Sivaram Gottimukkala - Morrisville NC, US Lap Huynh - Cary NC, US Dinakaran Joseph - Apex NC, US Michael Law - Morrisville NC, US Linwood Overby, Jr. - Raleigh NC, US Wesley Devine - Apex NC, US Michael Behrendt - Randersacker, DE Gerd Breiter - Wildberg, DE
Assignee:
International Business Machines Corporation - Armonk NY
A computer-implemented method of enabling security in network resources provisioned as part of a service landscape instance is provided. The method includes initiating an orchestration process for creating a landscape service instance to provide services to a service subscriber over a data communications network. The method further includes deriving from the orchestration process at least one parameter, and generating at least one security configuration profile based upon the at least one parameter for at least one system of the landscape service instance.
Securing Live Migration Of A Virtual Machine Within A Service Landscape
Wesley M. Devine - Apex NC, US Sivaram Gottimukkala - Morrisville NC, US Lap T. Huynh - Cary NC, US Dinakaran Joseph - Apex NC, US Michael S. Law - Morrisville NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/00 G06F 21/00 G06F 9/455
US Classification:
726 1, 726 3, 718 1
Abstract:
In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM cna be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.
Computing Environment Configuration And Initialization
Rohith K. Ashok - Apex NC, US Michael J. Burr - Cary NC, US Christine B. Chato - Durham NC, US Adam R. Geiger - Cary NC, US Matt R. Hogstrom - Cary NC, US Michael S. Law - Morrisville NC, US Matthew J. Sheard - Morrisville NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709201
Abstract:
According to one aspect of the present disclosure a method and technique for automatically configuring a set of resources for deployment as a computing environment is disclosed. The method includes: executing a configuration management application, the configuration management application configured to automatically connect to and discover each hardware element forming a networked set of resources; determine whether each discovered hardware element is specified for the computing environment; responsive to determining that each discovered hardware element is specified for the computing environment, determine a configuration setting for each respective discovered hardware element; responsive to determining that the configuration setting of the discovered hardware element conflicts with a desired configuration setting for deployment of the discovered hardware element, automatically configure the discovered hardware element to the desired configuration setting; and automatically load and configure a management interface to enable deployment of the networked set of resources as a computing environment.
- Armonk NY, US Nataraj Nagaratnam - Cary NC, US Dinakaran Joseph - Apex NC, US Michael S. Law - Morrisville NC, US Priyank Narvekar - St. John's, CA Hillery Hunter - Chappaqua NY, US
International Classification:
G06F 21/52 G06F 21/62
Abstract:
A method, apparatus, system, and computer program product for configuring a computing environment. A configuration profile is identified by a computer system for the computing environment that is to be deployed in which the computing environment meets a security policy to run an application in the computing environment. A determination is made, by the computer system, as to whether the configuration profile for the computing environment meets the security policy for running the application in the computing environment. The configuration profile for the computing environment is deployed, by the computer system, to configure the computing environment for the application in response to the configuration profile meeting the security policy.
Securing Live Migration Of A Virtual Machine Within A Service Landscape
- Armonk NY, US Sivaram Gottimukkala - Morrisville NC, US Lap T. Huynh - Cary NC, US Dinakaran Joseph - Apex NC, US Michael S. Law - Morrisville NC, US Linwood H. Overby - Raleigh NC, US
International Classification:
G06F 9/455 G06F 9/455 G06F 9/48
Abstract:
In an embodiment of the invention, a method for secure live migration of a virtual machine (VM) in a virtualized computing environment can include selecting a VM in a secure virtualized computing environment for live migration to a different virtualized computing environment and blocking data communications with the selected VM and other VMs in the secure virtualized computing environment. The selected VM can be live migrated to the different virtualized computing environment and the VM can be restarted in the different virtualized computing environment. Notably, a secure communicative link can be established between the restarted VM and at least one other of the VMs in the secure virtualized computing environment. Finally, data communications between the restarted VM and the at least one other of the VMs can be enabled over the secure communicative link.
Emulating Multiple Universal Serial Bus (Usb) Keys So As To Efficiently Configure Different Types Of Hardware
INTERNATIONAL BUSINESS MACHINES CORPORATION - , US Michael J. Burr - Cary NC, US Hugh E. Hockett - Raleigh NC, US Michael S. Law - Morrisville NC, US Matthew J. Sheard - Morrisville NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 13/10
US Classification:
710 8
Abstract:
A method, system and computer program product for efficiently configuring different types of hardware components. A computing device is connected to a hardware component to be configured. The computing device detects the type of the hardware component upon being connected to the hardware component. The computing device then identifies a profile from among multiple profiles associated with the detected type of hardware component, where each profile contains a configuration file(s) for configuring its associated type of hardware component. Upon identifying the profile associated with the connected hardware component, the computing device emulates a Universal Serial Bus (USB) key presenting the configuration file(s) contained in the identified profile to the detected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the computing device emulate multiple USB keys.
Universal Serial Bus (Usb) Key Functioning As Multiple Usb Keys So As To Efficiently Configure Different Types Of Hardware
- Armonk NY, US Michael J. Burr - Cary NC, US Hugh E. Hockett - Raleigh NC, US Michael S. Law - Morrisville NC, US Matthew J. Sheard - Morrisville NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 13/10
US Classification:
710 8
Abstract:
A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.
Universal Serial Bus (Usb) Key Functioning As Multiple Usb Keys So As To Efficiently Configure Different Types Of Hardware
- Armonk NY, US Michael J. Burr - Cary NC, US Hugh E. Hockett - Raleigh NC, US Michael S. Law - Morrisville NC, US Matthew J. Sheard - Morrisville NC, US
International Classification:
G06F 13/10
US Classification:
710 8
Abstract:
A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys.
Michael M Law MD 10941 Raven Ridge Rd Suite 103, Raleigh, NC 27614 9192560900 (Phone)
Certifications:
Plastic Surgery, 2012
Awards:
Healthgrades Honor Roll
Languages:
English Spanish
Philosophy:
My personal 'aesthetic sensibility' is this: A good aesthetic surgery result looks natural, not 'done'. The ideal way for a prospective plastic surgery patient to decide to 'have something done,' and to get that natural result, is to get the best information available from a source with experience and appropriate credentials whom you trust with your well-being. This is what I do my best to provide for every individual that I meet in consultation.
Education:
Medical School Emory University School Of Medicine Graduated: 1988 Medical School UCLA Medical Center Graduated: 1988 Medical School Usc University Hospital Graduated: 1988 Medical School University Of North Carolina Chapel Hill Graduated: 1988
Michael M Law MD 10941 Raven Rdg Rd STE 103, Raleigh, NC 27614 9192560900 (phone), 9192560902 (fax)
Education:
Medical School Emory University School of Medicine Graduated: 1988
Languages:
English
Description:
Dr. Law graduated from the Emory University School of Medicine in 1988. He works in Raleigh, NC and specializes in Plastic Surgery. Dr. Law is affiliated with North Carolina Specialty Hospital and Rex Hospital.
Sunderland College - Leturer Middlesbrough College - Lecturer (2009)
Education:
Farringdon Community Sports College, City of Sunderland College, University of Sunderland - Journalism, University of Sunderland - Post-Compulsory Education Training
Tagline:
Hi this page in theory will contain links to helpful sites and Media and Film related news.
Michael Law
Lived:
Huntersville, NC Westmont, IL Griffith, IN Lafayette, IN Batesville, IN Houston, TX Atlanta, GA
About:
I work, sleep and study Cisco.
Tagline:
CiscoFreak
Bragging Rights:
I can reach to the top shelf
Michael Law
Work:
United States Navy - Officer
Education:
Brigham Young University
Michael Law
Work:
Can't at the this time :-(
Education:
B.W.H - High school
Michael Law
Work:
Schulich School of Business, York University - Senior Information Systems Specialist (2010) Schulich School of Business, York University - Lotus Notes / Domino Administrator (2001-2010)