Restricting resources consumed by ghost agents
First Claim
Patent Images
1. A method for restricting resources consumed by ghost agents comprising the steps of:
- associating a ghost agent with a host;
ascertaining a resource utilization for said ghost agent and said host combined;
comparing said resource utilization to a usage threshold; and
determining whether at least one operation of said ghost agent is to be executed responsive to said comparing step.
1 Assignment
0 Petitions
Accused Products
Abstract
One aspect of the present invention can include a method for restricting resources consumed by ghost agents. The method can include the step of associating a ghost agent with a host. A resource utilization value can be ascertained for the ghost agent and the host combined. The ascertained resource utilization value can be compared with a usage threshold. A determination can be made as to whether operations of the ghost agent are to be executed based upon the previous comparison.
30 Citations
20 Claims
-
1. A method for restricting resources consumed by ghost agents comprising the steps of:
-
associating a ghost agent with a host;
ascertaining a resource utilization for said ghost agent and said host combined;
comparing said resource utilization to a usage threshold; and
determining whether at least one operation of said ghost agent is to be executed responsive to said comparing step. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A ghost agent comprising:
-
an interface for associating said ghost agent with a host;
a ghost log configured to record data relating to said host; and
a ghost controller configured to compare resource utilization levels with established thresholds, and wherein said ghost agent automatically moves within a grid environment to follow movements of said host. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A machine-readable storage having stored thereon, a computer program having a plurality of code sections, said code sections executable by a machine for causing the machine to perform the steps of:
-
associating a ghost agent with a host;
ascertaining a resource utilization for said ghost agent and said host combined;
comparing said resource utilization to a usage threshold; and
determining whether at least one operation of said ghost agent is to be executed responsive to said comparing step. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system for restricting resources consumed by ghost agents comprising the steps of:
-
means for associating a ghost agent with a host;
means for ascertaining a resource utilization for said ghost agent and said host combined;
means for comparing said resource utilization to a usage threshold; and
means for determining whether at least one operation of said ghost agent is to be executed responsive to said comparing step.
-
Specification