Patent application number | Description | Published |
20090070777 | Method for Generating and Using Constraints Associated with Software Related Products - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate any constraint in the set. | 03-12-2009 |
20090112566 | AUTOMATED GENERATION OF EXECUTABLE DEPLOYMENT CODE FROM A DEPLOYMENT ACTIVITY MODEL - Although a modeling language can be used to create a deployment diagram to graphically depict a deployment model, the utility of the deployment diagram is limited to easing understanding of the model. Automated generation of executable deployment code that implements a deployment model allows benefits of modeling to be realized. Automated generation of executable deployment code from a deployment model provides efficiency in time and resource utilization. | 04-30-2009 |
20090112567 | PRELIMINARY DATA REPRESENTATIONS OF A DEPLOYMENT ACTIVITY MODEL - A deployment activity model is automatically generated from a deployment topology model. The operations to automatically generate the deployment activity model may be visible or “under the covers.” Regardless of visibility, a deployment model tool traverses a representation (e.g., one or more data structures) of the one or more diagrams of the deployment topology model. The deployment model tool begins creating preliminary representations of a deployment activity model until representation of a valid deployment activity model is created. Although the preliminary representations (assuming the first traversal attempt of the deployment topology model is unsuccessful) are discarded in some embodiments, other embodiments store the representations of the preliminary representations for analysis (e.g., analysis for the tool to learn, analysis to discover values for automatically defining attributes, etc.). | 04-30-2009 |
20090112909 | AUTOMATED GENERATION OF MODELING LANGUAGE PROFILES - A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles. | 04-30-2009 |
20090113381 | AGGREGATION OF CONSTRAINTS ACROSS PROFILES - Leveraging profiles to define stereotypes for other profiles introduces efficiency into modeling. Although constraints can be inherited, constraints cannot currently be aggregated across profiles. Aggregating constraints across profiles leverages the labor invested in defining other profiles as well as adding flexibility to defining stereotypes. | 04-30-2009 |
20090113382 | AUTOMATED DEPLOYMENT IMPLEMENTATION WITH A DEPLOYMENT TOPOLOGY MODEL - Although a modeling language can be used to create a deployment diagram to graphically depict a deployment model, the utility of the deployment diagram is limited to easing understanding of the model. A semantically correct deployment topology model can be processed to automate deployment of a product, add-on, update, configuration, etc. A semantically correct deployment topology model can be processed to generate activities that conform to the deployment model. The activities have executable code units associated with them. The executable code units are collected and organized to implement the deployment modeled with the deployment topology model. | 04-30-2009 |
20090113544 | ACCESSING PASSWORD PROTECTED DEVICES - Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password. The method can also include transmitting the secondary password to the peripheral device; and accessing the peripheral device. | 04-30-2009 |
20090119225 | METHOD AND SYSTEM FOR PROVIDING A UNIFIED MODEL FOR CANDIDATE SERVICE ASSETS - A computer-implementable method, system and computer-usable medium in which a unified model is utilized to provide candidate service assets. A plurality of assets can be presented to a user in association with a consistent set of properties that demonstrate how a particular asset among the assets Is composed. A single consolidated data model can then be processed that sufficiently describes the particular asset in a manner that provides sufficient information to the user to determine if the particular asset is a possible candidate for subsequent selection and action by the user, thereby permitting the user to perform decisions with respect to the particular asset with a minimal effort. | 05-07-2009 |
20090182752 | AUTOMATICALLY PERSISTING DATA FROM A MODEL TO A DATABASE - Projects often involve multiple teams of developers in different locations. The different teams make updates to a central or shared database(s) that can store information about the project, such as progress. Each team or even different members of the different teams can check out instances of a representation of a model for the project. The different teams/members can independently modify their instance with data specific to that member and/or team. Database operations embedded in the individual instances are then executed on the database(s) to persist the data from their individual instances to the database(s). Database mechanisms can handle locking and/or conflicts that may arise from performance of the database operations. A manager can then request a report from the database(s), and the report with data from the different members and/or teams can be generated from the database(s). | 07-16-2009 |
20090210384 | VISUALIZATION OF CODE UNITS ACROSS DISPARATE SYSTEMS - A visualization tool that provides visibility of the functionality implemented with each system used by an institution(s) at code unit granularity can be used to overcome a variety of challenges that can occur in an environment with disparate systems. The visualization tool discovers and graphically displays functions/procedures/methods (“code units”) that satisfy a set of one or more criteria, as well as attributes of the discovered code units. Furthermore, the visualization tool can automatically provide visual annotations to identify targets for asset maintenance, targets to leverage for other systems, etc. | 08-20-2009 |
20100333083 | Software Asset Packaging and Consumption Method and System - A reusable asset packaging and consumption method and system that support consumption activities and variability point instances associated with asset types or artifact types. Generic consumption activities and variability point types for different asset types or artifact types and developed and stored in a repository. When an asset packager packages an asset, a needed activity is selected from the activities associated with the type of the asset. The activity, a variability point instance bound with the activity, and the context constraints, together with the artifacts is packaged into the asset package, where the asset package is then stored in a repository. During consumption, the asset consumer obtains the asset package, verifies the context, and executes the activity packaged in the asset, while specifying variability point values for the bound variability instance. | 12-30-2010 |
20110054958 | Method and Apparatus for Automatically Reconfiguring Tooling Based on Downloaded Solution Asset Classification, Decompisition and Semantics - Provided is a method for the management of actionable assets with respect to a computing solution. Assets and corresponding artifacts are located and downloaded from a tool repository and incorporated into existing computing tooling. The repository may be located on any computing system connected to an appropriately configured host system via a network such as a local area network (LAN) or the Internet. Downloaded assets are analyzed and parsed into corresponding artifacts. The asset is disassembled into the corresponding artifacts and loaded into the computing tooling. The tooling is then reconfigured with respect to the newly loaded asset and artifacts. Reconfiguration may, but is not limited to, the reconfiguration of palettes, menus and auto model loading. Automatic reconfiguration of the tooling is also executed based upon the availability of the asset the asset type and classification of the asset. | 03-03-2011 |
20110131249 | AUTOMATED GENERATION OF MODELING LANGUAGE PROFILES - A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles. | 06-02-2011 |
20110321036 | GENERATING AND USING CONSTRAINTS ASSOCIATED WITH SOFTWARE RELATED PRODUCTS - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set. | 12-29-2011 |
20120210293 | AGGREGATION OF CONSTRAINTS ACROSS PROFILES - Leveraging profiles to define stereotypes for other profiles introduces efficiency into modeling. Although constraints can be inherited, constraints cannot currently be aggregated across profiles. Aggregating constraints across profiles leverages the labor invested in defining other profiles as well as adding flexibility to defining stereotypes. | 08-16-2012 |
20130198735 | METHOD FOR GENERATING AND USING CONSTRAINTS ASSOCIATED WITH SOFTWARE RELATED PRODUCTS - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set. | 08-01-2013 |
20150033218 | Generating and Using Constraints Associated with Software Related Products - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate violates any constraint in the set. | 01-29-2015 |