摘要:
The present invention discloses a solution for managing policy artifacts using a configuration management database (CMDB). Policies can be associated with a number of information technology resources, such as servers, businesses applications and the like. The solution permits automatic tagging of the policies (auto-discovery) as they enter the CMDB. For example, when a policy is added, it can be compared against a set of tagging rules. Multiple rules can match a new policy, which results in multiple tags being added for the policy. The policy specific tags can be optionally indexed for faster searching. Once indexed, the CMDB can support policy and policy tag based queries. In one embodiment, policy artifacts can be manipulated within a CMDB tool in a manner consistent with how the CMDB tool handles configuration items (CIs).
摘要:
The present invention provides a method, system, and computer program product for the autonomic installation and configuration of an enterprise business process on-demand. The method comprises: providing a business process document for expressing the business process, wherein the business process comprises a plurality of components and a workflow; providing a plurality of installation documents, where each installation document describes an installation of a component of the business process; providing a mapping document for mapping each component of the business process to at least one of the installation documents describing the installation of that component; and provisioning the business process on-demand using the business process document, the installation documents, and the mapping document.
摘要:
A system and method for language-agnostic policy management. At least one policy associated with an event occurrence is identified. At least one policy engine associated with the at least one policy is identified. The at least one policy is evaluated by a policy engine of the associated at least one policy engine.
摘要:
A configuration management database (CMDB) that associates a policy with a configuration item (CI) in the CMDB. The policy contains an “applies to” field and a “type descriptor”. When a relationship is created between the CI and a second CI in the CMDB, the policy is associated with the second CI.
摘要:
This application discloses a design verification tool to simulate a circuit design with a test bench to generate a simulated output for the circuit design and a simulation log corresponding to operation of the test bench during the simulation of the circuit design. The design verification tool can determine whether the simulated output for the circuit design is different than an expected output for the circuit design. A debug tool can synchronize the simulated output for the circuit design with test bench transactions from the simulation log that prompted the generation of the simulated output for the circuit design when the simulated output of the circuit design is different than the expected output of the circuit design.
摘要:
A computing environment climate-aware policy management system provides decision support by receiving a request to perform an action, where the request is communicated from or on behalf of a computing resource. Upon receiving the request, an indication of a computing environment climate is obtained, which may include for example, information related to the workflow associated with the requested action, information external to the workflow or other information that contextualizes the computing environment of components thereof. At least one policy is obtained that is associated with at least one of the action associated with the request, the resource associated with the request to perform the action received by the policy system manager, and the indicated climate. Each obtained policy is evaluated and a response to the request to perform the action is provided based upon the results of the policy evaluation.
摘要:
A method, system, and computer program product for the automatic detection and fixing of security vulnerabilities in both individual software components and across complex, multi-component software solutions. The architecture of the software solution to be monitored is analyzed prior to its being monitored. Data derived from the analysis is used to proactively identify possible ways to attack the software solution. The software solution being monitored and the system on which it runs is periodically scanned, and attacks on it are attempted. A list of possible attacks is continuously updated, for example, in a manner similar to virus signatures provided by virus security companies, and a log is generated describing which attacks were successful and which ones failed.
摘要:
A system, method and computer program product for determining policy follow-up action based on user-specified codes are set forth. When determining policy follow up action based upon user specified codes, a policy system receives function templates for permissible actions on a given resource type; each function template is annotated with indications of success and failure; the policy system performs an action on the resource; the policy system receives a status indication (or exception); the status indication is compared against the annotated function template; and, the policy system determines its next action based on that comparison.
摘要:
This application discloses a design verification tool to collect messages generated by a test bench during elaboration of the test bench. The messages can identify connectivity corresponding to library components in the test bench. A debug tool can generate a schematic representation of the test bench having circuit symbols corresponding to at least portions of the library components, which are interconnected with trace lines based, at least in part, on the messages. The debug tool can prompt display of the schematic representation of the test bench.
摘要:
This application discloses a design verification tool to simulate a circuit design with a test bench to generate a simulated output for the circuit design and a simulation log corresponding to operation of the test bench during the simulation of the circuit design. The design verification tool can determine whether the simulated output for the circuit design is different than an expected output for the circuit design. A debug tool can synchronize the simulated output for the circuit design with test bench transactions from the simulation log that prompted the generation of the simulated output for the circuit design when the simulated output of the circuit design is different than the expected output of the circuit design.