Abstract:
The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a Message Authentication Code (MAC) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the MAC, and said message body including the encrypted value, and said that the MAC key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.
Abstract:
The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a Message Authentication Code (MAC) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the MAC, and said message body including the encrypted value, and said that the MAC key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.
Abstract:
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated. Each infrastructure has its own infrastructure controller to create and configure the infrastructure. It has a user accessible part (CFC) for configuration of that user's infrastructure, and a user inaccessible part (UFC) able to access the mapping and the physical resources. This increases user control to ease system administration, while maintaining security by limiting access to the mapping.
Abstract:
In a computer-implemented method for automated test execution in a shared virtualized resource pool, a test description containing at least one model for a service under test (SUT) is received and one or more infrastructure configurations to be tested by resources in the shared virtualized resource pool based upon the test description are identified. In addition, a service lifecycle management (SLiM) tool is interacted with to cause the SUT and a load source to be created, the SLiM tool is directed to instantiate the SUT and the load source on the one or more infrastructure configurations in the shared virtualized resource pool for the SUT, and the SLiM tool and the load source are interacted with to receive performance data related to performance of the SUT under one or more loads generated by the load source.
Abstract:
A business process (15) having a number of computer implemented steps using software application components, to enable automatic deployment on computing infrastructure, is modelled by a management system. It automatically derives a grounded model (55) of the business process from an unbound model (25) of the business process, based on an infrastructure design template (35). The unbound model specifies the application components to be used, and the grounded model adds a complete design of the computing infrastructure to be used. The use of an infrastructure design template can reduce the large number of options to be evaluated to help reduce the complexity of generating or changing the grounded model. The infrastructure design template formally relates the business process, application components and infrastructure design so that designs, or changes which are inconsistent or inefficient can be avoided. Thus more automation of the designing and changing the design is feasible.
Abstract:
Management of heterogeneous data sources is described. In accordance with an embodiment method, a plurality of heterogeneous data sources is identified (410). The plurality of heterogeneous data sources can represent static data sources and management data streams received from servers for network management. The data sources can be encapsulated into data source containers (420). Each data source container can encapsulate a separate data source and can be mapped into an interdependent source graph (430). The interdependent source graph can include object links between the data source containers, the object links representing relationships existing between the data source containers. The interdependent source graph can be queried by traversing the interdependent source graph using data source container relationships to obtain management information about at least one of the data sources (440). Management information obtained while querying can be rendered to a management program on the management server to provide a unified view of the management information (450).
Abstract:
A system for generating a model representing an existing computer based business process involves analysing existing source content (910) which has annotations (920) added, to provide information for the modelling. Static analysis of the annotations can provide some of the information. Other information can be discovered at run time if the annotations alter the run time behaviour to generate monitoring events showing the behaviour. The annotations need not be restricted to codes or symbols or structures of the language of the source content, and can use concepts closer to those in the model being generated. Using annotations rather than manual modelling can reduce errors and lead to better predictions of performance from the model, and result in better reconfiguration of the software or the computing infrastructure to make more efficient usage of shared resources.
Abstract:
A system for developing a computer implemented service, for deployment on computing infrastructure, generates variants of the model by automatically choosing values for a limited set of design variables, and evaluates the variants in operation. A model manager (187) stores in a model repository (107) a current variant (57) and at least some previous variants, and their evaluation results and derivation trails, the generating part being arranged to use the evaluation results and the derivation trails to generate a next current variant. Such use of the repository can help make more efficient the search by the model manager for variants that work well. In particular the derivation trails and evaluations can make it easier to determine when to revert to a preceding variant or determine what new design choices to try next.
Abstract:
A business process (15) having a number of computer implemented steps using software application components, to enable automatic deployment on computing infrastructure, is modelled by a management system. It automatically derives a grounded model (55) of the business process from an unbound model (25) of the business process, based on an infrastructure design template (35). The unbound model specifies the application components to be used, and the grounded model adds a complete design of the computing infrastructure to be used. The use of an infrastructure design template can reduce the large number of options to be evaluated to help reduce the complexity of generating or changing the grounded model. The infrastructure design template formally relates the business process, application components and infrastructure design so that designs, or changes which are inconsistent or inefficient can be avoided. Thus more automation of the designing and changing the design is feasible.
Abstract:
Systems and methods for information technology system change planning are described. In an information technology system change planning method in accordance with an embodiment, a change request is received on a network server (310). Domain objects and dependencies among domain objects are identified to form a model (320). Refinable tasks, atomic tasks, and state transitions are selected from a knowledge base based on the change request and the model (330), including dependencies. A workflow is created for implementing the change request using a processor (340). The workflow can be based on the model and may include a combination of selected refinable tasks, atomic tasks, and state transitions used to implement the change request.