Autonomic Computing

Autonomic computing is a computing model in which the system is self-healing, self-configured, self-protected and self-managed. Designed to mimic the human body’s nervous system-in that the autonomic nervous system acts and reacts to stimuli independent of the individual’s conscious input-an autonomic computing environment functions with a high level of artificial intelligence while remaining invisible to the users.

Just as the human body acts and responds without the individual controlling functions (e.g., internal temperature rises and falls, breathing rate fluctuates, glands secrete hormones in response to stimulus), the autonomic computing environment operates organically in response to the input it collects.

IBM Suggests Conditions of Autonomic Systems

A leader in autonomic computing design, IBM has set forth eight conditions that define an autonomic system:

  • The system must know itself in terms of what resources it has access to, what its capabilities and limitations are and how and why it is connected to other systems.
  • The system must be able to automatically configure and reconfigure itself depending on the changing computing environment.
  • The system must be able to optimize its performance to ensure the most efficient computing process.
  • The system must be able to work around encountered problems by either repairing itself or routing functions away from the trouble.
  • The system must detect, identify and protect itself against various types of attacks to maintain overall system security and integrity.
  • The system must be able to adapt to its environment as it changes, interacting with neighboring systems and establishing communication protocols.
  • The system must rely on open standards and cannot exist in a proprietary environment.
  • The system must anticipate the demand on its resources while keeping transparent to users.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...