Patent application number | Description | Published |
20120143774 | Techniques for Creating Service Status Abstraction Layers Based on Client Roles in a Business Process Management Scenario - Techniques for role-based service operation status reporting to clients are provided. In one aspect, a method for reporting a status of a service operation to a client is provided. The method includes the following steps. A sequence of business process steps involved in performing the service operation is identified. One or more abstractions of the business process steps are made, each abstraction containing a sequence of a fewer number of steps than the business process, wherein the number of steps in each of the abstractions correlates with a level of detail about the service operation. The status of the service operation is reported to the client based on a given one of the abstractions having the level of detail best suited to a role of the client. | 06-07-2012 |
20130138812 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR COST-AWARE SELECTION OF TEMPLATES FOR PROVISIONING SHARED RESOURCES - A template generator organizing templates in a cost-aware clustering, a method of allocating resources using cost-aware clustering and computer program products therefor. A resource provisioning unit generates, selects and maintains a selected number of resource templates. Each template specifies an allocable resource capacity configuration. Each requesting client device has resources allocated determined by one of the selected resource templates. A resource provisioning unit includes a configuration store with costs of allocable resources and associated attributes, a server request store with previously received requests, and an input parameter store with template list options. A template generator determines an optimum list of templates to satisfy previously received requests. A template store stores generated template lists. | 05-30-2013 |
20140149983 | REPLACING VIRTUAL MACHINE DISKS - At least one target virtual disk descriptor that describes at least one virtual disk associated with an existing target virtual machine in a target virtualized environment is merged with at least one source virtual disk descriptor that describes at least one virtual disk associated with a source. The merging is carried out to obtain at least one merged virtual disk descriptor compatible with the target virtualized environment. The at least one virtual disk associated with the existing target virtual machine in the target virtualized environment is replaced with the at least one virtual disk associated with the source, in accordance with the at least one merged virtual disk descriptor. | 05-29-2014 |
20150261842 | CONFORMANCE SPECIFICATION AND CHECKING FOR HOSTING SERVICES - One or more requirements of a target hosting environment are captured in a specification. The specification is automatically checked against a source content of a source environment with a conformance checker, where the source content is to be migrated to the target hosting environment. It is determined whether the source content conforms to the specification. | 09-17-2015 |
20160036817 | Protected Graphical User Interface for Role-Based Application and Data Access - Methods, systems, and computer program products for a protected graphical user interface for role-based application and data access are provided herein. A method for controlling access on an endpoint device to at least a portion of an application includes obtaining a default configuration indicating whether one or more widget functions associated with the application are enabled in a graphical user interface; modifying one or more of the widget functions in the default configuration to a disabled status in the graphical user interface based on a privilege configuration; determining if one or more user click events generated using the graphical user interface are associated with a widget function having the disabled status; and preventing the user click events having the disabled status from being provided to an operating system for further processing, wherein at least one of the steps is carried out by a computing device. | 02-04-2016 |
20160048685 | PROTECTED SHELL FOR RISK VALIDATION - On a computer system, a shell is invoked, through which a plurality of commands and/or scripts can be executed. Individual ones of the plurality of commands and/or scripts are validated. Given individual ones of the plurality of commands and/or scripts, for which the validation is successful, are executed via the shell. | 02-18-2016 |
20160110215 | REPLACING VIRTUAL MACHINE DISKS - At least one target virtual disk descriptor that describes at least one virtual disk associated with an existing target virtual machine in a target virtualized environment is merged with at least one source virtual disk descriptor that describes at least one virtual disk associated with a source. The merging is carried out to obtain at least one merged virtual disk descriptor compatible with the target virtualized environment. The at least one virtual disk associated with the existing target virtual machine in the target virtualized environment is replaced with the at least one virtual disk associated with the source, in accordance with the at least one merged virtual disk descriptor. | 04-21-2016 |