Patent application number | Description | Published |
20140237588 | METHOD AND SYSTEM FOR MANAGING AND CONTROLLING DIRECT ACCESS OF AN ADMINISTRATOR TO A COMPUTER SYSTEM - A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the administrator a request for the direct access to the managed computer system directly from the system console and requests a service management system to search open tickets. In response to that the open tickets are found, the at least one computer program requests the administrator to choose at least one ticket from the open tickets and grants the administrator the direct access to the computer system in response to determining that the at least one ticket is valid. | 08-21-2014 |
20140280861 | DYNAMICALLY LAUNCHING INTER-DEPENDENT APPLICATIONS BASED ON USER BEHAVIOR - A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage. | 09-18-2014 |
20140289737 | UPDATING PROGRESSION OF PERFORMING COMPUTER SYSTEM MAINTENANCE - A computer-implemented method, computer program product, and computer system for updating progression of performing computer system management. A computer system receives a log-on of a change implementer onto a managed computer system and searches a change request on a managing computer system. In response to that the change request is found, the computer system receives from the change implementer a command with a current date and time and matches the command to one or more tasks within the change request. In response to determining that the command matches the one or more tasks, the computer system updates start dates and times of the one or more tasks. And, in response to that the one or more tasks are completed, the computer system updates stop dates and times of the one or more tasks. | 09-25-2014 |
20140351408 | UTILIZING AUGMENTED REALITY FOR LOCATING COMPUTER HARDWARE ASSOCIATED TO A REPORTED INCIDENT - Program code on a client computer receives an image of computer hardware and a unique identifier of the computer hardware. The program code generates a request that includes the unique identifier, a location of a client computer, and profile information of an end-user logged into the client computer. The program code sends the request to a server computer, and forwards a version of the request to an incident management system that in response to receiving the request extracts information associated to the computer hardware. The program code receives the information extracted, and forwards the information to the client computer. The program code overlays at least some of the information forwarded, onto the image of the computer hardware. The program code generates a map that displays on the screen of the client computer the image of the computer hardware overlaid with at least some of the information forwarded. | 11-27-2014 |
20140359010 | UTILIZING SOCIAL MEDIA FOR INFORMATION TECHNOLOGY CAPACITY PLANNING - Program on a server computer generates a list having at least a string of plain text defined based on rules, wherein the rules also define a news feed of an electronic media source. The program code subscribes to the news feed. The program code computes a number of times the string of plain text is identified within the news feed, and a score for the string of plain text. Based on the score, the program code generates an electronic notification that alerts of an anticipated change in computer hardware capacity requirements for a build, support, and maintenance of a networked computer system. The program code estimates the requirements. Based on the score, the program code generates a request to adjust allocation of the computer hardware within the networked computer system to satisfy the requirements estimated. The program code sends the request generated to a client computer for viewing. | 12-04-2014 |
20150089488 | ANALYTICS BASED PATCH MANAGEMENT AND DISTRIBUTION - In a method for determining a time to deploy and install patches one or more processors receive a request to deploy a patch by a target deployment time and install the patch by a target installation time, for at least one computing device of a plurality of computing devices on a network. The one or more processors determine a time frame to deploy the patch based on the target deployment time and availability of bandwidth on the network. The one or more processors determine a time to install the patch based on the target installation time and usage of the at least one computing device. The one or more processors cause the patch to be deployed within the determined time frame to deploy the patch. The one or more processors send an instruction to install the patch at the determined time to install the patch. | 03-26-2015 |
20150120908 | REAL-TIME, DISTRIBUTED ADMINISTRATION OF INFORMATION DESCRIBING DEPENDENCY RELATIONSHIPS AMONG CONFIGURATION ITEMS IN A DATA CENTER - In a data center, real-time, distributed administration of information describing dependency relationships among configuration items may be carried out. In such a data center, each configuration item is associated with an independent agent that is coupled to other agents and maintains a record of dependencies amongst the configuration item associated with the agent and other configuration items. Administration of dependency information includes: detecting, by an independent agent associated with a particular configuration item, a change in the item's dependency; providing information describing the change in the particular configuration item's dependency to all other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item; and, for each of the other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item: updating the record of dependences for the configuration item associated with the independent agent. | 04-30-2015 |
20150121463 | AUTHORIZING A CHANGE WITHIN A COMPUTER SYSTEM - Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period. The program code verifies the authorization code inputted into the second computer to determine if the end user has authority to implement the change on second computer, wherein the authorization code is separated into a first string and a second string each having a fixed number of bits. The program code grants access to the end user to implement the change to the configuration item on the second computer if the end user has the authority to implement the change. | 04-30-2015 |