Patent application number | Description | Published |
20080228873 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 09-18-2008 |
20080235373 | SYSTEM AND METHOD FOR DETECTING STATUS CHANGES IN A NETWORK USING VIRTUAL COORDINATE MAPPING - A system and method for scalable status change detection in a network of nodes includes embedding node coordinate positions into a virtual map environment. A cluster of nodes are represented with a representative node to form a hierarchy of nodes and clusters where changes in a status of the representative node imply a status change in the nodes of the cluster. By selectively monitoring the representative nodes for the changes in status, the representative nodes create a capability for scalable monitoring of the network. | 09-25-2008 |
20080250135 | METHODS AND COMPUTER PROGRAM PRODUCTS FOR MANAGING APPLICATION PERFORMANCE ON A NETWORK - Managing application performance on a network. A network graph is generated from a set of application endpoints on the network. The network graph is annotated by associating one or more of the application endpoints with at least one of a corresponding latency annotation or a corresponding available bandwidth annotation. An end to end plan is formulated from the annotated network graph, wherein the plan maps one or more application requirements onto the plurality of paths in accordance with one or more end to end control adjustments including at least one of a server selection adjustment, an internet service provider (ISP) selector, or an overlay routing adjustment. | 10-09-2008 |
20080259789 | METHOD AND APPARATUS FOR RE-ESTABLISHING ANONYMOUS DATA TRANSFERS - One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint. The neighbor node's repair server is contacted for a repair node associated with the neighbor node, and a connection to the repair node is made such that the path is established in a manner that maintains anonymity of the first endpoint and the second endpoint relative to each other. | 10-23-2008 |
20090055684 | METHOD AND APPARATUS FOR EFFICIENT PROBLEM RESOLUTION VIA INCREMENTALLY CONSTRUCTED CAUSALITY MODEL BASED ON HISTORY DATA - A system for problem resolution in network and systems management includes a database of trouble ticket data including information fields for checked components and affected components, an automated model builder system that processes the trouble ticket data to construct a causality model to represent causality information between system components identified in the checked component and affected component fields of the trouble ticket data, and an automated problem analysis system that receives information indicative of a problem event and determines a cause of the problem event using the causality model. | 02-26-2009 |
20090063673 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 03-05-2009 |
20090113031 | Method, Apparatus And Computer Program Product Implementing Multi-Tenancy For Network Monitoring Tools Using Virtualization Technology - Method, apparatus and computer program product manage a plurality of networks with a single tenant network management tool using virtualization and implement control plane virtualization of the single tenant management tool; data storage virtualization of a data storage apparatus and network address virtualization of an available address range. A virtual machine may be implemented for each network of the plurality of networks to contain an instance of the single tenant management tool. In one implementation, a proxy is used to implement data storage virtualization. In another implementation, separate data storage is maintained for each network and data storage virtualization is achieved by managing the network protocol stack virtualization. The network address virtualization may be implemented using machine-level virtualization or operating-system-level virtualization. | 04-30-2009 |
20090113243 | Method, Apparatus and Computer Program Product for Rule-Based Directed Problem Resolution for Servers with Scalable Proactive Monitoring - Method, apparatus and computer program product are configured to perform computer monitoring activities; to collect information regarding computer system status during the computer monitoring activities; to detect a problem in dependence on the information collected during the computer monitoring activities; and to determine whether to launch a diagnostic probe when the problem is detected. The monitoring activities may be performed on a periodic or event-driven basis. The determination whether to launch a diagnostic probe is based on a rule included in a hierarchy of rules. The hierarchy of rules is based on problem tickets; system logs; and computer system configuration information. | 04-30-2009 |
20100031095 | METHOD AND APPARATUS FOR ENHANCING TICKETING SYSTEM IN A SERVICE MANAGEMENT PROCESS FOR EFFICIENT PROBLEM RESOLULTION - Problem ticket usage is improved by adding dynamic information to the ticket or using dynamic information to prompt the user or customer for additional information. Two categories of dynamic information are used. In the case where an initial problem ticket involves identification of a problem component the dynamic information is derived from abnormal status of related components, such as components which support the problem component. In the case where an initial problem ticket involves problem symptom information, data is derived from resolved problem tickets by identifying important words or concepts which are stored in connection with the particular symptom. When later problem tickets having the same symptom are identified the related important words or concepts are either added to the problem ticket or are used to prompt customers or users for additional information. A system implementing an embodiment of the invention is also described. | 02-04-2010 |
20100082620 | METHOD FOR EXTRACTING SIGNATURE FROM PROBLEM RECORDS THROUGH UNSTRUCTURED AND STRUCTURED TEXT MAPPING, CLASSIFICATION AND RANKING - The structure attributes and unstructured attributes of a ticket are used to generate a problem signature. For structured attributes, correlation between field values is determined and fields with the highest weight are identified. For unstructured attributes, data mining techniques are applied to generate a plurality of keywords with a ranking for each ticket by identifying keywords, and commonly used acronyms and corpus variances. The set of structured attributes and the plurality of keywords from unstructured attributes form the signature of a given problem ticket. | 04-01-2010 |
20100100774 | AUTOMATIC SOFTWARE FAULT DIAGNOSIS BY EXPLOITING APPLICATION SIGNATURES - A method monitors non-faulty application traces of a computer application with the runtime environment during fault-free activities to create non-faulty runtime signatures for the computer application. Once obtained, the method stores the non-faulty runtime signatures. The method then detects a faulty application trace of the computer application and compares the faulty application trace with the non-faulty runtime signatures by comparing a call graph of the faulty application trace with call graphs of non-faulty application traces of the application signatures to identify differences between the two (e.g., fault attributes). Then the invention outputs the fault attributes to allow the user to identify a fault cause. | 04-22-2010 |
20100115340 | METHOD AND APPARATUS FOR PROACTIVE ALERT GENERATION VIA EQUIVALENT MACHINE CONFIGURATION DETERMINATION FROM PROBLEM HISTORY DATA - A method, and system employing the method, initiates proactive maintenance of computer systems and/or devices in a computer network. The method determines the subsystems of the computers and network devices and analyzes their configuration data including their respective subsystems. The method generates maintenance characteristics for the devices, and determines a maintenance event for devices using the maintenance characteristics and the configuration data of the devices. The method initiates a maintenance solution of a device determined to have a problematic configuration. | 05-06-2010 |
20110125914 | END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA. | 05-26-2011 |
20110131330 | COLLOCATING DESKTOP VIRTUAL MACHINES TO PROXIMITY OF THE USER - A plurality of master desktop images for a plurality of users are stored at a plurality of geographically diverse data centers. At a first one of the data centers, a virtual desktop is constructed for a remote client. The virtual desktop is constructed from a given one of the master desktop images at the first one of the data centers and an individualized delta image for a user associated with the remote client. When it is determined that the remote client is at a geographical location wherein the first one of the data centers is not the closest one of the data centers to the remote client, the virtual desktop for the remote client is reconstructed at a second, closest, one of the data centers. The virtual desktop is reconstructed from a given one of the master desktop images at the second one of the data centers and the individualized delta image for the user associated with the remote client. A copy of the individualized delta image is moved from the first one of the data centers to the second one of the data centers to facilitate reconstructing the virtual desktop. | 06-02-2011 |
20110161456 | Apparatus and Method for Supporting Memory Management in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system. | 06-30-2011 |
20110167134 | Apparatus and Method for Supporting Memory Management in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system. | 07-07-2011 |
20110296021 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-01-2011 |
20110307887 | DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS - Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep state, implementing a virtual machine surrogate, wherein the virtual machine surrogate listens to network traffic, enabling the virtual machine to handle network traffic that is capable of being handled by the virtual machine, and enabling the virtual machine to queue network traffic and wake-up the virtual machine in the sleep state for network traffic that the virtual machine surrogate is incapable of handling. | 12-15-2011 |
20120036251 | METHOD AND SYSTEM FOR END-TO-END QUALITY OF SERVICE IN VIRTUALIZED DESKTOP SYSTEMS - A system and method is provided for integrating the front-end and back-end of a virtualized desktop environment to achieve an objective. Network measurements are gathered which are related to enforcement of an objective. Based on gathered network measurements and quality of service requirements for user sessions, a determination is made as to how back-resources and front-end remoting protocol settings are to be adjusted. The back-end resources and the front-end remoting protocol settings are controlled to achieve the objective. | 02-09-2012 |
20120124124 | Centralized Rendering Of Collaborative Content - A method is disclosed that includes rendering a portion of a collaborative data stream at a first application running in a first virtual machine on a physical server. The method also includes the first application sharing the rendered portion of the collaborative data stream with a multiplicity of second applications running in second virtual machines on the physical server. Apparatus and program products are also disclosed. | 05-17-2012 |
20120185848 | TASK PRIORITIZATION MANAGEMENT IN A VIRTUALIZED ENVIRONMENT - A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task. | 07-19-2012 |
20120215829 | METHOD AND APPARATUS FOR EFFICIENT AND ACCURATE ANALYTICS WITH CROSS-DOMAIN CORRELATION - A method of generating analytics to provide an analysis of data from distinct data domains includes collecting sensor data from at least two distinct data domains, deriving parameters from the collected data, wherein at least one of the parameters is a first domain parameter derived from one of the data domains and at least another one of the parameters is a second domain parameter derived from the other data domain, providing a data model that enables a user to specify at least one of the first parameters and at least one of the second domain parameters and generate at least one rule based on the selected parameters, and generating analytics that analyze the collected data against the rules to determinate whether the rules have been satisfied and provide results of the analysis to a user of the analytics. | 08-23-2012 |
20120221744 | Migrating Virtual Machines with Adaptive Compression - A method, data processing system, and computer program product for managing images. A processor unit divides an image for a virtual machine into blocks. The processor unit determines whether to compress the blocks prior to transmitting the blocks to a destination for the image. In response to a determination to compress the blocks, the processor unit compresses the blocks to form a compressed set of blocks. The processor unit sends the compressed set of blocks and any uncompressed blocks remaining in the blocks to the destination for the image. | 08-30-2012 |
20120260247 | Fine-Grained Cloud Management Control Using Nested Virtualization - A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. | 10-11-2012 |
20120297054 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 11-22-2012 |
20120324116 | Enabling Service Virtualization in a Cloud - A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services. | 12-20-2012 |
20130007268 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 01-03-2013 |
20130024573 | SCALABLE AND EFFICIENT MANAGEMENT OF VIRTUAL APPLIANCE IN A CLOUD - Data representative of a set of requests for cloud computing services is obtained. The services are to be provided by a cloud having a plurality of base images. The requests specify requested subsets of the base images. Data representative of provisioning and de-provisioning costs associated with the plurality of base images is obtained. Then, k composite virtual appliances are pre-provisioned. The composite virtual appliances include virtual appliance subsets of the base images, based on cost minimization, in accordance with the data representative of the set of requests and the data representative of the provisioning and de-provisioning costs. | 01-24-2013 |
20130061224 | MOVEABLE ACCESS CONTROL LIST (ACL) MECHANISMS FOR HYPERVISORS AND VIRTUAL MACHINES AND VIRTUAL PORT FIREWALLS - A computer implemented method of virtual machine migration with filtered network connectivity includes enforcing network security and routing at a hypervisor layer which is independent of guest operating systems via dynamic updating of routing controls initiated by a migration of said virtual machine from a first device to a second device. | 03-07-2013 |
20130103215 | UTILITY CONSUMPTION DISAGGREGATION USING LOW SAMPLE RATE SMART METERS - Utility meter readings generated at low sampling rates are disaggregated to identify consumer usage activities. Time intervals between readings can include a plurality of consumer usage activities. By employing a model which recognizes associations among consumer usage activities, effective disaggregation is possible using only aggregated consumption data and interval start times. Consumers and utility managers can design and assess conservation programs based on the disaggregated consumption usage activities. | 04-25-2013 |
20130116939 | BEHAVIOR CHANGE DETECTION - A computer program product includes a tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes, upon receiving utility consumption data of a group of elements, defining clusters of elements by like geography and like utility consumption, evaluating a significance of each cluster by comparing an average utility consumption within the cluster with utility consumption of elements neighboring the cluster and determining from a result of the evaluating which clusters exhibit significant differences in utility consumption from the neighboring elements and defining those clusters as regional outliers. | 05-09-2013 |
20130137450 | ENERGY EFFICIENT LOCATION TRACKING ON SMART PHONES - A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode. | 05-30-2013 |
20130205007 | SUGGESTING MIGRATION TO A CLOUD COMPUTING INFRASTRUCTURE - Embodiments of the present invention relate to an approach for suggesting/recommending migration of an IT environment to a cloud computing infrastructure. Specifically, in a typical embodiment, historical incident data of an information technology (IT) environment is analyzed. Based on the historical incident data, it may be determined whether a problem is recurring in the IT environment. If so, it may then be determined whether the problem can be mitigated in the cloud computing infrastructure. For example, it may be determined whether the cost of mitigating the problem by migrating to the cloud computing infrastructure is less than the cost of loss due to the problem within the current IT environment. A report particular to the IT environment that identifies a benefit of migrating the IT environment to the cloud computing infrastructure may be generated. | 08-08-2013 |
20130222158 | ELECTRIC VEHICLE (EV) CHARGING INFRASTRUCTURE WITH CHARGING STATIONS OPTIMUMALLY SITED - A system, method and program product for siting charging stations. A mobility detection module collects traffic data from vehicle sensors distributed in an area. A map matching module maps detected traffic in the area. A vehicle flow module temporally characterizes mapped traffic flow. An electric vehicle (EV) requirements (EVR) evaluator determines an optimal number of charging stations and respective locations for siting the charging stations. | 08-29-2013 |
20130291127 | ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT - Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images. | 10-31-2013 |
20130304363 | IDENTIFYING PURPOSE-BASED ORIGIN-DESTINATION USING CALL DETAILED RECORDS - Access is obtained to call data records (or other data) for a plurality of mobile telephony users. The call data records (or other data) include location-time sequences. For each of the mobile telephony users, corresponding ones of the location-time sequences are segmented into trips; a home-work-school classification model is used to determine a home location and a work-school location, based on the trips; and a trip purpose classification model is used to assign each of the trips a purpose label, based at least on comparing at least one of a start location and an end location for each one of the trips to at least one of the home location and the work-school location determined using the home-work-school classification model. The trips are aggregated into purpose based origin-destination categories based at least on the purpose labels, time ranges of the location-time sequences, and the start and end locations. | 11-14-2013 |
20140045535 | ENERGY EFFICIENT LOCATION TRACKING ON SMART PHONES - A GPS-enabled cellular electronic device is operated in an indoor mode. An increase in strength of a cellular signal is detected at the GPS-enabled cellular electronic device. Responsive at least to the increase in cellular signal strength, the GPS-enabled cellular electronic device is transitioned to an outdoor testing mode. Detecting is carried out to determine whether movement of the GPS-enabled cellular electronic device occurs during the outdoor testing mode. If so, the GPS-enabled cellular electronic device is transitioned to an outdoor mode. | 02-13-2014 |
20140101714 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 04-10-2014 |
20140101715 | PRIVACY AWARE AUTHENTICATED MAP-REDUCE - A computer-implemented process for privacy aware authenticated map-reduce processing receives data for a MapReduce operation to form received data, identifies a control point in a set of control points of the MapReduce operation to form an identified control point and identifies an applicable set of policies for the identified control point to form a selected set of policies. The selected set of policies is applied at the identified control point and responsive to a determination that application of the selected set of policies at the identified control point returned a positive result, the computer-implemented process continues operation to a next stage in the MapReduce operation. | 04-10-2014 |
20140137247 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 05-15-2014 |
20140137272 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 05-15-2014 |
20140156837 | METHOD AND SYSTEM FOR GENERIC APPLICATION LIVELINESS MONITORING FOR BUSINESS RESILIENCY - A system and method for monitoring liveliness includes a management device which has an application layer where applications are executed. A connection monitor is located other than on the application layer, and the connection monitor is configured to receive requests from clients and deliver the requests to components on the application layer. The components include a generic application monitor which responds to liveliness monitor requests from the clients for all applications monitored, and one or more applications which response to requests to that application. | 06-05-2014 |
20140215020 | Enabling Access to User-Chosen and/or Preferred Content Via Remote Trusted Third-Party Systems - Techniques, systems, and articles of manufacture for enabling access to user-specified and/or user-chosen content via remote third-party systems. A method includes communicating with a content provider via use of one or more user credentials, wherein the content provider maintains a list of user content choices and one or more preferences for content, wherein the content is generated by the user and/or by the content provider and/or by one or more other users, automatically downloading an amount of user-specified and/or user-chosen content from the list of user content choices and one or more preferences to a primary enterprise system and/or a secondary enterprise system in conjunction with an interaction between the user and the primary enterprise system, and providing access to the downloaded user-specified and/or user-chosen content to the user in conjunction with an interaction between the user and the secondary enterprise system, the content provider and/or the primary enterprise system. | 07-31-2014 |
20140215022 | Enabling Access to User-Chosen and/or Preferred Content Via Remote Trusted Third-Party Systems - Systems and articles of manufacture for enabling access to user-specified and/or user-chosen content via remote third-party systems include communicating with a content provider via use of one or more user credentials, wherein the content provider maintains a list of user content choices and one or more preferences for content, wherein the content is generated by the user and/or by the content provider and/or by one or more other users, automatically downloading an amount of user-specified and/or user-chosen content from the list of user content choices and one or more preferences to a primary enterprise system and/or a secondary enterprise system in conjunction with an interaction between the user and the primary enterprise system, and providing access to the downloaded user-specified and/or user-chosen content to the user in conjunction with an interaction between the user and the secondary enterprise system, the content provider and/or the primary enterprise system. | 07-31-2014 |
20140237470 | Virtual Machine-to-Image Affinity on a Physical Server - Systems and articles of manufacture for improving virtual machine-to-image affinity on a physical server include identifying physical machines in a network as candidate source physical machines, wherein each candidate source physical machine stores a first virtual machine image and a set of additional virtual machine images, identifying physical machines in the network as candidate target physical machines, wherein each candidate target physical machine stores one of the additional virtual machine images, and selecting a virtual machine image from the set of additional virtual machine images and selecting a physical machine from the candidate target physical machines such that migrating the selected virtual machine image from a candidate source physical machine to the selected target physical machine results in a maximized image affinity per virtual machine in comparison to each image migration scenarios for the set of additional virtual machine images. | 08-21-2014 |
20140237479 | Virtual Machine-to-Image Affinity on a Physical Server - Techniques, systems, and articles of manufacture for improving virtual machine-to-image affinity on a physical server. A method includes identifying physical machines in a network as candidate source physical machines, wherein each candidate source physical machine stores a first virtual machine image and a set of additional virtual machine images, identifying physical machines in the network as candidate target physical machines, wherein each candidate target physical machine stores one of the additional virtual machine images, and selecting a virtual machine image from the set of additional virtual machine images and selecting a physical machine from the candidate target physical machines such that migrating the selected virtual machine image from a candidate source physical machine to the selected target physical machine results in a maximized image affinity per virtual machine in comparison to each image migration scenarios for the set of additional virtual machine images. | 08-21-2014 |
20140259089 | Security-Aware Admission Control of Requests in a Distributed System - Techniques, systems and articles of manufacture for security-aware admission control of requests in a distributed system. A method includes identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components. | 09-11-2014 |
20140259091 | Security-Aware Admission Control of Requests in a Distributed System - Systems and articles of manufacture for security-aware admission control of requests in a distributed system include identifying a request dropped by a first application component in a distributed system, determining one or more actions to take with respect to the dropped request, said determining comprises identifying one or more policies of the first application component responsible for the dropped request and identifying one or more additional application components in the distributed system to be affected based on the identified one or more policies, and executing said one or more actions to control admission of one or more requests associated with the dropped request at the one or more additional application components. | 09-11-2014 |
20140297395 | END-TO-END EFFECTIVE CITIZEN ENGAGEMENT VIA ADVANCED ANALYTICS AND SENSOR-BASED PERSONAL ASSISTANT CAPABILITY (EECEASPA) - Providing an end-to-end citizen engagement, in one aspect, may comprise obtaining data of multiple disintegrated sources from one or more of communication and social computing channels via one or more adapters. Data refactoring and management, integration and process orchestration of the data according to a data model as data attributes of the data model may be provided. One or more analytics may be performed based on the data attributes stored according to the data model and input specified to the one or more analytics. One or more results computed by performing the one or more analytics may be provided. One or more application logics supporting one or more front-end applications may be produced. One or more front-end applications for automated sensing of user activities and sensor-based personal assistant capability may be provided. | 10-02-2014 |
20140331089 | ENABLING REMOTE DEBUGGING OF VIRTUAL MACHINES RUNNING IN A CLOUD ENVIRONMENT - Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine. | 11-06-2014 |
20140331090 | ENABLING REMOTE DEBUGGING OF VIRTUAL MACHINES RUNNING IN A CLOUD ENVIRONMENT - Enabling remote debugging of virtual machines, in one aspect, may comprise attaching a debug virtual machine to a target virtual machine deployed in a virtualized environment. Interactions and/or access to the target virtual machine may be performed via the attached debug virtual machine. The debug virtual machine may be created and attached to the target virtual machine in response to receiving a request to debug the target machine, for example, from a remote user of the target virtual machine. | 11-06-2014 |
20150046130 | DETECTING APPLIANCES IN A BUILDING FROM COARSE GRAINED METER DATA WITH PARTIAL LABEL - Detecting appliance in a building, in one aspect, may comprise receiving meter data associated with energy consumption, the meter data comprising at least energy consumption data associated with usage of the appliance, receiving customer data associated with the meter data, extracting features for training a model for detecting the appliance, based on at least the meter data and the customer data, and constructing the model based on the features. | 02-12-2015 |
20150046131 | DETECTING APPLIANCES IN A BUILDING FROM COARSE GRAINED METER DATA WITH PARTIAL LABEL - Detecting appliance in a building, in one aspect, may comprise receiving meter data associated with energy consumption, the meter data comprising at least energy consumption data associated with usage of the appliance, receiving customer data associated with the meter data, extracting features for training a model for detecting the appliance, based on at least the meter data and the customer data, and constructing the model based on the features. | 02-12-2015 |