09-26 | International Business Machines Corporation | Managing transactional data for high use databases |
US10310898B1 (en) | 2014-03-04 | 2019-06-04 | Google Llc | Allocating computing resources based on user intent |
US11086676B1 (en) | 2014-03-04 | 2021-08-10 | Google Llc | Allocating computing resources based on user intent |
US9495211B1 (en) * | 2014-03-04 | 2016-11-15 | Google Inc. | Allocating computing resources based on user intent |
US20170111240A1 (en) * | 2014-07-04 | 2017-04-20 | Huawei Technologies Co., Ltd. | Service Elastic Method and Apparatus in Cloud Computing |
US9767065B2 (en) * | 2014-08-21 | 2017-09-19 | GM Global Technology Operations LLC | Dynamic vehicle bus subscription |
US20160055116A1 (en) * | 2014-08-21 | 2016-02-25 | GM Global Technology Operations LLC | Dynamic vehicle bus subscription |
US20160110421A1 (en) * | 2014-10-20 | 2016-04-21 | Xerox Corporation | Matching co-referring entities from serialized data for schema inference |
US9977817B2 (en) * | 2014-10-20 | 2018-05-22 | Conduent Business Services, Llc | Matching co-referring entities from serialized data for schema inference |
US10152365B2 (en) * | 2014-11-18 | 2018-12-11 | Bull Sas | Method and sequencer for detecting a malfunction occurring in a high performance computer |
US20160139973A1 (en) * | 2014-11-18 | 2016-05-19 | Bull Sas | Method and sequencer for detecting a malfunction occurring in major it infrastructures |
US10972540B2 (en) | 2015-01-22 | 2021-04-06 | International Business Machines Corporation | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment |
US10506041B2 (en) * | 2015-01-22 | 2019-12-10 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US10284647B2 (en) * | 2015-01-22 | 2019-05-07 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US9912751B2 (en) | 2015-01-22 | 2018-03-06 | International Business Machines Corporation | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment |
US9888078B2 (en) | 2015-01-22 | 2018-02-06 | International Business Machines Corporation | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment |
US9917899B2 (en) | 2015-01-22 | 2018-03-13 | International Business Machines Corporation | Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment |
US20160219106A1 (en) * | 2015-01-22 | 2016-07-28 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US20160218928A1 (en) * | 2015-01-22 | 2016-07-28 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US9917897B2 (en) | 2015-01-22 | 2018-03-13 | International Business Machines Corporation | Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment |
US10601920B2 (en) | 2015-01-22 | 2020-03-24 | International Business Machines Corporation | Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment |
US10498824B2 (en) | 2015-01-22 | 2019-12-03 | International Business Machines Corporation | Requesting storage performance models for a configuration pattern of storage resources to deploy at a client computing environment |
US10944827B2 (en) | 2015-01-22 | 2021-03-09 | International Business Machines Corporation | Publishing configuration patterns for storage resources and storage performance models from client systems to share with client systems in a network computing environment |
US10581970B2 (en) | 2015-01-22 | 2020-03-03 | International Business Machines Corporation | Providing information on published configuration patterns of storage resources to client systems in a network computing environment |
US9389916B1 (en) * | 2015-04-24 | 2016-07-12 | International Business Machines Corporation | Job scheduling management |
US9886311B2 (en) | 2015-04-24 | 2018-02-06 | International Business Machines Corporation | Job scheduling management |
US10659327B2 (en) | 2015-06-19 | 2020-05-19 | Cisco Technology, Inc. | Network traffic analysis |
US11144604B1 (en) * | 2015-07-17 | 2021-10-12 | EMC IP Holding Company LLC | Aggregated performance reporting system and method for a distributed computing environment |
US9785474B2 (en) | 2015-07-23 | 2017-10-10 | International Business Machines Corporation | Managing a shared pool of configurable computing resources using a set of scaling factors and a set of workload resource data |
US9785475B2 (en) | 2015-07-23 | 2017-10-10 | International Business Machines Corporation | Managing a shared pool of configurable computing resources using a set of scaling factors and a set of workload resource data |
US10140162B2 (en) | 2015-07-23 | 2018-11-27 | International Business Machines Corporation | Managing a shared pool of configurable computing resources using a set of scaling factors and a set of workload resource data |
US10146586B2 (en) | 2015-07-23 | 2018-12-04 | International Business Machines Corporation | Managing a shared pool of configurable computing resources using a set of scaling factors and a set of workload resource data |
US20170063597A1 (en) * | 2015-08-31 | 2017-03-02 | Ca, Inc. | Api provider insights collection |
US10176017B2 (en) | 2015-09-13 | 2019-01-08 | International Business Machines Corporation | Configuration management for a shared pool of configurable computing resources |
US10169086B2 (en) * | 2015-09-13 | 2019-01-01 | International Business Machines Corporation | Configuration management for a shared pool of configurable computing resources |
EP3220270A1 (en) * | 2016-03-14 | 2017-09-20 | AirMagnet, Inc. | System and method to configure distributed measuring devices and treat measurement data |
US10394759B2 (en) | 2016-03-14 | 2019-08-27 | Airmagnet, Inc. | System and method to configure distributed measuring devices and treat measurement data |
US20170317914A1 (en) * | 2016-04-27 | 2017-11-02 | Electronics And Telecommunications Research Institute | Apparatus for testing and developing products of network computing based on open-source virtualized cloud |
US10367714B2 (en) * | 2016-04-27 | 2019-07-30 | Electronics And Telecommunications Research Institute | Apparatus for testing and developing products of network computing based on open-source virtualized cloud |
US10554516B1 (en) * | 2016-06-09 | 2020-02-04 | Palantir Technologies Inc. | System to collect and visualize software usage metrics |
US11444854B2 (en) * | 2016-06-09 | 2022-09-13 | Palantir Technologies Inc. | System to collect and visualize software usage metrics |
US20230025877A1 (en) * | 2016-06-09 | 2023-01-26 | Palantir Technologies Inc. | System to collect and visualize software usage metrics |
US10977697B2 (en) | 2016-08-03 | 2021-04-13 | Mediamath, Inc. | Methods, systems, and devices for counterfactual-based incrementality measurement in digital ad-bidding platform |
US11170413B1 (en) | 2016-08-03 | 2021-11-09 | Mediamath, Inc. | Methods, systems, and devices for counterfactual-based incrementality measurement in digital ad-bidding platform |
US10467659B2 (en) | 2016-08-03 | 2019-11-05 | Mediamath, Inc. | Methods, systems, and devices for counterfactual-based incrementality measurement in digital ad-bidding platform |
US11556964B2 (en) | 2016-08-03 | 2023-01-17 | Mediamath, Inc. | Methods, systems, and devices for counterfactual-based incrementality measurement in digital ad-bidding platform |
US10740795B2 (en) | 2017-05-17 | 2020-08-11 | Mediamath, Inc. | Systems, methods, and devices for decreasing latency and/or preventing data leakage due to advertisement insertion |
US10354276B2 (en) | 2017-05-17 | 2019-07-16 | Mediamath, Inc. | Systems, methods, and devices for decreasing latency and/or preventing data leakage due to advertisement insertion |
US11727440B2 (en) | 2017-05-17 | 2023-08-15 | Mediamath, Inc. | Systems, methods, and devices for decreasing latency and/or preventing data leakage due to advertisement insertion |
US10505857B1 (en) * | 2017-07-14 | 2019-12-10 | EMC IP Holding Company LLC | Maximizing network throughput between deduplication appliances and cloud computing networks |
US10587998B2 (en) * | 2017-12-18 | 2020-03-10 | Toyota Jidosha Kabushiki Kaisha | Managed selection of a geographical location for a micro-vehicular cloud |
US20190191265A1 (en) * | 2017-12-18 | 2019-06-20 | Toyota Jidosha Kabushiki Kaisha | Managed Selection of a Geographical Location for a Micro-Vehicular Cloud |
US11810156B2 (en) | 2018-02-08 | 2023-11-07 | MediaMath Acquisition Corporation | Systems, methods, and devices for componentization, modification, and management of creative assets for diverse advertising platform environments |
US11348142B2 (en) | 2018-02-08 | 2022-05-31 | Mediamath, Inc. | Systems, methods, and devices for componentization, modification, and management of creative assets for diverse advertising platform environments |
US11469982B2 (en) * | 2019-05-30 | 2022-10-11 | Ncr Corporation | Edge system health monitoring and auditing |
US11133997B2 (en) * | 2019-05-30 | 2021-09-28 | Ncr Corporation | Edge system health monitoring and auditing |
US11487623B2 (en) * | 2019-06-07 | 2022-11-01 | Kyocera Document Solutions Inc. | Information processing system |
US11514477B2 (en) | 2019-09-23 | 2022-11-29 | Mediamath, Inc. | Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing |
US11182829B2 (en) | 2019-09-23 | 2021-11-23 | Mediamath, Inc. | Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing |
US20200167190A1 (en) * | 2020-01-29 | 2020-05-28 | Intel Corporation | Adaptive data shipment based on burden functions |
CN111475555A (en) * | 2020-03-12 | 2020-07-31 | 咪咕文化科技有限公司 | Data acquisition method, electronic device and computer-readable storage medium |
US20220269505A1 (en) * | 2020-06-25 | 2022-08-25 | Segment.io, Inc. | Client-side enrichment and transformation via dynamic logic for analytics |
US20220269504A1 (en) * | 2020-06-25 | 2022-08-25 | Segment.io, Inc. | Client-side enrichment and transformation via dynamic logic for analytics |
Also Published As
Publication number | Publication date |
---|---|
US8996695B2 (en) | 2015-03-31 |
US8447851B1 (en) | 2013-05-21 |
US20130238791A1 (en) | 2013-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8996695B2 (en) | System for monitoring elastic cloud-based computing systems as a service | |
AU2021201512B2 (en) | Data stream processing language for analyzing instrumented software | |
US10394693B2 (en) | Quantization of data streams of instrumented software | |
US20230004434A1 (en) | Automated reconfiguration of real time data stream processing | |
US9712410B1 (en) | Local metrics in a service provider environment | |
US20220012103A1 (en) | System and method for optimization and load balancing of computer clusters | |
US11635994B2 (en) | System and method for optimizing and load balancing of applications using distributed computer clusters | |
CN109039817B (en) | Information processing method, device, equipment and medium for flow monitoring | |
WO2016100534A1 (en) | Data stream processing language for analyzing instrumented software | |
WO2019126720A1 (en) | A system and method for optimization and load balancing of computer clusters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COPPEREGG CORPORATION, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANDERSON, ERIC PAUL;JOHNSON, SCOTT CONRAD;PERDUE, DAVID;AND OTHERS;REEL/FRAME:027209/0601 Effective date: 20111110 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: COMERICA BANK, AS AGENT, MICHIGAN Free format text: SECURITY INTEREST;ASSIGNORS:IDERA, INC.;PRECISE SOFTWARE SOLUTIONS, INC.;COPPEREGG CORPORATION;REEL/FRAME:033696/0004 Effective date: 20140905 |
|
AS | Assignment |
Owner name: FIFTH STREET MANAGEMENT LLC, AS AGENT, CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNORS:IDERA, INC.;PRECISE SOFTWARE SOLUTIONS, INC.;COPPEREGG CORPORATION;REEL/FRAME:034260/0360 Effective date: 20141105 |
|
AS | Assignment |
Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 Owner name: PRECISE SOFTWARE SOLUTIONS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 Owner name: IDERA, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 |
|
AS | Assignment |
Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 Owner name: PRECISE SOFTWARE SOLUTIONS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 Owner name: IDERA, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: FIRST LIEN SECURITY AGREEMENT;ASSIGNORS:IDERA, INC.;CODEGEAR LLC;EMBARCADERO TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:036842/0410 Effective date: 20151009 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: SECOND LIEN SECURITY AGREEMENT;ASSIGNORS:IDERA, INC.;CODEGEAR LLC;EMBARCADERO TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:036863/0137 Effective date: 20151009 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN SPECIFIED PATENTS;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:048822/0343 Effective date: 20190401 Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE OF SECURITY INTEREST IN SPECIFIED PATENTS;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:049064/0147 Effective date: 20190401 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210521 |