Abstract:
This technology relates to a device and method for determining co-locatability of a plurality of virtual machines on one or more physical infrastructures. The plurality of virtual machines hosts a plurality of workloads. This involves identifying workloads which have high variability from the time series data and determining the workload capacity threshold of the identified workloads. Thereafter, the candidate workloads are selected among the identified workloads to colocate on a virtual machine based on the workload variability. After that, the total capacity required by each candidate workload pair to meet the service requirement is determined based on the workload capacity threshold. Then, an optimal sharing point of each workload of the pair with respect to the other workload of the pair is identified. Further, percentage compatibility of each workload pair is determined and finally, the candidate workloads are colocated based on the optimal sharing point and percentage compatibility.
Abstract:
A method of estimating an employee engagement indicator is described which comprises receiving engagement data and criticality data of an employee as input, through a user interface. This engagement data and criticality data of the employee are analyzed to categorize the employee based on engagement level and criticality level wherein the engagement level and criticality level is determined based on the analyzed engagement data and criticality data respectively Further performing a mapping of the categorized engagement levels onto categorized criticality levels helps to determine a risk level of the employee generating a notification over a computer network to another employee based on the mapping.
Abstract:
A system and method for monitoring and analyzing social network databases to determine actual key influencers is disclosed. Inputs are received from the user, which includes search keyword(s), time, date, language, area and country. Content corresponding to the user inputs is fetched from the social network databases. The fetched content is analyzed to identify a list of probable key influencers. Among the probable key influencers, actual key influencers are determined based on parameters associated with the probable key influencer. Reports may be generated based on the actual key influencers and the content they posted on the social network.
Abstract:
An intermediate gateway is positioned between a client device and a mobile application service provider. The intermediate gateway can assist in securing and managing accesses from a mobile application on the client device to the mobile application service provider. The intermediate gateway can store a client device identification associated with the client device, which can be used to authenticate the client device. Other parameters can also be used in device authentication.
Abstract:
Embodiments provide a method and system for tracking a position of an object. The method may include creating a plurality of geofences on a map of a predefined location and identifying, by Wi-Fi trilateration, the position of the object within the created geofence. Further, a floor layout of the predefined location may be created by a handheld device. The position of the object can be represented on the created floor layout.
Abstract:
The technique relates to a system and method for optimizing software maintenance delivery characteristics using client portfolio characteristics. The method involves obtaining a plurality of project maintenance characteristics and client portfolio characteristics from a software maintenance project repository, thereafter assigning a rating to each of the project maintenance characteristics and the client portfolio characteristics based on one or more assessment guidelines and finally building a relationship model between the project maintenance characteristics and the client portfolio characteristics by using one or more regression models wherein the relationship model uses an average of the assigned ratings of each of the project maintenance characteristics and the client portfolio characteristics. The method further involves validating the relationship model to determine a strength of the relationship model.
Abstract:
A system and method for providing end-to-end consulting activity is disclosed. The consulting system receives domain input from the user of the consulting system. Based on the domain selected, the system selects a methodology for consulting activity, comprising a template with a list of questionnaires. The questionnaire may be sent to respective stakeholders/consultants for providing response. The response provided by stakeholders may involve current state of the business, pain points and desired business capabilities. The consulting system determines gap between current state of business with desired state of business based by as-is, gap, and impact analysis. Business and functional requirement are converted into desired technical capabilities for generating technology roadmap using the stakeholder response. Further, request for information (RFI) and/or request for proposal (RFP) may be created as per client goals. The user may configure vendor evaluation parameters and associated weightages for evaluating the vendor.
Abstract:
A method and system for monitoring health of virtual environment includes receiving input data for one or more virtual machines in the virtual environment. A number of entitled CPU cycles for each of the virtual machines based on the input data are determined. A number of actual CPU cycles obtained by each of the virtual machines based on the input data are computed. The number of entitled CPU cycles is compared with the number of actual CPU cycles for each of the virtual machines. A health status of the virtual machines based on the comparison is displayed.
Abstract:
A system and method for locking an application to specific hardware device without storing device or user information on server. A lock registration is performed during the first usage of the application where the application sends a unique value to the server through secured channel. This unique value is combination of user specific information and device information. The server receives the unique value, and sends the encrypted value to the device, which is stored in predefined location of device. During lock validation, which is initiated during every request to the server or on every session creation, the device unique value and encrypted value is sent to the server. The server receives it, decrypts the encrypted value, and compares with the received unique value. If both the values are same, the server validates application instance by sending the response to the device else error message is sent to the device.
Abstract:
The present invention provides a method and system for generating negative test input data. A set of attributes and a set of attribute properties can be extracted from a requirement specification. A constraint representation syntax can be framed from the extracted set of attribute properties. A structured diagram is modeled from the framed constraint representation syntax and a set of use cases, a set of path predicates can be constructed from the structured diagram. One or more attribute classes can be determined from the set of path predicates based on an attribute constraint and an attribute dependency. The negative test input data shall be generated from the one or more attribute classes using genetic algorithm.