Loewenstern
David Loewenstern, Yorktown Heights, NY US
Patent application number | Description | Published |
---|---|---|
20110016368 | System and Method for Automated Configuration Control, Audit Verification and Process Analytics - A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered. | 01-20-2011 |
20110029767 | System and Method for Transforming Configuration Data Items in a Configuration Management Database - A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified. | 02-03-2011 |
David Loewenstern, New York, NY US
Patent application number | Description | Published |
---|---|---|
20090327001 | DEFINING AND IMPLEMENTING CONFIGURATION STANDARDS FOR FACILITATING COMPLIANCE TESTING IN AN INFORMATION TECHNOLOGY ENVIRONMENT - A method for facilitating compliance testing in an information technology (IT) environment is provided. The method includes defining each IT component of an enterprise as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for IT components of the enterprise against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the IT components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the IT components that failed to meet respective ones of the selected Configuration Standards. | 12-31-2009 |
David Loewenstern, Hawthorne, NY US
Patent application number | Description | Published |
---|---|---|
20130110568 | ASSIGNING WORK ORDERS WITH CONFLICTING EVIDENCES IN SERVICES | 05-02-2013 |
20130111488 | TASK ASSIGNMENT USING RANKING SUPPORT VECTOR MACHINES | 05-02-2013 |
David M. Loewenstern, New York, NY US
Patent application number | Description | Published |
---|---|---|
20140122693 | Web Navigation Tracing - A navigation to a plurality of visited web sites is traced and a navigation map is generated comprised of a node for each visited web site. Each node in the navigation map is connected by an edge to at least one other node in the navigation map, and the edge is associated with the link from the given visited web site to the next web site. For each visited web site, the corresponding node stores an address for the given web site, a time stamp of the visit to the given visited web site, a link from the given visited web site to a next web site and optionally a title of the web site. A keyword search of the nodes can be processed to identify a given web site in the navigation map. A signature portion of the given web site can be used to identify a new location of the given web site. A navigation map can be designated as a searchable public navigation map. | 05-01-2014 |
20140122701 | Web Navigation Tracing - A navigation to a plurality of visited web sites is traced and a navigation map is generated comprised of a node for each visited web site. Each node in the navigation map is connected by an edge to at least one other node in the navigation map, and the edge is associated with the link from the given visited web site to the next web site. For each visited web site, the corresponding node stores an address for the given web site, a time stamp of the visit to the given visited web site, a link from the given visited web site to a next web site and optionally a title of the web site. A keyword search of the nodes can be processed to identify a given web site in the navigation map. A signature portion of the given web site can be used to identify a new location of the given web site. A navigation map can be designated as a searchable public navigation map. | 05-01-2014 |
20140214827 | Data Caveats for Database Tables - A method for storing data caveats for databases is described. The method includes storing at least one record in at least one content table in a database. The method includes storing at least one data caveat having a relationship to the content table in at least one record in a caveat table. A data caveat has a relationship to the content table when the data caveat applies to: a record in the content table or the content table in entirety. The method also includes storing, in a memory device, an indication of the relationship. Articles of manufacture are also described. | 07-31-2014 |
20140214828 | DATA CAVEATS FOR DATABASE TABLES - A method for storing data caveats for databases is described. The method includes storing at least one record in at least one content table in a database. The method includes storing at least one data caveat having a relationship to the content table in at least one record in a caveat table. A data caveat has a relationship to the content table when the data caveat applies to: a record in the content table or the content table in entirety. The method also includes storing, in a memory device, an indication of the relationship. Articles of manufacture are also described. | 07-31-2014 |
20140354432 | SYSTEM AND METHOD FOR VERIFYING PATIENT COMPLIANCE - A system for verifying compliance, comprises an input device including a radio-frequency identification (RFID) reader module, wherein the RFID reader module is capable of determining that an RFID tag corresponding to a medication dose in a product packaging is not detectable, and recording a time of the determination that the RFID tag is not detectable, a network, and a data management service module which is capable of receiving from the input device via the network information corresponding to the RFID tag and the time when the RFID tag was determined not detectable. | 12-04-2014 |
20140354433 | SYSTEM AND METHOD FOR VERIFYING PATIENT COMPLIANCE - A system for verifying compliance, comprises an input device including a radio-frequency identification (RFID) reader module, wherein the RFID reader module is capable of determining that an RFID tag corresponding to a medication dose in a product packaging is not detectable, and recording a time of the determination that the RFID tag is not detectable, a network, and a data management service module which is capable of receiving from the input device via the network information corresponding to the RFID tag and the time when the RFID tag was determined not detectable. | 12-04-2014 |
David Matthew Loewenstern, Maplewood, NJ US
Patent application number | Description | Published |
---|---|---|
20090006298 | IT RESOURCE EVENT SITUATION CLASSIFICATION AND SEMANTICS - An off-line knowledge acquisition process takes IT resource messages and automatically generates a set of rules used to provide situation categories for the resource messages/events. The off-line knowledge acquisition process generates an event-to-situation mapping file for efficiently mapping situation to events in runtime. Rules are fed back into a knowledge repository and process for reuse. The off-line knowledge acquisition process provides methods to reiterate the process of mining (autonomically and/or by human interaction) to improve the rules and confidence level assigning the situation categories. A runtime categorizer component uses the event-to-situation mapping file to add situation categories to the IT resource events. The runtime categorizer uses a plurality of annotator components each capable of adding a situation annotation to incoming messages based on rules generated by the off-line knowledge acquisition process. An assessment component chooses the best situation category from those annotated by the annotator components. | 01-01-2009 |
20090276383 | RULES GENERATION FOR IT RESOURCE EVENT SITUATION CLASSIFICATION - A computer processing device receives computer readable data to derive computer executable rules for mining and constructing situation categories. The received data is transformed into a predetermined standard format if the received data is not already in the predetermined standard format. The predetermined standard formatted data is parsed, and an outer, iterative loop is performed until at least one predetermined stopping criterion is met. An inner iterative loop is performed within the outer iterative loop until all desired subsets of data are processed. During the inner iterative loop, selected subsets of data are labeled with labels associated with corresponding previously labeled subsets of data. New computer executable rules are generated for mining and constructing situation categories from the labeled subsets of data. Keyword list classifiers are transformed using the stored labeled subsets of data. | 11-05-2009 |
David Matthew Loewenstern, New York, NY US
Patent application number | Description | Published |
---|---|---|
20130086100 | Method and System Providing Document Semantic Validation and Reporting of Schema Violations - A method includes receiving a request from a requestor to validate a data assemblage expressed in Javascript Object Notation (JSON); translating the data assemblage expressed in JSON into an extensible markup language (XML) instance; validating the XML instance using syntactic schema and semantic schema specifications; and sending a response to the requestor. For a case where the data assemblage contains invalid data in at least one field the response includes an output array containing information for specifying valid data for the at least one field and a message explaining a reason why the field is invalid. A system for performing the method is also described, as is a computer program product that can be used to execute the method. | 04-04-2013 |
20130086462 | Method and System for Retrieving Legal Data for User Interface Form Generation by Merging Syntactic and Semantic Contraints - An aspect of this invention is a method that includes receiving input data from an application. The input data includes information descriptive of at least one field. The method further includes processing the input data to form an array composed of legal data for the at least one field. The array is formed by merging a result of processing syntactic constraints and a result of processing semantic constraints. The method further includes outputting the array to the application. A system for performing the method is also described, as is a computer program product that can be used to execute the method. | 04-04-2013 |
20130275085 | PERFORMANCE MANAGEMENT AND QUANTITATIVE MODELING OF IT SERVICE PROCESSES USING MASHUP PATTERNS - Methods and arrangements for quantitatively modeling service processes. A process is assimilated, the process comprising at least one step. At least one quantitative metric with respect to the process is estimated, and at least one mashup pattern applicable to the process is determined, the at least one mashup pattern comprising at least one mashup pattern applicable to at least one process step. The determining includes recalculating the at least one quantitative metric in consideration of at least one mashup pattern and applying at least one mashup pattern to the process responsive to improvement in the at least one quantitative metric. | 10-17-2013 |