Patent application number | Description | Published |
20110137622 | ASSESSING THE MATURITY OF AN INDUSTRY ARCHITECTURE MODEL - A system creates and maintains an industry business architecture model over a network. The system defines specific levels of maturity for the model. Associations, relationships, and linkages between content elements are also determined. From these, a specific level of aggregate maturity is defined according to an algorithm. | 06-09-2011 |
20110137714 | SYSTEM FOR MANAGING BUSINESS PERFORMANCE USING INDUSTRY BUSINESS ARCHITECTURE MODELS - A system and dashboard are provided for managing business performance. Key performance indicators developed for a component business model map are computed and displayed along with the map in real time. A user may select a corresponding key performance indicator to display a heat map of components on the dashboard. | 06-09-2011 |
20110137819 | TOOL FOR CREATING AN INDUSTRY BUSINESS ARCHITECTURE MODEL - A system creates and maintains an industry business architecture model (IBAM) over a network. The IBAM has a component business model, process model, service model, and information model. It also may include a reference architecture, demos and other knowledge assets, and collateral. | 06-09-2011 |
20110196719 | SYSTEM FOR ENHANCING BUSINESS PERFORMANCE - A system gathers real-time data about an enterprise over a network. A user device displays a dashboard showing a component business model map, a heat map, key performance indicators for components, key performance indicators for the enterprise, and gradients. The business is enhanced by making investments and changes to those operations having large gradients. | 08-11-2011 |
20120124104 | PUBLISHING AN INDUSTRY BUSINESS ARCHITECTURE MODEL - A data-driven mechanism of business rules is used to form associations between business sectors, industries, solutions, solution offerings, and industry business architecture models. The system and method includes use of a navigation hierarchy, and entity diagram to facilitate use by business consultants for access, viewing, navigation, publishing, and updating. | 05-17-2012 |
20130185602 | HEAP DUMP OCCURRENCE DETECTION - Detection of heap dump occurrence is facilitated through maintenance of a heap dump location registry. The heap dump location registry indicates tools for which heap dump occurrence is to be detected. Based on periodically referencing the heap dump location registry, it is determined whether heap dump of a tool of the one or more tools has occurred. In one embodiment, startup and shutdown events of the tool are tracked to update execution status and process identifiers in the heap dump location registry, and the periodically references determines based on the indicators whether heap dump has occurred for the tool. In another embodiment, a heap dump location for heap dumps of the tool is obtained from the registry and the heap dump location is checked for the presence of heap dump files, which presence indicates occurrence of a heap dump for the tool. | 07-18-2013 |
20130218854 | FILE IDENTIFICATION VIA UNIVERSAL FILE CODE - A unique, universal file code created for a file being created or saved for the first time has core elements that include an original device identifier; an original product identifier unique to a software product used to create or save the file; an original operating system identifier unique to an operating system used to create or save the file; an original user identifier unique to a user creating or saving the file; a checksum computed from a totality of a data content of the file; and a name of a checksum algorithm used to compute the checksum. The universal file code is added to file metadata or attributes for the new file and saved with the new file. Embodiments determine whether files are identical, related or not identical or related by comparing elements of their universal file codes. | 08-22-2013 |
20130254764 | ENABLING MULTI-TENANCY FOR INTEGRATED DEVELOPMENT ENVIRONMENT SOFTWARE IN VIRTUAL ENVIRONMENTS - A method and system for enabling multiple users in a computing environment is provided. The method includes receiving software comprising an operating system, integrated development environment (IDE) software, middleware software, and database software. A virtual image instance of operating system, the IDE software, the middleware software, and the database software is provisioned to a virtual instance. User IDs for access to the operating system instance are generated. Workspaces are generated and associated with the user IDs. The middleware software and the database software are configured and the virtual image instance is enabled to accept multiple concurrent logins associated with the user IDs. | 09-26-2013 |
20130332123 | MODEL ELEMENT CHARACTERISTIC PRESERVATION IN MODELING ENVIRONMENTS - Model element characteristic preservation is provided when instantiating unified modeling language elements of a unified modeling language model. Requirements management tool elements become associated with a stereotype via, for instance, user assignment of the stereotype to a requirements type of the requirements management project. A stereotype assignment is obtained for a requirements management tool element, and the stereotype is automatically applied when instantiating a UML element representative of the requirements management tool element. Nesting and traceability relationships between the requirements management tool element and other requirements management tool elements are additionally preserved. | 12-12-2013 |
20140059519 | ENABLING MULTI-TENANCY FOR A COMMERCE SERVER - A method and system for enabling multi-tenancy in a commerce server is provided. The method includes receiving software comprising an operating system, integrated development environment (IDE) software, commerce server middleware software, and database software. A virtual image instance of operating system, the IDE software, and the database software is provisioned to a virtual instance. User IDs for access to the operating system instance are generated. Workspaces are generated and associated with the user IDs. The commerce server middleware software is configured such that the user IDs, hosts, and ports are mapped to commerce server services associated with the commerce server middleware software. The database software is configured such that the virtual image instance is enabled to accept multiple concurrent logins associated with the user IDs. | 02-27-2014 |
20140068042 | Method and Apparatus for Accelerated Virtual Image Provisioning in Distributed Cloud Environments - Systems, methods and/or software where a separate image repository server (IRS) is created and maintained in each and every network and/or subnet segment that includes a destination server associated with the managed pool. Also, when a given virtual image is provisioned to a given destination server then the present invention preferably ensures that the IRS used as a source of the given virtual image is an IRS located in the same subnet and same network as the given destination server. | 03-06-2014 |
20140365442 | ARCHIVAL MANAGEMENT OF BUSINESS PROCESSES IN A CLOUD ENVIRONMENT - A method for product for archival management of business processes in a cloud environment is provided. In one aspect, the method comprises archiving managed pool including one or more versions of a business process instance or business process execution in a cloud computing environment. The method further comprises a provisioning manager of the cloud computing environment that requests or tasks provisioning, deprovisioining, decommissioning or deleting the one or more versions of a business process instance or business process execution. For each of the requests or tasks, a restore manager of the cloud environment determines, if the managed pools of virtual instances contain a business process management environment or a business process archive manager environment. The restore manager further recreates a previous version of the one or more versions of the business process instance or business process execution based on the determination. | 12-11-2014 |
20150081809 | CONTROLLING DELIVERY AND ACCESS OF ELECTRONIC COMMUNICATIONS - A method, system and a computer program product of a computer controlling delivery and access of electronic communications is provided which includes providing an electronic communication sender to include a security measure with respect to an electronic communication to be sent to at least one electronic communication account of at least one intended recipient, receiving and applying the electronic communication security measure to the electronic communication to be sent, sending the electronic communication with the security measure to at least one intended recipient, determining existence of one or more delegates of the electronic communication account of the at least one intended recipient and in response to the determination step, preventing the sent electronic communication with the security measure from view by the one or more delegate of the electronic communication account of the at least one intended recipient. | 03-19-2015 |