摘要:
A method for configuring multiple lifecycles, and associating each lifecycle with one or more subcategories of items includes receiving a request for a state change for an item in a current state; determining if the item's current state exists in the located lifecycle; wherein if the current state does not exist in the located lifecycle, the current state is updated with a series of update rules; determining if the current state has flags; wherein the flags are checked for one or more protection rules; generating a list of target states; receiving a user selected target state from the generated list; checking the selected target state for one or more associated protection rules; recording a state change for the selected target state in response to the satisfaction of the one or more associated protection rules, and if no protection rules are found; and propagating the state change.
摘要:
A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.
摘要:
A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered.
摘要:
A method for facilitating compliance testing in an environment is provided. The method includes defining each component as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for components against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the components that failed to meet respective ones of the selected Configuration Standards.
摘要:
Methods and apparatus for managing a configuration management database is provided. One or more composite CIs in the CMDB are utilized as fundamental units for change history management of elements of the CMDB. Each of the one or more composite CIs comprise at least one root element.
摘要:
Methods and apparatus of automatically creating composite configuration items in a configuration management database are provided. A plurality of configuration items and a corresponding plurality of configuration item relationships are provided to the configuration management database. One or more composite configuration items are created from one or more of the plurality of configuration items in accordance with one or more types of the plurality of configuration items.
摘要:
A method for facilitating compliance testing in an information technology (IT) environment is provided. The method includes defining each IT component of an enterprise as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for IT components of the enterprise against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the IT components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the IT components that failed to meet respective ones of the selected Configuration Standards.
摘要:
A method, system and computer program and method for delivering a streaming data to a remote device from a wireless transmitter. In one embodiment, a transmitter is configured to send units of the streaming data to the remote device. A receiver is configured to receive usage data about the streaming data from the remote device. An adjusting module is configured to automatically adjust a transmission strategy of unsent units of the streaming data based, at least in part, on the usage data as a function of time according to a transmission policy. The usage data may include at least location information about the remote device or time of day information at the remote device. A user interface at the remote device may be configured to adjust the predefined transmission policy.
摘要:
An embodiment of the invention is a method of accurately determining the spatial location of an RFID tag in two-dimensions or three-dimensions. The method utilizes a plurality of RFID readers to make a plurality of distance, direction, and or time-of-flight determinations. Such determinations are made by sending a request signal from one of the plurality of RFID readers and listening for a response signal from an RFID tag received at each of the plurality of RFID readers. Correction factors are then determined and the time-of-flight factors adjusted. The adjusted time-of-flight factors are then used to determine more accurately the distances between the RFID tag and each of the plurality of RFID readers. These more accurate distance measurements are then used to determine the spatial location of the RFID tag.
摘要:
The present invention is an application-aware method for allocating resources to applications based on a set of predefined policies comprising a Resource Allocation Program (RAP). The RAP is application-aware in that the RAP does not arbitrarily allocate resources to requesting applications. Instead, the RAP allocates resources to requesting applications based on predefined policies. The RAP allows a user to define the resource allocation for each policy in a Resource Allocation Table and associate the applications with the policies in a Policy Application Table. When an application requests resources, the RAP looks to the Policy Allocation Table to determine the policy associated with the application and looks to the Resource Allocation Table to determine the permissible amount of resources to allocate to the application associated with the policy. The RAP then allocates the resources to the requesting application.