41
1 © 2002 IBM Corporation Autonomic Computing Alan G. Ganek Vice President IBM Autonomic Computing http://www.ibm.com/ autonomic/

Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

Embed Size (px)

Citation preview

Page 1: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

1 © 2002 IBM Corporation

Autonomic Computing

Alan G. GanekVice PresidentIBM Autonomic Computing

http://www.ibm.com/autonomic/

Page 2: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

2 © 2002 IBM Corporation

xOn Demand EraOn Demand Era

Responsive in real-time

Variable cost structures

Focused on what’s core and differentiating

Resilient around the world, around the clock

IntegratedOpenVirtuala

Page 3: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

3 © 2002 IBM Corporation

CIO’s Speak Out

“Most of my costs are really pure maintenance and operations – keeping the processes running that keep the ship afloat. Our development budget suffers.”

“Y2K and 9/11 have forced us to look at what we have – and we have too much complexity.”

Page 4: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

4 © 2002 IBM Corporation

Complex heterogeneous infrastructures are a reality!

Directory Directory and Security and Security

ServicesServicesExistingExisting

ApplicationsApplicationsand Dataand Data

BusinessBusinessDataData

DataDataServerServer

WebWebApplicationApplication

ServerServer

Storage AreaStorage AreaNetworkNetwork

BPs andBPs andExternalExternalServicesServices

WebWebServerServer

DNSDNSServerServer

DataData

Dozens of systems and applications

Hundreds of components

Thousands of tuning

parameters

Page 5: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

5 © 2002 IBM Corporation

What Are Some e-business IT Challenges Your Customers Face Today?

WorkloadsWorkloads

PricePrice

Complexity

Skills

Resiliency

Return on Investment

Price performance gains in technology are more than offset by scale and complexity of deployments

Page 6: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

6 © 2002 IBM Corporation

Frees your business to focus on business, not

infrastructure

What Is The Autonomic Computing Vision?

“Intelligent” open systems that…

Manage complexity

“Know” themselves

Continuously tune themselves

Adapt to unpredictable conditions

Prevent and recover from failures

Provide a safe environment

        

Page 7: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

7 © 2002 IBM Corporation

Increased return on IT investment (ROI) Lower administrative costs

Improved utilization of assets

IT alignment with business goals

Increased performance

Improved resiliency: Quality of Service (QoS) Reduced downtime

Improved security

Accelerated implementation of new capabilities: Time to Value (TTV)

Faster / more accurate installation of new capabilities

Reduced test cycles

Autonomic Computing helps CIOs, CTOs, and IT managers to realize:

Page 8: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

8 © 2002 IBM Corporation

Self-managing systems that …

Increase Responsiveness

Adapt to dynamically changing environments

Business Resiliency

Discover, diagnose, and act to prevent disruptions

Operational Efficiency

Tune resources and balance workloads to maximize use of IT resources

Secure Information and Resources

Anticipate, detect, identify, and protect against attacks

Page 9: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

9 © 2002 IBM Corporation

Basic description

HWdetection

Expertheuristics

Configurationmodel

Configurationsettings

Speeds deploymentImproves performanceFrees up resource

Basic description

HWdetection

Expertheuristics

Configurationmodel

Configurationsettings

Per

form

ance

as

Per

cen

tag

e o

f D

BA

tu

ned

So

luti

on

0%

50%

100%

150%

200%

250%

DBA tuned

Advisor as % of tuned

Default configuration

OLTP - 32 OLTP - 64 Cust #2 Cust #1

DB2 Configuration Advisor Results

Self-Configuring Example: DB2 Configuration Advisor

Page 10: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

10 © 2002 IBM Corporation

Problem Problem DatabaseDatabase

Electronic Response

Dispatch CEService agent

detects a hardware problem

Voice Support

Sends error symptomsto IBM

Sends Symptoms

for Diagnosis

DataDataCatcherCatcher

AnalysisAnalysis

ofof

Problem Problem RecordRecord

Fully Automatic

Faster problem resolutionHigher availability/resiliencyLower maintenance cost

""IBM's eService Agent allows me to sleep soundlyknowing the system is being monitored 24x7."

Alex Tambellini, 7-Eleven Stores Pty Ltd.

Self-Healing Example: IBM Electronic Service Agent

Page 11: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

11 © 2002 IBM Corporation

Self Optimizing: Enterprise Workload Management

InternetInternet

Appliance Appliance ServersServers

Web Web Application Application

ServersServersData and Data and

Transaction Transaction ServersServers

Internet/Internet/ExtranetExtranet

Business Business PartnersPartners

Self-tuning, end-to-end Self-tuning, end-to-end performance managementperformance management

Dynamic allocation of network resourcesDynamic allocation of network resources Workload balancing & routingWorkload balancing & routing Cross platform reportingCross platform reporting Policy-based for various classes of users & Policy-based for various classes of users &

applicationsapplications

Heterogeneous, distributed Components working together

Open standards based instrumentation

Page 12: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

12 © 2002 IBM Corporation

Automate incident responseProtect systems and dataHelp prevent service disruptions

Risk MgrIDS Rules

Event Database

CorrelationEngine

Intrusion Detection System (IDS)

RouterWebServer

Firewall

ApplicationServer Intrusion

Detection

InternetIntranet

RiskManagerSecurity Event

ApplicationServer

"The Tivoli security management software portfolio is helping our clients extend their businesses to the

Internet while providing security and privacy..."Mark Ford, Principal

Deloitte & Touche

Self-Protecting Example: IBM Tivoli Risk Manager

Rapid / automated analysisof complex situations

Page 13: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

13 © 2002 IBM Corporation

Manual Autonomic

Ben

efi

tsS

kill

sC

har

acte

rist

ics

ManagedLevel 2

PredictiveLevel 3

AdaptiveLevel 4

AutonomicLevel 5

Evolving to Autonomic Computing

BasicLevel 1

Multiple sources of

system generated data

Requires extensive,

highly skilled IT staff

Basic Requirements

Met

Page 14: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

14 © 2002 IBM Corporation

Manual Autonomic

Ben

efi

tsS

kill

sC

har

acte

rist

ics

BasicLevel 1

PredictiveLevel 3

AdaptiveLevel 4

AutonomicLevel 5

Evolving to Autonomic Computing

Multiple sources of

system generated data

Requires extensive,

highly skilled IT staff

Basic Requirements

Met

ManagedLevel 2

Consolidationof data and

actions through

managementtools

IT staffanalyzes andtakes actions

Greater system awareness

Improved productivity

Page 15: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

15 © 2002 IBM Corporation

Manual Autonomic

Ben

efi

tsS

kill

sC

har

acte

rist

ics

BasicLevel 1

ManagedLevel 2

AdaptiveLevel 4

AutonomicLevel 5

Evolving to Autonomic Computing

Multiple sources of

system generated data

Requires extensive,

highly skilled IT staff

Basic Requirements

Met

Consolidationof data and

actions through

managementtools

IT staffanalyzes andtakes actions

Greater system awareness

Improved productivity

PredictiveLevel 3

Systemmonitors,

correlates and recommends

actions

IT staffapproves and

initiates actions

Reduced dependency on

deep skills

Faster/better decision making

Page 16: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

16 © 2002 IBM Corporation

Manual Autonomic

Ben

efi

tsS

kill

sC

har

acte

rist

ics

BasicLevel 1

ManagedLevel 2

PredictiveLevel 3

AutonomicLevel 5

Evolving to Autonomic Computing

Multiple sources of

system generated data

Requires extensive,

highly skilled IT staff

Basic Requirements

Met

Consolidationof data and

actions through

managementtools

IT staffanalyzes andtakes actions

Greater system awareness

Improved productivity

Systemmonitors,

correlates and recommends

actions

IT staffapproves and

initiates actions

Reduced dependency on

deep skills

Faster/better decision making

AdaptiveLevel 4

System monitors,

correlates and takes action

IT staff manages performance against SLAs

Balanced human/system

interaction

IT agility and resiliency

Page 17: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

17 © 2002 IBM Corporation

Manual Autonomic

Ben

efi

tsS

kill

sC

har

acte

rist

ics

BasicLevel 1

ManagedLevel 2

PredictiveLevel 3

AdaptiveLevel 4

Evolving to Autonomic Computing

Multiple sources of

system generated data

Requires extensive,

highly skilled IT staff

Basic Requirements

Met

Consolidationof data and

actions through

managementtools

IT staffanalyzes andtakes actions

Greater system awareness

Improved productivity

Systemmonitors,

correlates and recommends

actions

IT staffapproves and

initiates actions

Reduced dependency on

deep skills

Faster/better decision making

System monitors,

correlates and takes action

IT staff manages performance against SLAs

Balanced human/system

interaction

IT agility and resiliency

AutonomicLevel 5

Integrated components dynamically managed by

business rules/policies

IT staff focuseson enabling

business needs

Business policy drives IT

management

Business agility and resiliency

Page 18: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

18 © 2002 IBM Corporation

Architecture Framework

Common Autonomic construct for all system elements

Distributed components and systems integrated as one virtual operating system

Web Services Interfaces to elements

Web Services

System Mgmt Database

ISVSolutions

Servers Storage Network

Customer Applications

Application Servers

OGSAMeta OS Services

Industry standards arekey to the success of

Autonomic Computing

A Holistic Approach to Autonomic Computing

Architecture Framework

Page 19: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

19 © 2002 IBM Corporation

Core Building Blocks for an open architecture

Monitor Execute

Analyze Plan

Knowledge

Element

Sensors Effectors

An autonomic element contains a continuous control loop that monitors activities and takes actions to adjust the system to meet business objectives

Autonomic elements learn from past experience to build action plans

Managed elements need to be instrumented consistently

Page 20: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

20 © 2002 IBM Corporation

Autonomic Architecture – SLA example

Customer Relationship Solutions

Collect runtime metrics

Monitor

Project SLAViolations

Analyze

Create CorrectiveAction plan

Plan

Execute plan before violations occur

Execute

Sensors EffectorsSLA

Example

An autonomic element is a function in a system that monitors activities and adjusts the system to meeting some goal.

Element

Monitor

Analyze

Sensors

Execute

Plan

Effectors

Knowledge

Autonomic Element

Au

ton

omic

Man

ager

Man

aged

Ele

men

tSensors Effectors

Page 21: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

21 © 2002 IBM Corporation

Autonomic Manager Substructure

Alerts, events and problem analysis request interface

SLA/Policy interface, interprets and translates into "control logic"

Plan

Policy Transforms

Plan Generators

Policy InterpreterAnalyze

Execute

Service Dispatcher

Distribution Engine

Scheduler Engine

Workflow Engine

Monitor

Metric Managers

Filters

Simple Correlators

Knowledge

Policy

CalendarTopology

Recent Activity Log

Sensors Effectors

Rules Engines

Analysis Engines

Policy Validations

Policy Resolution

Page 22: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

22 © 2002 IBM Corporation

Management and Manageability

Elements

M

AE

P

K

S E

M

AE

P

K

S E

A Touch Point Autonomic Manager is dedicated to a particular elements.

M

AE

P

K

S E M

AE

P

K

S E

M

AE

P

K

S E

Management tools deliver autonomic capability by implementing complete control loops.Management…

Capabilities that perform the work for managing IT resources.

Manageability... Instrumentation that make a particular IT resource manageable.

Risk Management

Workload ManagementConfiguration

Management

Page 23: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

23 © 2002 IBM Corporation

Multiple Contexts for Autonomic Behavior

System Elements(Intra-element

self-management)

Groups of Elements

(Inter-elementself-management)

Business Solutions(Business Policies,

Processes, Contracts)

ServerFarm

EnterpriseNetwork

StoragePool

Customer Relationship Management

EnterpriseResourcePlanning

Servers StorageNetworkDevices Middleware Database Applications

Page 24: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

24 © 2002 IBM Corporation

Autonomic Computing requires some core, foundational technologies

Enabled capabilities

Core technologies

Administrative Console

Policy Infrastructure

Data Collection

(Logging / Tracing)

Infrastructure

Provisioning

Install / Dependency

Management

Heterogeneous Workload Management

Solution Management

Policy-based Management

End-to-end Problem Determination

Automated Root Cause AnalysisAuto-Update

Identity and Security Management

Auto-Detection

Dynamic Provisioning

Page 25: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

25 © 2002 IBM Corporation

Integrated Solutions Console for Common System Administration

Value: One consistent user interface across product

portfolio

Common runtime infrastructure and development tools based on industry standards, component reuse

Provides a presentation framework for other autonomic core technologies

...n

Customer pain point:Complexity of operations

Standards-based: J2EE, JSR168

Page 26: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

26 © 2002 IBM Corporation

Log and Trace Tool for Problem Determination

Value: Introduces standard interfaces and formats

for logging and tracing, key to building self-healing, self-optimizing autonomic system capabilities

Central point of interaction with multiple data sources

Correlated views of data

Reduced time spent in problem analysis

Analysis Engine

Data Exploiters

Data Producers

ISC

StandardInterface

LoggingAgent

Common situations and data model

BLog

Embedded adapter

....

Data Store

LoggingAgent

Common situations and data model

eServer

Log

Embedded adapter

LoggingAgent

Common situations and data model

ALog

Embedded adapter

Collector Collector....

Parser

Parser

Parser

Viewer....

Customer pain point:Difficulty in analyzing problems in multi-component systems

Standards-based:JSR47, Apache

Page 27: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

27 © 2002 IBM Corporation

Install/Config Package for Solution Install

Value: One consistent software installation technology across

all products

Consistent and up-to-date configuration and dependency data, key to building

self-configuring autonomic systems

Reduced deployment time with less errors

Reduced software maintenance time, improved analysis of failed system components

Component-based install for IBM and non-IBM products

Install package developer

Meta-DataNameUUIDVendorVersion

Configuration PropertiesInstall InputRuntime Attributes

DependenciesHW, SW, OS, ConfigurationExtensions

Install ActionsExtensions

Verification ActionsExtensions

Configuration ActionsExtensions

Package Structure

Product Files (binaries, etc.)

Product Files (binaries, etc.)

Deployment Descriptor

Deployment Descriptor

Verification Actions

Verification Actions

DependencyCheckers

DependencyCheckers

Custom Extensions

InstallActions

InstallActions

Configuration Actions

Configuration Actions

GUI Interface

GUI Interface

Customer pain point:Difficulty of deployment in complex systems

Standards-based:OGSA, Web Services

Partnering with InstallShield

Page 28: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

28 © 2002 IBM Corporation

Policy Tools for Policy-based Management

Value:Uniform cross-product policy definition

and management infrastructure, needed for delivering system-wide self-management capabilities

Simplifies management of multiple products; reduced TCO

Easier to dynamically change configuration in on-demand environment

Customer pain point:Complexity of product and systems management

Standards-based:DMTF, OASIS, OGSA

Adaptation

Definition

Validation

Local Reposit

ory

Distribution

Enforcement

Point

Push or pull

Push or pull

Activate

Implement

MON ITOR

Facts

Analysis

Resource

……

Enforcement

Point

Resource

Resource

Page 29: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

29 © 2002 IBM Corporation

Policy is use to configure the system.

Measurable Intent

Specifications to describe observable behavior or objective.

Scope Specifications to identify what is or is not subject to the intent.

Pre-Conditions

Specifications to express when a policy is to be applied or is active.

BusinessValue

Specifications to express utility functions to make economic trade offs

Policy is a set of behavioral constraints and preferences that influences the decisions made by an autonomic manager.

Element

M

A

S

E

P

E

K

S E

“Plan” is the primary consumer of policy. It configures “M”, “A”, and “E” to meet objectives.

“Analyze” determine whether a policy is met or not.

Bus

ines

s V

alue

Pre

-C

ondi

tion

Scope

Measurable Intent

Page 30: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

30 © 2002 IBM Corporation

Business Workload Manager for Heterogeneous Workload Mgmt

Value:Response time measurement and

reporting of transaction processing segments

Dynamic learning of transaction workflow topology through servers and middleware

Drill-down through service class reporting to identify bottleneck processes

Tivoli Management ServereWLM integratedAll platforms (except OS/400)

Tivoli UIWeb Browser / ISCAll UI platforms

Coarse-Grained ManagementWindowsLinux / IntelSolarisLinux / z

Tivoli Agent - Detailed ReportingAIXz/OSOS/400WindowsLinux / IntelSolarisLinux / z

Customer pain point: Unable to definitively determine cause of bottleneck in system Standards-based:

ARM 4.0

Page 31: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

31 © 2002 IBM Corporation

Technologies for Implementing Autonomic Managers

Value: Components to simplify the incorporation of autonomic functions

into applications Building blocks for self-management

Monitoring, analysis, planning and execution components

Including autonomic computing technologies, grid tools, and services

PluggableDefines interfaces and provides implementations for each major toolkit component

Detailed examples and documentation for all components A complete implementation of a null autonomic manager which

can be extended through inheritance

Customer pain point: How to implement end-to-end autonomic solutions

Standards-based:OGSA, W3C

Page 32: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

32 © 2002 IBM Corporation

Putting It All Together – Technology Preview

Problem addressed: IT usage today has moved from static planned systems to e-business dynamic load

Provide dynamic surge protection: Monitors the response time of current users

Detects a rising response time in real time

Identifies type of extra load, validates surge or even predicts seasonal type peak

Adds capacity when it reasonably (intelligently) thinks it has to sustain « something bigger »

Releases capacity when the peak is over

Demo

Page 33: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

33 © 2002 IBM Corporation

Few minutes later…

An important scenario: Workload surge

Systems can go from steady state … Systems can go from steady state …

Internet

to overloaded without to overloaded without warning warning

Page 34: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

34 © 2002 IBM Corporation

Autonomic Computing: Dynamic Surge Protection

DatabaseWAS

Driver (simulates Internet in/out)

Surge Button

MonitoringConfiguration management

Sensor Effector

ControllerForecaster

Performance Modeler

Statistics /Knowledge

Element

Monitor

Analyze (Forecaster)

Sensors

Execute(Controller)

Plan(Perf Modeler)

Effectors

Knowledge

Page 35: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

35 © 2002 IBM Corporation

Response Time

Actual BOPS

Predicted BOPS

#Active Servers

#Requested Servers

11. Steady State

Page 36: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

36 © 2002 IBM Corporation

2. Monitor, Detect Surge

Response Time

Actual BOPS

Predicted BOPS

#Active Servers

#Requested Servers

1 2

Page 37: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

37 © 2002 IBM Corporation

3. Forecast, Provision Servers

Response Time

Actual BOPS

Predicted BOPS

#Active Servers

#Requested Servers

1 21 2 3

Page 38: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

38 © 2002 IBM Corporation

Response Time

Actual BOPS

Predicted BOPS

#Active Servers

#Requested Servers

4. Monitor, Remove Servers1 2 43

Page 39: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

39 © 2002 IBM Corporation

Homework

Autonomic computing systems are self managing and always available, analogous to the human autonomic nervous system depicted abstractly on the cover. Papers in this issue describe a variety of research projects in which the concepts of autonomic computing are being developed.

http://www.research.ibm.com/journal/sj42-1.html

Page 40: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

40 © 2002 IBM Corporation

Continuing the evolution of e-business

The journey has started... IBM is leading the way

The roadmap has been defined

Products and services are available today

Exciting new technologies based on open standards will increase the momentum

IBM customer and partner collaboration is key

Watch this space....!

Freeing customers to focus on their business instead of

their infrastructure

Page 41: Title/subtitle/confidentiality line: 10pt Arial Regular, white Maximum length: 1 line Information separated by vertical strokes, with two spaces on either

41 © 2002 IBM Corporation

Autonomic Computing

Alan G. GanekVice PresidentIBM Autonomic Computing

http://www.ibm.com/autonomic/