Patent application number | Description | Published |
20110225017 | ANALYTIC-BASED SCALING OF INFORMATION TECHNOLOGY RESOURCES - Embodiments of the present invention provide a solution for service-supporting resources (e.g., IT resources such as processor, storage, network, etc.). Specifically, the present invention will first create a resource configuration data repository that includes resource scaling capabilities (e.g., dynamic scaling, automated aggregation, concurrent scaling needs of specific resources such as file system and database table space, storage zoning and input/output multi-pathing, etc.) of a set of IT resources. A unit of work data repository that includes details of jobs handled by the IT resources will also be included. Then, a profile will be created for the set of IT resources. In a typical embodiment, the profile includes information related to a service demand, a capacity, a utilization, and a performance of the set of IT resources. Resource utilization and performance data (e.g., historical and/or real-time data) will then be collected. Using the resource configuration data repository, the unit of work data repository, the profile, and the resource utilization and performance data, a scaling strategy will be generated/developed and implemented for the IT resources. | 09-15-2011 |
20120117422 | DISASTER RECOVERY IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide a DR solution for a networked computing environment such as a cloud computing environment. Specifically, a customer or the like can select a disaster recovery provider from a pool (at least one) of disaster recovery providers using a customer interface to a DR portal. Similarly, using the interface and DR portal, the customer can then submit a request for DR to be performed for a set (at least one) of applications. The customer will then also submit (via the interface and DR portal) DR information. This information can include, among other things, a set of application images, a set of application files, a set of recovery requirements, a designation of one or more specific (e.g., application) components for which DR is desired, dump file(s), database file(s), etc. Using the DR information, the DR provider will then generate and conduct a set of DR tests and provide the results to the customer via the DR portal and interface. In one embodiment, a temporary DR environment can be created (e.g., by the DR provider or the customer) in which the DR tests are conducted. | 05-10-2012 |
20120271949 | REAL-TIME DATA ANALYSIS FOR RESOURCE PROVISIONING AMONG SYSTEMS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for intelligent service resource provisioning among distinct systems in a networked computing environment (e.g., a cloud computing environment). Specifically, the embodiments of the present invention provide an intelligent provisioning engine (hereinafter engine) that accesses a service intelligence repository that comprises configuration information pertaining to a set of service resources available on a set of systems. The engine may also receive/identify a set of rules pertaining to any constraints on the set of service resources as well as a set of policies pertaining to provisioning the set of service resources. Still yet, the engine can collect real-time data pertaining to operational characteristics of the set of service resources. Based on the information/data collected, the engine may determine a plan for provisioning the set of service resources and integrate the plan with ancillary systems/engines (e.g., scaling, provisioning, monitoring, etc.) for implementation of the plan. | 10-25-2012 |
20130159390 | Information Caching System - A method, data processing system, and computer program product for caching information. A computer determines whether at least one of a client data processing system and a hardware device in a plurality of hardware devices has performed a number of operations that have been identified as being associated with a request that is sent to a first hardware device in the plurality of hardware devices. The first hardware device is configured to obtain information from a second hardware device in the plurality of hardware devices for use in generating a response to the request. The computer caches the information in a cache for the plurality of hardware devices prior to a subsequent request for the information being sent to the first hardware device in response to a determination that the at least one of the client data processing system and the hardware device has performed the number of operations. | 06-20-2013 |
20130179537 | TRANSMITTING OF CONFIGURATION ITEMS WITHIN A NETWORK - A method, system and program product for transmitting configuration item data by a network object within a network. The steps include the network object detecting a change; the network object detecting an amount of traffic within the network; the network object transmitting configuration item data to the network at a level based on the amount of traffic present within the network. If all of the configuration item data was not sent and the network object detects that the amount of network traffic within the network is below a determined amount, the network object transmits remaining configuration item data to the network; and if all configuration item data was sent, returns to the step of the network object detecting a change. | 07-11-2013 |
20130227116 | DETERMINING OPTIMAL COMPONENT LOCATION IN A NETWORKED COMPUTING ENVIRONMENT - Service data and service management data traffic in a networked computing environment (e.g., a cloud computing environment) may flow thorough a large number of devices (e.g., storage, network, cache and other devices and appliances) when the data move from one or more source systems to one or more target systems (or end user systems). Embodiments of the present invention provide a data analysis driven approach that detects patterns in data movements, and data traffic can be used to determine placement of certain network service components such as, among others, storage devices and appliances, server devices and appliances, network devices and appliances, etc. | 08-29-2013 |
20130245928 | ELECTRONICALLY LOCATING CONTACTS BASED ON INTENDED TRAVEL DESTINATIONS - Embodiments of the present invention provide an approach for locating connections/contacts of a user of social networking websites based on an intended travel destination of the user. Specifically, embodiments of the present invention will analyze a set of online resources (e.g., travel websites, social networking services, calendaring programs, etc.) to identify one or more travel profiles (e.g., reservations) associated with the user. Based on one or more intended destinations set forth in the travel profile(s), social networking websites associated with the user may be analyzed to identify and locate contacts/connections of the user that are located within a predetermined proximity of the intended destination(s). Once such contacts have been identified, the user may be provided with a notification that identifies the contact and provides the contact's location. | 09-19-2013 |
20130339515 | NETWORK SERVICE FUNCTIONALITY MONITOR AND CONTROLLER - A system and method is disclosed for controlling functionality of a computer network to avoid occurrence of resource or service incidents that degrade or disrupt operation of the network. The metrics monitored are formulated into control charts. Nelson like rules analyze the control charts to identify abnormal service events and abnormal resource events. The identified abnormal service events and abnormal resource events are analyzed using various analytic modes to identify potential resource incidents and potential service incidents. The analytic modes include covariate analysis, multivariate analysis, time series analysis and similar analytic techniques. Information on the abnormal service and abnormal resource events and the information on the potential service incidents/potential resource incidents are forwarded to a control or decision center to guide actions by an autonomic system or human operator to prevent the identified potential resource incidents and potential service incidents from degrading or disrupting operation of the network. | 12-19-2013 |
20140067880 | LEVERAGING ENTERPRISE CONTENT - A method and system for leveraging content is provided. The method includes receiving, data associated with a subscriber and registering the subscriber with an ECM computing system. Devices belonging to the subscriber are connected to the ECM computing system and metadata associated with content retrieved from the devices is generated. The content in the devices are classified into formal content and informal content. Multiple searches for additional content are monitored and multifaceted search results associated with the formal content and the informal content are generated and presented to the subscriber. The subscriber has an option to request informal content on additional end user devices from respective end users based on metadata presented by search results. | 03-06-2014 |
20140081881 | SOCIAL NETWORK BASED MAPPING - A method and system for mapping in accordance with social networking data. The method includes receiving data associated with a user. A computer processor periodically retrieves explicit and implicit social networking data associated with the user. The computer processor analyzes the explicit social networking data, the implicit social networking data, and the first data and generates resulting analysis data. The computer processor generates different travel routes from an initial user location to a user specified destination. Each travel route comprises various stopping points associated with locations of individuals related to the user. Graphical images associated with the individual are generated and presented to the user in combination with graphical representations of the different travel routes via a multifaceted display of each travel route. | 03-20-2014 |
20140089025 | AUTHENTICATING A RESPONSE TO A CHANGE REQUEST - A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request. | 03-27-2014 |
20140095216 | ITINERARY-BASED EVENT RECOMMENDATIONS - Embodiments of the present invention provide a computer system, method, and computer program product for providing event recommendations to a user. User data is aggregated and analyzed to identify one or more user preferences for events. After a travel itinerary is created for the user, the user is notified of one or more events that comport with the user preferences and coincide with the travel itinerary. | 04-03-2014 |
20140123017 | PROVIDING ONLINE MAPPING WITH USER SELECTED PREFERENCES - One embodiment of the invention comprises a method including the step of responsive to receiving a map request from a user that pertains to a specified geographical feature, generating a first view that shows the geographical feature. The method further includes specifying each of one or more preference categories of the user, wherein a user preference is needed for each category, in order to show an additional feature corresponding to each user preference on a map view which includes the geographical feature. The method further includes determining the user preference for each category, wherein at least one of the user preferences is determined from information obtained by accessing an online social network in which the user participates. Each determined user preference is used with one or more search engines in order to acquire information for use in generating each of the additional features for a map view. | 05-01-2014 |
20140195387 | CUSTOMIZATION OF AN E-COMMERCE DISPLAY FOR A SOCIAL NETWORK PLATFORM - A first computer identifies electronic commerce activity related to a first user. The first computer retrieves a first data, wherein the first data is coupled to the electronic commerce activity. The first computer analyzes the first data and generates a second data. The first computer generates an electronic commerce display for a social network platform using the second data, wherein the electronic commerce display includes at least one timeline of the electronic commerce activity of the first user. | 07-10-2014 |
20140201362 | REAL-TIME DATA ANALYSIS FOR RESOURCE PROVISIONING AMONG SYSTEMS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for intelligent service resource provisioning among distinct systems in a networked computing environment (e.g., a cloud computing environment). Specifically, the embodiments of the present invention provide an intelligent provisioning engine (hereinafter engine) that accesses a service intelligence repository that comprises configuration information pertaining to a set of service resources available on a set of systems. The engine may also receive/identify a set of rules pertaining to any constraints on the set of service resources as well as a set of policies pertaining to provisioning the set of service resources. Still yet, the engine can collect real-time data pertaining to operational characteristics of the set of service resources. Based on the information/data collected, the engine may determine a plan for provisioning the set of service resources and integrate the plan with ancillary systems/engines (e.g., scaling, provisioning, monitoring, etc.) for implementation of the plan. | 07-17-2014 |
20140201569 | DISASTER RECOVERY IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide a DR solution for a networked computing environment such as a cloud computing environment. Specifically, a customer or the like can select a disaster recovery provider from a pool (at least one) of disaster recovery providers using a customer interface to a DR portal. Similarly, using the interface and DR portal, the customer can then submit a request for DR to be performed for a set (at least one) of applications. The customer will then also submit (via the interface and DR portal) DR information. This information can include, among other things, a set of application images, a set of application files, a set of recovery requirements, a designation of one or more specific (e.g., application) components for which DR is desired, dump file(s), database file(s), etc. Using the DR information, the DR provider will then generate and conduct a set of DR tests and provide the results to the customer via the DR portal and interface. In one embodiment, a temporary DR environment can be created (e.g., by the DR provider or the customer) in which the DR tests are conducted. | 07-17-2014 |
20140279187 | GIFTING ENABLED BY INTEGRATION OF COMMERCE AND SOCIAL NETWORKS - An approach to generate and execute an e-commerce gift offer for a social network contact as a function of integrating social network data into a web site offering goods or services for sale within a network computing environment is provided. In response to the user selecting an item offered for sale by the web site, aspects search personal data associated with the user that is acquired from a different, social network web site to determine an indication that another user listed within the acquired personal data has an interest in also acquiring the selected item, and present an offer to the user to select the item for an additional gift purchase for such other user as a recipient. Further aspects use the acquired personal data to narrow down retailers to those that provide delivery service to a current residence of the other user for execution of the gift purchase. | 09-18-2014 |
20140280861 | DYNAMICALLY LAUNCHING INTER-DEPENDENT APPLICATIONS BASED ON USER BEHAVIOR - A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage. | 09-18-2014 |
20140310125 | E-COMMERCE SYSTEM THAT ALLOWS FOR SELLER GEOGRAPHIC RESTRICTIONS - A computer receives a first set of geographic restrictions on the sale of an item from a seller. The computer receives an offer for purchase of the item from a buyer, wherein the offer includes geographic information of the buyer. The computer determines whether the geographic information of the buyer satisfies the first set of geographic restrictions on the sale of the item. Based on the determination of whether the geographic information of the buyer satisfies the first set of geographic restrictions on the sale of the item, the computer determines whether to transmit the offer for purchase of the item to the seller. | 10-16-2014 |
20140324541 | USING REAL-TIME ONLINE ANALYTICS TO AUTOMATICALLY GENERATE AN APPROPRIATE MEASUREMENT SCALE - A method and associated systems for using real-time online text analytics and real-time online semantic analytics to automatically generate an appropriate measurement scale for a questionnaire, survey, interview, or other information-gathering instrument. The method uses known techniques, procedures, and models of real-time online analytics to infer meaning from a subject's unstructured response to a questioner's solicitation of information. It next uses these results to select one or more measurement scales from a repository of measurement scales and to customize those selected scales into forms appropriate to the researcher's solicitation. The processor then delivers the customized scale or scales to the researcher quickly enough to allow the researcher to use the delivered scales to immediately quantize or otherwise characterize the unstructured response. | 10-30-2014 |
20140324825 | GENERATION OF MULTI-FACETED SEARCH RESULTS IN RESPONSE TO QUERY - Aspects retrieve, organize and display different classifications of sets of search results in different, respective tabbed sheets that are nested on top of one another in a web-based interface dashboard. A text string search query is classified into constituent primary search terms that are likely to return satisfactory search results as indicated by retrieved search history data as a function of search resources and language classification rules associated with the user identity indicia. Secondary search terms related to the primary search terms and including synonyms and antonyms are determined as substitutes for the primary search terms in response to search history indicating follow-up searches immediately subsequent to searches of the primary search terms at less than a specified threshold of frequency. The set of peripheral knowledge article results is generated by searching knowledge article resources for background information on the primary search terms or the secondary search terms. | 10-30-2014 |
20140328486 | ANALYZING AND TRANSMITTING ENVIRONMENTAL SOUNDS - Embodiments herein provide analysis and transmission of environmental sounds (e.g., outdoor sounds generated from an environment surrounding an enclosure) to an indoor occupant. Specifically, a sound analyzer is configured to receive a sensor output containing the environmental sounds, and analyze, in real-time, the environmental sounds to determine attributes of each of the environmental sounds. Each attribute is then compared to a collection of known sounds, and classified based on the comparison. The environmental sounds are then output and transmitted to the indoor occupant as at least one of: an audio transmission containing one or more of the environmental sounds, and a display of information about the one or more environmental sounds. The environmental sounds can be broadcast to the indoor occupant in real-time, and/or may be recorded for later analysis and use. | 11-06-2014 |
20140330680 | E-COMMERCE SYSTEM THAT ALLOWS FOR SELLER RESTRICTIONS BASED ON SOCIAL MEDIA ACCOUNT CHARACTERISTICS - A computer receives a first restriction on the sale of an item from a seller, wherein the first restriction is based on at least one social media account characteristic. The computer receives an offer for purchase of the item from a buyer, wherein the offer includes characteristics of a social media account of the buyer. The computer determines whether the characteristics of the social media account of the buyer satisfies the first restriction on the sale of the item. Based on the determination of whether the characteristics of the social media account of the buyer satisfies the first restriction on the sale of the item, the computer determines whether to transmit the offer for purchase of the item to the seller. | 11-06-2014 |
20140372076 | PROVIDING KNOWN DISTRIBUTION PATTERNS ASSOCIATED WITH SPECIFIC MEASURES AND METRICS - A computer receives one or more keywords input by a user to describe a metric or a test and identifies a first document that includes at least one of the keywords. The computer identifies, in the first document, a known distribution pattern and an associated metric or measure that relate to the one or more keywords. The computer makes an electronic record of the identified known distribution pattern and associated metric or measure. | 12-18-2014 |
20150089488 | ANALYTICS BASED PATCH MANAGEMENT AND DISTRIBUTION - In a method for determining a time to deploy and install patches one or more processors receive a request to deploy a patch by a target deployment time and install the patch by a target installation time, for at least one computing device of a plurality of computing devices on a network. The one or more processors determine a time frame to deploy the patch based on the target deployment time and availability of bandwidth on the network. The one or more processors determine a time to install the patch based on the target installation time and usage of the at least one computing device. The one or more processors cause the patch to be deployed within the determined time frame to deploy the patch. The one or more processors send an instruction to install the patch at the determined time to install the patch. | 03-26-2015 |