摘要:
A composite, multi-tier SLA. A composite, multi-tier SLA can include two or more service offerings having both internal use only service level objectives and external service level objectives. The composite, multi-tier SLA further can include two or more SLAs combined into a single, composite SLA. Each of the SLAs can correspond to a specific one of the service offerings. Moreover, the SLAs in the composite SLA can have a hierarchical organization based upon dependencies between the service offerings. Notably, each of the SLAs can correspond to one of an outsourced service offering, an internal service offering and an external service offering. Additionally, at least one of the SLAs can expose an external service level objective of a corresponding internal service offering which has been redefined as an internal use only service level objective in an SLA at a higher tier in the hierarchical organization.
摘要:
A method of automatically and intelligently maintaining business systems, including information technology assets. A management system automatically maintains a business system based on relationships among resources within the business system and/or on a priority rank that establishes the value or importance of a particular resource. The management system, and optionally the user, can also create rules for maintaining relationships among resources and for maintaining relationships among different business systems. The management system automatically adapts to a change in rules by maintaining relationships among resources and business systems based on a change in the rules.
摘要:
A method, system, and computer instructions for managing interruptions across applications in a data processing system. A user's focus is monitored within the data processing system. Responsive to a request to present a window in the foreground, the priority level of an application currently containing the user focus is compared with a priority level of an application presenting the window. If the application presenting the window has a higher or equal priority than the application currently containing the user focus, the window is presented in the foreground. If the application presenting the window has a lower priority than the application currently containing the user's focus, the request to present the window in the foreground is ignored. Information regarding the request is then stored in a log for later viewing.
摘要:
A system, method and apparatus for performing a real-time service level agreement (SLA) impact analysis. In the system of the invention, a service level manager can be programmed to establish a plurality of SLAs directly implicating selected resources. A relationship database further can be configured for coupling to one or more management applications programmed to manage the selected resources. Finally, a modeling and evaluation system can be communicatively coupled to the relationship database and the service level manager and programmed to perform a real-time SLA impact analysis based both upon resources directly implicated by the SLAs and also upon resources which are related to the resources directly implicated by the SLAs.
摘要:
A method for using confidence factors in forming a system may include receiving a tolerable confidence factor. The method may also include utilizing only resources and relationships of a plurality of resources and relationships with confidence factors equal to or greater than the tolerable confidence factor to form the system.
摘要:
A method, system and apparatus for estimating an SLA breach value. The method can include processing resource data to identify an acceptable SLA breach value; and, displaying the acceptable SLA breach value through a user interface. The processing step can include identifying a best practices SLA breach value based upon resource data for an aggregation of customers. Alternatively, the processing step can include identifying an average SLA breach value for a specific customer. As a further alternative, the identifying step can include identifying an average SLA breach value for a specific customer for a specific resource. As yet a further alternative, the processing step can include identifying an SLA breach value trend based upon past measured historical systems management data; and, predicting a future SLA breach value based upon the trend. In all cases, the acceptable SLA breach value can be increased by a fixed proportion.
摘要:
A method for using confidence factors in forming a system may include receiving a tolerable confidence factor. The method may also include utilizing only resources and relationships of a plurality of resources and relationships with confidence factors equal to or greater than the tolerable confidence factor to form the system.
摘要:
A method to automatically define resources forming an IT service may include tracking resources utilized in responding to a request or set of requests or performing a transaction or a set of transactions. The method may also include automatically defining resources that form an IT service by aggregating all resources utilized to respond to all requests or to perform all transactions.