Patent application number | Description | Published |
20090158275 | Dynamically Resizing A Virtual Machine Container - Embodiments of the present invention pertain to dynamically resizing a virtual machine container. According to one embodiment, an optimal utilization is determined based on a desired performance for a multi-tiered application and transaction mix information that describes a mix of transactions that result from executing the multi-tiered application. Automatic modification of an amount of a physical resource a virtual machine container is entitled to for executing a particular application component associated with the multi-tiered application is enabled where the amount is automatically modified based on the optimal utilization. | 06-18-2009 |
20100091786 | Control of a Computing System Having Adjustable Inputs - A technique for controlling an output of a computing system having multiple adjustable inputs includes providing a set of adjustable inputs to the computing system, observing an output of the computing system while the system is in operation, and selecting a subset of adjustable inputs from the set of adjustable inputs based on the observation of the output. The inputs in the selected subset are then adjusted to achieve a desired output of the computing system. | 04-15-2010 |
20100115095 | AUTOMATICALLY MANAGING RESOURCES AMONG NODES - A system for managing resources automatically among nodes includes a node controller configured to dynamically manage allocation of node resources to individual workloads, where each of the nodes is contained in one of a plurality of pods. The system also includes a pod controller configured to manage live migration of workloads between nodes within one of the plurality of pods, where the plurality of pods are contained in a pod set. The system further includes a pod set controller configured to manage capacity planning for the pods contained in the pod set. The node controller, the pod controller and the pod set controller are interfaced with each other to enable the controllers to meet common service policies in an automated manner. The node controller, the pod controller and the pod set controller are also interfaced with a common user interface to receive service policy information. | 05-06-2010 |
20100198839 | TERM EXTRACTION FROM SERVICE DESCRIPTION DOCUMENTS - Terms are extracted from service description documents describing desired services, and the terms are used to search for candidate service providers operable to provide the desired services. A matrix of terms and documents are determined from the service description documents. Singular value decomposition (SVD) is used to decompose the matrix. Eigen vectors from the SVD decomposition are weighted by top k singular values in a diagonal matrix S of singular values also generated from the decomposition. The weighted eigen vectors are used to rank terms from the matrix X based on relevance of the terms to the requirements for desired services described in the service description documents. | 08-05-2010 |
20100198840 | RANK-ORDER SERVICE PROVIDERS BASED ON DESIRED SERVICE PROPERTIES - Candidate service providers for a desired service are ranked. Terms describing service requirements for a desired service are determined. Service capability documents describing the services of the candidate service providers are determined using the terms describing the service requirements. Using singular value decomposition (SVD) and a metric, similarities between the terms describing the service requirements and the service capability documents are determined. The candidate service providers are ranked based on the similarities. | 08-05-2010 |
20100306757 | DETERMINING COMPATIBILITY AMONG SERVICE VERSIONS - A method comprises receiving, by a processor, a description of a later version of a service model and determining, by the processor, backward compatibility of the description of the later version of the service model with a description of a previous version of the service model. Each service model comprises one or more versionable types and each versionable type has an associated description. | 12-02-2010 |
20110055559 | DATA RETENTION MANAGEMENT - A file-based data retention management system is provided. A data source can store data files. An online backup file system can make a backup copy of the data files from the data source and store the backup copy of the data files on a backup server. A policy database can be maintained by the system, the policy database including data retention policies for the data files for retention management of the data files. A key management system can assign and manage encryption keys for the data files. The key management system can store the encryption keys on a separate system from the data files stored on the backup server. | 03-03-2011 |
20110161236 | SYSTEM AND METHOD FOR NEGOTIATING A SALE - There is provided a computer system for negotiating a sale. A computer system comprises a processor adapted to execute stored instructions and a memory device that stores instructions for execution by the processor. The memory device comprises computer-implemented code adapted to make an offer to sell in a round of a negotiation. The memory device also comprises computer-implemented code adapted to receive a counter-offer. The memory device additionally comprises computer-implemented code adapted to determine whether to accept the counter-offer based on a pre-determined target, a best alternative to a negotiated agreement (BATNA), and the round of the negotiation. | 06-30-2011 |
20110264483 | DYNAMIC COLLABORATIVE ADAPTATION OF A BUSINESS ACTIVITY IN A BUSINESS ACTIVITY MANAGEMENT SYSTEM - Dynamic adaptation of a business activity involves creation and updating of the business activity in an ad-hoc and collaborative manner as the business activity executes. User input relating to creation of a business activity is received through a user portal, where the business activity involves interactions among people. A business activity orchestrator orchestrates execution of work in the business activity. The business activity is updated using a business activity adapter, where updating the business activity occurs during execution of the business activity, and the updating is further responsive to collaborative input of the people involved in the business activity. | 10-27-2011 |
20110264592 | TEMPLATE-BASED TECHNIQUE FOR MAKING A BEST PRACTICES FRAMEWORK ACTIONABLE - A template-based technique for making a best practices framework actionable includes creating a formal representation of a best practices framework, where the representation includes a machine-readable template. A portion of the template is interpreted to link the portion of the template with logic that corresponds to an action. Execution of the logic is triggered to perform the action in response to occurrence of a trigger condition. | 10-27-2011 |
20110264611 | PRESENTING AN INTERACTIVE GUIDANCE STRUCTURE IN A COLLABORATIVE ENVIRONMENT - A collaborative work environment is provided that supports collaboration among users for performance of a people service that is associated with ad-hoc activities. An information base is provided that includes information relating to responsibilities of the users and work items for the ad-hoc activities. An interactive guidance structure is presented in the collaborative environment to guide actions of the users with respect to the work items. Materials produced as a result of the actions to update the information base are collected. | 10-27-2011 |
20120290485 | AUTOMATED NEGOTIATION - A probability that an opposing party in a negotiation will accept the terms of a candidate offer within a given number of rounds of the negotiation may be computed, and the candidate offer may be identified as an offer to present to the opposing party based on the computed probability. | 11-15-2012 |
20120290850 | DATA MANAGEMENT - In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified. | 11-15-2012 |
20130007020 | METHOD AND SYSTEM OF EXTRACTING CONCEPTS AND RELATIONSHIPS FROM TEXTS - An exemplary embodiment of the present techniques extracts concepts and relationships from a text. Concepts may be generated from the text using singular value decomposition, and ranked based on a term weight and a distance metric. The concepts that are ranked above a particular threshold may be iteratively extracted, and the concepts may be merged to form larger concepts until the generation of concepts has stabilized. Relationships may be generated based on the concepts using singular value decomposition, then ranked based on various metrics. The relationships that are ranked above a particular threshold may be extracted. | 01-03-2013 |
20130007242 | COMPOSITION OF SERVICES - A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal. | 01-03-2013 |
20130010966 | ENCRYPTION KEY STORAGE - Systems, methods, and machine-readable and executable instructions are provided for encryption key storage. Encryption key storage may include associating each of a plurality of identifiers with a different one of a plurality of key fragment stores, determining a plurality of indexes, where each of the plurality of indexes is based upon a handle provided by a customer, an authorization token provided by the customer, and a different one of the plurality of identifiers, partitioning an encryption key provided by the customer into a number of encryption key fragments, and distributing the plurality of indexes and the number of encryption key fragments to the plurality of key fragment stores. | 01-10-2013 |
20130111349 | PROVISIONING IAAS SERVICES | 05-02-2013 |
20130159723 | METHODS, APPARATUS AND SYSTEMS FOR MONITORING LOCATIONS OF DATA WITHIN A NETWORK SERVICE - In one embodiment, a data set is received at a network service element of a network service, a location record for that data set is generated, and the location record is sent to a location registry within the network service to monitored locations of that data set within a network service. The network service element is operatively coupled to a communications link. The location record is generated based on a portion of the data set and a cryptographic key associated with the network service element. The location record uniquely identifies the presence of the data set at the network service element. | 06-20-2013 |
20130191238 | AUTOMATED NEGOTIATION - An agreement is negotiated on behalf of a first party. A region ( | 07-25-2013 |
20130218720 | AUTOMATED NEGOTIATION - A switching linear dynamical system (SLDS) transition model accommodating any number of different switching states may be used to model negotiation behavior. Furthermore, a negotiation behavior model that accommodates multiple different negotiation strategies (e.g., an SLDS transition model where individual switching states represent different negotiation strategies) may be used to predict a trajectory of offers to be made by a party to a negotiation, and terms of a counteroffer to the party may be calculated based on the predicted trajectory of offers to be made by the party. | 08-22-2013 |
20140019368 | AUTOMATED NEGOTIATION - A negotiation involves multiple issues. A counteroffer to an offer made by an opposing party is identified from among a set of candidate counteroffers and presented to the opposing party. | 01-16-2014 |
20140025527 | Automated Negotiation - A potential transaction between a first party and a second party involves multiple issues. A current offer made by the second party is received. A set of candidate counteroffers that satisfy a target utility value for the first party is identified. A counteroffer is selected from among the set of candidate counteroffers and presented to the second party. | 01-23-2014 |
20140039906 | OPTIMIZED SURGERY SCHEDULING - Techniques for generating optimized surgery schedules are described in various implementations. In one example implementation, a method that implements the techniques includes receiving a plurality of surgery scheduling requests for surgical procedures to be performed at a surgical facility having a plurality of operating rooms. The method also includes identifying resource constraints associated with the surgery scheduling requests, and identifying an optimization goal for the surgical facility, the optimization goal being defined using weighted optimization parameters. The method also includes generating a proposed surgery schedule for the surgical facility that includes sequencing and operating room assignments for each of the surgical procedures to be performed, the proposed surgery schedule satisfying the resource constraints and being optimized based on the optimization goal for the surgical facility. The method also includes simulating the proposed surgery schedule to determine expected operational metrics associated with the proposed surgery schedule. | 02-06-2014 |
20140074646 | Automated Negotiation - Offers previously accepted and offers previously made by one or more opposing parties in negotiations inform an assessment of the likelihood that a candidate offer will be accepted by an opponent in a negotiation. | 03-13-2014 |
20140176342 | Patient Environment with Accelerometer - A system includes a patient environment having a first surface and a second surface, an accelerometer mounted to the first surface and configured to capture physiological data of a patient in contact win the second surface, and a connection to transmit the physiological data to a processing system. | 06-26-2014 |
20140358041 | ASSESSING PHYSICAL STABILITY OF A PATIENT USING AN ACCELEROMETER - A system includes an accelerometer worn by a patient to capture physiological data of the patient and transmit the physiological data and a processing system to receive the physiological data and assess a physical stability of the patient using the physiological data. | 12-04-2014 |
20150029029 | ACCELEROMETERS IN AN AREA - A system includes a patient environment in an area, a first accelerometer attached to the first patient environment, a second accelerometer disposed in the area, and a processing system to detect an activity of a patient in the area using vibration data received from the first and the second accelerometers. | 01-29-2015 |