Patent application number | Description | Published |
20090070777 | Method for Generating and Using Constraints Associated with Software Related Products - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate any constraint in the set. | 03-12-2009 |
20090112566 | AUTOMATED GENERATION OF EXECUTABLE DEPLOYMENT CODE FROM A DEPLOYMENT ACTIVITY MODEL - Although a modeling language can be used to create a deployment diagram to graphically depict a deployment model, the utility of the deployment diagram is limited to easing understanding of the model. Automated generation of executable deployment code that implements a deployment model allows benefits of modeling to be realized. Automated generation of executable deployment code from a deployment model provides efficiency in time and resource utilization. | 04-30-2009 |
20090112567 | PRELIMINARY DATA REPRESENTATIONS OF A DEPLOYMENT ACTIVITY MODEL - A deployment activity model is automatically generated from a deployment topology model. The operations to automatically generate the deployment activity model may be visible or “under the covers.” Regardless of visibility, a deployment model tool traverses a representation (e.g., one or more data structures) of the one or more diagrams of the deployment topology model. The deployment model tool begins creating preliminary representations of a deployment activity model until representation of a valid deployment activity model is created. Although the preliminary representations (assuming the first traversal attempt of the deployment topology model is unsuccessful) are discarded in some embodiments, other embodiments store the representations of the preliminary representations for analysis (e.g., analysis for the tool to learn, analysis to discover values for automatically defining attributes, etc.). | 04-30-2009 |
20090112909 | AUTOMATED GENERATION OF MODELING LANGUAGE PROFILES - A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles. | 04-30-2009 |
20090113381 | AGGREGATION OF CONSTRAINTS ACROSS PROFILES - Leveraging profiles to define stereotypes for other profiles introduces efficiency into modeling. Although constraints can be inherited, constraints cannot currently be aggregated across profiles. Aggregating constraints across profiles leverages the labor invested in defining other profiles as well as adding flexibility to defining stereotypes. | 04-30-2009 |
20090113382 | AUTOMATED DEPLOYMENT IMPLEMENTATION WITH A DEPLOYMENT TOPOLOGY MODEL - Although a modeling language can be used to create a deployment diagram to graphically depict a deployment model, the utility of the deployment diagram is limited to easing understanding of the model. A semantically correct deployment topology model can be processed to automate deployment of a product, add-on, update, configuration, etc. A semantically correct deployment topology model can be processed to generate activities that conform to the deployment model. The activities have executable code units associated with them. The executable code units are collected and organized to implement the deployment modeled with the deployment topology model. | 04-30-2009 |
20090113544 | ACCESSING PASSWORD PROTECTED DEVICES - Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password. The method can also include transmitting the secondary password to the peripheral device; and accessing the peripheral device. | 04-30-2009 |
20090119225 | METHOD AND SYSTEM FOR PROVIDING A UNIFIED MODEL FOR CANDIDATE SERVICE ASSETS - A computer-implementable method, system and computer-usable medium in which a unified model is utilized to provide candidate service assets. A plurality of assets can be presented to a user in association with a consistent set of properties that demonstrate how a particular asset among the assets Is composed. A single consolidated data model can then be processed that sufficiently describes the particular asset in a manner that provides sufficient information to the user to determine if the particular asset is a possible candidate for subsequent selection and action by the user, thereby permitting the user to perform decisions with respect to the particular asset with a minimal effort. | 05-07-2009 |
20090182752 | AUTOMATICALLY PERSISTING DATA FROM A MODEL TO A DATABASE - Projects often involve multiple teams of developers in different locations. The different teams make updates to a central or shared database(s) that can store information about the project, such as progress. Each team or even different members of the different teams can check out instances of a representation of a model for the project. The different teams/members can independently modify their instance with data specific to that member and/or team. Database operations embedded in the individual instances are then executed on the database(s) to persist the data from their individual instances to the database(s). Database mechanisms can handle locking and/or conflicts that may arise from performance of the database operations. A manager can then request a report from the database(s), and the report with data from the different members and/or teams can be generated from the database(s). | 07-16-2009 |
20090210384 | VISUALIZATION OF CODE UNITS ACROSS DISPARATE SYSTEMS - A visualization tool that provides visibility of the functionality implemented with each system used by an institution(s) at code unit granularity can be used to overcome a variety of challenges that can occur in an environment with disparate systems. The visualization tool discovers and graphically displays functions/procedures/methods (“code units”) that satisfy a set of one or more criteria, as well as attributes of the discovered code units. Furthermore, the visualization tool can automatically provide visual annotations to identify targets for asset maintenance, targets to leverage for other systems, etc. | 08-20-2009 |
20100053215 | CREATION AND APPLICATION OF PATTERNS TO DIAGRAM ELEMENTS - Users of drawing applications can utilize patterns to efficiently create diagrams as users tend to create similar drawings over time. For example, a user may create two use case diagrams. The first use case diagram depicts use cases for driving a car and the second use case diagram depicts use cases for driving a motorcycle. The use cases and structure of the diagrams are similar. Functionality may be implemented within a drawing application to determine a pattern from a drawing and create a new drawing based on the pattern. Creating a new drawing based on a pattern reduces time spent creating similar drawings because a user is able to edit the new pattern based drawing instead of creating the new drawing from scratch. | 03-04-2010 |
20100058161 | AUTOMATIC MANAGEMENT OF DIAGRAM ELEMENTS - Managing diagram elements in a drawing becomes more challenging as the number of diagram elements increases. Placing a new diagram element in a drawing often requires manual movement of one or more other diagram elements within the drawing. Functionality can be implemented within a drawing application to automatically manage diagram elements in a drawing by applying layouts to sets of diagram elements. A drawing tool can associate a set of diagram elements and assigns them a exclusive area or region in the drawing space. Since a layout occupies an exclusive area, the drawing tool can manage the drawing space by automatically moving elements within a first layout when overlap with a second layout is detected. Managing drawing spaces with layouts reduces time spent adjusting diagram elements as a result of applying operations to other elements. | 03-04-2010 |
20100058162 | AUTOMATIC CUSTOMIZATION OF DIAGRAM ELEMENTS - Manually changing properties of each diagram element placed in a drawing becomes tedious. A significant amount of time is spent manually customizing diagram elements creating or editing a drawing. Functionality can be implemented within a drawing application to allow automatic diagram element customization based on a set of diagram element policies. Diagram policies specify conditions for customizing properties of a diagram element. Automatic customization of diagram elements reduces time spent creating drawings because diagram elements will be placed in a drawing in their desired configurations. | 03-04-2010 |
20100250677 | SUBSCRIBER DEVICE AND SUBSCRIPTION MANAGEMENT THAT SUPPORTS REAL-TIME COMMUNICATION - Real-time communication for resource content comprises selecting by a subscriber device, an event topic based on an event topic list, creating for the selected event topic, a topic path for receiving a notification event related to the selected event topic, and sending path information of the created topic path as part of identification information with the selected event topic to a resource content publishing device. Real-time communication also comprises receiving by the resource content publishing device, the identification information and the selected event topic, and adding the identification information and the selected event topic to an event topic subscription search table. Real-time communication also comprises, if new resource content is available, obtaining, based on the event topic subscription search table, identification information of a subscriber device subscribing to an event topic related to the new resource content and sending a notification event including the new resource content to the subscriber device. | 09-30-2010 |
20100333083 | Software Asset Packaging and Consumption Method and System - A reusable asset packaging and consumption method and system that support consumption activities and variability point instances associated with asset types or artifact types. Generic consumption activities and variability point types for different asset types or artifact types and developed and stored in a repository. When an asset packager packages an asset, a needed activity is selected from the activities associated with the type of the asset. The activity, a variability point instance bound with the activity, and the context constraints, together with the artifacts is packaged into the asset package, where the asset package is then stored in a repository. During consumption, the asset consumer obtains the asset package, verifies the context, and executes the activity packaged in the asset, while specifying variability point values for the bound variability instance. | 12-30-2010 |
20110010217 | Service Oriented Architecture Governance Using A Template - Embodiments of the invention are directed to establishing a governance procedure for a selected service oriented architecture. One embodiment of the invention, directed to a method, comprises the steps of furnishing one or more first governance tasks, and furnishing one or more second governance tasks. The method further comprises providing a user of the governance procedure with a template, wherein the template is configured for operation by the user to selectively modify at least one of the first governance tasks. The template is configured further to be incapable of modifying any of the second governance tasks, when the template is being operated by the user. Each modified first governance task is combined with each of the second governance tasks, and also with each unmodified first governance task, to provide the governance procedure. | 01-13-2011 |
20110022439 | SYSTEM FOR MANAGING EVENTS IN A CONFIGURATION OF SOA GOVERNANCE COMPONENTS - Embodiments of the invention are associated with a configuration comprising multiple integrated SOA governance components, and are generally concerned with monitoring and managing events that can or are likely to impact on different components of the configuration. One embodiment of the invention, directed to a method, comprises the steps of detecting a particular event that occurs at a particular SOA governance component of the configuration, and routing information pertaining to the detected event to a pre-specified storage location. The method further comprises operating a monitoring mechanism to selectively monitor the information routed to the location, and to determine from the monitored information that the particular event has occurred at the particular component of the configuration. Responsive to determining that the particular event has occurred at the particular component, the monitoring mechanism is further operated to query each of the remaining SOA governance components, in order to identify each of the remaining components in which the particular event does not exist. | 01-27-2011 |
20110054958 | Method and Apparatus for Automatically Reconfiguring Tooling Based on Downloaded Solution Asset Classification, Decompisition and Semantics - Provided is a method for the management of actionable assets with respect to a computing solution. Assets and corresponding artifacts are located and downloaded from a tool repository and incorporated into existing computing tooling. The repository may be located on any computing system connected to an appropriately configured host system via a network such as a local area network (LAN) or the Internet. Downloaded assets are analyzed and parsed into corresponding artifacts. The asset is disassembled into the corresponding artifacts and loaded into the computing tooling. The tooling is then reconfigured with respect to the newly loaded asset and artifacts. Reconfiguration may, but is not limited to, the reconfiguration of palettes, menus and auto model loading. Automatic reconfiguration of the tooling is also executed based upon the availability of the asset the asset type and classification of the asset. | 03-03-2011 |
20110082721 | AUTOMATED REACTIVE BUSINESS PROCESSES - A computer implemented method, data processing system, and computer usable program code for managing reactive business processes. In one embodiment, the computer implemented method provides for modeling a set of business processes as pre-defined events in a software process application, wherein the software process application is located on a data processing system. A set of performance indicators are associated to the set of business processes. A set of reactive business processes are modeled, wherein the set of reactive business processes are pre-defined templates included in the software process application. The set of reactive business processes are mapped to the set of performance indicators. The set of performance indicators are monitored and responsive to a trigger from the set of performance indicators, a reactive business process is initiated. | 04-07-2011 |
20110131249 | AUTOMATED GENERATION OF MODELING LANGUAGE PROFILES - A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles. | 06-02-2011 |
20110321036 | GENERATING AND USING CONSTRAINTS ASSOCIATED WITH SOFTWARE RELATED PRODUCTS - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set. | 12-29-2011 |
20120210293 | AGGREGATION OF CONSTRAINTS ACROSS PROFILES - Leveraging profiles to define stereotypes for other profiles introduces efficiency into modeling. Although constraints can be inherited, constraints cannot currently be aggregated across profiles. Aggregating constraints across profiles leverages the labor invested in defining other profiles as well as adding flexibility to defining stereotypes. | 08-16-2012 |
20130152106 | MANAGING EVENTS IN A CONFIGURATION OF SOA GOVERNANCE COMPONENTS - One embodiment of the invention, directed to a method, comprises the steps of a computer detecting a predetermined type of event resulting from one of an addition of new component to the SOA infrastructure or a change to an existing component of the SOA infrastructure, wherein a notice of the detected event is stored in a repository associated with the component. In response to the detected event, the computer queries other components of the SOA infrastructure, and determines whether the other components have been updated based on the detected event and in response to determining the other components have not been updated based on the detected event, the computer automatically updates the other components of the SOA infrastructure based on the detected event. | 06-13-2013 |
20130198735 | METHOD FOR GENERATING AND USING CONSTRAINTS ASSOCIATED WITH SOFTWARE RELATED PRODUCTS - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action violates any constraint in the set. | 08-01-2013 |
20130339448 | SUBSCRIBER DEVICE AND SUBSCRIPTION MANAGEMENT THAT SUPPORTS REAL-TIME COMMUNICATION - Subscription management for resource content is disclosed. A subscriber device selects an event topic based on an event topic list. The subscriber device creates a topic path for the selected event topic to receiving a notification event related to the selected event topic. The subscriber device sends path information of the created topic path as part of identification information of the subscriber device, along with the selected event topic, to a resource content publishing device, and the topic path indicates a document. The subscriber device receives the notification event sent by the resource content publishing device to the subscriber device according to the identification information of the subscriber device, wherein at least one field of the document indicates the receipt of the notification event. | 12-19-2013 |
20150033218 | Generating and Using Constraints Associated with Software Related Products - A computer implemented method and apparatus is provided for generating and using constraints that are associated with software programs or other software entities intended for use in a specified data processing system or environment. One embodiment is directed to a method that includes the step of extracting metadata pertaining to the one or more software programs from at least one database. The extracted metadata is selectively processed to generate a set of constraints that affect the use of the one or more programs in a specified environment, wherein such processing includes transforming the extracted metadata to provide the set of constraints in a prespecified constraint language. The method further comprises detecting a proposed action of a user that is associated with the one or more software programs, and determining whether the proposed action would violate violates any constraint in the set. | 01-29-2015 |