摘要:
An aspect of this invention is a method that includes receiving input data from an application. The input data includes information descriptive of at least one field. The method further includes processing the input data to form an array composed of legal data for the at least one field. The array is formed by merging a result of processing syntactic constraints and a result of processing semantic constraints. The method further includes outputting the array to the application. A system for performing the method is also described, as is a computer program product that can be used to execute the method.
摘要:
Improved systems and techniques for identification and resolution of conditions affecting an information technology system. When an alert is received, it is identified as actionable or non-actionable and, if non-actionable, is subjected to a waiting time before a trouble ticket is created. If the alert has cleared by the time the waiting time expires, an event associated with the alert is discarded and no trouble ticket is created. Non-actionable alerts are identified using a system of predictive rules, with rules being generated according to appropriate criteria, such as the likelihood that an event identified by a rule will be non-actionable, and by the likelihood that an event will be identified by a rule.
摘要:
A method, data processing system, and computer program product for managing services. A computer identifies information in a number of discussions in a discussion forum. The computer determines that the information is associated with a service. The computer then generates a new request for the service in an absence of a current request for the service.
摘要:
A method for facilitating compliance testing in an information technology (IT) environment is provided. The method includes defining each IT component of an enterprise as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for IT components of the enterprise against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the IT components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the IT components that failed to meet respective ones of the selected Configuration Standards.
摘要:
Methods, apparatus and computer program products decompose a service process into service process operations; filter the service operations based on at least one pre-determined criterion; identify at least one different service process operation to be used to replace an existing service process operation; and replace the existing service process operation with the at least one different service process operation. The service process can be decomposed using specific service features derived from reference service processes. The pre-determined criterion used to filter the service operations can constitute a service level; a service category; or a service process feature. A service process feature describes core functionality of the service.
摘要:
A global service management configuration comprises a plurality of interrelated administrative objects. One or more of the plurality of interrelated administrative objects provide access control of one or more of a plurality of configuration items of a configuration management database by at least one of the plurality of interrelated administrative objects.