Nothing Special   »   [go: up one dir, main page]

Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Computer Science Self Management: Fundamentals and Applications
Computer Science Self Management: Fundamentals and Applications
Computer Science Self Management: Fundamentals and Applications
Ebook96 pages1 hour

Computer Science Self Management: Fundamentals and Applications

Rating: 0 out of 5 stars

()

Read preview

About this ebook

What Is Computer Science Self Management


The process through which computer systems are able to control their own operations without the need for intervention from humans is referred to as self-management. It is anticipated that the future generation of network management systems would be predominated by technologies for self-administration.


How You Will Benefit


(I) Insights, and validations about the following topics:


Chapter 1: Self-management (computer science)


Chapter 2: Provisioning (technology)


Chapter 3: Scalability


Chapter 4: Autonomic computing


Chapter 5: Orchestration (computing)


Chapter 6: Vulnerability (computing)


Chapter 7: Cloud computing


Chapter 8: Software-defined networking


Chapter 9: Cloud management


Chapter 10: Transition (computer science)


(II) Answering the public top questions about computer science self management.


(III) Real world examples for the usage of computer science self management in many fields.


(IV) 17 appendices to explain, briefly, 266 emerging technologies in each industry to have 360-degree full understanding of computer science self management' technologies.


Who This Book Is For


Professionals, undergraduate and graduate students, enthusiasts, hobbyists, and those who want to go beyond basic knowledge or information for any kind of computer science self management.

LanguageEnglish
Release dateJul 3, 2023
Computer Science Self Management: Fundamentals and Applications

Read more from Fouad Sabry

Related to Computer Science Self Management

Titles in the series (100)

View More

Related ebooks

Intelligence (AI) & Semantics For You

View More

Related articles

Reviews for Computer Science Self Management

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Computer Science Self Management - Fouad Sabry

    Chapter 1: Self-management (computer science)

    The process by which computer systems are able to manage their own operations without the need for intervention from humans is referred to as self-management. It is anticipated that self-management technologies will become ubiquitous in the subsequent generation of network management systems.

    The most significant factor that is currently holding back the development of modern networked computer systems is the increasing complexity of these systems. Because of the growing heterogeneity of computer systems used by large corporations, the incorporation of mobile computing devices, and the combination of different networking technologies such as WLAN, cellular phone networks, and mobile ad hoc networks, traditional manual management is extremely challenging, time-consuming, and prone to errors. Self-management is a solution that has been suggested more recently as a possible answer to the increasing complexity in cloud computing.

    The Autonomic Computing Initiative (ACI), which was launched by IBM in 2001, is currently the most significant industrial initiative working toward the realization of self-management. The following four functional areas are defined by the ACI::

    Self-configuration

    Components that automatically configure themselves

    Self-healing

    Automatic identification and correction of errors, as well as automatic execution of all steps required to restore the system to its normal state of operation

    Self-optimization

    Automatic monitoring and control of resources to ensure that they are functioning at their highest potential in accordance with the requirements that have been set.

    Self-protection

    Identification and defense against arbitrary assaults in advance of their occurrence

    {End Chapter 1}

    Chapter 2: Provisioning (technology)

    In the field of telecommunications, the term provisioning refers to the process of preparing and outfitting a network so that it can offer new services to the customers who use it. In the context of telecommunications services for national security and emergency preparedness, provisioning is synonymous with initiation, and it encompasses modifying the status of an already existing priority service or capability.

    The provisioning of the customer's services to the network elements, which are various pieces of equipment connected in that network communication system, is what is meant when the term network provisioning or service mediation is discussed in the context of the telecommunications industry, where it is most commonly used. In most cases, this is accomplished through the use of network management database table mappings in telephony provisioning. It is necessary to have networking equipment, and its success is dependent on careful planning and design of the network.

    There is no way to differentiate between telecommunications services and higher level infrastructure in a modern signal infrastructure that uses information technology (IT) at every level. This is because there is no distinction between the two. As a result, provisioning refers to the process of configuring any necessary systems, providing users with access to data and technological resources, and being involved in all information-resource management at the enterprise level.

    In most companies, the Chief Information Officer is responsible for managing provisioning, which must always involve collaboration between the human resources and information technology departments:

    On the basis of a distinct user identity, allow users access to data repositories or grant authorization to various systems, network applications, and database types.

    hardware resources, such as computers, mobile phones, and pagers, which are suitable for their application.

    The monitoring of access rights and privileges is at the heart of the provisioning process, which serves to protect an enterprise's resources and the personal information of its users. It is a secondary responsibility, but it ensures compliance and reduces the systems' susceptibility to abuse and unauthorized access. Utilizing boot image control and various other strategies that significantly cut down on the total number of distinct configurations is one of its tertiary responsibilities. Another of its primary goals is to minimize the amount of custom configuration that is required.

    Provisioning is a topic that is frequently discussed in relation to other topics, such as virtualization, orchestration, utility computing, cloud computing, and open-configuration concepts and projects. For instance, the OASIS Provisioning Services Technical Committee (PSTC) defines an XML-based framework for exchanging user, resource, and service-provisioning information. This framework is referred to as SPML (Service Provisioning Markup Language), and it is intended to manage the provisioning and allocation of identity information and system resources within and between organizations..

    The process of SysOpping guarantees that the level of service will continue to meet or exceed the requirements even after provisioning has been completed. Therefore, provisioning only refers to the initialization or startup phase of the service operation, whereas systems administration is the ongoing support phase.

    Provisioning of one particular kind. The services that are assigned to the customer in the customer relationship management (CRM) system have to be provisioned on the network element that enables the service and gives the customer the ability to actually use the service. This is necessary in order to provide the customer with access to the service. It is not necessary that a one-to-one relationship exists between a service configured in the CRM and a service on the network elements; for instance, services such as Microsoft Media Server (mms:/) can be enabled by more than one network element.

    During the process of provisioning, the service mediation device translates the service and the parameters of the service that correspond to it into one or more services and parameters that are associated with the network elements that are being used. Provisioning logic is the name given to the algorithm that is utilized in the process of translating system services into network services.

    Your electronic invoice feeds from your carriers can be automatically downloaded directly into the core of the telecom expense management (TEM) software, and the software will immediately conduct an audit of each individual line item charge all the way down to the level of the User Support and Operations Center (USOC). The provisioning software will record each circuit number that is supplied by each of your carriers, and if

    Enjoying the preview?
    Page 1 of 1