Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Computable Awards
    • Nieuws
    • Winnaars
    • Partner worden
    • Inzending indienen
    • Inzendingen
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
    • Magazine
    • Adverteren in het magazine
  • Nieuwsbrief

Self managing systems

01 mei 2003 - 22:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

IBM has already developed a good set of tools for Web based applications with WebSphere, which they will continue to develop to make integration with legacy systems easier.

However Sun and Microsoft, not forgetting Oracle and BEA, also have similar capabilities and so IBM are pushing forward with technology to deliver on-demand computing, charged on a "how much has been used" basis. This development is referred to by IBM as "Project eLiza". This technology is scheduled to be applied to all IBM’s platforms, but it is far more advanced on mainframes with the revolutionary Intelligent Resource Director (IRD, which uses the z/OS Workload Manager and Parallel Sysplex Clustering to implement dynamic partitioning, enabling resources to be rescheduled without shutting executing applications down.
Project eLiza is targeted to achieve four key objectives, self-optimising, self-healing, self configuring and self-protecting systems. The emphasis is on "self" so that these next generation systems can be easily and economically managed. Clearly it will take many years to fully develop and implement eLiza, but there are already significant pieces of the jig-saw puzzle in place; it is of course uneven across the various platforms, only mainframes having IRD for instance.
Self-optimising systems can automatically and seamlessly allocate and de-allocate processor, memory and I/O capacity to active, protected partitions. This needs to be done in relatively small increments, i.e. a share of a processor, not constrained to a whole one. This is important if service level agreements are to be met, since a peak demand by one user must not be met at an excessive cost to another user. At present this is only achievable on a mainframe and it will be interesting to see how H-P and Sun, as well as IBM’s other systems, respond.
Self-healing has been employed for years in fault tolerant systems and in complex communication networks. The primary function is to detect faults in any part of the system; the second function is to do something about it. It is the latter that has the scope for a lot of serious development! Some faults are transient and are resolved by repeating the operation (with roll-back). Redundant equipment can be used to fix more permanent faults, but that also requires fault reporting and within the eLiza architecture requires an ability to remove and replace components without disrupting the normal operation. "Hot swapping" of I/O, processor and memory cards was pioneered by Tandem and Stratus for earlier fault-tolerant systems, now it must become the norm. Predicting and anticipating faults before they become catastrophic, technology found today in networks, will also be applied to eLiza. IBM by the way has some very advanced techniques for implementing error-correcting memory.
Self-configuring technology allows hardware and software to be added to or removed from a system without having to shut the system down and to reboot. This requires advances in both hardware and operating systems, in particular directory management. There will be a strong interaction between self-configuration and self-optimisation.
Self-protecting is needed to automatically protect both the system and the user’s assets. Security has long been a problem for IT systems which has become far more wide ranging since the advent of the Internet. On-demand computing will increase the need to control unauthorised access. Indeed this is probably going to be the biggest influence in the early phases and will definitely slow down the mass acceptance of utility computing for some time. The Internet has placed focus on intrusion detection via the network but it must become more sophisticated to function throughout the whole system.< BR>
 
Martin Healey, pioneer development Intel-based computers en c/s-architecture. Director of a number of IT specialist companies and an Emeritus Professor of the University of Wales.

Meer over

LegacyWebSphere

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Hybride vergaderen herzien

    Wat moderne werkplekken vragen van meeting- en samenwerkingsomgevingen

    Computable.nl

    Virtualisatie heroverwogen

    Waarom enterprise IT opnieuw kijkt naar kosten, schaal en flexibiliteit

    Computable.nl

    Hoe raakt NIS2 ook jouw bedrijf?

    De nieuwe cyberregels voor het MKB in aantocht

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Awards-inzendingen

    Pijl naar rechts icoon

    HackShield Future Cyber Heroes

    85.000 kinderen praten over veilig gamen met HackShield
    Pijl naar rechts icoon

    Wiz

    Wiz versterkt cyber resilience met contextgedreven cloudsecurity
    Pijl naar rechts icoon

    Getac

    Realtime inzicht als fundament voor digitale transformatie
    Pijl naar rechts icoon

    JBT Marel

    TechDoc Finder: AI-zoekagent voor service engineers
    Pijl naar rechts icoon

    Milieu Service Nederland

    WIN-platform: realtime afvaldata voor inzameling en facturatie
    Alle inzendingen
    Pijl naar rechts icoon
    Stuur je case voor de Computable Awards en word getoond op de website!
    Ik wil een case insturenIcoon

    Populaire berichten

    Meer artikelen

    Meer lezen

    Innovatie & Transformatie

    Microsoft onthult netwerktechnieken die datacenters zuiniger maken

    Cloud & Infrastructuur

    Eerenberg (Financiën) houdt vast aan belastingdeal met Fast Enterprises

    Cloud & Infrastructuur

    Kort: Mastercard verleidt fin­tech­star­tups, Vertiv en Nvidia tillen ai-fabriek omhoog (en meer)

    Cloud & Infrastructuur

    Ook (eveneens Amerikaanse) Equinix kan dienst­ver­le­ning DigiD verstoren

    Software & Development

    Omstreden omzetbelastingsysteem op termijn naar de cloud

    Cloud & Infrastructuur

    EU Cloud Sovereignty Framework: beleidsstuk dat geen slaappil is

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Computable Awards
    • Magazine
    • Ontvang Computable e-Magazine
    • Cybersec e-Magazine
    • Topics
    • Phishing
    • Ransomware
    • NEN 7510

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2026 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs