Patent application number | Description | Published |
20120016880 | DATA ELEMENT CATEGORIZATION IN A SERVICE-ORIENTED ARCHITECTURE - A method and system for specifying categories of data elements during a service specification phase of a service-oriented architecture (SOA) life cycle defined in a service modeling methodology like Service-Oriented Modeling and Architecture (SOMA). A Unified Modeling Language based SOA modeling tool for SOMA methodology includes a middleware based integration plug-in that categorizes retrieved service-specific data elements as transaction elements, optional controller elements, glue elements, optional extension patterns, extension elements and core Common Information Model entities, and associates the categorized data elements with corresponding operations of the service being modeled. A user interface provided by the plug-in enables input of the data elements into the categories and input of the associations between the categorized data elements and corresponding operations of the service being modeled. Furthermore, the plug-in generates and initiates storing of a service specification based on the categorization of the data elements. | 01-19-2012 |
20120084327 | Building Information Technology Services From a Library of Elements - Source entities with initially predefined properties for service modeling are presented in a library for user selection as service modeling entities. An automated computer process expediter copies user selected ones of the source entities from the library into a computer readable storage medium providing a services layer. The copying generates instances in the services layer of the selected service modeling source entities, such that the services layer instances at least initially include the initially predefined properties of their respective source entities. The automated computer process expediter maintains the properties of the selected ones of the source entities, including maintaining the selected source entities' properties independently of changes made in a first change mode to the properties of the service modeling entity instances, which are in the services layer, so that the user may change the properties of the layer service modeling instances. | 04-05-2012 |
20130036100 | DEDUPLICATION IN NETWORK STORAGE WITH DATA RESIDENCE COMPLIANCE - Deduplication in a network storage environment includes, for files stored in a network, determining a location constraint status specified by a compliance agreement for each of the files. Location constraint statuses include a location of persistent residency and no residency restriction. Deduplication also includes selecting a file from the files in the network and identifying corresponding redundant files, the selected file and the corresponding redundant files representing a set. Deduplication further includes determining the location constraint status for each of the files in the set. For the files in the set having a location constraint status specifying a location of persistent residency, the deduplication includes retaining a master copy at the respective location of persistent residency, and removing the corresponding redundant files from the network. | 02-07-2013 |
20130225147 | CALENDAR-BASED POWER RESERVE - Implementing calendar-based power reserve includes identifying a new calendar entry scheduled into a calendar application of a mobile communications device. The new calendar entry specifies a telephone call. Upon determining a priority indicator has been set for the new calendar entry in the calendar application, the calendar-based power reserve also includes directing a power management component of the mobile communications device to reserve an amount of power for the telephone call, and updating a battery power indicator on the mobile communications device to reflect a capacity of a battery of the mobile communications device. The capacity reflects a current amount of available power for the battery minus the amount of power to reserve. | 08-29-2013 |
20130227318 | CALENDAR-BASED POWER RESERVE - Implementing calendar-based power reserve includes identifying a new calendar entry scheduled into a calendar application of a mobile communications device. The new calendar entry specifies a telephone call. Upon determining a priority indicator has been set for the new calendar entry in the calendar application, the calendar-based power reserve also includes directing a power management component of the mobile communications device to reserve an amount of power for the telephone call, and updating a battery power indicator on the mobile communications device to reflect a capacity of a battery of the mobile communications device. The capacity reflects a current amount of available power for the battery minus the amount of power to reserve. | 08-29-2013 |
20140195488 | Intelligent Selection of Replication Node for File Data Blocks in GPFS-SNC - A mechanism is provided in a data processing system for replicating writing of a file with striping. The mechanism writes a file at an owner node within a plurality of nodes in a data processing system. The mechanism divides the file into a plurality of file chunks. The mechanism identifies at least one replication node within the plurality of nodes having a duplicate copy of a respective file chunk within the plurality of file chunks. The mechanism selects a plurality of replication nodes for the plurality of file chunks based on identification at least one replication node within the plurality of nodes having a duplicate copy of a respective file chunk and replicates the file at the plurality of replication nodes based on the selection of the plurality of replication nodes. | 07-10-2014 |
Patent application number | Description | Published |
20120110208 | ROUTING A SESSION INITIATION PROTOCOL (SIP) MESSAGE IN A COMMUNICATION SYSTEM - An approach that provides routing a SIP message to a proxy server of a called party in a communication network is provided. In one embodiment, there is a routing tool that assists in routing a session initiation protocol (SIP) message to a called party. The routing tool, including a receiving component, receives a SIP message of a user making a call in the network. The routing tool further includes a parsing component configured to parse the message to determine the domain of the called party and performs a table lookup using the domain of the called party in order to: retrieve a destination code; embed the destination code into the message; and route the message based on the destination code. | 05-03-2012 |
20120117149 | REDUCING CARBON FOOTPRINT AND PROVIDING POWER SAVINGS IN SESSION INITIATED PROTOCOL CONFERENCING - A method includes determining a first subset of a plurality of links to be set to a first power state and a second subset of the plurality of links to be set to a second power state, different from the first power state, based on estimated data transmission. The method also includes instructing at least one network apparatus to set the first subset of the plurality of links to the first power state and to set the second subset of the plurality of links to the second power state different from the first power state. | 05-10-2012 |
20120123984 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Embodiments of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a datasize of a defined retrieval pattern is larger than a permissible memory resource threshold. | 05-17-2012 |
20120124135 | DELIVERY IN SESSION INITIATED PROTOCOL (SIP) CONFERENCING - A method includes determining conference data associated with a conference and determining an optimum congestion control technique for a call leg of the conference based on the conference data. The determining the conference data includes obtaining or receiving the conference data from at least one of: a Home Subscriber Service (HSS), a presence server, and a conference object. The conference is a Session Initiated Protocol (SIP) conference | 05-17-2012 |
20120131159 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 05-24-2012 |
20120253859 | METRICS BASED DESIGN METHOD AND SYSTEM - A metrics based design method and system is disclosed. The method includes receiving by a computer processor, an informational model comprising data objects, attributes, and relationships associated with a service. The data objects comprise sub-objects. The computer processor receives business affinity (BA) band data associated with the data objects, threshold levels associated with the business affinity (BA) band data, business affinity (BA) levels associated with the business affinity (BA) band data, and service interface operation parameters. The computer processor computes a business affinity (BA) for the informational model based on the business affinity (BA) band data, the threshold levels, the business affinity (BA) levels, and the service interface operation parameters. The computer processor computes a data variation percentage and a reusability count. The computer processor performs: a nested level computation for service valency, a factorization process for computing service valency, and a data element count. | 10-04-2012 |
20130019245 | SPECIFYING ON THE FLY SEQUENTIAL ASSEMBLY IN SOA ENVIRONMENTSAANM Jalaldeen; AhamedAACI KarnatakaAACO INAAGP Jalaldeen; Ahamed Karnataka INAANM Purohit; Siddharth N.AACI AllenAAST TXAACO USAAGP Purohit; Siddharth N. Allen TX USAANM Sharma; ManishaAACI New DelhiAACO INAAGP Sharma; Manisha New Delhi INAANM Sivakumar; GandhiAACI VictoriaAACO AUAAGP Sivakumar; Gandhi Victoria AUAANM Viswanathan; RamAACI PlanoAAST TXAACO USAAGP Viswanathan; Ram Plano TX US - A method and system for defining an interface of a service in a service-oriented architecture environment. Definitions of atomic tasks of a request or response operation included in a service are received. Unique identifiers corresponding to the atomic tasks are assigned. A sequence map required to implement the service is received. The sequence map is populated with a sequence of the assigned unique identifiers corresponding to a sequence of the atomic tasks of the operation. At runtime, an interface of the service is automatically and dynamically generated to define the service by reading the sequence of unique identifiers in the populated sequence map and assembling the sequence of the atomic tasks based on the read sequence of unique identifiers. | 01-17-2013 |
20130055193 | SPECIFYING DATA OCCURRENCE IN SOA BASED ENVIRONMENTS - A method and system for specifying a data occurrence in a service-oriented architecture based environment. After a service specification phase of a service, a service interface is received and a service implementation is created. During a service realization phase, a data element of the service is determined to be sourced or not sourced by the service implementation. If the data element is sourced, then the data element is determined to be optional. If the data element is not sourced, then the data element is determined to be mandatory. The data occurrence including an indication of whether the data element is optional or mandatory is displayed. The service specification phase is repeated and the service interface is modified based on the displayed data occurrence. | 02-28-2013 |
20130103372 | SPECIFYING REUSABLE PROCESS MODELS - A method and system for specifying a reusable process model. Sub-processes of a base process are identified as having a potential to be modified. By filling in values in a configurable pattern applied to each identified sub-process, dynamic categories are mapped to the identified sub-processes, thereby allowing the sub-processes to be reusable. A change to business requirements occurs, where the base process is based on the business requirements. Based on the change to the business requirements, a change to the values in the configurable pattern applied to a sub-process is received. The change to the values in the configurable pattern does not require a change to the base process. | 04-25-2013 |
20130205041 | ROUTING A SESSION INITIATION PROTOCOL (SIP) MESSAGE IN A COMMUNICATION SYSTEM - An approach that provides routing a SIP message to a proxy server of a called party in a communication network is provided. In one embodiment, there is a routing tool that assists in routing a session initiation protocol (SIP) message to a called party. The routing tool, including a receiving component, receives a SIP message of a user making a call in the network. The routing tool further includes a parsing component configured to parse the message to determine the domain of the called party and performs a table lookup using the domain of the called party in order to: retrieve a destination code; embed the destination code into the message; and route the message based on the destination code. | 08-08-2013 |
20130238672 | SPECIFYING DATA IN A STANDARDS STYLE PATTERN OF SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS - An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF. | 09-12-2013 |
20130263242 | TENANT DRIVEN SECURITY IN A STORAGE CLOUD - Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider. The method further includes allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot. | 10-03-2013 |
20130283289 | ENVIRONMENTALLY AWARE LOAD-BALANCING - A method and associated systems for the environmentally aware load-balancing of components of a multi-component power-consuming system. The environmentally aware load-balancer receives continually updated values from at least two environmental sensors that monitor and report the values of environmental metrics that characterize components of the power-consuming system and the environments within which those components are located. When the load-balancer receives a task request directed to the power-consuming system, the load-balancer selects a balanced workload allocation as a function of the values of the received environmental metrics and communicates that balanced workload allocation to a routing mechanism. The routing mechanism then uses the communicated balanced workload allocation to determine which component or components of the power-consuming system should receive the task request. | 10-24-2013 |
20130290500 | DIFFERENTIATED SERVICE IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past. This approach further allows for a validation assessment that is based on actual metrics of service usage verses an estimated usage at the time of service implementation. | 10-31-2013 |
20130290599 | LEVERAGING A HYBRID INFRASTRUCTURE FOR DYNAMIC MEMORY ALLOCATION AND PERSISTENT FILE STORAGE - Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure. | 10-31-2013 |
20130339279 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a data size of a defined retrieval pattern is larger than a permissible memory resource threshold. | 12-19-2013 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 01-09-2014 |
20140026191 | SECURITY MODEL FOR A MEMORY OF A NETWORK INFORMATION SYSTEM - Systems and methods for providing information services are disclosed. A method includes passing an instance an object, invoked by a user, to a memory device at a hardware layer of a network information system, the object being hosted for a tenant of a network information service. The method further includes determining by a processing unit of the memory device that storage of the object is not authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes preventing storage of the instance in the memory device based on the result of the determining. | 01-23-2014 |
20140122827 | MANAGEMENT OF MEMORY USAGE USING USAGE ANALYTICS - An approach for managing memory usage in cloud and traditional environments using usage analytics is disclosed. The approach may be implemented in a computer infrastructure including a combination of hardware and software. The approach includes determining that space is available within one or more tables which have schema definitions with string fields having a predefined length. The approach further includes creating a virtual table and mapping the available space to the virtual table for population by one or more records. | 05-01-2014 |
20140223240 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 08-07-2014 |
20140283111 | SPATIAL SECURITY FOR STORED DATA - Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or sector of the hard disk drive. The method also includes locking the at least one track and/or sector as a default setting. The method additionally includes determining the user has moved into a predefined area. The method further includes unlocking the at least one track and/or sector based on the determining the user has moved into the predefined area. | 09-18-2014 |
20140325616 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 10-30-2014 |
20150032678 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by monitoring usage of a data retrieval point with respect to a defined unit of work. A multilayer feed-forward neural network is used to predict, as a function of training sets composed of historical data generated by the monitored usage of the data retrieval point, a future value of a data size of results from an eager fetch setting for the data retrieval point. The eager fetch is automatically revised to a lazy fetch setting in response to determining that the future data size value of the eager fetch setting results is larger than a permissible memory resource threshold. | 01-29-2015 |
20150046597 | SPATIAL SECURITY IN A SESSION INITIATION PROTOCOL (SIP) CONFERENCE - In a method for securing a session initiation protocol (SIP) conference session, first location information of a SIP conference session invitee attempting to connect to a SIP conference session is received. The computer determines that the received first location information at least partially matches a location requirement assigned to the invitee attempting to connect to the SIP conference session. The computer causes the invitee to be connected to the SIP conference session. | 02-12-2015 |
20150067065 | TRANSMISSION OF MESSAGES AND NOTIFICATIONS IN VIRTUALIZED WIRELESS MOBILE COMPUTING DEVICES - A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message. | 03-05-2015 |
20150074174 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074175 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074368 | THIN PROVISIONING STORAGE DEVICES IN CONNECTION WITH SECURE DELETE OPERATIONS - A method for improving thin provisioning storage devices in connection with secure delete operations is provided. The method may include receiving at a physical storage device a first indicator to initiate writing a secure delete pattern to a plurality of physical storage locations. The secure delete pattern is written to a plurality of allocated physical storage locations based on the received first indicator. When a second indicator is set, the end of the secure delete pattern is reached. The thin provisioning storage device, upon receiving the second indicator, securely erases the plurality of storage device metadata regions where the mapping of virtual storage locations to allocated physical storage locations is stored. Requests to write a secure delete pattern for virtual storage locations without corresponding allocated physical storage locations are ignored. | 03-12-2015 |
20150215341 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 07-30-2015 |
20150254156 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 09-10-2015 |
20150256548 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 09-10-2015 |
Patent application number | Description | Published |
20130007835 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 01-03-2013 |
20130185498 | PREVENTION OF DATA LOSS DUE TO ADJACENT TRACK INTERFERENCE - For limiting data loss due to ATI or ATE, an apparatus may include a storage module, a tracking module, and a refresh module. The storage module is configured to store a risk value for a tracked storage division. The risk value indicates a risk level of data loss for the tracked storage division. The tracked storage division is one of a plurality of storage divisions of a data storage device. The tracking module is configured to update the risk value to indicate a higher risk level based on a write to a physically proximal storage division. The physically proximal storage division is within an interference range of the tracked storage division. The tracking module is configured to reset the risk value based on a write to the tracked storage division. The refresh module is configured to refresh the tracked storage division based on the risk value meeting a threshold value. | 07-18-2013 |
20130232179 | ENHANCED STORAGE QUOTA MANAGEMENT FOR CLOUD COMPUTING SYSTEMS - An embodiment of the invention provides a method for storage management in a cloud computing system. More specifically, locations of storage components in the cloud computing system and storage properties of the storage components are identified. The storage properties include the amount of available storage space and/or the cost of storage space. A storage quota for a user of the cloud computing system is generated with a cloud quota management module based on the locations of the storage components and/or the storage properties of the storage components. In at least one embodiment, the storage quota includes the maximum amount of storage allocated to the user in at least one of the storage components. | 09-05-2013 |
20130238781 | SNMP-BASED MANAGEMENT OF SERVICE ORIENTED ARCHITECTURE ENVIRONMENTS - A Simple Network Management Protocol (SNMP)-based apparatus including an SNMP manager to monitor network hardware devices and define object identifiers (OIDs); a Simple SOA Performance Monitor (SSPM) manager to augment the OIDs with service-specific object identifiers to monitor services; and an SSPM agent associated with at least one service to collect details pertaining to the service, the details of the service being provided to the SSPM manager which in turn provides the details of the service to the SNMP manager. The SNMP-based apparatus may be implemented by at least one computing device. Also disclosed is a method of monitoring services and a computer program product. | 09-12-2013 |
20130262590 | RECIPIENT CHANGES IN EMAIL THREADS - A tool for notifying a recipient of an email message, belonging to an email thread, that a recipient address has been added to or dropped from the thread. Address fields of the email message received are compared to the address fields of the most recent prior email message in the thread. Addressed that are determined to be added or dropped are stored in the metadata of the email message received so the added or dropped recipient addresses can be accessed to notify recipients of subsequent emails in the email thread. The metadata of previous email messages in the email thread are accessed to notify the recipient of recipient addresses added or dropped between any two consecutive email messages in the thread. | 10-03-2013 |
20130304431 | AUTOMATICALLY ASESSING MATURITY OF CUSTOM APPLICATION FOR STANDARD-GOVERNED COMPUTING ENVIRONMENT - A system and associated method for automatically assessing maturity for a custom application in a cloud computing environment in accordance with a standard application model. A data fabric analyzer automatically calculates a logical data model compliance level to a process model for the custom application, and a maturity level the logical data model against a standard logical data model. If the logical data model is mature, the data fabric analyzer transforms the logical data model to a physical data model for implementation by a distillation process and a shearing process. If the logical data model is immature, the process model maturity is assessed to employ a standard physical model for implementing the custom application. The data fabric analyzer subsequently computes non-compliance levels for the physical model and calculates a capital expenditure cost caused by non-compliance of the custom physical model to a standard physical model. | 11-14-2013 |
20140032276 | Method And Apparatus For Assessing Layered Architecture Principles Compliance For Business Analytics In Traditional And SOA Based Environments - Computer-implemented methods, computer program products and computer systems that assess business logic architecture compliance by defining an ideal business logic architecture hierarchy of a desired application, retrieving one or more applications from a data repository, breaking down these applications into a plurality of processes and analyzing the plurality of processes for common inter-application processes. Common inter-application processes are located and store in the middleware layer. The desired application is developed using the applications and common inter-application processes from the middleware layer to provide a resultant application, followed by determining an actual business logic hierarchal structure of the resultant application. This actual business logic hierarchal structure of the resultant application is compared against the ideal business logic architecture hierarchy to calculate compliance thereof, which in turn, reflects the maturity level of the developed resultant application. | 01-30-2014 |
20140032861 | SYSTEMS AND METHODS FOR EFFICIENTLY STORING DATA - One method includes assigning a pointer from multiple logical blocks to the same original physical block if the multiple logical blocks include the same data. The method further includes receiving a command to write data to the first logical block and determining if the first logical block is a frequently accessed logical block. If the first logical block is a frequently accessed logical block, ownership of the original physical block is assigned to the first logical block. If ownership is established, the method includes copying any data stored in the original physical block to a new physical block, assigning a pointer from a second logical block to the new physical block, and performing the write command on the original physical block. A system includes a processor for performing the above method. One computer program product includes computer code for performing the method described above. | 01-30-2014 |
20140055260 | POLICY-BASED VEHICLE HORN FUNCTIONS - Vehicle horn functions are implemented by deriving a current value associated with a component defined by a policy, retrieving from a data file a volume setting mapped to the current value, and modifying operation of a horn in a vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn. | 02-27-2014 |
20140056441 | POLICY-BASED VEHICLE HORN FUNCTIONS - Vehicle horn functions are implemented by a computer processor integral with a vehicle and logic executable by the computer processor. The logic derives a current value associated with a component defined by a policy, retrieves from a data file a volume setting mapped to the current value, and modifies operation of a horn in the vehicle to produce a volume corresponding to the volume setting when an operator of the vehicle activates the horn. | 02-27-2014 |
20140215430 | METHOD AND APPARATUS FOR ENABLING LAYERED PROPERTY DEFINITION IN TRADITIONAL AND CLOUD COMPUTING ENVIRONMENTS - In developing custom programming, particularly for clients or tenants of a cloud computing environment, following pointers from a candidate, existing object of interest vertically to obtain inherited attributes and horizontally to obtain encapsulated properties and presenting such attributes and properties to a software developer for editing and inclusion in custom object-oriented programming facilitates and expedites accommodation of requirements of model based design for potential or existing tenants or clients of a cloud computing environment. | 07-31-2014 |
20140282380 | METHOD AND APPARATUS FOR ENABLING AGILE DEVELOPMENT OF SERVICES IN CLOUD COMPUTING AND TRADITIONAL ENVIRONMENTS - Prepending a name object or setting a type of a software object to a name and prepending a value object to the software object provides inheritance of a name value pattern by the software object to establish particular types or classes of attributes of the software object without modification of the software object itself that is thus strongly typed and accessible by type. | 09-18-2014 |
20140365442 | ARCHIVAL MANAGEMENT OF BUSINESS PROCESSES IN A CLOUD ENVIRONMENT - A method for product for archival management of business processes in a cloud environment is provided. In one aspect, the method comprises archiving managed pool including one or more versions of a business process instance or business process execution in a cloud computing environment. The method further comprises a provisioning manager of the cloud computing environment that requests or tasks provisioning, deprovisioining, decommissioning or deleting the one or more versions of a business process instance or business process execution. For each of the requests or tasks, a restore manager of the cloud environment determines, if the managed pools of virtual instances contain a business process management environment or a business process archive manager environment. The restore manager further recreates a previous version of the one or more versions of the business process instance or business process execution based on the determination. | 12-11-2014 |
20150046974 | METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL - A method and an apparatus for specifying a time-varying, intelligent service-oriented model are provided. A method implemented in a computer infrastructure having computer executable code embodied on a computer readable storage medium having programming instructions, includes defining information of a service which is to be provided to one or more users having access to a system storing the defined information. The method further includes defining policies associated with the defined information to allow and deny access to selected portions of the defined information, and exposing to a user of the one or more users the selected portions of the defined information based on the defined policies allowing access to the selected portions of the defined information. | 02-12-2015 |
20150142752 | PRIORITY BASED RELIABILITY MECHANISM FOR ARCHIVED DATA - A method and system for determining priority is provided. The method includes generating a list defining specified data objects stored within a back-up/archived data storage system and applying importance levels to the specified data objects. Reliability urgency levels for the storage devices are determined and in response groups of data objects of the specified data objects are generated. Required reliability levels for each group of data objects are determined and associated erasure encoding rates are calculated. Fragment sets for the groups of data objects are generated and numbers of parity objects required for the fragment sets are determined. An erasure code algorithm is executed with respect to the groups of data objects and in response parity objects are computed on demand. | 05-21-2015 |
20150142885 | SHARING MEMORY AMONG MOBILE DEVICES - A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in all mobile devices from a user-defined group of mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the first slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use. | 05-21-2015 |
20150160943 | SPECIFYING DATA IN A STANDARDS STYLE PATTERN OF SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS - An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF. | 06-11-2015 |
20150193239 | ENHANCED SECURITY AND RESOURCE UTILIZATION IN A MULTI-OPERATING SYSTEM ENVIRONMENT - An approach is provided for operating a mobile device having first and second operating systems (OSs) installed. While the mobile device is executing the first OS but not the second OS, (1) based in part on battery power remaining in the mobile device being less than a threshold and a lower power consumption of the mobile device if executing the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device; and/or (2) based in part on (a) the mobile device being currently located in the first geographic region which has a greater likelihood of attack on the mobile device, and (b) the mobile device being more secure while operating the second OS but not the first OS, execution of the first OS is terminated and the second OS is executed in the mobile device. | 07-09-2015 |
20150199297 | SHARING MEMORY AMONG MOBILE DEVICES - A method, system, and/or computer program product enables the sharing of memory among mobile devices. Copies of a same hard key holder are installed in multiple mobile devices. The hard key holder controls memory sharing between a master mobile device and a slave mobile device. A memory appropriation request is sent from the master mobile device to the slave mobile device. In response to the slave mobile device receiving the memory appropriation request, an unused sector of the memory in the slave mobile device is reserved for use by the master mobile device. Upon storing of data sent from the master mobile device, a message is sent from the slave mobile device to the master mobile device describing how much room is still available for the master mobile device to use. | 07-16-2015 |
20150332056 | PROTECTING DATA OWNED BY AN OPERATING SYSTEM IN A MULTI-OPERATING SYSTEM MOBILE ENVIRONMENT - An approach is provided for protecting data owned by an operating system on a mobile computing device having multiple operating systems. A map specifying protected data regions for the operating systems on the mobile computing device is generated. At least a portion of the map is secured with a shared key. Based on the map and the shared key, and in response to a data cleanup activity being performed by a software utility being executed on another, currently running operating system included in the multiple operating systems, a data region included in the protected data regions is determined to be owned by the operating system. Based on the data region being owned by the operating system and the data region being specified by the map, the data cleanup activity is blocked from being performed on the data region owned by the operating system. | 11-19-2015 |