Patent application number | Description | Published |
20080201195 | SYSTEM AND METOD FOR TRANSFORMING AN ENTERPRISE USING A COMPONENT BUSINESS MODEL - A system and method are described for using a Component Business Model (CBM) to transform a business. A CBM map is used to identify components that collaborate to provide a specified capability, and a repository supporting the CBM map is filtered to provide a view of the identified components that highlights how they collaborate. The view is used to identify component features contributing to the specified capability. The specified capability is then enhanced by a transformation strategy that includes re-engineering particular components, identifying a pattern characterizing the collaboration between components and adding a component to perform the collaborative pattern, and/or adding an additional feature to the collaboration and adding component to perform the additional feature. The CBM repository provides exemplar best practices that can be adapted for use in a re-engineered component. | 08-21-2008 |
20080215398 | SYSTEM AND METHOD FOR USING A COMPONENT BUSINESS MODEL TO MANAGE AN ENTERPRISE - A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business. | 09-04-2008 |
20080215882 | Assigning Security Levels to a Shared Component - Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step. | 09-04-2008 |
20080221940 | SYSTEM AND METHOD FOR USING THE COMPONENT BUSINESS MODEL TO ANALYZE BUSINESS VALUE DRIVERS - The method and system uses the component business model as a framework for locating business activities. Business value drivers are identified, related in an influence model, and structured into a prioritized driver tree. The driver tree is used to determine the relative contributions of leaf drivers to the overall value of the business. Business activities contributing to the leaf drivers are then identified, and the relative contributions of the leaf drivers are allocated to the business activities and then rolled up to the components for display as a heat map overlay on a component map. | 09-11-2008 |
20100031226 | WORK PACKET DELEGATION IN A SOFTWARE FACTORY - A method, system, and computer-readable medium for utilizing the design centers, assembly line and job shops of a global delivery network across multiple software factories are presented. A work packet is examined to determine if it is authorized to be sub-contracted out to a different design center, assembly line or job shop than the design center/assembly line/job shop that have primary responsibility for the work packet. If the work packet is authorized to be sub-contracted out, then the work packet is reassigned to a different pre-qualified design center/assembly line/job shop. | 02-04-2010 |
20100250300 | METHOD FOR TRANSFORMING AN ENTERPRISE BASED ON LINKAGES AMONG BUSINESS COMPONENTS, BUSINESS PROCESSES AND SERVICES - A business consulting company performs an assessment of a client business enterprise. The assessment includes use of a computer implemented tool for performing business component modeling techniques for creating a heat map. The heat map is used with the tool to form a domain decomposition, form a goal-service modeling structure, and perform an existing asset analysis based to linkages to the heat map. The assessment is delivered to the client company. A service oriented architecture, SOA, solution plan based on the assessment may also be delivered. The consulting company may implement the SOA plan for the client. | 09-30-2010 |
20100250328 | BUSINESS ASSESSMENT METHOD - An assessment of a business is performed using a computer implemented tool to provide a strategy model, an operating model, and an IT model. The assessment is performed by a services providing company for a client company. The assessment is used to create a SOA solution for the business. The services providing company may also implement the SOA solution for the business. | 09-30-2010 |
20100251205 | SYSTEM FOR IMPLEMENTING BUSINESS TRANSFORMATION IN AN ENTERPRISE - A business enterprise is assessed by a consultant using a computer implemented tool for practicing component business modeling techniques. The tool builds a map of components, filters the map to form a heat map and identifies collaborations. Key performance indicators are evaluated. | 09-30-2010 |
20110137622 | ASSESSING THE MATURITY OF AN INDUSTRY ARCHITECTURE MODEL - A system creates and maintains an industry business architecture model over a network. The system defines specific levels of maturity for the model. Associations, relationships, and linkages between content elements are also determined. From these, a specific level of aggregate maturity is defined according to an algorithm. | 06-09-2011 |
20110137714 | SYSTEM FOR MANAGING BUSINESS PERFORMANCE USING INDUSTRY BUSINESS ARCHITECTURE MODELS - A system and dashboard are provided for managing business performance. Key performance indicators developed for a component business model map are computed and displayed along with the map in real time. A user may select a corresponding key performance indicator to display a heat map of components on the dashboard. | 06-09-2011 |
20110137819 | TOOL FOR CREATING AN INDUSTRY BUSINESS ARCHITECTURE MODEL - A system creates and maintains an industry business architecture model (IBAM) over a network. The IBAM has a component business model, process model, service model, and information model. It also may include a reference architecture, demos and other knowledge assets, and collateral. | 06-09-2011 |
20110196719 | SYSTEM FOR ENHANCING BUSINESS PERFORMANCE - A system gathers real-time data about an enterprise over a network. A user device displays a dashboard showing a component business model map, a heat map, key performance indicators for components, key performance indicators for the enterprise, and gradients. The business is enhanced by making investments and changes to those operations having large gradients. | 08-11-2011 |
20120124104 | PUBLISHING AN INDUSTRY BUSINESS ARCHITECTURE MODEL - A data-driven mechanism of business rules is used to form associations between business sectors, industries, solutions, solution offerings, and industry business architecture models. The system and method includes use of a navigation hierarchy, and entity diagram to facilitate use by business consultants for access, viewing, navigation, publishing, and updating. | 05-17-2012 |
20130060945 | IDENTIFYING SERVICES AND ASSOCIATED CAPABILITIES IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention classify cloud computing environments based on the abstraction layers that the cloud computing environments span and by combining the re-usable capabilities/logical components from these layers. In a typical embodiment, input (e.g., a set of requirements, a set of preferences, a set of costs parameters, and/or a request for feedback) pertaining to a set of services available in the networked computing environment is received from a requester via a network node. Based on the input, a set of capabilities and a corresponding set of logical components of the networked computing environment are identified. Thereafter, a set of providers capable of providing at least one of the set of services is identified and ranked. The set of logical components is then configured to provide the set of services according to the input, and made available to the requester. | 03-07-2013 |