Patent application number | Description | Published |
20130159763 | Dynamic Allocation of Network Security Credentials For Alert Notification Recipients - Methods, apparatuses, and computer program products for dynamic allocation of network security credentials for alert notification recipients are provided. Embodiments include receiving from a managed system, by an alert management system, an alert indicating one of a failure in the managed system and a pending failure in the managed system; selecting, by the alert management system, a remote device from a plurality of remote devices registered for remote access with the alert management system; preapproving, by the alert management system, network security clearance of the selected remote device, the network security clearance for remote access to the management system via a virtual private network (VPN) interface; and transmitting to the selected remote device, by the alert management system, an alert notification that includes an internet address corresponding to the VPN interface. | 06-20-2013 |
20130159794 | Dynamic Allocation of Network Security Credentials for Alert Notification Recipients - Methods, apparatuses, and computer program products for dynamic allocation of network security credentials for alert notification recipients are provided. Embodiments include receiving from a managed system, by an alert management system, an alert indicating one of a failure in the managed system and a pending failure in the managed system; selecting, by the alert management system, a remote device from a plurality of remote devices registered for remote access with the alert management system; preapproving, by the alert management system, network security clearance of the selected remote device, the network security clearance for remote access to the management system via a virtual private network (VPN) interface; and transmitting to the selected remote device, by the alert management system, an alert notification that includes an internet address corresponding to the VPN interface. | 06-20-2013 |
20130253757 | Maintaining A Dynamic Service Registry For A Self-Diagnosing Device - Maintaining a dynamic service registry for a self-diagnosing device, including: detecting, by the self-diagnosing device, a fault condition, wherein the fault condition indicates that the self-diagnosing device needs to be serviced; detecting, by the self-diagnosing device, that the fault condition has been resolved; determining, by the self-diagnosing device, the geographic location of the self-diagnosing device upon detecting that the fault condition was resolved; and entering, by the self-diagnosing device, the fault condition and the geographic location of the self-diagnosing device when the fault condition was resolved into the dynamic service registry. | 09-26-2013 |
20140101421 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 04-10-2014 |
20140101422 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101428 | DYNAMIC PROTECTION OF ONE OR MORE DEPLOYED COPIES OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of one or more deployed copies of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of one or more other deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the one or more other deployed copies of the master OS image. | 04-10-2014 |
20140101429 | DYNAMIC PROTECTION OF A MASTER OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamic protection of a master operating system image are provided. Embodiments include monitoring, by an image deployment monitor, an operational state of a deployed copy of a master operating system (OS) image; detecting, by the image deployment monitor, a change in the operational state of the deployed copy of the master OS image; in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to prevent the change from occurring in operational states of future deployed copies of the master OS image; and providing, by the image deployment monitor, the configuration recommendation to the master OS image. | 04-10-2014 |
20140101430 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140101431 | DYNAMICALLY RECOMMENDING CONFIGURATION CHANGES TO AN OPERATING SYSTEM IMAGE - Methods, apparatuses, and computer program products for dynamically recommending configuration changes to an operating system image are provided. Embodiments include monitoring, by an image deployment monitor, configurations of a plurality of deployed copies of a master operating system (OS) image; detecting, by the image deployment monitor, a change in one or more configurations of a first set of deployed copies of the plurality of deployed copies; and in response to detecting the change, generating, by the image deployment monitor, a configuration recommendation to recommend the change to an OS image. | 04-10-2014 |
20140108774 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140108779 | DYNAMICALLY RECOMMENDING CHANGES TO AN ASSOCIATION BETWEEN AN OPERATING SYSTEM IMAGE AND AN UPDATE GROUP - Dynamically recommending changes to an association between an operating system image and an update group includes monitoring a configuration of a deployed copy of a first master operating system (OS) image; detecting a modification in the configuration of the deployed copy; determining that the configuration of the deployed copy with the modification more closely matches a configuration of a second master OS image than a configuration of the first master OS image; in response to determining that the configuration of the deployed copy with the modification more closely matches the configuration of the second master OS image, generating an association recommendation that recommends associating the deployed copy with a second update group of the second master OS image; and associating the deployed copy with the second update group of the second master OS image instead of the first update group of the first master OS image. | 04-17-2014 |
20140157037 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer program product includes computer usable program code for: detecting a stability change in a computer system; identifying a first set of at least one capability of the computer system that is affected by the stability change; identifying, in response to detecting the stability change, a software application that was installed or updated prior to the stability change; identifying a second set of at least one capability that is utilized by the identified software application; comparing the first set to the second set to determine a degree of similarity; comparing a first time that the stability change was detected to a second time that the identified software application was installed or updated to determine a temporal proximity; and identifying the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157040 | IDENTIFYING SOFTWARE RESPONSIBLE FOR CHANGES IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a computer system, and identifies a first set of at least one capability of the computer system that is affected by the stability change. In response to detecting the stability change, the method identifies a software application that was installed prior to the stability change, and identifies a second set of at least one capability of the computer system that is utilized by the identified software application. The method compares the first and second capability sets to determine a degree of similarity, and compares the time that the stability change was detected to the time that the identified software application was installed to determine a temporal proximity. The method then identifies the likelihood that the identified software application is the cause of the stability change, wherein the identified likelihood is a function of the degree of similarity and the temporal proximity. | 06-05-2014 |
20140157056 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer program product including computer usable program code embodied on a tangible computer usable storage medium, includes: computer usable program code for detecting a stability change in a first computer system; computer usable program code for comparing a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems in communication with a management module; computer usable program code for identifying a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application; and computer usable program code for identifying the given software application as the cause of the stability change in the first computer system. | 06-05-2014 |
20140157058 | IDENTIFYING SOFTWARE RESPONSIBLE FOR A CHANGE IN SYSTEM STABILITY - A computer-implemented method detects a stability change in a first computer system, and compares a first set of software applications installed on the first computer system to each set of software applications installed on a plurality of other computer systems. The method then identifies a second computer system from among the plurality of other computer systems, wherein the set of software applications installed on the second computer system includes all of the first set of software applications except for a given software application. The given software application is then identified as the cause of the stability change in the first computer system. The computer systems are preferably virtual machines being managed by a management module, such as a provisioning manager. The method may be used to detect both increases in stability and instability. | 06-05-2014 |
20140173329 | CASCADING FAILOVER OF BLADE SERVERS IN A DATA CENTER - Cascading failover of blade servers in a data center implemented by transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring by the system management server the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server. | 06-19-2014 |
20140173332 | Cascading Failover Of Blade Servers In A Data Center - Cascading failover of blade servers in a data center implemented by transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring by the system management server the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server. | 06-19-2014 |
20140173336 | CASCADING FAILOVER OF BLADE SERVERS IN A DATA CENTER - Cascading failover of blade servers in a data center that includes transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server, including transferring the workload to the subsequent replacement blade server only if the data processing cost of the transfer of the workload to the subsequent replacement blade is less than the value of a transfer cost threshold. | 06-19-2014 |
20140215037 | PROVISION OF MANAGEMENT INFORMATION AND REQUESTS AMONG MANAGEMENT SERVERS WITHIN A COMPUTING NETWORK - Provision of management information and requests among management servers within a computing network are disclosed herein. According to an aspect, a method includes determining a requirement of a computing device that cannot be met by a first management server within a computing network. The method may also include communicating a request to a second management server within the computing network to assist with meeting the requirement of the computing device. Further, the method may include providing, to the second management server, access to management information associated with the computing device. | 07-31-2014 |
20140289572 | Dynamically Altering Error Logging Activities In A Computing System - Dynamically altering error logging activities in a computing system, including: receiving, by an error logging manager, historical error resolution data; identifying, by the error logging manager in dependence upon the historical error resolution data, a plurality of computing components associated with each error contained in the historical error resolution data; and associating, by the error logging manager in a related component repository, an identification of each of the plurality of computing components associated with each error and an identification of the error. | 09-25-2014 |
20140289573 | Dynamically Altering Error Logging Activities In A Computing System - Dynamically altering error logging activities in a computing system, including: receiving, by an error logging manager, historical error resolution data; identifying, by the error logging manager in dependence upon the historical error resolution data, a plurality of computing components associated with each error contained in the historical error resolution data; and associating, by the error logging manager in a related component repository, an identification of each of the plurality of computing components associated with each error and an identification of the error. | 09-25-2014 |
20150020209 | AUTO-SHARING OF SENSITIVE DATA - A method, computer system, and/or computer program product shares sensitive data. Sensitive data about a user of a first device is stored within the first device. The sensitive data within the first device is classified into different sensitive data tiers. A determination is made, by one or more processors, as to which tier level of sensitive data from the different sensitive data tiers is appropriate for sharing with a second device, where determining an appropriateness of sharing a particular tier level of sensitive data is based on a current contextual circumstance of the user of the first device. The appropriate tier level sensitive data is transmitted from the first device to the second device. | 01-15-2015 |