Patent application number | Description | Published |
20080294740 | EVENT DECOMPOSITION USING RULE-BASED DIRECTIVES AND COMPUTED KEYS - Methods, systems, and computer program products for generating a common event format representation of information from a plurality of messages include parsing a rule associated with a current message to determine if a property of a common event format representation for the current message is to be populated with a property value from a previous message. If the rule specifies to obtain the property value from the previous message, the property value is obtained from the previous message and the common event format representation for the current message is populated with the obtained property value from the previous message. The property value may be obtained by generating a computed key based on properties of the current message that are common to the previous message, and identifying the previous message based on the key of the current message. The rule associated with the current message may also be parsed to determine if the property of the common event format representation for the current message is to be populated with a property value determined by specified code. If the rule specifies to obtain the property value using the specified code, the property value is obtained using the specified code and the common event format representation for the current message is populated with the obtained property value obtained using the specified code. | 11-27-2008 |
20090006298 | IT RESOURCE EVENT SITUATION CLASSIFICATION AND SEMANTICS - An off-line knowledge acquisition process takes IT resource messages and automatically generates a set of rules used to provide situation categories for the resource messages/events. The off-line knowledge acquisition process generates an event-to-situation mapping file for efficiently mapping situation to events in runtime. Rules are fed back into a knowledge repository and process for reuse. The off-line knowledge acquisition process provides methods to reiterate the process of mining (autonomically and/or by human interaction) to improve the rules and confidence level assigning the situation categories. A runtime categorizer component uses the event-to-situation mapping file to add situation categories to the IT resource events. The runtime categorizer uses a plurality of annotator components each capable of adding a situation annotation to incoming messages based on rules generated by the off-line knowledge acquisition process. An assessment component chooses the best situation category from those annotated by the annotator components. | 01-01-2009 |
20090007146 | METHOD AND SYSTEM TO CORRELATE AND CONSOLIDATE A PLURALITY OF EVENTS - A method to correlate and consolidate a plurality of events may include consolidating each of the plurality of events to form a multi-personality event. Each event may be emitted from a respective one of a plurality of components forming an event producer in response to an incident affecting the event producer. The method may also include providing the multi-personality event to an event consumer. | 01-01-2009 |
20090138595 | TECHNIQUE TO GENERICALLY MANAGE EXTENSIBLE CORRELATION DATA - A technique to generically manage extensible correlation data is provided for correlating a series of events. The technique employs a global unique identifier (GUID) for identifying an event and uses the GUID as a key to associate one or more extensible correlators of correlation data. A transport correlator may be configured to transport the GUID for associating with a GUID of a second event such that a small and fixed amount of data is passed by the communications layer providing the transport, minimally impacting communications. An arbitrary amount of data may be logged and keyed with the GUID, providing optimization and flexibility. | 05-28-2009 |
20090147958 | Dynamic, Selective Obfuscation of Information for Multi-Party Transmission - Selectively obfuscating, or obscuring, a portion or portions of information in a multi-party transmission. A user participating in a multi-party exchange signals a communication device (or proxy) that he will provide private information that is to be perceptible only to a subset of the other participants. This user also identifies that subset, preferably by providing a group identifier for a group in which that subset of participants are members. The communication device transmits a member-specific descriptor comprising an encrypted version of a group key, and uses this group key to encrypt the private information that is to be perceptible only to the subset. Device-specific characteristics of participant devices are used, in addition to user-provided data (such as a user's log-on identifier and/or password), as input to create cryptographic key information. Only participants in the subset can decrypt the encrypted private information; other participants preferably receive a filler pattern of some type instead. | 06-11-2009 |
20090276383 | RULES GENERATION FOR IT RESOURCE EVENT SITUATION CLASSIFICATION - A computer processing device receives computer readable data to derive computer executable rules for mining and constructing situation categories. The received data is transformed into a predetermined standard format if the received data is not already in the predetermined standard format. The predetermined standard formatted data is parsed, and an outer, iterative loop is performed until at least one predetermined stopping criterion is met. An inner iterative loop is performed within the outer iterative loop until all desired subsets of data are processed. During the inner iterative loop, selected subsets of data are labeled with labels associated with corresponding previously labeled subsets of data. New computer executable rules are generated for mining and constructing situation categories from the labeled subsets of data. Keyword list classifiers are transformed using the stored labeled subsets of data. | 11-05-2009 |
20110010222 | POINT-IN-TIME BASED ENERGY SAVING RECOMMENDATIONS - Energy saving efforts should not compromise data center performance. An energy management application can determine usage patterns in historical energy usage data based on statistical analysis and energy models. Energy savings recommendations can be generated for future points-in-time based on the usage patterns. Business constraints can be applied to the energy savings recommendations to ensure that the energy savings recommendations meet performance requirements. | 01-13-2011 |
20120144219 | Method of Making Power Saving Recommendations in a Server Pool - A method, system and computer-usable medium are disclosed for optimizing the power consumption of a plurality of information processing systems. Historical usage data representing power usage of a plurality of information processing systems is retrieved in response to a request to generate power savings recommendations. Statistical analysis is performed on the historical usage data are to determine usage patterns, which are then further analyzed to determine repetitions of the usage patterns. In turn, the repetitions of the usage patterns are analyzed to generate power consumption management recommendations to initiate power consumption management actions at particular times. One or more business constraints are determined, which are used to generate constraints to the power consumption management recommendations. | 06-07-2012 |
20130019187 | VISUALIZING EMOTIONS AND MOOD IN A COLLABORATIVE SOCIAL NETWORKING ENVIRONMENTAANM HIND; JOHN R.AACI RALEIGHAAST NCAACO USAAGP HIND; JOHN R. RALEIGH NC USAANM SALAHSHOUR; ABDOLREZAAACI RALEIGHAAST NCAACO USAAGP SALAHSHOUR; ABDOLREZA RALEIGH NC USAANM SOEMARGONO; TINTIN S.AACI CARYAAST NCAACO USAAGP SOEMARGONO; TINTIN S. CARY NC USAANM WIGUNA; STEFANUSAACI CARYAAST NCAACO USAAGP WIGUNA; STEFANUS CARY NC US - Techniques are described for conveying a collective emotional state of a plurality of participants to a communication. Embodiments receive emotional state data for each of the participants to the communication. The emotional state data for each of the participants is collected by monitoring at least one or more applications the respective participant is interacting with. An emotional state of the participants to the communication is then determined, based on the received emotional state data and a determined topic of the communication. Embodiments provide an indication of the determined emotional state of the participants. | 01-17-2013 |
20130276629 | FILTER SYSTEMS - Systems and methods for monitoring quality of filters within a filtering system are disclosed. The system includes at least one pressure sensor which monitors a force applied by a filter on a filter housing. The system further includes a control system which provides notification to a user when the force measured by the at least one pressure sensor exceeds a predetermined threshold value. | 10-24-2013 |