摘要:
A method, information processing system, and network limit access to an electronically available information asset. A request (304) from a source (204) to exchange an electronically available information asset with at least one destination (206) is received. An identity (306) associated with the source (204) and the destination (206) is established. A semantically augmented context (226) is generated. The semantically augmented context is information used to identify a meaning and a behavior of the context (226). The request is analyzed relative to the semantically augmented context (226) for determining whether the request is to be one of allowed and denied. The source (204) is allowed to exchange the electronically available information asset with the destination (206) when the request is determined to be allowed. The source (204) is prevented from exchanging the electronically available information asset with the destination (206) when the request is determined to be denied.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
A method and system are disclosed for changing the structure of one or more policies and/or the order of application of one or more policies to resolve conflicts among a set of policies using graph-theoretic techniques. Policies are used to govern the states of managed entities (e.g., resources and services). The set of states of the set of managed entities are represented as nodes of a graph. The output of the set of applicable policies governing all or part of the nodes is then used to control the transition between some or all nodes in the graph.
摘要:
An identity provider (200) communicates (101) with a first logged-in user who seeks to receive particular streaming content at a first corresponding first user platform and who has also identified at least one other user with whom this user wishes to share the receiving of this content. The identity provider invites (102) the other user to share in the receiving of this content. Upon receiving (103) an acceptance of the invitation from the other user, the identity provider can treat this other user as a logged-in participating second user (i.e., a user who is now both logged-in (even if this user was not previously logged-in) and who wishes to accept the invitation and participate in viewing the streaming content selected by the first user) and automatically direct (104) these users to a content provide to facilitate the substantially simultaneous receipt of the streaming content at all of the corresponding user platforms.
摘要:
A method (1300) for manipulation of two sets of policies is described, wherein each set includes at least two related policies, and wherein each policy comprises a set of policy rules. The method includes identifying (1325) a possible conflict between a pair of policies comprising one policy in each of two sets of policies, marking (1330) the one policy in each of the two sets of policies to identify the possible conflict, and marking (1330) at least one other policy in one of the two sets of policies that is related to one of the marked policies in the two policy rules to identify at least one other possible conflict.
摘要:
An autonomic computational processor can be provided with both at least one substantially closed loop problem solving mechanism (such as, but not necessarily limited to, an abductive algorithm-based problem solving mechanism (101)) and at least one substantially open loop problem solving mechanism (such as, but not necessarily limited to, a machine learning algorithm-based problem solving mechanism (102)). Upon receiving (103) information regarding a problem as relates to a given corresponding process, then, these teachings can provide for automatically determining (104) which of the closed loop and open loop problem solving mechanisms to use to attempt to resolve the problem.
摘要:
A system, method, and information processing system manage a network. At least one contract including one or more components is received at a network that uses a component based architecture. A first operation (422) in the set of operations associated with the contract (114) is mapped to a policy rule event (424) associated with at least one policy rule (116). A second operation (426) in the set of operations associated with the contract (114) is mapped to at least one policy rule condition (428) associated with the policy rule (116). A third operation (430) in the set of operations associated with the contract (116) is mapped to a policy rule action (432) associated with the policy rule (116). A fourth operation (440) in the set of operations associated with the contract (116) is mapped to a policy rule condition (442) associated with the other policy rule (420).
摘要:
A method and information processing system manage policy elements in an information processing system. At least one policy element (110) from a plurality of policy elements stored in at least one policy repository (108) is retrieved. The plurality of policy elements includes at least one of a plurality of reusable policy rules (110), a plurality of reusable policy rule components (118, 120, 122), a plurality of reusable policy rule templates, and a plurality of and policy rule component templates. A new reusable policy element is created from at least one of the policy element (110) that has been retrieved and a default policy element. The new reusable policy element is stored in the at least one policy repository (108). A reusable policy element is queried using metadata (224) associated with the reusable policy element.
摘要:
The disparate data and commands from are received from a managed resource (102) and have potentially different semantics. The disparate data and commands are processed according to rules received from an autonomic manager (112) to produce a single normalized view of this information. The actual state of the managed resource is determined from the normalized view of disparate data. The actual state of the managed resource (102) is compared to a desired state of the managed resource (102). When a match does not exist between the actual state and the desired state, a configuration adjustment to the managed resource (102) and/or another resource is determined to allow the actual state to be the same as the desired state. Then, the configuration adjustment is applied to the managed resource (102). When a match exists between the actual state and the desired state, maintenance functions associated with the managed resource (102) are performed.