Patent application number | Description | Published |
20090313599 | Method for handling cross-cutting concerns at business level - A method for handling cross-cutting concerns at business level while developing enterprise application is disclosed. The method identifies the common variation requirements for the common cross cutting business concerns. The method then identifies the architecture strategies to enable identified variations and based on those strategies define an architecture with well defined variation points and finally define mechanisms for bundling such variations. The proposed solution describes how business aspects can be developed for applying cross cutting business concerns using the Infosys RADIEN Framework. | 12-17-2009 |
20100175044 | METHOD FOR CREATING SOFTWARE FACTORY FOR DEVELOPING J2EE APPLICATIONS - Methods for creating a factory, such as a software factory, a user experience factory, and a persistence factory, for developing one or more Java 2 Platform, Enterprise Edition (J2EE) applications. One or more artifacts related to the J2EE applications, such as code components, workflow scripts, and build scripts, are identified. Further, one or more templates are created for generating the one or more artifacts. The templates may be created based on a predefined architecture and coding conventions. These templates are stored in a repository to enable their subsequent reuse. Thereafter, one or more relationships between the artifacts are defined in a factory schema. Subsequently, the factory is created using the factory schema and the templates. The factory thus created may be used to develop the J2EE applications. | 07-08-2010 |
20120047107 | SYSTEM AND METHOD FOR IMPLEMENTING ON DEMAND CLOUD DATABASE - A method for dynamic management of one or more cloud database nodes is provided. The method enables gathering information related to usage of one or more cloud database nodes. The method further enables comparing time required by the one or more cloud database nodes for responding to one or more requests with a predetermined threshold. Furthermore, the method enables provisioning one or more new cloud database nodes or removing one or more new cloud database nodes based on at least one of: the gathered information, the comparison and a combination thereof. | 02-23-2012 |
20120089726 | AUTOMATED SERVICE LEVEL MANAGEMENT OF APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT - Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers. Automated dynamic migration of applications in a cloud computing environment comprises deciding to migrate an application, obtaining application resource requirements, identifying application server candidates, selecting an application server from one of the candidates, and migrating the application. | 04-12-2012 |
20120131090 | DISTRIBUTED REGISTRY FOR DEVICE DISCOVERY USING QUORUM CONSENSUS PROTOCOL - A distributed hierarchical registry provides services, such as registry services, including client device discovery and communication services. The distributed hierarchical registry comprises a plurality of registry groups where a registry group comprises a plurality of registry servers. The registry servers receive client device information, such as status, capability, and usage information, and update other registry servers, in the same registry group and/or in other registry groups, using a quorum consensus protocol. The registry servers also respond to lookup requests from client devices. Registry servers use policies to define parameters such as a number of registry servers that make up a read quorum and the number of registry servers that make up a write quorum. | 05-24-2012 |
20120259963 | SYSTEM AND METHOD FOR FAST SERVER CONSOLIDATION - System and computer-implemented method for determining optimal combinations of elements having multiple dimensions, including determining the optimal number of destination servers for server consolidation, wherein existing servers are evaluated across multiple dimensions. | 10-11-2012 |
20120260134 | METHOD FOR DETERMINING AVAILABILITY OF A SOFTWARE APPLICATION USING COMPOSITE HIDDEN MARKOV MODEL - The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components are identified and also the state of the sub-components is determined. The state of the sub-components is represented in CHMM using state space diagram. The failure rate and recovery time of the sub-components is computed using the state space diagram and the respective transition tables are derived from the CHMM to determine the availability of the layers. The availability of the layers is combined to determine the availability of the software application. | 10-11-2012 |
20120296866 | SYSTEM AND METHOD FOR IMPLEMENTING ON DEMAND CLOUD DATABASE - A method for dynamic management of one or more cloud database nodes is provided. The method enables gathering information related to usage of one or more cloud database nodes. The method further enables comparing time required by the one or more cloud database nodes for responding to one or more requests with a predetermined threshold. Furthermore, the method enables provisioning one or more new cloud database nodes or removing one or more new cloud database nodes based on at least one of: the gathered information, the comparison and a combination thereof. | 11-22-2012 |
20130305245 | METHODS FOR MANAGING WORK LOAD BURSTS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and resource management computing device comprises identifying one or more workload bursts in a production environment. One or more additional resources in a non-production environment required to manage the one or more workload burst in a production environment is determined by comparing an environment resource consumption value against a permissible maximum value, wherein the environment resource consumption value is a value indicating usage of each of the one or more resources. One or more additional resources are identified in the non-production environment. The identified one or more additional resources are provided to handle the one or more workload bursts. | 11-14-2013 |
20130339759 | METHOD AND SYSTEM FOR AUTOMATED APPLICATION LAYER POWER MANAGEMENT SOLUTION FOR SERVERSIDE APPLICATIONS - According to the one aspect of the present disclosure, a method for automated datacenter power management comprises, monitoring a metrics of an entity such as a virtual machine, an application level, a host level and an application platform. The method further comprises forecasting an application power usage by using monitored information from the entity. The monitored information can be but not restricted to a forecasted data, a historical data or a real-time data. Furthermore, the method also comprises the step of applying at least one control to the entity to manage the application power usage. The at least one control can be but not restricted to changing resource pool size at application platform level, changing resource allocations the virtual machine level and changing a processor clock speed at the host level to manage application power usage. | 12-19-2013 |
20140149566 | SYSTEM AND METHOD FOR DETERMINING OPTIMAL COMBINATIONS - A computer-implemented method, apparatus, and non-transitory computer-readable medium for determining optimal combinations of elements having multiple dimensions, including removing all multi-dimensional elements from a combination matrix which have a dimension corresponding to a highest classification in a plurality of classifications, iteratively combining one or more multi-dimensional elements from a first end of the combination matrix and one or more multi-dimensional elements from a second end of the combination matrix to generate one or more combined multi-dimensional elements, incrementing a count of packed combinations when a combined multi-dimensional element in the one or more combined multi-dimensional elements has a dimension corresponding to the highest classification in the plurality of classifications, and removing a combined multi-dimensional element in the one or more combined multi-dimensional elements from the combination matrix when the combined multi-dimensional element has a dimension corresponding to the highest classification in the plurality of classifications. | 05-29-2014 |
20140289412 | SYSTEMS AND METHODS FOR ALLOCATING ONE OR MORE RESOURCES IN A COMPOSITE CLOUD ENVIRONMENT - This technology relates to a device, method, and non-transitory computer readable medium for allocating one or more resources optimally in a composite cloud environment. This technology involves configuring organization and service level quota values, describing service composition, service unit, service level agreement, defining allocation model and resource allocation optimization algorithm. Based on these predefined rules the infrastructure, software and manual resources are assigned, future allocation is forecasted and resources are allocated to complete the service requests received from the users. | 09-25-2014 |
20140379539 | SYSTEMS AND METHODS FOR GENERATING BILLING DATA OF A COMPOSITE CLOUD SERVICE - The technique relates to a system and method for generating billing data of a composite cloud service. The technique tracks and meters manual service usage along with the infrastructure and software usage to generate billing data for the composite cloud service. The technique involves receiving a user request for the composite cloud service. After receiving the user request, one or more infrastructure, software and manual resources required to fulfill the user request are provisioned. Thereafter, the consumption of the one or more infrastructure, software and manual resources in real time to fulfill the user request is measured based on a predefined monitoring metrics. Finally, billing data for the composite cloud service is generated based on the measured consumption data of the one or more infrastructure, software and manual resources, a predefined chargeback model and a predefined billing policy. | 12-25-2014 |
20140379702 | SYSTEM FOR INFLUENCER SCORING AND METHODS THEREOF - Systems and methods for leveraging social media data by entities to identify key influencers are disclosed. Monitoring criteria is based on a selected subject-matter. The analysis permits quantification of influencers and takes into account the conversari platforms and the published platforms in the social media. | 12-25-2014 |
20150088959 | METHOD AND SYSTEM FOR AUTOMATED TRANSACTION ANALYSIS - The present invention relates to a method and a system to automate identification of transactions. The method comprises receiving raw log files from a transaction device into a log collector, storing the raw log files to a log storage, processing the raw log files by a log parser unit to remove the fields and the entries of the raw log files that are not relevant for the transaction identification analysis, identifying of at least one session of at least one user by clustering the processed one or more entries from a single user session using at least one session identifier unit, identifying at least one user path that is followed by at least one user during a single user session, identifying at least one entry point from the identified single user path and determining at least one transaction and at least one sub transaction from the identified entry point. | 03-26-2015 |