摘要:
Described are a method, system and apparatus for the association of an existing process with a reference process and ontology so that the process may be manipulated to the advantage of the process owner. Specifically, once integrated and associated into the process ontology repository and the process graph repository the invention describes how the processes can be expressed so as to show the relationship between process elements at different levels; permit queries against them; provide a way to find similar process elements based on the ontology; facilitate the creation of transformation plans that express how divergent processes can be converged based on similarities identified by the process analysis; associate processes to canonical workflow elements; and retarget process workflows to different workflow engines based on these associations.
摘要:
A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered.
摘要:
A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.
摘要:
A method for configuring multiple lifecycles, and associating each lifecycle with one or more subcategories of items includes receiving a request for a state change for an item in a current state; determining if the item's current state exists in the located lifecycle; wherein if the current state does not exist in the located lifecycle, the current state is updated with a series of update rules; determining if the current state has flags; wherein the flags are checked for one or more protection rules; generating a list of target states; receiving a user selected target state from the generated list; checking the selected target state for one or more associated protection rules; recording a state change for the selected target state in response to the satisfaction of the one or more associated protection rules, and if no protection rules are found; and propagating the state change.
摘要:
A method for facilitating compliance testing in an information technology (IT) environment is provided. The method includes defining each IT component of an enterprise as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for IT components of the enterprise against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the IT components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the IT components that failed to meet respective ones of the selected Configuration Standards.
摘要:
A system, method and apparatus for performing information transformations on an information stream composed of configuration items (CIs) for improving data quality and extending the capabilities of a configuration management database (CMDB). In one embodiment the data transformations ensure that a CMDB can be used to manage environments that use Network Address Translation by the modification of the signatures of analyzed CIs so that the resulting set of CIs is unique. The modification is applied to augment the signature with a domain specific prefix so that, when loaded into the enterprise wide CMDB, a CI is uniquely identified.
摘要:
A method for auditing and verifying configuration items (CIs) in an information technology (IT) configuration management database (CMDB) includes identifying which configuration item (CI) types should be part of an audit, defining link rules to link an authorized CI type stored in a CMDB to an actual CI type that is part of an IT infrastructure, retrieving all authorized CI instances of the identified CI types from the CMDB, retrieving all actual CI instances of the identified CI types from a discovery upload of a current IT environment, comparing the actual CI instances to the authorized CI instances, and taking remedial action when variances are discovered.
摘要:
A method for facilitating compliance testing in an environment is provided. The method includes defining each component as a set of attribute value pairs represented as a configuration item (CI) and defining relationships among the CIs. Configuration Standards for the CIs are defined to include scope identifying CIs to which the Configuration Standards apply and restrictions defining requirements for compliance. Compliance testing is performed for components against a selected Configuration Standards by determining, depending on the scope and the restrictions of each of the selected Configuration Standards, which of the components within the scope of the selected Configuration Standards fails to meet the restrictions of respective ones of the selected Configuration Standards; and by outputting results as a list, which includes each of the components that failed to meet respective ones of the selected Configuration Standards.