The Lighter Side Of The Cloud – The Cloud Lecture
The Lighter Side Of The Cloud – Server Management
The Lighter Side Of The Cloud – Gaming
The Lighter Side Of The Cloud – Telecommute

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

A devoted group of researchers at North Carolina State University have painstakingly developed a novel software tool aimed at addressing performance disarrays in cloud computing systems. The tool functions to automatically classify and respond to potential network disruptions before they actually occur.

Cloud computing provides the freedom of creating numerous virtual machines provided to the end-users across a single computing platform – all that functions autonomously. Performance issues with such an approach are bound to occur. In case of a software glitch or a closely related hiccup, problems arising across a single effected virtual machine may end up bringing down the entire cloud down on its knees.

Determination of various contingencies across a system can be simplified by sensing and keeping a track of numerous machine related variables. The software does exactly that. By calculating the current network traffic, extent of memory consumption, CPU utilization, and several other parameters of data within a cloud computing infrastructure, the tool is able to estimate an effective measure of the overall system health. This renders the software flexible enough to formulate an adequate data-range characterization that can be safely considered as being normal. The processor usage, for instance, reflects the amount of computational power being required at any instant of time. The software outlines normal performance for every virtual machine in the cloud, and reports deviation of almost any sort. Based on the aforementioned information the tool predicts incongruities that might potentially affect the system’s capacity to provide service to users.

This particular approach is immensely beneficial in terms of associated benefits, including the all-important savings inherent with the alleviation of personnel training requirement. The software, being entirely autonomous depicts aberrant behavior on its own. In addition, the ability to predict anomalies is a feat that has never been achieved before. Not only that, upon sensing abnormal behavior in a virtual machine, it executes a pre-defined black box diagnostic test that determines which variables (memory usage, for instance) might be affected. The diagnostic data is then used to prompt the suitable prevention subroutine without making use of the user’s personal data in any form.

Helen Gu, co-author of the paper articulating this research marvel and an assistant professor at North Carolina State University explained: “If we can identify the initial deviation and launch an automatic response, we can not only prevent a major disturbance, but actually prevent the user from even experiencing any change in system performance.”

Most importantly, the software is not resource hungry (power in particular) and does not consume considerable amount of processor cycles to operate. It has the ability to fetch the preliminary data and classify normal behavior much quicker than the existing tactics. With CPU power consumption less than 1% of the total and a mere 16 megabytes of memory, the software is bound to pack a punch.

During the testing phase, the program recognized up to 98% of incongruities, which is the utmost as compared to existing approaches. It prompted a mere 1.7% of false alarms. Gu says: “And because the false alarms resulted in automatic responses, which are easily reversible, the cost of the false alarms is negligible.”

The software does sound like a real game-changer altogether. However, commercialization of the said research would eventually reveal the true benefits this tool has in store for the cloud computing industry – fingers crossed.

By Humayun Shahid

 

Best Practices for Cloud-Based Recovery

Download this Whitepaper today to learn more best practices for Cloud-Based Recovery.

Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

Sorry, comments are closed for this post.

Popular Archives

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Recent

Churning It Up In The Cloud

Churning It Up In The Cloud

Churning The Corner With SaaS Applications There’s plenty of research that backs up our reasoning for a move to the cloud. Forrester Research claims that the public cloud computing market will reach $191bn in 2020 (everyone else is doing it); Peer1Hosting claims that 49% of IT decision makers are doing it to reduce costs (everyone…

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising