Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Constantin M. Adam is active.

Publication


Featured researches published by Constantin M. Adam.


network operations and management symposium | 2014

Managing risk in multi-node automation of endpoint management

Sai Zeng; Constantin M. Adam; Frederick Y. Wu; Shang Guo; Yaoping Ruan; Cashchakanithara Venugopal; Rajeev Puri

Endpoint management, including patching, health checking, configuration etc., is a key function for data center and cloud management. Managing multiple nodes through automation tools or scripts significantly increases efficiency. However, the risks of adverse impact due to excessive privilege or human error may propagate to a large pool of endpoints and lead to massive service disruptions and SLA (Service Level Agreement) violations. In this paper, we present a system that proactively and systematically manages the risk throughout the lifecycle phases of automation. We present a prototype implementation consisting of an authorization mechanism that guarantees the right level of eligibility and privilege of accessing the automation content (during the deployment stage), and an execution validator that controls the risk of human error which may cause massive damage to the infrastructure (during execution of the automation content). Our current implementation has been deployed to more than a dozen customer environments and achieved an efficiency gain of 58% with high execution accuracy.


international conference on service oriented computing | 2017

Optimizing Service Delivery with Minimal Runtimes

Katharina Gschwind; Constantin M. Adam; Sastry S. Duri; Shripad Nadgowda; Maja Vukovic

In this paper, we argue that deploying applications inside minimal runtime environments, which only contain the files necessary and sufficient for the application to run, can cut down the operating costs, specifically the costs for ensuring the application security and compliance. We identify a way to deliver minimal runtimes as Docker containers built from scratch. We describe a use case where minimal runtimes simplify the service maintenance operations, by reducing the number of updates for fixing security vulnerabilities.


network operations and management symposium | 2014

Managing the file system from the kernel

Shihabur Rahman Chowdhury; Constantin M. Adam; Frederick Y. Wu; John J. Rofrano; Raouf Boutaba

In this paper, we investigate the benefits of adding autonomic capabilities inside the operating system. We have developed and implemented a solution that focuses on three use cases (continuous file permission compliance, dynamic disk cleanup, and accidental removal protection) for the file system, and encapsulates all the respective file system monitoring, troubleshooting and error remedial operations in a Linux kernel module. The main benefits of this approach are the capability to detect issues instantly when they occur, and fix these issues transparently, with the invoking applications being unaware of their occurrence. These capabilities are not present in external agent architectures, including contemporary configuration management systems, like Puppet, Chef, or CFEngine. We have built a prototype and evaluated the performance of the most resource intensive use case, dynamic disk cleanup, using the FileBench file system benchmarking tool.


international conference on service oriented computing | 2017

Design and Evaluation of a Self-Service Delivery Framework

Constantin M. Adam; Nikos Anerousis; Muhammed Fatih Bulut; Robert Filepp; Anup K. Kalia; Brian Peterson; John J. Rofrano; Maja Vukovic; Jin Xiao

We present a framework for automating change and service request management, a process that has remained almost entirely human-centric, despite the fact that it involves complex workflows, takes a significant amount of time, and is prone to errors. We extend previous work on modeling process complexity to evaluate the impact of automating business constraints (such as policy approvals and entitlements). Our results indicate that automation eliminates a significant amount of operational complexity, reducing it by \(68\%\) compared to the Information Technology Infrastructure Library (ITIL) guidelines, and by \(80\%\) compared to actual client processes. Automation also reduces, between \(55\%\) and \(82\%\) for different client accounts, the average time that elapses from the moment that a change request is received until it starts executing.


Archive | 2006

Decentralized application placement for Web application middleware

Constantin M. Adam; Giovanni Pacifici; Michael J. Spreitzer; Malgorzata Steinder; Chunqiang Tang


Archive | 2008

Dynamic application instance placement in data center environments

Constantin M. Adam; Michael J. Spreitzer; Malgorzata Steinder; Chunqiang Tang


Archive | 2015

Automatic Key Management Using Enterprise User Identity Management

Constantin M. Adam; Milton H. Hernandez; Vugranam C. Sreedhar; Prema Vivekanandan


world congress on services | 2018

Continuous Compliance: Experiences, Challenges, and Opportunities

Robert Filepp; Constantin M. Adam; Milton H. Hernandez; Maja Vukovic; Nikos Anerousis; Guan Qun Zhang


Journal of Reproduction and Development | 2018

Building a cognitive platform for the managed IT services lifecycle

Kristof Kloeckner; Constantin M. Adam; Nikos Anerousis; Naga A. Ayachitula; Muhammed Fatih Bulut; Gargi Dasgupta; Yu Deng; Yixin Diao; Nicholas C. M. Fuller; Sandeep Gopisetty; Milton H. Hernandez; Jinho Hwang; P. Iannucci; Anup K. Kalia; Giovanni Lanfranchi; David Lanyi; Heiko Ludwig; A. Mahamuni; Ruchi Mahindru; Fan Jing Meng; Hamid R. Motahari Nezhad; Karin Murthy; Taiga Nakamura; Amit M. Paradkar; Dennis A. Perpetua; Birgit Pfitzmann; Daniela Rosu; Larisa Shwartz; Zhuo Su; Maheswaran Surendra


Archive | 2017

FILE DELETION IN STORAGE DEVICES BASED ON THE DELETION PRIORITY RULES

Constantin M. Adam; John J. Rofrano; Shang Q. Guo; Frederick F Y. Wu; Sai Zeng

Researchain Logo
Decentralizing Knowledge