Asserting reliable convergence for configuration management scripts

O Hanappi, W Hummer, S Dustdar - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
The rise of elastically scaling applications that frequently deploy new machines has led to
the adoption of DevOps practices across the cloud engineering stack. So-called …

An approach to understanding policy based on autonomy and voluntary cooperation

M Burgess - … Workshop on Distributed Systems: Operations and …, 2005 - Springer
Presently, there is no satisfactory model for dealing with political autonomy of agents in
policy based management. A theory of atomic policy units called 'promises' is therefore …

[책][B] Analytical network and system administration: managing human-computer networks

M Burgess - 2004 - books.google.com
Network and system administration usually refers to the skill of kee** computers and
networks running properly. But in truth, the skill needed is that of managing complexity. This …

On the theory of system administration

M Burgess - Science of Computer Programming, 2003 - Elsevier
This paper describes a mean field approach to defining and implementing policy-based
system administration. The concepts of regulation and optimization are used to define the …

SLA design from a business perspective

J Sauvé, F Marques, A Moura, M Sampaio… - Ambient Networks: 16th …, 2005 - Springer
A method is proposed whereby values for Service Level Objectives (SLOs) of an SLA can be
chosen to reduce the sum IT infrastructure cost plus business financial loss. Business …

Why Order Matters: Turing Equivalence in Automated Systems Administration.

S Traugott, L Brown - LISA, 2002 - usenix.org
Hosts in a well-architected enterprise infrastructure are self-administered; they perform their
own maintenance and upgrades. By definition, self-administered hosts execute self …

On the algebraic structure of convergence

A Couch, Y Sun - … Workshop on Distributed Systems: Operations and …, 2003 - Springer
Current self-healing systems are built from “convergent” actions that only make repairs when
necessary. Using an algebraic model of system administration, we challenge the traditional …

Configurable immunity for evolving human–computer systems

M Burgess - Science of Computer Programming, 2004 - Elsevier
The immunity model, as used in the GNU cfengine project, is a distributed framework for
performing policy conformant system administration, used on hundreds of thousands of Unix …

An Analysis of RPM Validation Drift.

J Hart, J D'Amelia - LISA, 2002 - usenix.org
Experiments that analyze dependencies in RedHat Linux and RpmFind. net show disturbing
conflicts and overlaps between software packages that result in installing multiple differing …

[HTML][HTML] On observed reproducibility in network configuration management

A Couch, Y Sun - Science of Computer Programming, 2004 - Elsevier
A rigorous language for discussing the issue of configuration management is currently
lacking. To this end, we develop a simple state machine model of configuration …