Patent application number | Description | Published |
20110161741 | TOPOLOGY BASED CORRELATION OF THRESHOLD CROSSING ALARMS - Method, apparatus and computer program product for correlating performance events in a data processing system. A first event is received at one of a first device and a second device of the data processing system, and a second event is received at one of the first device and the second device. A type of a connection between the first device and the second device is identified to form an identified type of connection, and a relationship between the first event and the second event is determined based on the identified type of connection between the first device and the second device. | 06-30-2011 |
20120239797 | RECONCILING NETWORK MANAGEMENT DATA - Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold. | 09-20-2012 |
20140250332 | LOG FILE REDUCTION ACCORDING TO PROBLEM-SPACE NETWORK TOPOLOGY - Embodiments of the invention provide a method, system and computer program product for log file reduction according to problem space topology. A method for log file reduction according to problem space topology can include receiving a fault report for a fault in a solution executing in memory of one or more computers of a computer data processing system. The method further can include extracting references to at least two resources of the computer data processing system from the fault report. The method yet further can include filtering a set of all log files for the computer data processing system to only a subset of log files related to the at least two resources. Finally, the method can include displaying the subset of log files in a log file analyzer. | 09-04-2014 |
20140250333 | LOG FILE REDUCTION ACCORDING TO PROBLEM-SPACE NETWORK TOPOLOGY - Embodiments of the invention provide a method, system and computer program product for log file reduction according to problem space topology. A method for log file reduction according to problem space topology can include receiving a fault report for a fault in a solution executing in memory of one or more computers of a computer data processing system. The method further can include extracting references to at least two resources of the computer data processing system from the fault report. The method yet further can include filtering a set of all log files for the computer data processing system to only a subset of log files related to the at least two resources. Finally, the method can include displaying the subset of log files in a log file analyzer. | 09-04-2014 |
Patent application number | Description | Published |
20080304496 | Inferred Discovery Of A Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 12-11-2008 |
20100332645 | METHOD AND SYSTEM FOR RESOURCE MANAGEMENT IN A COMPUTING ENVIRONMENT - A method and system for monitoring resources in a network of resources in a computing environment, is provided. One implementation involves discovering resources in the network; constructing a topology model including event information for each discovered resource; providing queries for polling the models for event information, such that the resources need not be polled; executing one or more queries against one or more models; evaluating the query results to ascertain whether or not an event has affected what is considered to be normal for the result of each query; and presenting the evaluation results to enable monitoring of the resources. | 12-30-2010 |
20110032260 | ENHANCING VISUALIZATION OF RELATIONSHIPS AND TEMPORAL PROXIMITY BETWEEN EVENTS - Components and functionality can be implemented in an event management application to display events along a timeline. A display interval can be configured for the timeline and a scroll bar can allow scrolling to view different time periods on the timeline. In addition, filters may be applied to the events, so that relationships between events may be visualized. For example, the events may be filtered by network resource name, so that groups of events related to each network resource can be grouped together along the timeline. | 02-10-2011 |
20110035628 | System And Method For Correlating Carrier Ethernet Connectivity Fault Management Events - A method, system and computer-usable medium are disclosed for suppressing managed endpoint (MEP) child events in a network. A MEP multicast message is broadcast by an originating MEP. Responses received from peer MEPs within a selected time interval are processed to determine their respective IP address, MAC address, and VLAN. If this information is not currently stored in a table of peer MEP device information associated with the originating MEP, then it is added. The responding MEP is then marked in the peer MEP device table as having responded. Peer MEP devices that have responded to previous multicast messages, but have now failed to respond within the selected time interval, are determined. A MEP network event is generated, comprising the IP address of the device containing the MEP, the MAC address for inward-facing MEPs, the MAC address of the associated bridge, the port addresses for outward-facing MEPs, and associated VLAN information. If another MEP network event occurs, the MAC address of the MEP and its VLAN information is determined. If the VLAN associated with the current MEP network event contains a MAC address associated with a prior MEP network event, then the MEP network event is designated as a child MEP network event and suppressed. Otherwise, the MEP network event is designated as a parent MEP network. | 02-10-2011 |
20110292834 | Maintaining Time Series Models for Information Technology System Parameters - A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern. | 12-01-2011 |
20120250522 | Inferred Discovery of a Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 10-04-2012 |
20130179793 | ENHANCING VISUALIZATION OF RELATIONSHIPS AND TEMPORAL PROXIMITY BETWEEN EVENTS - Components and functionality can be implemented in an event management application to display events along a timeline. A display interval earl be configured for the timeline and a scroll bar can allow scrolling to view different time periods on the timeline. In addition, filters may be applied to the events, so that relationships between events may be visualized. For example, the events may be filtered by network resource name, so that groups of events related to each network resource can be grouped together along the timeline. | 07-11-2013 |
20140115139 | Service Placement on Hosts for a Consumer Based on Their Geographic Location - Techniques are provided for service placement on hosts for a consumer based on geographic location The techniques include: determining a geographical location of a consumer; and inputting a topology model of an environment including multiple candidate hosts to support a service required by the consumer, the topology model including: a geographic location of each of resource in the environment; and connectivity details between the resources and between the resources and the consumer. The techniques also include: specifying bounding requirements for a host and/or bounding requirements for a path between the consumer to a host; calculating the distance from a candidate host to the consumer; determining if bounding requirements are met by a candidate host; and ordering candidate hosts that meet bounding requirements by distance. | 04-24-2014 |
20140192682 | Inferred Discovery of a Data Communications Device - Methods, apparatus, and products for inferred discovery of a data communications device connected to a router, unreachable by a management module, and characterized by a device address are disclosed that include querying, by the management module, the router for connection data and identifying, by the management module in dependence upon the connection data, the device address. | 07-10-2014 |
Patent application number | Description | Published |
20100306360 | NETWORK MANAGEMENT DISCOVERY TOOL - A method, apparatus, and computer program product for discovering network paths between network devices in a distance-vector network are provided. The method may include providing a node model of network devices in a distance-vector network. The node model may include a network address corresponding to a network device. The network address may be used to query the network device for routing information. This routing information may be used to identify another network address corresponding to a second network device, and to identify a path from the first network device to the second network device. These devices and the path therebetween may be mapped in the node model. Finally, the second network device may be queried for subsequent routing information to identify and map subsequent devices and paths. | 12-02-2010 |
20130185418 | EFFICIENTLY RELATING ADJACENT MANAGEMENT APPLICATIONS MANAGING A SHARED INFRASTRUCTURE - A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application. | 07-18-2013 |
20130185435 | EFFICIENTLY RELATING ADJACENT MANAGEMENT APPLICATIONS MANAGING A SHARED INFRASTRUCTURE - A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application. | 07-18-2013 |
Patent application number | Description | Published |
20080319167 | Clostridial toxin derivatives able to modify peripheral sensory afferent functions - This invention describes a novel agent for the targeted control of a mammalian cell activity, in particular the agent is used to control the interaction of particular cell types with their external environment. The agent has applications as a pharmaceutical for the treatment of a variety of disorders. An agent according to the invention comprises three Domains B, T and E linked together in the following manner: Domain B-Domain T-Domain E where Domain B is the Binding Domain which binds the agent to a Binding Site on the cell which undergoes endocytosis to produce an endosome, Domain T is the Translocation Domain which translocates the agent (with or without the Binding Site) from within the endosome across the endosomal membrane into the cytosol of the cell, Domain E is the Effector Domain which inhibits the ability of the Recyclable Membrane Vesicles to transport the Integral Membrane Proteins to the surface of the cell. | 12-25-2008 |
20090131645 | Clostridial toxin derivatives able to modify peripheral sensory afferent functions - This invention describes a novel agent for the targeted control of a mammalian cell activity, in particular the agent is used to control the interaction of particular cell types with their external environment. The agent has applications as a pharmaceutical for the treatment of a variety of disorders. An agent according to the invention comprises three Domains B, T and E linked together in the following manner: Domain B-Domain T-Domain E where Domain B is the Binding Domain which binds the agent to a Binding Site on the cell which undergoes endocytosis to produce an endosome, Domain T is the Translocation Domain which translocates the agent (with or without the Binding Site) from within the endosome across the endosomal membrane into the cytosol of the cell, Domain E is the Effector Domain which inhibits the ability of the Recyclable Membrane Vesicles to transport the Integral Membrane Proteins to the surface of the cell. | 05-21-2009 |
20120141511 | CLOSTRIDIAL TOXIN DERIVATIVES ABLE TO MODIFY PERIPHERAL SENSORY AFFERENT FUNCTIONS - A novel agent for the targeted control of a mammalian cell activity can be used to control the interaction of particular cell types with their external environment. The agent has applications as a pharmaceutical for the treatment of a variety of disorders. An agent according to the invention comprises three Domains B, T and E, linked together in the following manner: Domain B-Domain T-Domain E where Domain B is the Binding Domain, which binds the agent to a Binding Site on the cell which undergoes endocytosis to produce an endosome; Domain T is the Translocation Domain, which translocates the agent from within the endosome across the endosomal membrane into the cytosol of the cell; and Domain E is the Effector Domain, which inhibits the ability of the Recyclable Membrane Vesicles to transport the Integral Membrane Proteins to the surface of the cell. | 06-07-2012 |
Patent application number | Description | Published |
20090056150 | Blade | 03-05-2009 |
20090133890 | Power Tool Attachments - An attachment is for a power tool having a chuck. The attachment has a connection portion in the form of a shaft for connecting the attachment with the tool, during use, by attachment in the chuck. The attachment further has a blade portion which, in use, is offered to a surface indicated at, and to which hammer blows are transmitted from the hammer tool, thereby causing the blade portion to cut into the surface. | 05-28-2009 |
20090304468 | Drill Bit - A drill bit has a cutting face for engaging a workpiece. The cutting face forms an annular cut. A mouth is bounded by the cutting face and receives material of the workpiece from within the annular cut, as cutting progresses. An internal passage has a mouth through which this material can leave the bit. | 12-10-2009 |
20100031947 | Blade - A blade comprises a strip having a main body portion and an edge portion. Cutting medium in the form of a diamond grit is secured to the strip by braze material. The edge portion is thinner than the main body portion. | 02-11-2010 |