Autonomic Computing

Autonomic computing is a computing model in which the system is self-healing, self-configured, self-protected and self-managed. Designed to mimic the human body’s nervous system-in that the autonomic nervous system acts and reacts to stimuli independent of the individual’s conscious input-an autonomic computing environment functions with a high level of artificial intelligence while remaining invisible to the users.

Just as the human body acts and responds without the individual controlling functions (e.g., internal temperature rises and falls, breathing rate fluctuates, glands secrete hormones in response to stimulus), the autonomic computing environment operates organically in response to the input it collects.

IBM Suggests Conditions of Autonomic Systems

A leader in autonomic computing design, IBM has set forth eight conditions that define an autonomic system:

  • The system must know itself in terms of what resources it has access to, what its capabilities and limitations are and how and why it is connected to other systems.
  • The system must be able to automatically configure and reconfigure itself depending on the changing computing environment.
  • The system must be able to optimize its performance to ensure the most efficient computing process.
  • The system must be able to work around encountered problems by either repairing itself or routing functions away from the trouble.
  • The system must detect, identify and protect itself against various types of attacks to maintain overall system security and integrity.
  • The system must be able to adapt to its environment as it changes, interacting with neighboring systems and establishing communication protocols.
  • The system must rely on open standards and cannot exist in a proprietary environment.
  • The system must anticipate the demand on its resources while keeping transparent to users.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...