Abstract:
PROBLEM TO BE SOLVED: To timely process a duplicated event report generated and reported from a plurality of event sources in an event management system to avoid confusion. SOLUTION: An event bus 61 links a plurality of problem solving servers together and allocates ownership to each event report. The event bus 61 analyzes each incoming event in order to add or change a slot value. The event is transferred to a configured event server based on the slot value, and the ownership is dynamically changed in order to keep an error-free systematic transmission flow. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To manage a default value of a computer program. SOLUTION: The computer program automatically determines that a first program operates in a batch mode in which a default value is not intended to be acknowledged or changed by user interaction. According to the determination result, the computer program determines a first present default value for input to the first program, and determines whether a user has previously input or acknowledged the first present default value in the interactive mode. If the first present default value has been previously input or acknowledged, the computer program enables the first program to proceed to be operated using the first present default value, and if the first present default value is not input or acknowledged previously, the program enables the first program not to proceed to be operated using the first present default value. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
An illustrative embodiment of a computer-implemented method for authority based content filtering, receives a request containing search criteria from a requester, searches a content repository using the search criteria of the request to identify a set of content candidates from the content repository. A contributor authority for each contributor associated with each content candidate in a list of content candidates in the set of content candidates is queried by the computer-implemented method, wherein the contributor authority includes a mapping of a set of credentials of a contributor to subject matter and the list of content candidates is filtered and sorted by the computer-implemented method using a result from the contributor authority.
Abstract:
A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, resource requirements entered are immediately sent to a remote resource manager to permit real-time feedback to the user who is entering the resource requirements. The user can thus reconfigure or otherwise modify the resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment. In addition, the dynamic feedback on the new resource request that exceeds a service level agreement can be used to develop a new service level agreement or temporary service offer that addresses the unique resource condition.
Abstract:
A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation pe~riodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resource to its actual usage.
Abstract:
An illustrative embodiment of a computer-implemented method for authority based content filtering, receives a request containing search criteria from a requester, searches a content repository using the search criteria of the request to identify a set of content candidates from the content repository. A contributor authority for each contributor associated with each content candidate in a list of content candidates in the set of content candidates is queried by the computer-implemented method, wherein the contributor authority includes a mapping of a set of credentials of a contributor to subject matter and the list of content candidates is filtered and sorted by the computer-implemented method using a result from the contributor authority.
Abstract:
A monitoring program contains a method for detecting a load imbalance in a group of servers and providing notification so that corrections can be made. An embodiment of the invention reads from the address resolution protocol (ARP) cache to determine which server addresses are present, then clears the ARP cache. The address resolution protocol will repopulate the cache from traffic it snoops and from new requests. By performing this query and clear operation pe~riodically, the tracking program can form a picture of the activity levels of the servers. When a significant imbalance exists, the program notifies a control console for human intervention to solve the problem. The tracking program will periodically write its results to a log file, allowing reports for various time periods to be produced as needed. By this mechanism, not only can an imbalance be quickly detected, but underutilization can be picked up by comparing known capability of a resourc e to its actual usage.
Abstract:
Es wird ein Ansatz für eine Berechtigungsprüfung bereitgestellt. Der Ansatz führt ein Identifizieren eines Kontos, das auf einheitenübergreifend verteilte Daten zuzugreifen versucht, durch einen oder mehrere Computerprozessoren durch. Der Ansatz führt ein Identifizieren einer oder mehrerer Datenverarbeitungseinheiten, die dem Konto zugehörig sind, durch einen oder mehrere Computerprozessoren durch. Der Ansatz führt ein Ermitteln eines Abstandes von einer ersten Datenverarbeitungseinheit der identifizierten einen oder mehreren Datenverarbeitungseinheiten zu einer zweiten Datenverarbeitungseinheit der identifizierten einen oder mehreren Datenverarbeitungseinheiten durch einen oder mehrere Computerprozessoren durch. Der Ansatz führt ein Ermitteln, ob der Abstand von der ersten Datenverarbeitungseinheit zur zweiten Datenverarbeitungseinheit innerhalb einer Schwellenwertnähe liegt, durch einen oder mehrere Computerprozessoren durch. Der Ansatz gewährt oder verweigert ferner einen Zugriff auf einheitenübergreifend verteilte Daten auf Grundlage dessen, dass eine Schwellenwertnähe eingehalten oder überschritten wird.
Abstract:
A technique for efficiently processing resource allocation requests in an on-demand environment. When a user logs into a resource allocation request manager, various resource requirements entered are immediately sent to a remote resource manager to allow for dynamic, real-time feedback to the user who is entering the resource requirements as to any issues or concerns regarding the requested resource(s) or plug-in element(s), such as lack of availability. The user can thus reconfigure or otherwise modify the various resource requests based on this feedback to optimize the overall resource allocation request. This also allows an organization providing services such as computer hosting services to re-allocate resources in advance if a new resource request would exceed a service level agreement outlined in advance with a customer, thereby improving resource planning in a data center environment. In addition, the dynamic feedback on the new resource request that exceeds a service level agreement can be used to develop a new service level agreement or temporary service offer that addresses the unique resource condition.