Patent application number | Description | Published |
20110296018 | ONTOLOGY BASED RESOURCE PROVISIONING AND MANAGEMENT FOR SERVICES - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment. | 12-01-2011 |
20110296020 | EXTENSIBLE SUPPORT SYSTEM FOR SERVICE OFFERINGS - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings. For example, such a support system can be a business support system which may be employed in conjunction with a cloud computing environment. | 12-01-2011 |
20120059917 | SOFTWARE LICENSE MANAGEMENT WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a solution to manage software licenses within a cloud computing environment. Specifically, aspects of the present invention (among other things): determine a requester's/customer's needs; identify a set (at least one) of providers capable of addressing the requester's licensing needs; and match the customer with the most appropriate provider. The embodiments of the present invention will also analyze current licensing configurations/models of the requesters, providers, and software vendors to identify areas of potential improvement. This provides the functionality necessary to adjust software license level in a dynamic fashion so as to best meet the customer's needs. | 03-08-2012 |
20120131677 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-24-2012 |
20120221542 | INFORMATION THEORY BASED RESULT MERGING FOR SEARCHING HIERARCHICAL ENTITIES ACROSS HETEROGENEOUS DATA SOURCES - A method, system, and computer program product are disclosed for merging search results. In one embodiment, the method comprises identifying a query, splitting the query into sub-queries, and calculating information content for each of the sub-queries. This method also comprises executing each of the sub-queries to obtain a plurality of search results, and combining the search results based on the information content calculated for the sub-queries. In an embodiment, the execution of each of the sub-queries includes identifying a multitude of search results for at least one of the sub-queries; and the combining includes grouping said multitude of search results into a plurality of clusters, and computing a relevance score for each of said clusters. In the embodiment the combining further includes merging the clusters based on the relevance scores computed for the clusters as well as the information content calculated for the sub-queries. | 08-30-2012 |
20130013462 | EXTENSIBLE SUPPORT SYSTEM FOR SERVICE OFFERINGS - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings. For example, such a support system can be a business support system which may be employed in conjunction with a cloud computing environment. | 01-10-2013 |
20130018764 | Methodology For Charging Of Discrete Resource Reservation Based ServicesAANM Deng; YuAACI Yorktown HeightsAAST NYAACO USAAGP Deng; Yu Yorktown Heights NY USAANM Nguyen; Thao N.AACI KatonahAAST NYAACO USAAGP Nguyen; Thao N. Katonah NY USAANM Perng; Chang-ShingAACI Bedford HillsAAST NYAACO USAAGP Perng; Chang-Shing Bedford Hills NY USAANM Rendahl; Randy A.AACI RaleighAAST NCAACO USAAGP Rendahl; Randy A. Raleigh NC USAANM Sailer; AncaAACI ScarsdaleAAST NYAACO USAAGP Sailer; Anca Scarsdale NY USAANM Swirszcz; Grzegorz M.AACI OssiningAAST NYAACO USAAGP Swirszcz; Grzegorz M. Ossining NY US - Methods, apparatus, and articles of manufacture are disclosed. These perform the following: accessing records of previous usage within a billing period of service units for customers, wherein the service units are discrete sizes of services for resource types, wherein each usage of an individual one of the service units has start and stop events, and wherein each resource type has a price fixed as of a date of the previous usage; dividing the billing period into time periods determined using the start and stop events for the usage of all of the service units; using the accessed records and the time periods and based on one or more criteria, assigning resource types to the previous usage in the time periods of the service units by the customers; and determining total charge for a selected customer based on the assignments of the resource types and corresponding prices for the selected customer. | 01-17-2013 |
20140019963 | CO-LOCATION OF VIRTUAL MACHINES WITH NESTED VIRTUALIZATION - Co-locating a virtual machine with nested virtualization, in one aspect, may comprise receiving a list of one or more virtual machine instances to co-locate with associated configuration information. A parent virtual machine instance may be identified to host the one or more virtual machine instances. Virtual machine images associated with the one or more virtual machine instances may be consolidated. A composite parent virtual machine image may be created based on the consolidated virtual machine images and the parent virtual machine instance. The parent virtual machine instance may be configured to accommodate for capacity requirement of the one or more child virtual machine instances. The parent virtual machine instance may be started on a processor via the composite parent virtual machine image. The one or more virtual machine instances may be started within the parent virtual machine instance as one or more child virtual machine instances. | 01-16-2014 |
20140019968 | CO-LOCATION OF VIRTUAL MACHINES WITH NESTED VIRTUALIZATION - Co-locating a virtual machine with nested virtualization, in one aspect, may comprise receiving a list of one or more virtual machine instances to co-locate with associated configuration information. A parent virtual machine instance may be identified to host the one or more virtual machine instances. Virtual machine images associated with the one or more virtual machine instances may be consolidated. A composite parent virtual machine image may be created based on the consolidated virtual machine images and the parent virtual machine instance. The parent virtual machine instance may be configured to accommodate for capacity requirement of the one or more child virtual machine instances. The parent virtual machine instance may be started on a processor via the composite parent virtual machine image. The one or more virtual machine instances may be started within the parent virtual machine instance as one or more child virtual machine instances. | 01-16-2014 |
20140047120 | ONTOLOGY BASED RESOURCE PROVISIONING AND MANAGEMENT FOR SERVICES - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment. | 02-13-2014 |
20140052768 | SYSTEM AND METHOD SUPPORTING APPLICATION SOLUTION COMPOSITION ON CLOUD - Disclosed is a method, computer-program product and a system to compose an application solution on a cloud-computing platform for a user. The method includes, in response to input from the user, selecting at least one predetermined template that includes a hardware and software instance of a data processing system that is implementable as an solution on a cloud platform; comparing the at least one selected template against a set of constraints; establishing an instance of a cloud based solution for the user based on the selected template; and validating the established cloud based solution against user-uploaded information such as software and workloads to ensure that the solution satisfies requirements of the user, such as both technical and financial requirements of the user. | 02-20-2014 |
20140052773 | SYSTEM AND METHOD SUPPORTING APPLICATION SOLUTION COMPOSITION ON CLOUD - Disclosed is a method, computer-program product and a system to compose an application solution on a cloud-computing platform for a user. The method includes, in response to input from the user, selecting at least one predetermined template that includes a hardware and software instance of a data processing system that is implementable as an solution on a cloud platform; comparing the at least one selected template against a set of constraints; establishing an instance of a cloud based solution for the user based on the selected template; and validating the established cloud based solution against user-uploaded information such as software and workloads to ensure that the solution satisfies requirements of the user, such as both technical and financial requirements of the user. | 02-20-2014 |
20140067824 | DATABASE TABLE FORMAT CONVERSION BASED ON USER DATA ACCESS PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables. | 03-06-2014 |
20140074561 | CONFIGURABLE RATING AND METERING - A method for creating a configurable model for rating and metering resource usage, the method includes utilizing at least one rating context for a contract of a registered offering, wherein the registered offering is a resource, monitoring the resource usage to create a usage record, optimizing the collection of the usage data based on revenue potential and metering costs, contextualizing a usage record of the resource, generating rated usage data according to the usage record, and tuning a performance indicator of a metering definition for the registered offering based on the rated usage data. | 03-13-2014 |
20140074562 | CONFIGURABLE RATING AND METERING - A method for creating a configurable model for rating and metering resource usage, the method includes utilizing at least one rating context for a contract of a registered offering, wherein the registered offering is a resource, monitoring the resource usage to create a usage record, optimizing the collection of the usage data based on revenue potential and metering costs, contextualizing a usage record of the resource, generating rated usage data according to the usage record, and tuning a performance indicator of a metering definition for the registered offering based on the rated usage data. | 03-13-2014 |
20140074674 | TRACKING FOR ROYALTY DETERMINATION - A system including at least one memory having a plurality of individual contributions forming a compilation stored in the at least one memory; and at least one processor connected to the at least one memory, where the processor is configured to use provenance data associated with a catalog item to track an individual contribution in a compilation of contributions, where the compilation is stored in the at least one memory; and dynamically compute a royalty distribution for the individual contribution based, at least partially, upon at least one metric related to the contributions which form the compilation. | 03-13-2014 |
20140074676 | Tracking For Royalty Determination - A system including at least one memory having a plurality of individual contributions forming a compilation stored in the at least one memory; and at least one processor connected to the at least one memory. The processor is configured to identify at least one of the individual contributions; and determine a royalty distribution value for the identified individual contribution based, at least partially, upon at least one weighted metric regarding the compilation. | 03-13-2014 |
20140074693 | TRACKING FOR ROYALTY DETERMINATION - A method including identifying an individual contribution to a compilation, where the compilation comprises a plurality of individual contributions; and determining, at least partially with a computer processor, a royalty distribution value for the identified individual contribution based, at least partially, upon at least one weighted metric regarding the compilation. | 03-13-2014 |
20140137258 | IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed. | 05-15-2014 |
20140201251 | USING CROWDSOURCING TO IMPROVE SENTIMENT ANALYTICS - A computer and computer program product for managing analysis of sentiment is disclosed. A computer retrieves data used to perform the analysis of sentiment. The computer analyzes the data and the analysis of sentiment to determine if a gap exists requiring further processing to improve the analysis of sentiment. Responsive to a determination that the gap exists requiring further processing to improve the analysis of sentiment, the computer generates a task to address the gap. The computer then uses crowdsourcing to submit the generated task for processing. | 07-17-2014 |
20140201749 | USING CROWDSOURCING TO IMPROVE SENTIMENT ANALYTICS - A method and computer for managing analysis of sentiment is disclosed. A computer retrieves data used to perform the analysis of sentiment. The computer analyzes the data and the analysis of sentiment to determine if a gap exists requiring further processing to improve the analysis of sentiment. Responsive to a determination that the gap exists requiring further processing to improve the analysis of sentiment, the computer generates a task to address the gap. The computer then uses crowdsourcing to submit the generated task for processing. | 07-17-2014 |
20140222745 | Dynamic Model-Based Analysis of Data Centers - Techniques for model-based analysis of a data center. A method includes creating a metamodel based on domain knowledge to represent a type of object and/or relationship of a data center, using static and dynamic configuration and data analysis techniques to discover topology of elements of the data center and represent the topology as a model that is an instance of the metamodel, using the model to perform analysis of the data center in connection with a specified task, leveraging domain knowledge represented in nodes of the metamodel to guide the analysis in terms of determining guidelines to apply to each node and determining relationships to traverse to continue the analysis, extending the domain knowledge by updating the metamodel upon discovery of additional knowledge for use in improving analysis tasks, and extending the model on-demand using dynamic analysis techniques upon detection of multiple analysis failures. | 08-07-2014 |
20140310346 | DATA ANALYTICS AND SECURITY IN SOCIAL NETWORKS - A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program. The method may also include determining a pattern of communications between the member and the at least one social network account and generating a profile for the at least one social network account assigned to the member based on the pattern of communications. The method may further include monitoring an electronic communication with the at least one social network account by the member based on comparing the generated profile with the electronic communication. | 10-16-2014 |
20140310554 | SYSTEM AND METHOD FOR GRAPH BASED K-REDUNDANT RESILIENCY FOR IT CLOUD - A method for enabling resiliency for cloud computing systems is described. The method includes modifying a topology graph of a network architecture by mapping processes flows onto the topology graph. A resiliency graph is created based on the modified topology graph. The method includes modifying the resiliency graph by translating at least one SLA into the resiliency graph. Overlaps and dependencies in the modified resiliency graph are identified. Apparatus and computer readable instructions are also described. | 10-16-2014 |
20140310559 | System And Method For Graph Based K- Redundant Resiliency For IT Cloud - An apparatus for enabling resiliency for cloud computing systems is provided. An apparatus includes a processor and a memory storing computer program code. The memory and the computer program code are configured to, with the processor, cause the apparatus to perform actions. The actions include modifying a topology graph of a network architecture by mapping processes flows onto the topology graph and creating a resiliency graph based on the modified topology graph. The actions also include modifying the resiliency graph by translating at least one SLA into the resiliency graph and identifying overlaps and dependencies in the modified resiliency graph. Apparatus and computer readable instructions are also described. | 10-16-2014 |
20140317089 | CONTEXT AWARE DYNAMIC SENTIMENT ANALYSIS - A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project. The method also includes decomposing each of the one or more inputs, based on a content of the one or more comments, into at least one of the two or more aspects to generate one or more comment-aspect sets, each of the two or more aspects representing a context within the project, extracting opinions from each of the comment-aspect sets, and generating a disruptive argument based on the opinions. | 10-23-2014 |
20140317118 | CONTEXT AWARE DYNAMIC SENTIMENT ANALYSIS - A system and method to perform context aware sentiment analysis on a project that includes two or more aspects are described. The method includes identifying one or more inputs related to the project. The method also includes decomposing each of the one or more inputs, based on a content of the one or more comments, into at least one of the two or more aspects to generate one or more comment-aspect sets, each of the two or more aspects representing a context within the project, extracting opinions from each of the comment-aspect sets, and generating a disruptive argument based on the opinions. | 10-23-2014 |
20140344206 | VERIFYING LEGITIMATE FOLLOWERS IN SOCIAL NETWORKS - A method for verifying a legitimate follower in a social network account assigned to a user is provided. The method may include generating a set of user defined rules associated with verifying a follower request. The method may further include monitoring the social network account assigned to the user to identify the follower request and analyzing the identified follower request to determine the legitimate follower based on the set of user-defined rules. | 11-20-2014 |