Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Constantin M. Adam.
network operations and management symposium | 2014
Sai Zeng; Constantin M. Adam; Frederick Y. Wu; Shang Guo; Yaoping Ruan; Cashchakanithara Venugopal; Rajeev Puri
Endpoint management, including patching, health checking, configuration etc., is a key function for data center and cloud management. Managing multiple nodes through automation tools or scripts significantly increases efficiency. However, the risks of adverse impact due to excessive privilege or human error may propagate to a large pool of endpoints and lead to massive service disruptions and SLA (Service Level Agreement) violations. In this paper, we present a system that proactively and systematically manages the risk throughout the lifecycle phases of automation. We present a prototype implementation consisting of an authorization mechanism that guarantees the right level of eligibility and privilege of accessing the automation content (during the deployment stage), and an execution validator that controls the risk of human error which may cause massive damage to the infrastructure (during execution of the automation content). Our current implementation has been deployed to more than a dozen customer environments and achieved an efficiency gain of 58% with high execution accuracy.
international conference on service oriented computing | 2017
Katharina Gschwind; Constantin M. Adam; Sastry S. Duri; Shripad Nadgowda; Maja Vukovic
In this paper, we argue that deploying applications inside minimal runtime environments, which only contain the files necessary and sufficient for the application to run, can cut down the operating costs, specifically the costs for ensuring the application security and compliance. We identify a way to deliver minimal runtimes as Docker containers built from scratch. We describe a use case where minimal runtimes simplify the service maintenance operations, by reducing the number of updates for fixing security vulnerabilities.
network operations and management symposium | 2014
Shihabur Rahman Chowdhury; Constantin M. Adam; Frederick Y. Wu; John J. Rofrano; Raouf Boutaba
In this paper, we investigate the benefits of adding autonomic capabilities inside the operating system. We have developed and implemented a solution that focuses on three use cases (continuous file permission compliance, dynamic disk cleanup, and accidental removal protection) for the file system, and encapsulates all the respective file system monitoring, troubleshooting and error remedial operations in a Linux kernel module. The main benefits of this approach are the capability to detect issues instantly when they occur, and fix these issues transparently, with the invoking applications being unaware of their occurrence. These capabilities are not present in external agent architectures, including contemporary configuration management systems, like Puppet, Chef, or CFEngine. We have built a prototype and evaluated the performance of the most resource intensive use case, dynamic disk cleanup, using the FileBench file system benchmarking tool.
international conference on service oriented computing | 2017
Constantin M. Adam; Nikos Anerousis; Muhammed Fatih Bulut; Robert Filepp; Anup K. Kalia; Brian Peterson; John J. Rofrano; Maja Vukovic; Jin Xiao
We present a framework for automating change and service request management, a process that has remained almost entirely human-centric, despite the fact that it involves complex workflows, takes a significant amount of time, and is prone to errors. We extend previous work on modeling process complexity to evaluate the impact of automating business constraints (such as policy approvals and entitlements). Our results indicate that automation eliminates a significant amount of operational complexity, reducing it by \(68\%\) compared to the Information Technology Infrastructure Library (ITIL) guidelines, and by \(80\%\) compared to actual client processes. Automation also reduces, between \(55\%\) and \(82\%\) for different client accounts, the average time that elapses from the moment that a change request is received until it starts executing.
Archive | 2006
Constantin M. Adam; Giovanni Pacifici; Michael J. Spreitzer; Malgorzata Steinder; Chunqiang Tang
Archive | 2008
Constantin M. Adam; Michael J. Spreitzer; Malgorzata Steinder; Chunqiang Tang
Archive | 2015
Constantin M. Adam; Milton H. Hernandez; Vugranam C. Sreedhar; Prema Vivekanandan
world congress on services | 2018
Robert Filepp; Constantin M. Adam; Milton H. Hernandez; Maja Vukovic; Nikos Anerousis; Guan Qun Zhang
Journal of Reproduction and Development | 2018
Kristof Kloeckner; Constantin M. Adam; Nikos Anerousis; Naga A. Ayachitula; Muhammed Fatih Bulut; Gargi Dasgupta; Yu Deng; Yixin Diao; Nicholas C. M. Fuller; Sandeep Gopisetty; Milton H. Hernandez; Jinho Hwang; P. Iannucci; Anup K. Kalia; Giovanni Lanfranchi; David Lanyi; Heiko Ludwig; A. Mahamuni; Ruchi Mahindru; Fan Jing Meng; Hamid R. Motahari Nezhad; Karin Murthy; Taiga Nakamura; Amit M. Paradkar; Dennis A. Perpetua; Birgit Pfitzmann; Daniela Rosu; Larisa Shwartz; Zhuo Su; Maheswaran Surendra
Archive | 2017
Constantin M. Adam; John J. Rofrano; Shang Q. Guo; Frederick F Y. Wu; Sai Zeng