摘要:
A method, information processing system, and system manage network entities. At least a portion of at least one information model (120) for a first managed entity (104) and at least a second managed entity (106) is accessed. The portion of the at least one information model (120) includes a set of capabilities (542) associated with the first managed entity (104) and second managed entity (106), respectively. A first set of capabilities (708) supported by the first managed entity (104) and a second set of capabilities (710) supported by the second managed entity (106) are identified based on the portion of the at least one information model (120). A set of common capabilities (712) from the first set of capabilities (708) and the second set of capabilities (710) that is supported by both of the first managed entity (104) and the second managed entity (106) is determined.
摘要:
A method, information processing system, and network select machine learning algorithms for managing autonomous operations of network elements. A state (404) of at least one problem (406) and at least one context associated with the problem are received as input. A machine learning algorithm (118) is selected (410) based on the problem and context of the problem that have been received. The machine learning algorithm (118) that has been selected is outputted to an autonomic controller.
摘要:
A system, method, and information processing system for managing a configuration of a network device. A current state associated with at least one network device (104) is determined (206). A set of commands (118) available for the current state of the network device (104) is retrieved (208). A next state associated with a current command is determined (216) for each command in the set of commands (118). A transition from the current state to the next state is created (218, 222) in response to determining a next state associated with a current command. A transition is determined to have been created for each command in the set of commands (118). An extended finite state machine (120) is created that includes at least the current state, the next state, and the transition for each of the commands in the set of commands (118).
摘要:
A method for modifying policy elements is disclosed. At least one reusable policy element (110) is retrieved from at least one repository (108). The reusable policy element (110) includes at least one of a reusable policy rule (110), a reusable policy rule component (118, 120, 122), a reusable policy rule template, and a reusable policy rule component templates. The reusable policy element (110) is modified by one of editing the reusable policy element (110), and deleting the reusable policy element (110).
摘要:
A method and system for managing a policy includes a memory adapted to store at least one policy, residing at a first abstraction level, where each policy includes a plurality of language elements in a first vocabulary set and a processor communicatively coupled to the memory and adapted to perform semantic resolution using a set of ontologies by mapping at least one of the language elements in the first vocabulary set to at least one of a plurality of language elements in a second vocabulary set, the second vocabulary set having at least one of a different grammar and a different vocabulary from the first vocabulary set create a second policy, in response to the semantic resolution.
摘要:
A method and computer program product for detecting a policy conflict in a managed system includes examining a plurality of policy rules for overlapping policy targets, in response to finding no overlapping policy targets, reporting that the policy rules do not conflict, and in response to finding overlapping policy targets, examining the plurality of policy rules for at least two rules having a same condition and a same event, and, in response to not finding at least two rules having a same condition and a same event, reporting that the policy rules do not conflict.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
A method and system are disclosed for changing the structure of one or more policies and/or the order of application of one or more policies to resolve conflicts among a set of policies using graph-theoretic techniques. Policies are used to govern the states of managed entities (e.g., resources and services). The set of states of the set of managed entities are represented as nodes of a graph. The output of the set of applicable policies governing all or part of the nodes is then used to control the transition between some or all nodes in the graph.
摘要:
An identity provider (200) communicates (101) with a first logged-in user who seeks to receive particular streaming content at a first corresponding first user platform and who has also identified at least one other user with whom this user wishes to share the receiving of this content. The identity provider invites (102) the other user to share in the receiving of this content. Upon receiving (103) an acceptance of the invitation from the other user, the identity provider can treat this other user as a logged-in participating second user (i.e., a user who is now both logged-in (even if this user was not previously logged-in) and who wishes to accept the invitation and participate in viewing the streaming content selected by the first user) and automatically direct (104) these users to a content provide to facilitate the substantially simultaneous receipt of the streaming content at all of the corresponding user platforms.
摘要:
A method (1300) for manipulation of two sets of policies is described, wherein each set includes at least two related policies, and wherein each policy comprises a set of policy rules. The method includes identifying (1325) a possible conflict between a pair of policies comprising one policy in each of two sets of policies, marking (1330) the one policy in each of the two sets of policies to identify the possible conflict, and marking (1330) at least one other policy in one of the two sets of policies that is related to one of the marked policies in the two policy rules to identify at least one other possible conflict.