摘要:
A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison.
摘要:
Methods, systems and computer program products for document sharing in collaborative electronic meetings. Exemplary embodiments include a method for control of documents in a collaborative interaction, the method including establishing an out-of-band channel between a first participant and a second participant in the collaborative interaction, transferring a copy of a document on the out-of-band channel between the first participant and the second participant, transferring a command issued on the document by the first participant on an in-band channel established between the first participant and the second participant, invoking the command by the second participant on the copy of the document by the second participant and displaying the result of invoking the command to the second participant.
摘要:
The present invention provides a system process to establish or configure a mode of operation for computing devices through the use of affinity groups, policy guidelines, and priority graphs. An affinity group is a group of peer devices identified by a network to which a target device is connected as being similar to the target device. Policy guidelines are parameters describing mode or configuration policies for a group of users and reflecting users' identified needs and requirements. A priority graph is a decision tree, which may or may not be graphically represented, describing hierarchically the organization of policies governing the mode or configuration of device operation and capturing the relative priorities of different policies. A key aspect of the present invention involves the sharing of information within an affinity group.
摘要:
A method for switching channels on a video playback device, the device receiving content from a plurality of channels transmitted by a digital video distribution network, the method including establishing a context for selecting additional channels; receiving a selection for another channel; updating the context with the selection; and transmitting the selection to the device and providing the additional channels for fast channel switching.
摘要:
Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported.
摘要:
Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system.
摘要:
Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
摘要:
Disclosed is a technique for performing configuration checking of a network. A network data store is scanned for at least one transaction. At least one event is generated for said transaction. At least one configuration policy is associated with said event. Said configuration policy is compared with configuration data associated with said event. It is determined whether said configuration policy has been violated based on the comparison. Also disclosed is a technique for performing proactive configuration checking of a network. A hypothetical network scenario is received. At least one transaction is generated based on the hypothetical network scenario. A network data store is populated with configuration data for said transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Moreover, disclosed is a technique for performing reactive configuration checking of a network. A request to perform configuration checking on an existing network configuration is received. A network data store is scanned for at least one transaction. At least one event is generated for said transaction using a mapping of events to transactions. Configuration data associated with said event is used to determine whether a configuration policy has been violated. Furthermore, disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user.
摘要:
A method for estimating a response time by combining metrics from networking and application layers. This is achieved by placing correlation tags in data collected at these layers so that the data can later be identified as corresponding to a single web page download or a web session. Once data corresponding to a single web page download or a web session is identified, a splicing algorithm calculates client perceived response time by using analytical models of response time.