Abstract:
A system, method and computer program product of using peer collaboration tools to extend the reach of applications by enabling the application to specify a modality policy that is predicated on end-user context when pushing an interaction to the end-user. Various collaboration technologies—including cell phones, email, instant messaging (IM), the short message service (SMS), and pagers—have emerged that people can use to interact with each other even when they are remote and/or mobile. Using collaboration tools as the interface to Web applications eliminates the applications' dependency on Web browsers and allows applications to be accessed even when a Web browser is not available. In addition, collaboration tools are capable of receiving “calls”, which can be exploited by applications to proactively initiate and push an interaction to end users.
Abstract:
A system and method for creating and managing a business process integration solution comprises modeling a business strategy including elements representing business measurements and initiatives according to defined business goals and objectives of an entity; modeling business operations of the entity in terms of business process elements including process tasks, artifact flows and artifact repositories, and business commitment elements including incorporating key performance indicators; mapping elements of the strategy model with artifact and process elements of the operations model; and, measuring business performance and comparing performance measurements against the key performance indicators. The business strategy and operation model process elements may be continuously refined over a solution development lifecycle as a result of process measurements and comparing. A business level modeling language is further implemented for formally representing the business operations.
Abstract:
A system for analyzing a business process integration and management (BPIM) solution includes an assembler which assembles a plurality of solution artifacts to form a platform independent solution template, a simulator which simulates an execution of a BPIM solution based on the platform independent solution template, and an analyzer for analyzing a performance of the BPIM solution.
Abstract:
Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent.
Abstract:
Systems and methods are provided for the management of assets within an enterprise. Management of assets includes the creation of assets, the derivation and lineage of assets and asset composition. In addition, the creation of artifacts by the assets is provided. Assets and artifacts are maintained within a repository that is accessible throughout the enterprise. In addition, rules are provided for the composition and usage of all assets within the enterprise.
Abstract:
Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images.
Abstract:
Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent.
Abstract:
A method, data processing system, and computer program product are present for managing projects in a network data processing system. A computer system identifies a plurality of tasks for a project. The computer system creates a model for the project using the plurality of tasks. The model identifies people to perform the plurality of tasks. The computer system selects a group of people with knowledge about the plurality of tasks. The computer system sends a number of requests to the group of people to update the model of the project. The number of requests includes the model. The computer system updates the model of the project using a number of responses in response to receiving the number of responses to the number of requests.
Abstract:
An electronic chronicling method and system that automatically captures, stores, and organizes various aspects of business processes in real-time. The system allows different role players to analyze, mine, and share selected performance metrics of business processes in the context of various measures involved, including users, systems, applications, processes, etc. The system enables users to analyze and utilize sortable performance metrics with varying degrees of specificity and detail. This analysis and utilization provides an efficient means for the real-time streamlining and optimization of business processes.
Abstract:
A mechanism provides a model-driven solution template-based approach for managed business services. Key assets of the business services are templatized and made configurable. The mechanism implements a metamodel describing standard service offerings that can be configured to meet specific business and operational requirements at a level of business process and system components. A cost and pricing model of service offerings helps assess the service costs and resource requirements based on a client's selection of standard and customized processes and system components. A supporting system solution is developed based upon underlying solution templates and solution artifacts as well as client-specific requirements.