摘要:
A system and method is described for using a component business model to partition a business into non-overlapping components, and then allocating different components to appropriate organizing strategies, based on attribute values assigned to each component. In the best mode of implementation there are two attributes: whether or not the component differentiates the business within the market place; and whether the component is industry standard or is tailored by the organization. These attributes and their values map the components of the business to a matrix. Based on the combination of attribute values in each cell of the matrix, available organizing strategies are also mapped to the matrix, thereby identifying for each component an appropriate organizing strategy.
摘要:
A method and system are described for using the structure and relationships between components in a component business model of an enterprise to assign components providing monitoring data to a management component. In response to the monitoring data, the management component executes a business rule invoking a service that alters a behavior of the enterprise. The management component contains data rules limiting the information provided by the assigned components, analysis rules defining the interaction between components, and report rules for consolidating recommendations for altering behavior of the enterprise, including decisions to invest in certain aspects of the business, to reengineer certain processes of the business, and to alter operation of certain aspects of the business.
摘要:
A system and method are described for using a Component Business Model (CBM) to transform a business. A CBM map is used to identify components that collaborate to provide a specified capability, and a repository supporting the CBM map is filtered to provide a view of the identified components that highlights how they collaborate. The view is used to identify component features contributing to the specified capability. The specified capability is then enhanced by a transformation strategy that includes re-engineering particular components, identifying a pattern characterizing the collaboration between components and adding a component to perform the collaborative pattern, and/or adding an additional feature to the collaboration and adding component to perform the additional feature. The CBM repository provides exemplar best practices that can be adapted for use in a re-engineered component.
摘要:
A programmed method for supplying content includes receiving via a network a request for a first content for use on a device, from a requester; automatically selecting a second content to fulfill the request; and providing the second content to a source of the request. From the point of view of a requester, the programmed method includes requesting via a network a first content for use on a device; and receiving an automatically selected second content to fulfill the request. The device may be a computer, and the content may be software for use on the computer. Selection may be performed in accordance with predetermined criteria, including predetermined rules. Information defining at least one criterion may be received from at least one requester. The criteria may be based on relatedness of the first content and the second content. Generally, the request is fulfilled via a network.
摘要:
A system automatically determines probable idle times for a computing system and performs maintenance tasks, such as virus scanning, during these times. A prediction of probable idle times is based on an assessment of a user's past use or by an aggregate of information from several users if a company wishes to determine optimal times for running such tasks or pushing software patches to employees. A policy table set by the user or a company determines the priority of maintenance tasks to be run during the predicted idle time.
摘要:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
摘要:
A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
摘要:
A system and an article of manufacture for providing a prompt for real-time cognitive assistance include analyzing input from at least one environmental sensor to identify context information pertaining to a user situation, identifying a likely subsequent cognitive task of the user in the user situation based on the context information and use of a learned model, determining an action with respect to information to be suggested to the user via a corresponding prompt, wherein the determining is based on the likely subsequent cognitive task, the context information and information learned from at least to one previous user situation, computing a confidence value to represent a level of certainty in the action, and providing the prompt to the user if the action has a confidence value greater than a threshold value corresponding to the action.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
A system and method provide an enhanced e-mail (electronic mail) system with a proactive indication of recipient away message. The system and method provide an enhanced e-mail system with a proactive indication of away messages of individuals related to the recipient. The system and method also provides for enhanced e-mail with a variety of away messages automatically sent based on criteria such as the nature of the e-mail sender, the date the e-mail was received, and the content of the e-mail.