Patent application number | Description | Published |
20090113031 | Method, Apparatus And Computer Program Product Implementing Multi-Tenancy For Network Monitoring Tools Using Virtualization Technology - Method, apparatus and computer program product manage a plurality of networks with a single tenant network management tool using virtualization and implement control plane virtualization of the single tenant management tool; data storage virtualization of a data storage apparatus and network address virtualization of an available address range. A virtual machine may be implemented for each network of the plurality of networks to contain an instance of the single tenant management tool. In one implementation, a proxy is used to implement data storage virtualization. In another implementation, separate data storage is maintained for each network and data storage virtualization is achieved by managing the network protocol stack virtualization. The network address virtualization may be implemented using machine-level virtualization or operating-system-level virtualization. | 04-30-2009 |
20090113243 | Method, Apparatus and Computer Program Product for Rule-Based Directed Problem Resolution for Servers with Scalable Proactive Monitoring - Method, apparatus and computer program product are configured to perform computer monitoring activities; to collect information regarding computer system status during the computer monitoring activities; to detect a problem in dependence on the information collected during the computer monitoring activities; and to determine whether to launch a diagnostic probe when the problem is detected. The monitoring activities may be performed on a periodic or event-driven basis. The determination whether to launch a diagnostic probe is based on a rule included in a hierarchy of rules. The hierarchy of rules is based on problem tickets; system logs; and computer system configuration information. | 04-30-2009 |
20100031095 | METHOD AND APPARATUS FOR ENHANCING TICKETING SYSTEM IN A SERVICE MANAGEMENT PROCESS FOR EFFICIENT PROBLEM RESOLULTION - Problem ticket usage is improved by adding dynamic information to the ticket or using dynamic information to prompt the user or customer for additional information. Two categories of dynamic information are used. In the case where an initial problem ticket involves identification of a problem component the dynamic information is derived from abnormal status of related components, such as components which support the problem component. In the case where an initial problem ticket involves problem symptom information, data is derived from resolved problem tickets by identifying important words or concepts which are stored in connection with the particular symptom. When later problem tickets having the same symptom are identified the related important words or concepts are either added to the problem ticket or are used to prompt customers or users for additional information. A system implementing an embodiment of the invention is also described. | 02-04-2010 |
20100082620 | METHOD FOR EXTRACTING SIGNATURE FROM PROBLEM RECORDS THROUGH UNSTRUCTURED AND STRUCTURED TEXT MAPPING, CLASSIFICATION AND RANKING - The structure attributes and unstructured attributes of a ticket are used to generate a problem signature. For structured attributes, correlation between field values is determined and fields with the highest weight are identified. For unstructured attributes, data mining techniques are applied to generate a plurality of keywords with a ranking for each ticket by identifying keywords, and commonly used acronyms and corpus variances. The set of structured attributes and the plurality of keywords from unstructured attributes form the signature of a given problem ticket. | 04-01-2010 |
20100115340 | METHOD AND APPARATUS FOR PROACTIVE ALERT GENERATION VIA EQUIVALENT MACHINE CONFIGURATION DETERMINATION FROM PROBLEM HISTORY DATA - A method, and system employing the method, initiates proactive maintenance of computer systems and/or devices in a computer network. The method determines the subsystems of the computers and network devices and analyzes their configuration data including their respective subsystems. The method generates maintenance characteristics for the devices, and determines a maintenance event for devices using the maintenance characteristics and the configuration data of the devices. The method initiates a maintenance solution of a device determined to have a problematic configuration. | 05-06-2010 |
20100318608 | SYSTEMS AND METHODS FOR EFFICIENT LIVE APPLICATION MIGRATION WITHIN BANDWIDTH CONSTRAINED NETWORKS - A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order. | 12-16-2010 |
20100318990 | METHOD AND APPARATUS FOR SCALABLE MONITORING OF VIRTUAL MACHINE ENVIRONMENTS - A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The monitoring agent monitors performance of the multiple virtual computing devices. The method measures simple operating characteristics of only a base level virtual computing device. The method monitors complex operating characteristics using the monitoring agent by: measuring the complex operating characteristics for each of the multiple virtual computing devices (using each of the multiple virtual computing devices); recording the complex operating characteristics of each of the multiple virtual computing devices on a corresponding memory page of each of the multiple virtual computing devices; and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics and outputs the simple events and the complex events for each of the multiple virtual computing devices. | 12-16-2010 |
20110238460 | Dynamic Pricing of a Resource - A method of dynamic pricing of a resource is presented. For example, the method includes determining a set of anticipated demands for one or more users to acquire the resource according to uncertainty of the one or more users in preferring one or more certain time periods of a plurality of time periods for acquiring the resource. Prices for the resource differ between at least two of the plurality of time periods. Each anticipated demand of the set is associated with a different one of the plurality of time periods. The method further includes setting prices for the resource during each of the plurality of time periods according to the determined set of anticipated demands. The determining of the set of anticipated demands and/or the setting of prices are implemented as instruction code executed on a processor device. | 09-29-2011 |
20110307887 | DYNAMIC VIRTUAL MACHINE SHUTDOWN WITHOUT SERVICE INTERRUPTIONS - Techniques for dynamically managing a sleep state of a virtual machine are provided. The techniques include detecting idleness of a virtual machine, putting the idle virtual machine into a sleep state, implementing a virtual machine surrogate, wherein the virtual machine surrogate listens to network traffic, enabling the virtual machine to handle network traffic that is capable of being handled by the virtual machine, and enabling the virtual machine to queue network traffic and wake-up the virtual machine in the sleep state for network traffic that the virtual machine surrogate is incapable of handling. | 12-15-2011 |
20120042256 | HIGH PERFORMANCE COMPUTING AS A SERVICE - A scheduling system and method for high-performance computing (HPC) applications includes a network management component stored in physical memory and executed by a processor. The management component is configured to transform HPC resources into a schedulable resource catalog by transforming multi-dimensional HPC resources into a one dimension versus time resource catalog with a dependent graph structure between resources such that HPC resources are enabled to be provisioned into a service environment with predictable provisioning using the resource catalog. A graphical user interface component is coupled to the network management component and configured to provide scheduling visibility to entities and to enable a plurality of different communication modes for scheduling and communication between entities. | 02-16-2012 |
20120042320 | SYSTEM AND METHOD FOR DYNAMIC RESCHEDULING OF MULTIPLE VARYING RESOURCES WITH USER SOCIAL MAPPING - A system and method for scheduling resources includes a memory storage device having a resource data structure stored therein which is configured to store a collection of available resources, time slots for employing the resources, dependencies between the available resources and social map information. A processing system is configured to set up a communication channel between users, between a resource owner and a user or between resource owners to schedule users in the time slots for the available resources. The processing system employs social mapping information of the users or owners to assist in filtering the users and owners and initiating negotiations for the available resources. | 02-16-2012 |
20120260247 | Fine-Grained Cloud Management Control Using Nested Virtualization - A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. | 10-11-2012 |
20120324470 | SYSTEM AND METHOD FOR DYNAMIC RESCHEDULING OF MULTIPLE VARYING RESOURCES WITH USER SOCIAL MAPPING - A system and method for scheduling resources includes a memory storage device having a resource data structure stored therein which is configured to store a collection of available resources, time slots for employing the resources, dependencies between the available resources and social map information. A processing system is configured to set up a communication channel between users, between a resource owner and a user or between resource owners to schedule users in the time slots for the available resources. The processing system employs social mapping information of the users or owners to assist in filtering the users and owners and initiating negotiations for the available resources. | 12-20-2012 |
20130111583 | SYSTEM AND METHOD FOR HYBRID ROLE MINING | 05-02-2013 |
20130198827 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent. | 08-01-2013 |
20130275579 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 10-17-2013 |
20130275993 | SYSTEM AND METHOD FOR DYNAMIC RESCHEDULING OF MULTIPLE VARYING RESOURCES WITH USER SOCIAL MAPPING - A system and method for scheduling resources includes a memory storage device having a resource data structure stored therein which is configured to store a collection of available resources, time slots for employing the resources, dependencies between the available resources and social map information. A processing system is configured to set up a communication channel between users, between a resource owner and a user or between resource owners to schedule users in the time slots for the available resources. The processing system employs social mapping information of the users or owners to assist in filtering the users and owners and initiating negotiations for the available resources. | 10-17-2013 |
20130291127 | ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT - Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images. | 10-31-2013 |
20130311220 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A method and data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311221 | EVALUATING DEPLOYMENT READINESS IN DELIVERY CENTERS THROUGH COLLABORATIVE REQUIREMENTS GATHERING - A data processing system for determining deployment readiness of a service is disclosed. A computer identifies tasks that must be performed to address requirements associated with categories of complexity for deploying the service in one or more locations. The computer assigns the identified tasks to experts based on skill and availability of the experts. The computer verifies whether the assigned tasks have been completed. The computer then provides an indication that the service is ready to be deployed in one or more locations responsive to the verification that the tasks have been completed. | 11-21-2013 |
20130311653 | SERVICE COMPLIANCE ENFORCEMENT USING USER ACTIVITY MONITORING AND WORK REQUEST VERIFICATION - A computer implemented method, data processing system, and computer program product control point in time access to a remote client device and auditing system logs of the remote client device by an auditing server device to determine whether monitored user activity on the remote client device associated with a work request was in compliance with one or more regulations. | 11-21-2013 |
20150074784 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |
20150074785 | USING SERVICE REQUEST TICKET FOR MULTI-FACTOR AUTHENTICATION - In an environment wherein a front end system receives a service request, and a back end system responds to the request, a user of a target endpoint must be authenticated. A ticket ID is assigned to the service request, and responsive to an initiating action of the user, a virtual token is generated that has a specified relationship with the ticket ID. The virtual token is delivered to the user, and the user is prompted to present the token to a validating component associated with one of the front end or back end systems, wherein the validating component is configured to verify the token validity. If the token is found to be valid, the user is authenticated to access the specified target endpoint. | 03-12-2015 |