Patent application number | Description | Published |
20080270543 | E-MAIL SYSTEM THAT ALLOWS SENDER TO ATTACH RECIPIENT SPECIFIC METADATA - A method detects a request from a user to append metadata to an e-mail message being addressed to a number of recipients. In response to the request, the method prompts the user to supply recipient specific information. The method generates the recipient specific metadata from the recipient specific information. The recipient specific information is different for different recipients and includes information regarding the action that is expected from the recipient, the relevance level of the e-mail, the description of the e-mail, and/or associated comments. Similarly, the recipient specific metadata is different for different recipients and the recipient specific metadata comprises fields for expected action, relevance level, description, and/or comments. The method adds the recipient specific metadata to the e-mail message and sends the e-mail message. | 10-30-2008 |
20080270557 | E-MAIL SYSTEM THAT ALLOWS SENDER TO ATTACH RECIPEINT SPECIFIC METADATA - A method detects a request from a user to append metadata to an e-mail message being addressed to a number of recipients. In response to the request, the method prompts the user to supply recipient specific information. The method generates the recipient specific metadata from the recipient specific information. The recipient specific information is different for different recipients and includes information regarding the action that is expected from the recipient, the relevance level of the e-mail, the description of the e-mail, and/or associated comments. Similarly, the recipient specific metadata is different for different recipients and the recipient specific metadata comprises fields for expected action, relevance level, description, and/or comments. The method adds the recipient specific metadata to the e-mail message and sends the e-mail message. | 10-30-2008 |
20080281650 | METHOD FOR COMPUTING THE RESILIENCY SCORE OF AN ORGANIZATION OR ANY PART THEREOF - A method computes a resiliency score of an entity by representing the entity as a set of components. The method determines interactions and relationships and can, in one embodiment, determine two types of relationships between the components to produce resiliency scores for the components. These two types of relationships comprise a dependency relationship (whether a first component depends on one or more additional components to function) and a substitution relationship (whether two or more components share some functionality, and whether the first component can be at least partially substituted for one or more additional components). The method computes and outputs an overall score representing a resiliency of the entity based on the scores of the components of the entity and relationships between the components. | 11-13-2008 |
20080281656 | METHOD FOR COMPUTING THE RESILIENCY SCORE OF AN ORGANIZATION OR ANY PART THEREOF - A method computes a resiliency score of an entity by representing the entity as a set of components. The method determines interactions and relationships and can, in one embodiment, determine two types of relationships between the components to produce resiliency scores for the components. These two types of relationships comprise a dependency relationship (whether a first component depends on one or more additional components to function) and a substitution relationship (whether two or more components share some functionality, and whether the first component can be at least partially substituted for one or more additional components). The method computes and outputs an overall score representing a resiliency of the entity based on the scores of the components of the entity and relationships between the components. | 11-13-2008 |
20090106068 | SYSTEM AND METHOD FOR RESILIENCY PLANNING - A method and a system for efficiently planning resiliency in a work environment based on resiliency parameters for a given definition of service, determining a best allocation plan with resources allocated, and allocating a resource request in a best allocation plan to the requesting source to perform the definition of service. | 04-23-2009 |
20090271383 | METHOD FOR DERIVING CONTEXT FOR DATA DISCLOSURE ENFORCEMENT - Techniques for deriving a context for enforcing a data disclosure policy while accessing a database are provided. The techniques include receiving a request for database access with met a information, parsing the meta information to identify a context, receiving a user query, formulating a query equivalent to-the user query, wherein the equivalent query implements the identified context to enforce a data disclosure policy, and accessing the database with the equivalent query. | 10-29-2009 |
20090276256 | METHOD FOR COMPUTING AN ENTERPRISE PROCESS COMPLIANCE INDEX - Techniques for computing an enterprise process compliance index are provided. The techniques include obtaining an enterprise process, obtaining a compliance policy, segmenting the enterprise process into at least one process step and the compliance policy in at least one policy clause, and computing an enterprise process compliance index, wherein computing the enterprise process compliance index comprises determining an applicability of the at least one process step to the at least one policy clause. | 11-05-2009 |
20100122238 | GENERATING FUNCTIONAL ARTIFACTS FROM LOW LEVEL DESIGN DIAGRAMS - At least one design diagram is obtained from at least one previous software project. At least one service abstraction is extracted from the at least one design diagram. The at least one service abstraction is reused in a new software project. In another aspect, requirements are obtained for a current software project; at least one class diagram is obtained from at least one previous software project; a dependency graph is generated from the at least one design diagram, using link analysis; relationships between classes in the dependency graph are analyzed to obtain functional artifacts for the requirements; and the functional artifacts are reused in the new software project. | 05-13-2010 |
20100180014 | PROVIDING NETWORK IDENTITY FOR VIRTUAL MACHINES - Techniques for assigning an internet protocol (IP) address to a virtual machine are provided. The techniques include tunneling a request for an IP address to an initialization protocol server, using the server to mask an identity of one or more guest virtual machines and obtain an IP address for the virtual machine based on a media access control (MAC) address of the virtual machine, and tunneling the IP address to the virtual machine. | 07-15-2010 |
20110082716 | System for Discovering Business Processes from Noisy Activities Logs - A system for discovering business processes from noisy activities logs from various activities performed during the execution of the process. Activities are observed from the noisy activity logs that may include text from manually entered activity logs, chat scripts, emails, voice transcripts, desktop captures, and tool logs, wherein the noisy activity logs are received from multiple person/tool actors with each of the actors performing one or more activities related to one/more business tasks. Extracting information from the noisy activity logs to capture activity based information, and then analyzing similar activities and finding possible paths in the similar activities. The results are used to build a process graph based on the similar activities and the possible paths in the similar activities. | 04-07-2011 |
20110106515 | SYSTEM AND METHOD FOR RESOURCE IDENTIFICATION - Systems and methods for resource identification. Preferably, this can be undertaken via modeling in which primary constraints include requirements and availability and building a resource map that includes alternatives which can help in the realization of the function. | 05-05-2011 |
20110191748 | SYSTEMS AND METHODS FOR DESIGN TIME SERVICE VERIFICATION AND VALIDATION - Design principles of services ensure reliability, scalability and reusability of software components. Services that follow the design principles are robust to changes and are largely reusable in multiple scenarios but in similar domains. To-date there is no systematic approach to apply these design principles to service design that will ensure service quality. Embodiments of the invention provide a formal check for the adherence of the services designed for an enterprise solution to the service orientation principles using design diagrams. | 08-04-2011 |
20110295634 | System and Method for Dynamic Optimal Resource Constraint Mapping in Business Process Models - Electronic communication has made it increasingly easier for large companies, such as those with thousands, even tens of thousands, of workers and/or consultants, to maintain steady streams of workflow across scattered offices and locations. In such a context, there is broadly contemplated herein business process modelling comprising the receipt of multiple business process models and resource constraints for each of the models. The models and constraints are then consolidated to more fully optimize business process modelling. Additional resource constraints governing goals of the business unit or organization are also received in embodiments of the invention, as well as resource registry information, (e.g., LDAP information) in addition to resource information such as resource availability and cost, etc. In embodiments of the invention, historical resource-to-task mapping is also assimilated as well as performance characteristics of resources. In other embodiments, dynamic changes to resource information are also considered for resource assignment. | 12-01-2011 |
20120078969 | SYSTEM AND METHOD TO EXTRACT MODELS FROM SEMI-STRUCTURED DOCUMENTS - Systems and associated methods for automated and semi-automated building of domain models for documents are described. Embodiments provide an approach to discover an information model by mining documentation about a particular domain captured in the documents. Embodiments classify the documents into one or more types corresponding to concepts using indicative words, identify candidate model elements (concepts) for document types, identify relationships both within and across document types, and consolidate and learn a global model for the domain. | 03-29-2012 |
20120197677 | MULTI-ROLE BASED ASSIGNMENT - A method and system to effectively apply the real time resource information into process models at design time. When process models are being prepared, an optimal list of candidate roles for each task within the process is presented. This list is generated dynamically based on the characteristics of the underlying resources within the roles. Further, the same information, along with historical data related to past performance at a resource level, can be leveraged during process simulations for optimal resource allocations. | 08-02-2012 |
20120246719 | SYSTEMS AND METHODS FOR AUTOMATIC DETECTION OF NON-COMPLIANT CONTENT IN USER ACTIONS - Described herein are methods, systems, apparatuses and products for automatic detection of non-compliant content in user actions. An aspect provides a method including, responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. Other embodiments are disclosed. | 09-27-2012 |
20120324531 | AUTOMATIC DETECTION OF NON-COMPLIANT CONTENT IN USER ACTIONS - Described herein are methods, systems, apparatuses and products for automatic detection of non-compliant content in user actions. An aspect provides a method including, responsive to receiving a user selection to share data via an electronic device, analyzing the data to be shared; and automatically identifying non-compliant content within the data prior to sharing the data. Other embodiments are disclosed. | 12-20-2012 |
20130086434 | CONFIGURATION FAULT LOCALIZATION IN SHARED RESOURCE ENVIRONMENTS - Methods and arrangements for fault localization. Structural clusters for an environment are received, and configuration parameters and dependencies for components in the structural clusters are identified. A configuration map is built, and a configuration fault occurrence is ascertained. | 04-04-2013 |
20130198116 | LEVERAGING USER-TO-TOOL INTERACTIONS TO AUTOMATICALLY ANALYZE DEFECTS IN IT SERVICES DELIVERY - An approach is presented for identifying related problem tickets in an information technology (IT) environment. User interactions with a computer program are stored. The user interactions include inputs to the computer program to search for problem tickets issued in the IT environment that have the same characteristics. One or more user interaction patterns within the user interactions are recognized. A user interaction pattern of the one or more user interaction patterns is selected based on an evaluation of effectiveness of each of the one or more user interaction patterns. Based on the user interaction pattern, a rule is generated for determining which problem tickets in the IT environment share a common characteristic. The rule is applied to additional problem tickets issued in the IT environment to identify which of the additional problem tickets share the common characteristic. | 08-01-2013 |
20130198149 | AUTOMATED CORRUPTION ANALYSIS OF SERVICE DESIGNS - Methods and arrangements for conducting corruption analysis of service designs. A service design is accepted. Corrupting factors within the service design are assessed, and a corruption susceptibility score is generated. An alternative service design is generated responsive to a corruption susceptibility score fulfilling predetermined criteria. | 08-01-2013 |
20130198153 | AUTOMATED CORRUPTION ANALYSIS OF SERVICE DESIGNS - Methods and arrangements for conducting corruption analysis of service designs. A service design is accepted. Corrupting factors within the service design are assessed, and a corruption susceptibility score is generated. An alternative service design is generated responsive to a corruption susceptibility score fulfilling predetermined criteria. | 08-01-2013 |
20140067360 | System And Method For On-Demand Simulation Based Learning For Automation Framework - Systems and methods for on-demand simulation based learning for an automation framework. According to one embodiment, the system or method comprises an automated process in a real computing environment that encounters a novel, divergent, or defined state that the automation cannot handle. The state is replicated in a simulated computing environment which a user interacts with to resolve the simulated issue. The user's actions are captured and replicated in the real computing environment in order to resolve the issue. Optionally, the user's actions are analyzed and added to the automation database or rules. | 03-06-2014 |
20140244816 | RECOMMENDING SERVER MANAGEMENT ACTIONS FOR INFORMATION PROCESSING SYSTEMS - One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying. | 08-28-2014 |
20140321276 | Reducing Latencies Through Packet Aggregation - Techniques, systems, and articles of manufacture for reducing latencies through packet aggregation. A method includes computing an end-to-end latency for each of multiple data packets to reach a pre-determined destination, determining an aggregation scheme with a corresponding aggregation time for each of the multiple data packets, wherein the aggregation time encompasses the time needed to transmit each of the multiple data packets to an aggregation component and the time spent waiting to output the aggregation component to an output port, and wherein the aggregation time is less than the computed end-to-end latency for each of the multiple data packets, aggregating each of the multiple data packets in accordance with the aggregation scheme, and programming the aggregation component with the aggregation scheme. | 10-30-2014 |
20150033077 | LEVERAGING USER-TO-TOOL INTERACTIONS TO AUTOMATICALLY ANALYZE DEFECTS IN IT SERVICES DELIVERY - An approach is presented for identifying related problem tickets in an information technology (IT) environment. A pattern of actions included in interactions with a computer program is determined to be effective at proactively preventing a problem in the IT environment based on a frequency at which user(s) performed the interactions which perform text and statistical analyses of content of historical problem tickets. A script based on the pattern of actions is generated. A root cause of the problem is determined based on the text and statistical analyses. Responsive to a receipt of a new problem ticket, the script is executed to automatically perform the pattern of actions. The new problem ticket is classified as being in a group of problem tickets which are related to the problem and included in the historical problem tickets. The new problem ticket is determined to specify the problem which has the root cause. | 01-29-2015 |