In accordance with certain aspects of the model-based policy application, each of a plurality of policies is associated with appropriate parts of a model of a heterogeneous system. A deployment agent is invoked to apply each of the plurality of policies to components associated with the parts of the
In accordance with certain aspects of the model-based policy application, each of a plurality of policies is associated with appropriate parts of a model of a heterogeneous system. A deployment agent is invoked to apply each of the plurality of policies to components associated with the parts of the model. An identification of a change to one of the plurality of policies is received, and the deployment agent is also invoked to apply the changed policy to selected ones of the components associated with the parts of the model.
대표청구항▼
The invention claimed is: 1. One or more computer storage media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to perform a method, the method comprising: associating a type, an instance, and one or more configurati
The invention claimed is: 1. One or more computer storage media having stored thereon a plurality of instructions that, when executed by one or more processors, causes the one or more processors to perform a method, the method comprising: associating a type, an instance, and one or more configurations with components of a system, each type, instance, and configuration having its own information page corresponding to a particular component, wherein: the type is a general template having corresponding information page that describes the type to which the particular component corresponds; the configuration is a specific template including specific information for a particular class of the type; the instance is a specific occurrence of the type or the configuration and corresponding to the particular component; information contained in information page associated with the instance is more specific or restrictive than the information contained in information pages associated with the configuration, unless instructed otherwise by a user; and information contained in information page associated with the configuration is more specific or restrictive than the information contained in information pages associated with the type, unless instructed otherwise by the user; associating one or more information pages with components of the system to define a model of the system, wherein: each component comprises at least one of: an application, a particular hardware on a computer, a virtual machine, a computer, or a group of multiple computers; each information page represents a specification for an associated component, each information page comprising at least two of following distinct pages: a policy page, an installation page, a constraint page, a monitoring page a service level agreement page, or a description page, the model defines one or more relationships among the components, the relationships including: a containment relationship; a hosting relationship; or a communication relationship; and the model supports deployment of a plurality of policies, wherein each policy applies to a subset of the system such that a system component affected by a first policy is not affected by a second policy; associating two or more policies with particular components based on the information in a policy page associated with the particular components, the two or more policies comprising: a software deployment policy; a software configuration management policy; a data protection policy; an inventory data policy; a health monitoring policy; a workload deployment policy; or a task execution policy; making the model accessible to various utilities or other applications involved in managing the system; receiving an identification of a change to one of the policies; identifying appropriate components of the model to which the changed policy applies; associating the changed policy with the identified appropriate components of the model; and invoking a deployment agent to apply the changed policy to the identified appropriate components of the system associated with the parts of the model. 2. One or more computer storage media as recited in claim 1, the method further comprising: receiving an identification of a change to the system, the change to the system being at least one of: addition of a component to the system, removal of a component from the system, change of a type of a component of the system, or addition, removal, or modification of a relationship among the components of the system; associating appropriate policies with the components affected by the change to the system; and applying appropriate policies to the affected components in the system. 3. One or more computer storage media as recited in claim 1, wherein associating one or more policies with particular components based on the information in a policy page associated with the particular components comprises: receiving a policy for particular components of the system; identifying appropriate components of the system to which the policy applies; and associating the policy with the identified appropriate components. 4. One or more computer storage media as recited in claim 3, wherein identifying appropriate components of the system comprises accessing information pages associated with the components of the system and identifying, from the information in the information pages, the components of the system to which the policy applies. 5. A method comprising: establishing, by a computing device configured to provide model-based policy functionality, a plurality parts of a model of a system, the establishing including associating, by the computing device, a type, an instance, and one or more configurations with components of the system, each type, instance, and configuration having its own information page corresponding to a particular component, wherein: the type is a general template having corresponding information page that describes the type to which the particular component corresponds; the configuration is a specific template including specific information for a particular class of the type; the instance is a specific occurrence of the type or the configuration and corresponding to the particular component; information contained in information page associated with the instance is more specific or restrictive than the information contained in information pages associated with the configuration, unless instructed otherwise by a user; and information contained in information page associated with the configuration is more specific or restrictive than the information contained in information pages associated with the type, unless instructed otherwise by the user; the information page includes one or more policies; receiving, by the computing device, multiple policies for a part of the model of the system for a first policy of the multiple policies: identifying, by the computing device, a first part of the model of the system to which the first policy applies; associating, by the computing device, the first policy with the identified first part; and invoking, by the computing device, a deployment agent to apply the first policy to components of the system corresponding to the identified first part of the model; and for a second policy of the multiple policies: identifying, by the computing device, a second part of the model of the system to which the second policy applies; associating, by the computing device, the second policy with the identified second part; and invoking, by the computing device, the deployment agent to apply the second policy to components of the system corresponding to the identified second part of the model, wherein: the first policy is different from the second policy; and the first part of the model is different from the second part of the model. 6. A method as recited in claim 5, wherein all policies that apply to the system are associated with selected parts of the model of the system. 7. A method as recited in claim 5, further comprising performing, by the computing device, management of the system using the model of the system, the management of the system including deploying software to components of the system and monitoring health of the system. 8. A method as recited in claim 5, further comprising maintaining, by the computing device, the model of the system at a central repository. 9. A method as recited in claim 8, further comprising maintaining, by the computing device, at least a portion of the model at selected components of the system. 10. A method as recited in claim 5, further comprising changing, by the computing device, the policy for one part of the model based on one or more other parts of the model. 11. A method as recited in claim 5, wherein identifying parts of the model comprises accessing, by the computing device, information pages associated with components of the model and identifying, from the information in the information pages, the components of the model to which the policy applies. 12. A method as recited in claim 5, wherein identifying parts of the model comprises accessing, by the computing device, relationship information associated with components of the model and identifying, by the computing device, from the relationship information, the components of the model to which the policy applies. 13. A method as recited in claim 5, wherein the model defines one or more relationships among the components. 14. A method as recited in claim 13, wherein the relationships include a containment relationship, a hosting relationship, or a communication relationship. 15. A method comprising: associating, by a computing device configured to provide model-based policy functionality, one or more information pages with components of a system to define a model of the system, the associating including associating, by the computing device, a type, an instance, and one or more configurations with components of the system, each type, instance, and configuration having its own information page corresponding to a particular component, wherein; the type is a general template having corresponding information page that describes the type to which the particular component corresponds; the configuration is a specific template including specific information for a particular class of the type; the instance is a specific occurrence of the type or the configuration and corresponding to the particular component; information contained in information page associated with the instance is more specific or restrictive than the information contained in information pages associated with the configuration, unless instructed otherwise by a user; and information contained in information page associated with the configuration is more specific or restrictive than the information contained in information panes associated with the type, unless instructed otherwise by the user; wherein: each component comprises at least one of; an application, a particular hardware on a computer, a virtual machine, a computer, or a group of multiple computers; each information page represents a specification for an associated component, each information page comprising at least two of following distinct pages: a policy page, an installation page, a constraint page, a monitoring page a service level agreement page, or a description page, the model defines one or more relationships among the components, the relationships including: a containment relationship; a hosting relationship; or a communication relationship; and the model supports deployment of a plurality of policies, wherein each policy applies to a subset of the system such that a system component affected by a first policy is not affected by a second policy; associating, by the computing device, two or more policies with particular components based on the information in a policy page associated with the particular components, the two or more policies comprising: a software deployment policy; a software configuration management policy; a data protection policy; an inventory data policy; a health monitoring policy; a workload deployment policy; or a task execution policy; making, by the computing device, the model accessible to various utilities or other applications involved in managing the system; receiving, by the computing device, an indication of a change to a policy of the system; identifying, by the computing device, appropriate components of the model of the system that are affected by the change, each of the one or more components having an associated policy; modifying, by the computing device, each policy associated with the identified appropriate components to reflect the change, the modifying comprising adding, deleting, or replacing a changed policy in the policy page; and invoking, by the computing device, a deployment agent to apply the changed policy to the identified appropriate components of the system. 16. A method as recited in claim 15, further comprising: receiving, by the computing device, an identification of a change to the system, the change to the system being addition of a component to the system; associating, by the computing device, the policy with one or more parts of the model associated with the added component; and invoking, by the computing device, the deployment agent to apply the policy to the added component in the system. 17. A method as recited in claim 15, wherein identifying appropriate components of the model comprises accessing, by the computing device, information pages associated with components of the model and identifying, from the information in the information pages, one or more components of the model to which the policy applies. 18. A method as recited in claim 15, further comprising changing, by the computing device, the policy for appropriate components of the model based on one or more other parts of the model. 19. A method as recited in claim 15, wherein identifying appropriate components of the model comprises accessing, by the computing device, relationship information associated with components of the model and identifying, from the relationship information, the components of the model to which the policy applies. 20. A method as recited in claim 15, further comprising performing, by the computing device, management of the system using the model of the system, the management of the system including deploying software to components of the system and predicting capacity of the system.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (328)
Murthy V. Devarakonda ; Daniel Manuel Dias ; German Sergio Goldszmidt ; Guerney Douglass Holloway Hunt ; Arun Kwangil Iyengar ; Richard Pervin King ; Rajat Mukherjee, Affinity-based router and routing method.
Branson, Michael John; DeStefano, George Francis; Haugen, Ronald Joseph; Hintermeister, Gregory Richard; Hurlebaus, Gregory Scott; Lindberg, Erik Duane; Sandifer, David Henry; Townsend, Susette Marie, Apparatus and method for synchronizing software between computers.
Fung,Henry T., Apparatus, architecture, and method for integrated modular server system providing dynamically power-managed and work-load managed network devices.
Suorsa,Raymond E.; LeVasseur,Joshua T., Automated provisioning of computing networks according to customer accounts using a network database data model.
Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
Chandra, Tushar Deepak; Fakhouri, Sameh Afif; Fong, Liana Liyow; Jerome, William Francis; Krishnakumar, Srirama Mandyam; Naik, Vijay Krishnarao; Pershing, Jr., John Arthur; Turek, John Joseph Edward, Controlling a number of instances of an application running in a computing environment.
Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
Or,Yan; Casier,Johan; Garimella,Krishna; Bellur,Umesh; Koper,John; Joshi,Shashank; Sundaresan,Vinu, Deployment of applications in a multitier compute infrastructure.
Leung,Ying Tat; Parija,Gyana Ranjan; Sharma,Samir, Diagnosis of equipment failures using an integrated approach of case based reasoning and reliability analysis.
Couland Ghislaine,FRX ; Hunt Guerney Douglass Holloway ; Levy-Abegnoli Eric Michel,FRX ; Jean-Marie Mauduit Daniel Georges,FRX, Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server.
Narisi, Anthony; Coyne, Lois B.; Jennion, Susan; Kain, Michael T.; Parker, Charles Austin, Distributed transport communications manager with messaging subsystem for high-speed communications between heterogeneous computer systems.
Kubota, Yasuo; Shiba, Nobuo, Distributed-object development system and computer-readable recording medium recorded with program for making computer execute distributed-object development.
Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; Yu Philip Shi-Lung, Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy.
Carley,Kevin W.; Harrington,Lisa Marie; Dikeman,Jennifer Scot; Moody,Megan Davies; Gregory,Mary Michelle, Error and load summary reporting in a health care solution environment.
Axnix,Christine; Kuebl,Klaus Jurgen; Muehlbach,Andreas; Probst,Juergen Josef; Hollenback,Carl J.; Kubala,Jeffrey P., Flexible temporary capacity upgrade/downgrade in a computer system without involvement of the operating system.
Zinky, John A.; Schantz, Richard R.; Bakken, David E.; Loyall, Joseph P., Framework for providing quality of service requirements in a distributed object-oriented computer system.
Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
Goldszmidt,German; Lorrain,Jean A.; Maruyama,Kiyoshi; Verma,Dinesh Chandra, METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES.
Fakhouri,Sameh A.; Jerome,William F.; Kummamuru,Krishna; Naik,Vijay K.; Pershing, Jr.,John A.; Raina,Ajay; Varma,Pradeep; Badovinatz,Peter R.; Kumar,Vijay, Managing a cluster of networked resources and resource groups using rule-base constraints in a scalable clustering environment.
Davis,Andrew T.; Parikh,Jay G.; Thirumalai,Srikanth; Weihl,William E.; Tsimelzon,Mark, Managing web tier session state objects in a content delivery network (CDN).
Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul Joseph; Durfee,Glenn E.; Grinter,Rebecca E.; Wong,Hao Chi, Method and apparatus for establishing and using a secure credential infrastructure.
Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
Vilhuber,Jan; Pritikin,Max, Method and apparatus for integrated provisioning of a network device with configuration information and identity certification.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
Ben Nun, Michael; Ravid, Sagi; Barak, Itzhak; Weill, Ofer, Method and apparatus for scalable process flow load balancing of a multiplicity of parallel packet processors in a digital communication network.
Challener David Carroll ; Desai Dhruv Manmohandas ; Rohatgi Pankaj ; Safford David Robert, Method and apparatus for securing communication utilizing a security processor.
Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA) Von De Bur James M. (San Jose CA), Method and apparatus for storing interface information in a computer system.
Robert A. Dolin, Jr. ; Robert L. Einkauf ; Glen M. Riley, Method and apparatus for treating a logical programming expression as an event in an event-driven computer environment.
Al-Hilali Hilal ; Clarke Perry ; Guimbellot David Edward ; Howell David Andrew, Method and computer program product for estimating total resource usage requirements of a server application in a hypothetical user configuration.
Graupner,Sven; Kotov,Vadim; Trinks,Holger, Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers.
Kampe, Mark A.; Gien, Michel; Penkler, David; Jacquemot, Christian; Herrmann, Frederic; Armand, Francois; Fenart, Jean-Marc; Campbell, David F.; Baltz, Lawrence E., Method and system for achieving high availability in a networked computer system.
Poli, Christopher; Makofka, Douglas S.; Lehrman, Ira S.; Del Sordo, Christopher S.; Bates, IV, Thomas F., Method and system for downloading and managing the enablement of a list of code objects.
Gorczyca Robert ; Rashid Aamir Arshad ; Rodgers Kevin Forress ; Warnsman Stuart ; Weaver Thomas Van, Method and system for dynamically reconfiguring a cluster of computer systems.
Vrhel, Jr., Thomas; Barajas, Gaston M., Method and system for installing and testing build-to-order components in a defined configuration computer system.
Lawson, Todd C.; Cave, Warren D.; Fisher, Kamika Layne, Method and system for intelligent global event notification and control within a distributed computing environment.
Solden,Sherry; Harcourt,Edwin A.; La Rue, Jr.,William W.; Dunlop,Douglas D.; Hoover,Christopher; Chao,Qizhang; Agrawal,Poonam; Beverly,Aaron; Chiodo,Massimiliano L.; Bhatnagar,Neeti K.; Desai,Soumya;, Method and system for performance level modeling and simulation of electronic systems having both hardware and software elements.
Peterson, Glenn R.; Gamache, Rod; Massa, Michael T.; Kusters, Norbert P., Method and system for remote access to computer devices via client managed server buffers exclusively allocated to the client.
Waugh, Donald Craig; Roberts, Michael Albert; Alibhai, Rahim, Method and system for restricting access to the private key of a user in a public key infrastructure.
Chiu, Willy W.; Halim, Nagui; Hellerstein, Joseph L.; Krueger, Jr., LeRoy Albert; Mills, III, W. Nathaniel; Squillante, Mark S., Method, computer program product, and system for deriving web transaction performance metrics.
Maves Walter,CAX ; McGuirk Fred,CAX ; Bennett James,CAX ; Clarke Matthew,CAX, Method, system and data structures for computer software application development and execution.
Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
Pace,Charles P.; Pizzorni,Paolo R.; Chen,Shuang, Method, system, and structure for distributing and executing software and data on different network and computer devices, platforms, and environments.
Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
Ronald Leonard Westfall CA; Paul Terry CA; John M. Siu CA; Aaron S. Mar CA, Methods and apparatus for deploying quality of service policies on a data communication network.
Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
Thomsen, Brant D., Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device.
Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
McCollum,Raymond W.; Palanca,Radu R.; Pfenning,Jorg T.; Sutton,Alexander M.; Brown,Mark R., Model-based management of computer systems and distributed applications.
Contreras, Alfredo; White, Jeffrey Alan; Williams, William Bradley, Modeling objects, systems, and simulations by establishing relationships in an event-driven graph in a computer implemented graphics system.
O'Brien, Eric David; Tryon, Jr., James Robert, Modular framework for dynamically processing network events using action sets in a distributed computing environment.
Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R., Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects.
Curtis David C. ; Curtis Kathleen P. ; Denunzio David D. ; Reed William P. ; Wolak Robert A., Network configuration management system for digital communication networks.
Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network.
Dardinski,Steven; Eldridge,Keith; Hall,Robert; Johnson,Mark; McKay,Brian; Meskonis,Paul; Volk,Scott, Process control configuration system with connection validation and configuration.
Sonty Atashi C. (Pittsford NY) Faria Jose A. (Rochester NY) Willett Alan W. (Rochester NY) Ciulla Kim P. (Honcoye Falls NY) Comparetta Christopher (Pittsford NY) Latone Jack T. (Rochester NY), Process for configuration management.
Doli ; Jr. Robert A. (Menlo Park CA) Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA), Programming language structures for use in a network for communicating, sensing and controlling information.
Peter K. Craft ; Olive M. Philbrick ; Laurence B. Boucher ; David A. Higgen, Protocol processing stack for use with intelligent network interface device.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., Providing automatic policy enforcement in a multi-computer service application.
Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
Stelting, Stephen A.; Sierra, Katherine J., Service mapping method of enterprise application modeling and development for multi-tier service environments.
Myrick,Conrad B.; Hixon, Jr.,Harry W.; Koll,Christopher M.; Whittle, Jr.,Ralph L., Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business.
Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
Pancha, Girish; Wilson, A. Adam; Suresh, Sankaran; Lord, Spencer A., System and method for coupling remote data stores and mobile devices via an internet based server.
Rappaport, Theodore; Skidmore, Roger; Henty, Benjamin, System and method for design, tracking, measurement, prediction and optimization of data communication networks.
Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
Murphy,Richard C.; Carter,Scott M.; Ornelas,Mario G.; Deshpande,Shrikant, System and method for dynamic resource configuration using a dependency graph.
Friedrich Richard J. ; Matinka Joseph J. ; Sienknecht Tracy F., System and method for efficiently monitoring quality of service in a distributed processing environment.
Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for logical modeling of distributed computer systems.
Courts Howard R. ; Dholakia Neil K. ; Dunn Craig L. ; Huddleston Brian J. ; Huddleston Erik L. ; Macartney-Filgate Bruce C. ; McHyde Timothy J. ; Poorte Jacob, System and method for maintaining a state for a user session using a web system having a global session server.
Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
Dumarot Daniel Peter ; Stevenson David Alan ; Dono Nicholas Richard ; Moulic James Randall ; Pickover Clifford Alan ; Schneider Bengt-Olaf ; Smith Adelbert, System and method for optimizing computer software and hardware.
Randal Lee Bertram ; Frederick Scott Hunter Krauss ; Gregory J. McKnight, System and method for predicting computer system performance and for making recommendations for improving its performance.
Tabbara, Bassam; Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Welland, Robert V., System and method for restricting data transfers and managing software components of distributed computers.
Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
Gibson William,GB2 ; Marshall David R. ; Turner Steve,GB2 ; Dawson William N. ; Hogan Patrick M., System and method for the creation and use of surrogate information system objects.
Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Tabbara, Bassam; Van Antwerp, Mark D.; Welland, Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
Miyamoto,Carleton; Lin,Chang; Blume,William; Bandhole,Jagadish, System for dynamic provisioning of secure, scalable, and extensible networked computer environments.
Slater, Charles; Chennapragada, Krishna Rao, System for managing cluster of network switches using IP address for commander switch and redirecting a managing request via forwarding an HTTP connection to an expansion switch.
Leon L. Lumelsky ; Nelson R. Manohar, System for seamless streaming of data stored on a network of distributed primary and target servers using segmentation information exchanged among all servers during streaming.
Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
Masuoka Yoshimasa,JPX ; Kagimasa Toyohiko,JPX ; Kitai Katsuyoshi,JPX ; Noda Fumio,JPX, System using environment manager with resource table in each computer for managing distributed computing resources managed for each application.
Fung,Henry T., System, architecture, and method for logical server and other network devices in a dynamically configurable multi-server network environment.
Rappaport, Theodore S.; Gold, Brian T.; Skidmore, Roger R., System, method, and apparatus for portable design, deployment, test, and optimization of a communication network.
Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
Acharya,Anurag; Cocosel,Bogdan; Popescu,Catalin T.; Jhong,Eugene L.; Sim,Peng Toh, Systems and methods for automatic repair and replacement of networked machines.
Weldon,Phyllis Marie Dyer; Shankle, III,Edwin Bruce; Klein, Jr.,James Arthur, Systems, methods and computer program products for designing, deploying and managing interactive voice response (IVR) systems.
Marin Gerald A. ; Onvural Raif O. ; Roginsky Allen Leonid ; Srinivasan Vijay, Systems, methods and computer program products for distributing connection information between ATM nodes.
Deborah L. Caswell ; Srinivas Ramanathan ; James D. Hunter ; Scott S. Neal ; Frederick A. Sieker ; Mark D. Smith, Template-driven approach for generating models on network services.
Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.
Kamal Emile Dimitri ; John Edward Kulakowski ; Rodney Jerome Means, Wireless communication between multiple intelligent pickers and with a central job queue in an automated data storage library.
Forrester, Ronald James; Starnes, William Wyatt; Tycksen, Jr., Frank A., Method and apparatus for lifecycle integrity verification of virtual machines.
Devarakonda, Murthy V.; Rajamani, Nithya; Srivatsa, Mudhakar, Method and apparatus for performance and policy analysis in distributed computing systems.
Devarakonda, Murthy V.; Rajamani, Nithya; Srivatsa, Mudhakar, Method and apparatus for performance and policy analysis in distributed computing systems.
Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and system to issue trust score certificates for networked devices using a trust scoring service.
Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method to control access between network endpoints based on trust scores calculated from information system component analysis.
Bakman, Alexander; Panov, Sergey, Method, system and apparatus for managing, modeling, predicting, allocating and utilizing resources and bottlenecks in a computer network.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.