Patent application number | Description | Published |
20100011343 | REMOTE PRODUCT INVOCATION FRAMEWORK - A method for remote product invocation includes configuring an invocation framework that includes an integration module and an endpoint/handler module. Once configured, the integration module is configured to: receive a source object; format data from said source object for a desired operation; and utilize said endpoint/handler module to make a connection to an external service that executes said desired operation using said data from said source object. A system for remote invocation of external services includes a calling entity which generates a source object containing data for execution of a remote operation; and an integration module configured to receive the source object, interpret the source object, and pass the data to an endpoint/handler which opens a connection with an external service and executes the remote operation. | 01-14-2010 |
20100011408 | Implementing Organization-Specific Policy During Establishment of an Autonomous Connection Between Computer Resources - An organization-specific policy is implemented during establishment of an autonomous connection between computer resources includes evaluating a relative priority between default credentials and alternative credentials; and using the highest priority credentials to establish a connection between the computer resources. The alternative credentials are based organization-specific policy and provide for autonomous connections between computer resources differently than the default credentials. | 01-14-2010 |
20110154317 | Imposing Pre-Installation Prerequisite Checks on the Install User to Ensure a Higher Rate of Installation Success - Methods, systems and computer products are provided for imposing pre-installation prerequisite checks on the install user to ensure a higher rate of installation success. Projected failure rates are calculated for scenarios in which a user opts to not perform one or more prerequisite activities prior to the installation. The system prompts the user to perform the prerequisites, and provides installation advices showing the projected failure rates in the event the user opts out of performing one or more prerequisites. The system may not allow the user to bypass some prerequisites designated as being mandatory to the installation. | 06-23-2011 |
20110320606 | Allocating Computer Resources in a Cloud Environment - A method, data processing system, and computer program product for managing resources. A request for resources in the network data processing system is received. The request comprises requested values for a plurality of attributes for the resources in the network data processing system. In response to receiving the request, potential resources in the network data processing system are identified. The request is evaluated using a function configured to generate identified values for the plurality of attributes from the requested values in the request based on proximity scores for the plurality of attributes in the potential resources relative to an ideal allocation of the potential resources and resource weights for the plurality of attributes in the potential resources. | 12-29-2011 |
20120096165 | REALLOCATING RESOURCE CAPACITY AMONG RESOURCE POOLS IN A CLOUD COMPUTING ENVIRONMENT - In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments. The approach uses a rate of capacity consumption to calculate the risk of consuming the available capacity in each resource pool (e.g., resource pools allocated to satisfy different levels of service with different SLA failure penalties). Based on the relative available capacity in each pool (as determined by the pool rate of consumption), resources are reallocated to maximize revenue (e.g., reduce financial penalty) across a resource pool set. | 04-19-2012 |
20120191858 | Allocating Computer Resources in a Cloud Environment - A method, data processing system, and computer program product for managing resources. A request for resources in the network data processing system is received. The request comprises requested values for a plurality of attributes for the resources in the network data processing system. In response to receiving the request, potential resources in the network data processing system are identified. The request is evaluated using a function configured to generate identified values for the plurality of attributes from the requested values in the request based on proximity scores for the plurality of attributes in the potential resources relative to an ideal allocation of the potential resources and resource weights for the plurality of attributes in the potential resources. | 07-26-2012 |
20130055202 | IDENTIFYING COMPONENTS OF A BUNDLED SOFTWARE PRODUCT - A method for identifying software components of a software product comprises establishing, by a computer, data representative of at least one of an attribute and an action of at least one of a first software component in a computer system and a second software component in the computer system, establishing a first confidence value indicative of a likelihood that the first software component belongs to the software product, establishing, based on the data, a second confidence value indicative of a likelihood that the first software component and the second software component are software components of a common software product, and establishing, based on the first and second confidence values, a third confidence value indicative of a likelihood that the second software component belongs to the software product. | 02-28-2013 |
20130159972 | IDENTIFYING COMPONENTS OF A BUNDLED SOFTWARE PRODUCT - A method for identifying software components of a software product comprises establishing, by a computer, data representative of at least one of an attribute and an action of at least one of a first software component in a computer system and a second software component in the computer system, establishing a first confidence value indicative of a likelihood that the first software component belongs to the software product, establishing, based on the data, a second confidence value indicative of a likelihood that the first software component and the second software component are software components of a common software product, and establishing, based on the first and second confidence values, a third confidence value indicative of a likelihood that the second software component belongs to the software product. | 06-20-2013 |
20130226922 | Identification of Complementary Data Objects - In one aspect, the description relates to identifying complementary data objects, including providing a plurality of data objects, applying a clustering algorithm for grouping at least some of the data objects into two or more clusters, for each of the clusters, calculating a cluster center, calculating, for at least a first one of the cluster centers, a complementary cluster center, determining a second cluster center of a second cluster, the second cluster center being determined as the one of the cluster centers having the smallest distance in respect to the complementary cluster center, selecting at least one data object of the determined second cluster. Other features and aspects may be realized, depending upon the particular application. | 08-29-2013 |
20140143768 | MONITORING UPDATES ON MULTIPLE COMPUTING PLATFORMS - According to one aspect of the present disclosure, a method and technique for monitoring updates on multiple computing platforms is disclosed. The method includes: initiating an update to a plurality of computing platforms; analyzing tracking data corresponding to each of the plurality of computing platforms indicating an installation progress of the update; dynamically calculating a timeout period for an installation of the update based on the tracking data; and displaying the installation progress for each of the plurality of computing platforms relative to the timeout period. | 05-22-2014 |
20140325076 | REALLOCATING RESOURCE CAPACITY AMONG RESOURCE POOLS IN A CLOUD COMPUTING ENVIRONMENT - In general, the embodiments of the present invention provide an approach for rebalancing/reallocating cloud resource capacities between resource pools that provide variable customer assurances and delivery penalties when assurances are not met. The variables that are considered hereunder include, overall ‘reservations’, total current capacity, remaining capacity against unused reservations and penalties that apply for failing to satisfy ‘reservation’ commitments. The approach uses a rate of capacity consumption to calculate the risk of consuming the available capacity in each resource pool (e.g., resource pools allocated to satisfy different levels of service with different SLA failure penalties). Based on the relative available capacity in each pool (as determined by the pool rate of consumption), resources are reallocated to maximize revenue (e.g., reduce financial penalty) across a resource pool set. | 10-30-2014 |
Patent application number | Description | Published |
20080263060 | Policy-Based Access Control Approach to Staff Activities of a Business Process - A computer implemented method, data processing system, and computer program product for dynamically binding business process activities to human entities at deployment time. Identification information about a staff activity in a business process is received from a process server at an access control system external to the process server. Responsive to initiation of the business process, the staff activity is resolved at the access control system at runtime by assigning the staff activity to a user based on an access policy of the access control system to form a staff activity assignment. The staff activity assignment is communicated from the access control system to the process server. The process allows the development of the business process to be entirely decoupled from staff activity resolution at runtime. | 10-23-2008 |
20090019438 | METHOD AND APPARATUS FOR SELECTING A SYSTEM MANAGEMENT PRODUCT FOR PERFORMANCE OF SYSTEM MANAGEMENT TASKS - A computer implemented method, apparatus, and computer program product for managing a system. The process stores information regarding performance of a system management task to form a task execution history in response to performing a system management task. After receiving a request to perform to subsequent system management task, the process determines whether a task execution history is present for the subsequent system management task. The process then presents the task execution history for the subsequent task to a user for use in selecting a system management product from a plurality of system management products in response to the task execution history being present. | 01-15-2009 |
20090094462 | SYSTEM AND METHOD FOR SELF POLICING OF AUTHORIZED CONFIGURATION BY END POINTS - A system, method, and program product is provided that distributes authorized changes to the organization's entities and has the individual computer systems police configuration changes. A system receives change approval packages, each of the change approval packages including authorized change identification data that identifies authorized changes to the system. The authorized change identification data are stored in a storage area of the system. Subsequently, a change package is received by the computer system. The change package includes a change to the computer system and metadata that identifies the change. The metadata is compared with the authorized change identification data. If the metadata matches one of the authorized change identification data, then the change is installed, otherwise the change is rejected. | 04-09-2009 |
20120209992 | SYSTEM FOR METERING IN AN ON-DEMAND UTILITY ENVIRONMENT - A method for metering on-demand service (ODS) resource consumption by a user comprising a web services interface, a processing engine, and configuration data. A data gathering agent in the ODS stores the usage data in records, combines the records into packets, and transmits the packets to the web services interface. The web services interface passes the packets onto the processing engine, which stores the records in the packet into a database. The generalized format of the record is critical because it allows the metrics to be stored in the record table with the usage data. When a record contains an instruction to close a UOW, the processing engine applies the configuration data comprising composition rules and record selection rules to the database. The record selection rules select the desired records from the database. The composition rules aggregate, normalize, and compose the selected records to produce a metric. | 08-16-2012 |
20150256630 | UNUSED LOCATION DISCRIMINATOR - Instrumentalities are effective to at least provide a user interface to a mobile device of the user for finding an unused space, among a plurality of spaces, according to a user-selected criteria, wherein the user interface is transmitted via a wireless protocol agreed during the wireless handshake; and in response, presenting the mobile device with first unused spaces meeting the user-selected criteria. Further, an access point may receive a problem space indication from the user concerning at least one of the unused spaces which associates a problem to the at least one of the unused spaces, thereby forming a problem space, and in response, second presenting a second at least one unused space to the mobile device without the problem space, wherein the second unused spaces are presented in order of nearness to a current user location. | 09-10-2015 |
Patent application number | Description | Published |
20100218031 | ROOT CAUSE ANALYSIS BY CORRELATING SYMPTOMS WITH ASYNCHRONOUS CHANGES - An indication of a problem in at least one component of a computing system is obtained. A relevant change set associated with a directed dependency graph is analyzed. The computing system is configured to proactively overcome a root cause of the problem. The relevant change set includes a list of past changes to the computing system which are potentially relevant to the problem. The directed dependency graph includes dependency information regarding given components of the computing system invoked by transactions in the computing system. The analyzing includes identifying at least one of the past changes to the computing system that is the root cause of the problem. | 08-26-2010 |
20100332991 | Increasing Resilience of a Network Service - A set of data is obtained, representing a graph of a computer network having a set of hardware nodes and a set of hardware links between the hardware nodes. The hardware links are represented as edges in the graph. A first subset (for example, a vertex cut set) of the set of hardware nodes is found, such that those of the hardware nodes in the first subset are able to withstand a maximum number of failures before the graph disconnects. The failures include node failures and/or edge failures. The hardware nodes in the first subset are ranked based on expected resiliency, to obtain a ranked list. Optionally, in case of a tie between two or more of the hardware nodes in the ranked list, the tie is broken using a sum of shortest path metric. | 12-30-2010 |
20110054964 | Automatic Documentation of Ticket Execution - Techniques for automatically documenting activity data in connection with execution of a ticket are provided. The techniques include receiving activity data in connection with execution of a ticket, processing the activity data to generate an output, and appending the processed activity data output to the ticket for ticket enrichment. Techniques for identifying a wrong choice of resolution code in connection with a ticket are also provided. The techniques include analyzing one or more previous tickets to determine a category in which a ticket belongs, determining whether a user-defined code is in variance with a system-suggested code, and sending an alert to a system administrator if the user-defined code is different than the system-suggested code. | 03-03-2011 |
20110258478 | FACADE FOR BUSINESS RISK MINIMIZATION IN CHANGE ADMINISTRATION VIA RISK ESTIMATION AND MISTAKE IDENTIFICATION BY TICKET ANALYSIS - A system and method of employing a façade to intercept change action commands to be carried out on a target IT endpoint resource. The intercepted commands are compared to information on a corresponding change ticket and any differences, along with the information such as target history, are used to compute a risk assessment of the risk in allowing the intercepted change action commands to be executed. Where the risk exceeds a predetermined threshold, the intercepted change action commands may be modified or eventually aborted. | 10-20-2011 |
20120124173 | CONTENT DELIVERY USING MULTIPLE SOURCES OVER HETEROGENEOUS INTERFACES - Provided is a system for the distribution of data, comprising a data server comprising a processor, a computer-readable storage medium coupled to the data server, a plurality of proxy servers, each with a plurality of network interfaces, a file of digital content, comprising a plurality of chunks, wherein copies of each chunk are stored on two or more of the proxy servers and the digital server; and logic, stored on the computer-readable storage medium and executed on the processor, for receiving a request for the digital file from a client device, for generating a proxy list for each chunk, comprising information identifying the two or more proxy servers on which the copies of the chunks are stored, and information corresponding to network interfaces associated with the two or more proxy servers on which the copies are stored; and for transmitting the proxy list to the client device to enable the client device to select two or more proxy servers on which the copies are stored and simultaneously download the two or more of the chunks utilizing two or more proxy servers and two or more network interfaces. | 05-17-2012 |
20130054220 | ARRANGEMENTS FOR EXTENDING CONFIGURATION MANAGEMENT IN LARGE IT ENVIRONMENTS TO TRACK CHANGES PROACTIVELY - Methods and arrangements for tracking changes in an information technology environment. Configuration dependencies are learned in a production environment, and a model of the production environment is built. Events on a target system in the production environment are subscribed to. Events are received and correlated with the model to generate an enhanced model, and the enhanced model is thereupon employed to predict configuration errors. | 02-28-2013 |
20130124689 | CONTENT DELIVERY USING MULTIPLE SOURCES OVER HETEROGENEOUS INTERFACES - Provided is a system for the distribution of data, comprising a data server comprising a processor, a computer-readable storage medium coupled to the data server, a plurality of proxy servers, each with a plurality of network interfaces, a file of digital content, comprising a plurality of chunks, wherein copies of each chunk are stored on two or more of the proxy servers and the digital server; and logic, stored on the computer-readable storage medium and executed on the processor, for receiving a request for the digital file from a client device, for generating a proxy list for each chunk, comprising information identifying the two or more proxy servers on which the copies of the chunks are stored, and information corresponding to network interfaces associated with the two or more proxy servers on which the copies are stored; and for transmitting the proxy list to the client device to enable the client device to select two or more proxy servers on which the copies are stored and simultaneously download the two or more of the chunks utilizing two or more proxy servers and two or more network interfaces. | 05-16-2013 |
Patent application number | Description | Published |
20120079242 | PROCESSOR POWER MANAGEMENT BASED ON CLASS AND CONTENT OF INSTRUCTIONS - A processor and method are disclosed. In one embodiment the processor includes a prefetch buffer that stores macro instructions. The processor also includes a clock circuit that can provide a clock signal for at least some of the functional units within the processor. The processor additionally includes macro instruction decode logic that can determine a class of each macro instruction. The processor also includes a clock management unit that can cause the clock signal to remain in a steady state entering at least one of the units in the processor that do not operate on a current macro instruction being decoded. Finally, the processor also includes at least one instruction decoder unit that can decode the first macro instruction into one or more opcodes. | 03-29-2012 |
20120079303 | METHOD AND APPARATUS FOR REDUCING POWER CONSUMPTION IN A PROCESSOR BY POWERING DOWN AN INSTRUCTION FETCH UNIT - An apparatus and method are described for reducing power consumption in a processor by powering down an instruction fetch unit. For example, one embodiment of a method comprises: detecting a branch, the branch having addressing information associated therewith; comparing the addressing information with entries in an instruction prefetch buffer to determine whether an executable instruction loop exists within the prefetch buffer; wherein if an instruction loop is detected as a result of the comparison, then powering down an instruction fetch unit and/or components thereof; and streaming instructions directly from the prefetch buffer until a clearing condition is detected | 03-29-2012 |
20130290678 | INSTRUCTION AND LOGIC TO LENGTH DECODE X86 INSTRUCTIONS - Techniques to increase the consumption rate of raw instruction bytes within an instruction fetch unit. An instruction fetch unit according to embodiments of the present invention may include a prefetch buffer, a set of bypass multiplexers, an array of bypass latches, a byte-block multiplexer, an instruction alignment multiplexer, a predecode cache, and an instruction length decoder. Raw instruction bytes may be steered from the bypass latches into macro-instructions for consumption by the instruction length decoder, which may generate micro-instructions from the macro-instructions. Embodiments of the present invention may de-couple a latency for reading raw instruction bytes from the prefetch buffer from consuming raw instruction bytes by the instruction length decoder. | 10-31-2013 |
20140189324 | PHYSICAL REGISTER TABLE FOR ELIMINATING MOVE INSTRUCTIONS - Embodiments of an invention for a physical register table for eliminating move instructions are disclosed. In one embodiment, a processor includes a physical register file, a register allocation table, and a physical register table. The register allocation table is to store mappings of logical registers to physical registers. The physical register table is to store entries including pointers to physical registers in the mappings. The number of entry locations in the physical register table is less than the number of physical registers in the physical register file. | 07-03-2014 |
20140365749 | USING A SINGLE TABLE TO STORE SPECULATIVE RESULTS AND ARCHITECTURAL RESULTS - Some implementations provide techniques and arrangements that include a physical register file to store a speculative result of executing a operation and to store an architectural result after the operation is retired and a rename alias table to store a speculative result pointer to the speculative result stored in the physical register file, an architectural result pointer to the architectural result stored in the physical register file, and a result selection field to indicate whether to select the speculative result pointer or the architectural result pointer. | 12-11-2014 |