摘要:
Embodiments include a computer-implemented method for determining an equivalent license unit of an enterprise computer system in accordance with a standardized graph-based framework. The method includes discovering licensable products of an enterprise computer system in accordance with a standardized graph-based framework, and constructing a licensable product star graph (LPSG) for each licensable product in accordance with the standardized graph-based framework to identify any license models that have at least one subgraph associated with the licensable product. The method further includes constructing a licensable product constellation graph (LPCG) in accordance with the standardized graph-based framework by evaluating each LPSG to determine any common target elements of any license model to link the LPSGs, and determining an equivalent license unit metric for the license models based on the LPCG.
摘要:
Application compatibility testing for mobile applications enables enterprises to improve the extraction of mobile application suitability features (MASFs) from an App using techniques other than reading the package's manifest. In addition to performing dependency analysis in the open package format context, embodiments of the invention interpret the analysis results in the context of mobile devices where, in addition to binary, i.e. go/no go, OS compatibility, there is compatibility testing for other suitability metrics, such as enterprise policy compliance and device capability and/or compliance. A MASF results dictionary keeps track of the various identified hardware and software interfaces of the App.
摘要:
Intermediate representation (IR) code of source code can be generated for compiling the source code into machine code for an executable program. The IR code can be obfuscated by reorganizing the code based on return types of functions of the IR code to change the execution paths, resulting in an executable program that is difficult to reverse engineer.
摘要:
Some embodiments include a method of scheduling batch processing of a batch processing system based on subscriber usage patterns. The method includes steps of recording a last job commencement event for a subscriber when the batch processing system starts processing a batch process for the subscriber; recording a last usage event for the subscriber when the subscriber uses the batch processing system; in an event that a time period elapsed since the last usage event for the subscriber is less than a time period elapsed since the last job commencement event for the subscriber, placing a next batch process of the subscriber into a recently used queue; identifying the next batch process of the subscriber as the oldest batch process from the recently used queue; and start processing the identified batch process for the subscriber.
摘要:
Various of the disclosed embodiments provide systems and methods to compensate for certain event log errors. For example, when a system fails to record the occurrence of several events (a file closing, a file modification, a network socket opening, etc.) the disclosed embodiments may identify the discrepancy and provide a synthesized event sequence suitable to fulfill the purposes of the event log. In this manner, for example, a client may still be accurately billed for their use of a licensed software or system, even if their usage was punctuated with occasional failures to record their activity.
摘要:
A storage management system and method for managing access between a plurality of processes and a common store. In one embodiment, each individual process comprises data processing means, a cache for the temporary storage of data generated by the data processing means, and a control unit for managing the transferral of data between the cache and a common store. The control unit comprises a manager for monitoring the availability of storage locations in the store to receive and store data and for allocating data to available storage locations, an interface for transferring the allocated data to the available storage locations, and a locking arrangement for locking the store during data transfer in order to ensure exclusive access and thereby preserve data integrity.
摘要:
A method and system for assessing deployment and un-deployment of a software application installation are disclosed. In one embodiment, the method comprises receiving as an input a software application installation. Native code is extracted from the software application installation and executed. Information regarding the execution of the native code is provided to a user.
摘要:
A license update engine is run as part of a license entitlement automation system. The license update engine is minimally executed daily and identifies, for example, content updates to be applied and licenses that have drifted from their definition. The license update engine then generates proposals for operators to consider. Accepted proposals update the license configuration. Thus, the license update engine identifies licenses and the definitions that are connected to them, including definitions that the licenses from which the were created and definitions that are linked to SKUs of entitlement purchases. Analyses relates three categories of proposal, including license types, applications linked to licenses, and usage rights on licenses. Proposals are stored in a database and operators can accept or ignore them. The database maintains a history of license changes.
摘要:
Computer programs and computer-implemented techniques are described here for predicting when jobs in the queue of a batch scheduler will be completed. More specifically, various embodiments are described herein that relate to mechanisms for predicting the wait time and/or the estimated time to completion for jobs that are to be executed by a software asset management platform. For example, heuristics and algorithms could be used to discover when execution of a job is likely to begin and/or end. The estimated time to completion for a given job can be estimated by summing the expected execution time of the given job and the expected execution times of any jobs to be executed prior to the given job, while the wait time for a given job can be estimated by summing the expected execution times of any jobs to be executed prior to the given job.
摘要:
Various of the disclosed embodiments concern computer systems, methods, and programs for extracting information from an asset tag that can be used to monitor the corresponding asset. An operator, e.g. employee of an enterprise, logs into an application executed by a mobile device that includes a camera. A tag template can then be manually selected by the operator or automatically selected by the application. The tag template is used during scanning to locate and identify machine-readable elements, human-readable elements, structural elements, or some combination thereof. Once the application registers a successful scan of the asset tag, the operator can review and confirm the information was extracted correctly. Generally, the extracted information is transmitted to an asset management system, which creates a database entry that allows the asset to be continually monitored by the enterprise, e.g. each time the asset tag is subsequently scanned.