Patent application number | Description | Published |
20080294599 | APPARATUS AND METHOD OF SEMANTIC TUPLESPACE SYSTEM - A tuple matching method and system includes conducting a plurality of types of matching techniques. The system and method conducts both semantic tuple matching and correlation tuple matching. | 11-27-2008 |
20090024426 | Method and Apparatus for Dynamic Evolution in Business Performance Management - A policy-driven approach to Business Performance Management (BPM) evolution is to capture the mechanism of BPM solution evolutions. These policies are executed by the runtime infrastructure which transforms and interprets evolution policies and allows fine granularity controls on solution evolution. At transformation time, the relationship among the event processing progress and the runtime state is derived based on the observation model. Such relationship information allows verification of freshness of migrating data and parallelization of runtime state validation and event processing. Consistent and efficient evolution of BPM solutions transit while event processing is operational. | 01-22-2009 |
20090106271 | SECURE SEARCH OF PRIVATE DOCUMENTS IN AN ENTERPRISE CONTENT MANAGEMENT SYSTEM - An enterprise content management system such as an electronic contract system manages a large number of secure documents for many organizations. The search of these private documents for different organizational users with role-based access control is a challenging task. A content-based extensible mark-up language (XML)-annotated secure-index search mechanism is provided that provides an effective search and retrieval of private documents with document-level security. The search mechanism includes a document analysis framework for text analysis and annotation, a search indexer to build and incorporate document access control information directly into a search index, an XML-based search engine, and a compound query generation technique to join user role and organization information into search query. By incorporating document access information directly into the search index and combining user information in the search query, search and retrieval of private contract documents can be achieved very effectively and securely with high performance. | 04-23-2009 |
20090313298 | System and Method for Model-Driven Object Store - Disclosed is a system and method for model-driven datastore. The model-driven datastore includes an object persistence model editor for developing specifc object persistence models based on an object persistence metamodel. The object persistence model consists of object model, object access pattern and user defined functions. The object model consists of a collection of object definition, said object defintion supports at least one basic type or structure type of attributes. The object access pattern defines the access path that are used to retrieve the object instances, where the access path is consists of a collection of actions. The actions comprise at least one of the following a self action, parent action, or children action. User defined functions are declaratively defined and supports group operators. The model driven datastore further includes a model transformer for generating an object index based on object access patterns and executable code for supporting object access patterns and user defined functions and an object store manager for executing generated code that allows applications to create, update, retrivel or persist objects. | 12-17-2009 |
20110219375 | ENHANCED WORK-FLOW MODEL CAPABLE OF HANDLING EXCEPTIONS - A system and method for augmenting a work-flow model to handle all expected and unexpected exceptions during run-time. The system includes an Exception Handling Knowledge Base (EHKB), a Work-flow Manager for managing the execution of the work-flow model and automatically adding exception transitions from the EHKB to the model except those forbidden, and a Work-flow Monitor for monitoring the model execution. The Monitor generating alerts to a business manager when the exceptions are encountered. At build-time, a process analyst could define a process schema in a Process Schema Repository, specify a forbidden exception or modify a schema to handle an exception based on guidance from the EHKB. At run-time, a user may initiate a forbidden exception with approval from the business manager. | 09-08-2011 |
20110307789 | PUBLISH/SUBSCRIBE OVERLAY NETWORK CONTROL SYSTEM - A system may include an overlay network linking a plurality of publishers, a plurality of subscribers, and a plurality of brokers. The overlay network may include a first computer network having a first network protocol carried by a second computer network having a second network protocol. The system may also include an agent carried by each of the publishers, the subscribers, and the brokers that adjust the network's topology based upon collected runtime data of condition of each link within the network and/or broker availability to any publisher and subscriber. | 12-15-2011 |
20120046966 | Health Management Application Development and Deployment Framework - Techniques are disclosed for developing health management applications and managing health issues associated with one or more individuals or subjects. For example, a health management system includes the following modules. A health data transformation and routing module converts raw health data to at least one common format and routes the common format health data to one or more other modules that at least one of process and store the common format health data. A health monitoring module receives at least a portion of the common format health data, processes the received data, and provides one or more notifications based on processing results. A health analytics module receives data from one or more other modules and generates health knowledge based on the received data. A health data and knowledge storage module stores data from one or more other modules. Each of the health data transformation and routing module, the health monitoring module, and the health analytics module include one or more application programming interfaces for use in at least one of adding and editing logic associated with the respective module. | 02-23-2012 |
20120047099 | NON-INTRUSIVE EVENT-DRIVEN PREDICTION - A method, system, and computer usable program product for non-intrusive event-driven prediction of a metric in a data processing environment are provided in the illustrative embodiments. At least one set of events is observed in the data processing environment, the set of events being generated by several processes executing in the data processing environment. A subset of the set of events are tracked for an observation period, the tracking resulting in bookkeeping information about the subset of events. A pattern of events is detected in the bookkeeping information. The pattern is formed as a tuple representing a process in the several processes, the metric corresponding to the process. A prediction model is selected for the tuple. The prediction model is supplied with the tuple and executed to generate a predicted value of the metric. | 02-23-2012 |
20120059917 | SOFTWARE LICENSE MANAGEMENT WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a solution to manage software licenses within a cloud computing environment. Specifically, aspects of the present invention (among other things): determine a requester's/customer's needs; identify a set (at least one) of providers capable of addressing the requester's licensing needs; and match the customer with the most appropriate provider. The embodiments of the present invention will also analyze current licensing configurations/models of the requesters, providers, and software vendors to identify areas of potential improvement. This provides the functionality necessary to adjust software license level in a dynamic fashion so as to best meet the customer's needs. | 03-08-2012 |
20120131677 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-24-2012 |
20120183932 | Location-Aware Nutrition Management - Techniques for providing personalized location-aware nutrition management information are provided. The techniques include receiving geographical coordinates of an individual, acquiring nutritional information from one or more food providers within a designated proximity of the geographical coordinates of the individual, generating one or more nutrition selection options for the individual based on the nutritional information from the one or more food providers within a designated proximity of the geographical coordinates of the individual and dynamic nutritional guidelines for the individual, and outputting the one or more nutrition selection options to the individual. | 07-19-2012 |
20120233295 | Declarative Service Domain Federation - A mechanism for declarative service domain federation uses a declarative approach to both the visibility aspect and the management aspect of service domain federation. Instead of manually exporting services, that is, selecting individual services from source domains to be visible in the target domain, using the present system, a federation architect uses a federation console to specify federation intent. The federation intent may include federation rule, query-based service group, and quality-of-service (QoS) policy. Based on the declared federation intent, a planning engine resolves the individual services based on the group query, generates the service visibility configuration, and creates the necessary service proxies and/or mediation objects to satisfy the goal. At runtime, a service monitor collects the performance metrics of federated services and dynamically adjusts the mediation/proxy configurations to maintain the QoS objectives specified by the federation architect. | 09-13-2012 |
20120308975 | Wellness Decision Support Services - Techniques for providing one or more user-centric wellness decision support services are provided. The techniques include providing an interface that facilitates selection of a risk assessment model of interest for a user and an action plan to trigger one or more follow-up action items, applying the selected model to assess the user's wellness risk level based on one or more user wellness records, and applying the selected action plan to trigger one or more relevant disease management and lifestyle interventions. | 12-06-2012 |
20120310758 | Guideline-Based Food Purchase Management - Techniques for guideline-based food purchase management are provided. The techniques include generating a personalized set of nutrition guidelines for a user, generating a user profile for the user, wherein the user profile comprises health information and nutrition preferences, and using the personalized set of nutrition guidelines and the user profile to generate a guideline-based shopping list for the user. Techniques for generating location-based food purchase guidance are also provided. The techniques include obtaining a shopping list of food items and a list of stores to be considered in connection with the food items on the shopping list, using the shopping list, list of stores, a store location map and inter-store routing guidance to generate an inter-store shopping route, and generating an in-store shopping route, for each of the stores in the inter-store shopping route, based on the shopping list, intra-store routing guidance and a floor plan for the store. | 12-06-2012 |
20130006807 | Guideline-Based Food Purchase Management - Techniques for guideline-based food purchase management are provided. The techniques include generating a personalized set of nutrition guidelines for a user, generating a user profile for the user, wherein the user profile comprises health information and nutrition preferences, and using the personalized set of nutrition guidelines and the user profile to generate a guideline-based shopping list for the user. Techniques for generating location-based food purchase guidance are also provided. The techniques include obtaining a shopping list of food items and a list of stores to be considered in connection with the food items on the shopping list, using the shopping list, list of stores, a store location map and inter-store routing guidance to generate an inter-store shopping route, and generating an in-store shopping route, for each of the stores in the inter-store shopping route, based on the shopping list, intra-store routing guidance and a floor plan for the store. | 01-03-2013 |
20130013340 | Wellness Decision Support Services - Techniques for providing one or more user-centric wellness decision support services are provided. The techniques include providing an interface that facilitates selection of a risk assessment model of interest for a user and an action plan to trigger one or more follow-up action items, applying the selected model to assess the user's wellness risk level based on one or more user wellness records, and applying the selected action plan to trigger one or more relevant disease management and lifestyle interventions. | 01-10-2013 |
20130024413 | NON-INTRUSIVE EVENT-DRIVEN PREDICTION - A method for non-intrusive event-driven prediction of a metric in a data processing environment is provided in the illustrative embodiments. At least one set of events is observed in the data processing environment, the set of events being generated by several processes executing in the data processing environment. A subset of the set of events are tracked for an observation period, the tracking resulting in bookkeeping information about the subset of events. A pattern of events is detected in the bookkeeping information. The pattern is formed as a tuple representing a process in the several processes, the metric corresponding to the process. A prediction model is selected for the tuple. The prediction model is supplied with the tuple and executed to generate a predicted value of the metric. | 01-24-2013 |
20140067824 | DATABASE TABLE FORMAT CONVERSION BASED ON USER DATA ACCESS PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables. | 03-06-2014 |
20140108403 | License Reconciliation with Multiple License Types and Restrictions - Techniques for license reconciliation with multiple license types and restrictions. A method includes grouping a collection of multiple software installation instances, a collection of multiple hardware devices and a collection of multiple software licenses into multiple clusters, generating a reconciliation matrix for each cluster, wherein each row in the reconciliation matrix represents a software installation instance or a hardware device, each column in the reconciliation matrix represents a license type and/or an individual license, and each cell in the reconciliation matrix represents a license requirement and applicability of each software installation instance or hardware device, solving each reconciliation matrix, and generating a license reconciliation plan based on the solved reconciliation matrices. | 04-17-2014 |
20140108404 | License Reconciliation with Multiple License Types and Restrictions - Techniques for license reconciliation with multiple license types and restrictions includes grouping a collection of multiple software installation instances, a collection of multiple hardware devices and a collection of multiple software licenses into multiple clusters, generating a reconciliation matrix for each cluster, wherein each row in the reconciliation matrix represents a software installation instance or a hardware device, each column in the reconciliation matrix represents a license type and/or an individual license, and each cell in the reconciliation matrix represents a license requirement and applicability of each software installation instance or hardware device, solving each reconciliation matrix, and generating a license reconciliation plan based on the solved reconciliation matrices. | 04-17-2014 |
20140122158 | License Meta-Model for Automatic License Reasoning - Techniques, a system and an article of manufacture for generating a license meta-model for automatic license reasoning. A method includes creating an object-oriented information model to describe a hardware infrastructure, a software deployment environment, and an organization structure corresponding to a software license deployment, creating a set of property functions to formulate one or more items of information related to the hardware infrastructure, one or more users, and the organization structure, creating a set of license metrics by defining license metric capacity unit and license metric capacity calculation logic that leverage at least one existing property function and/or at least one of the created property functions, and leveraging the license metrics to model the software license. | 05-01-2014 |
20140122159 | License Meta-Model for Automatic License Reasoning - Techniques, a system and an article of manufacture for generating a license meta-model for automatic license reasoning include creating an object-oriented information model to describe a hardware infrastructure, a software deployment environment, and an organization structure corresponding to a software license deployment, creating a set of property functions to formulate one or more items of information related to the hardware infrastructure, one or more users, and the organization structure, creating a set of license metrics by defining license metric capacity unit and license metric capacity calculation logic that leverage at least one existing property function and/or at least one of the created property functions, and leveraging the license metrics to model the software license. | 05-01-2014 |
20140122160 | Optimized License Procurement - Techniques, a system and an article of manufacture for automatically determining a license procurement decision include identifying one or more license types for a software product, identifying, for each license type, one or more types of hardware configuration and software usage information to collect for a product license procurement decision, collecting said identified one or more types of hardware configuration and software usage information, populating a license decision matrix with said collected one or more types of hardware configuration and software usage information, and automatically generating a license procurement decision for the product based on analysis of the license decision matrix. | 05-01-2014 |
20140122348 | Optimized License Procurement - Techniques, a system and an article of manufacture for automatically determining a license procurement decision. A method includes identifying one or more license types for a software product, identifying, for each license type, one or more types of hardware configuration and software usage information to collect for a product license procurement decision, collecting said identified one or more types of hardware configuration and software usage information, populating a license decision matrix with said collected one or more types of hardware configuration and software usage information, and automatically generating a license procurement decision for the product based on analysis of the license decision matrix. | 05-01-2014 |
20140129282 | Automatic License Entitlement Calculation - Techniques for automatic license entitlement calculation. A method includes decomposing a license metric definition into metric-generic and metric-specific logic, compiling the metric-specific logic to generate intermediate code, interpreting the metric-generic logic and dynamically loading the intermediate code to execute a license entitlement calculation. | 05-08-2014 |
20140130024 | Automatic License Entitlement Calculation - Techniques for automatic license entitlement calculation. A method includes decomposing a license metric definition into metric-generic and metric-specific logic, compiling the metric-specific logic to generate intermediate code, interpreting the metric-generic logic and dynamically loading the intermediate code to execute a license entitlement calculation. | 05-08-2014 |
20140137258 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-15-2014 |
20140279888 | METADATA-DRIVEN VERSION MANAGEMENT SERVICE IN PERVASIVE ENVIRONMENT - Metadata driven version management service determines one or more version operations to perform based on the properties of a device, computing environment and metadata associated with a file being versioned. The version management service allows different devices to perform different version operations based on different device properties. | 09-18-2014 |
20140279904 | METADATA-DRIVEN VERSION MANAGEMENT SERVICE IN PERVASIVE ENVIRONMENT - Metadata driven version management service determines one or more version operations to perform based on the properties of a device, computing environment and metadata associated with a file being versioned. The version management service allows different devices to perform different version operations based on different device properties. | 09-18-2014 |
20140310817 | Execution-Based License Discovery and Optimization - Techniques, systems, and articles of manufacture for execution-based license discovery and optimization. A method includes collecting execution information for one or more software processes on one or more servers in an operating system, mapping the collected execution information for the one or more software processes to one or more software products, determining usage of a software product in the operating system based on the mapping of the collected execution information for the one or more software processes to one or more software products, and identifying one or more software product license optimization opportunities based on a comparison of the determined usage of the software product in the operating system and an indication of all installations of the software product in the operating system. | 10-16-2014 |
20140310818 | Execution-Based License Discovery and Optimization - Systems and articles of manufacture for execution-based license discovery and optimization include collecting execution information for one or more software processes on one or more servers in an operating system, mapping the collected execution information for the one or more software processes to one or more software products, determining usage of a software product in the operating system based on the mapping of the collected execution information for the one or more software processes to one or more software products, and identifying one or more software product license optimization opportunities based on a comparison of the determined usage of the software product in the operating system and an indication of all installations of the software product in the operating system. | 10-16-2014 |