Patent application number | Description | Published |
20080304496 | Inferred Discovery Of A Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 12-11-2008 |
20100332645 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT IN A COMPUTING ENVIRONMENT - A method and system for monitoring resources in a network of resources in a computing environment, is provided. One implementation involves discovering resources in the network; constructing a topology model including event information for each discovered resource; providing queries for polling the models for event information, such that the resources need not be polled; executing one or more queries against one or more models; evaluating the query results to ascertain whether or not an event has affected what is considered to be normal for the result of each query; and presenting the evaluation results to enable monitoring of the resources. | 12-30-2010 |
20110032260 | ENHANCING VISUALIZATION OF RELATIONSHIPS AND TEMPORAL PROXIMITY BETWEEN EVENTS - Components and functionality can be implemented in an event management application to display events along a timeline. A display interval can be configured for the timeline and a scroll bar can allow scrolling to view different time periods on the timeline. In addition, filters may be applied to the events, so that relationships between events may be visualized. For example, the events may be filtered by network resource name, so that groups of events related to each network resource can be grouped together along the timeline. | 02-10-2011 |
20110035628 | System And Method For Correlating Carrier Ethernet Connectivity Fault Management Events - A method, system and computer-usable medium are disclosed for suppressing managed endpoint (MEP) child events in a network. A MEP multicast message is broadcast by an originating MEP. Responses received from peer MEPs within a selected time interval are processed to determine their respective IP address, MAC address, and VLAN. If this information is not currently stored in a table of peer MEP device information associated with the originating MEP, then it is added. The responding MEP is then marked in the peer MEP device table as having responded. Peer MEP devices that have responded to previous multicast messages, but have now failed to respond within the selected time interval, are determined. A MEP network event is generated, comprising the IP address of the device containing the MEP, the MAC address for inward-facing MEPs, the MAC address of the associated bridge, the port addresses for outward-facing MEPs, and associated VLAN information. If another MEP network event occurs, the MAC address of the MEP and its VLAN information is determined. If the VLAN associated with the current MEP network event contains a MAC address associated with a prior MEP network event, then the MEP network event is designated as a child MEP network event and suppressed. Otherwise, the MEP network event is designated as a parent MEP network. | 02-10-2011 |
20110292834 | Maintaining Time Series Models for Information Technology System Parameters - A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern. | 12-01-2011 |
20120250522 | Inferred Discovery of a Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 10-04-2012 |
20130179793 | ENHANCING VISUALIZATION OF RELATIONSHIPS AND TEMPORAL PROXIMITY BETWEEN EVENTS - Components and functionality can be implemented in an event management application to display events along a timeline. A display interval earl be configured for the timeline and a scroll bar can allow scrolling to view different time periods on the timeline. In addition, filters may be applied to the events, so that relationships between events may be visualized. For example, the events may be filtered by network resource name, so that groups of events related to each network resource can be grouped together along the timeline. | 07-11-2013 |
20140115139 | Service Placement on Hosts for a Consumer Based on Their Geographic Location - Techniques are provided for service placement on hosts for a consumer based on geographic location The techniques include: determining a geographical location of a consumer; and inputting a topology model of an environment including multiple candidate hosts to support a service required by the consumer, the topology model including: a geographic location of each of resource in the environment; and connectivity details between the resources and between the resources and the consumer. The techniques also include: specifying bounding requirements for a host and/or bounding requirements for a path between the consumer to a host; calculating the distance from a candidate host to the consumer; determining if bounding requirements are met by a candidate host; and ordering candidate hosts that meet bounding requirements by distance. | 04-24-2014 |
20140192682 | Inferred Discovery of a Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 07-10-2014 |