Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

Towards Intelligent Cloud Diagnostics: Well Researched Software Marvel

A devoted group of researchers at North Carolina State University have painstakingly developed a novel software tool aimed at addressing performance disarrays in cloud computing systems. The tool functions to automatically classify and respond to potential network disruptions before they actually occur.

Cloud computing provides the freedom of creating numerous virtual machines provided to the end-users across a single computing platform – all that functions autonomously. Performance issues with such an approach are bound to occur. In case of a software glitch or a closely related hiccup, problems arising across a single effected virtual machine may end up bringing down the entire cloud down on its knees.

Determination of various contingencies across a system can be simplified by sensing and keeping a track of numerous machine related variables. The software does exactly that. By calculating the current network traffic, extent of memory consumption, CPU utilization, and several other parameters of data within a cloud computing infrastructure, the tool is able to estimate an effective measure of the overall system health. This renders the software flexible enough to formulate an adequate data-range characterization that can be safely considered as being normal. The processor usage, for instance, reflects the amount of computational power being required at any instant of time. The software outlines normal performance for every virtual machine in the cloud, and reports deviation of almost any sort. Based on the aforementioned information the tool predicts incongruities that might potentially affect the system’s capacity to provide service to users.

This particular approach is immensely beneficial in terms of associated benefits, including the all-important savings inherent with the alleviation of personnel training requirement. The software, being entirely autonomous depicts aberrant behavior on its own. In addition, the ability to predict anomalies is a feat that has never been achieved before. Not only that, upon sensing abnormal behavior in a virtual machine, it executes a pre-defined black box diagnostic test that determines which variables (memory usage, for instance) might be affected. The diagnostic data is then used to prompt the suitable prevention subroutine without making use of the user’s personal data in any form.

Helen Gu, co-author of the paper articulating this research marvel and an assistant professor at North Carolina State University explained: “If we can identify the initial deviation and launch an automatic response, we can not only prevent a major disturbance, but actually prevent the user from even experiencing any change in system performance.”

Most importantly, the software is not resource hungry (power in particular) and does not consume considerable amount of processor cycles to operate. It has the ability to fetch the preliminary data and classify normal behavior much quicker than the existing tactics. With CPU power consumption less than 1% of the total and a mere 16 megabytes of memory, the software is bound to pack a punch.

During the testing phase, the program recognized up to 98% of incongruities, which is the utmost as compared to existing approaches. It prompted a mere 1.7% of false alarms. Gu says: “And because the false alarms resulted in automatic responses, which are easily reversible, the cost of the false alarms is negligible.”

The software does sound like a real game-changer altogether. However, commercialization of the said research would eventually reveal the true benefits this tool has in store for the cloud computing industry – fingers crossed.

By Humayun Shahid

 

Best Practices for Cloud-Based Recovery

Download this Whitepaper today to learn more best practices for Cloud-Based Recovery.

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud You hear it over and over again: The future of computing is in the cloud. Businesses should be moving to the cloud. If you’re not in the cloud, you’re behind the times. But trusting your essential data to a cloud may sound like a dubious proposition. Below are some of the…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…