摘要:
A method and system for remote control of a target computer by a controller computer through a network. The graphic commands issued by the graphic engine of the target computer are "hooked" and translated into a system independent format. The translated commands are then transmitted to the controller computer to be replayed on the display. The independency from the operating system is realized by defining a protocol which is used to translate a subset of the graphic commands in the target computer before the transmission to the controller computer where the commands are re-translated according to the same protocol.
摘要:
A method and system for remote control of a target computer by a controller computer through a network. The graphic commands issued by the graphic engine of the target computer are "hooked" and translated into a system independent format. The translated commands are then transmitted to the controller computer to be replayed on the display. The independency from the operating system is realized by defining a protocol which is used to translate a subset of the graphic commands in the target computer before the transmission to the controller computer where the commands are re-translated according to the same protocol.
摘要:
A method for allowing license tools to detect the installation of applications that are not physically installed on a machine when an Application Virtualization Environments is used. In one embodiment of the invention, the license tools may further detect application usage. In one embodiment of the invention, a virtual installation signature may be defined. Agents in a target computer may be used to compare the virtual installation signature of an application with a localized list of potential applications to detect whether the software is installed on the target computer.
摘要:
A method and a corresponding apparatus for managing software licenses on a plurality of computer are proposed. The present method and system aim at populating a software catalog without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalog) which contains definitions of software products and the related use signature. Information about software products and their related signature is obtained through a process which gathers information with an automated process which takes an initial snapshot of all processes running on a monitored data processing system and makes a comparison with a final snapshot after execution of a software product has been started. A “use signature” of the software product is then generated according to the difference.
摘要:
A solution for discovering shared software components (C1-C9) of software products (PRODa-PRODe) installed on a data processing system is proposed. In order to achieve this result, for each software product the corresponding software components are aggregated into groups (Ga1-Ge1); each group includes software components that must be linked by a corresponding relationship (such as a co-location on the same operating system image). In this way, it is possible to assign a software component available on the system to its software product even when it may be used by more of them. Particularly, the operation is performed deterministically when the available software component is included in a single valid group (i.e., a group including all the required software components); in this case, the available software component (C2) is assigned to the software product (PROD) associated with the single valid group (Gb1). Alternatively, when an (ambiguous) available software component (C4, C8, C9) is included in more valid groups, a score is calculated for each associated (eligible) software product according to the corresponding available software components; the eligible software product with the highest score (PROD) is then selected for assigning the ambiguous software component.
摘要:
A solution is proposed for developing software applications on a data processing system. A corresponding method starts with the step of providing an analysis model of a software application (such as based on a use case diagram); the analysis model represents the software application with stereotypes (i.e., use cases) each one representing a requirement of the software application. The method continues by estimating an optimum number of features of the software application (each one representing a function of the software application); the optimum number of features is estimated according to the analysis model. The stereotypes are then organized in packages; each package includes a set of logically correlated stereotypes, which expose a corresponding feature. A number of the packages are determined according to the optimum number of features and used to implement the software application.
摘要:
In one embodiment, a system for license management includes logic adapted for arranging entitlement slots under a plurality of licenses, each entitlement slot being configured for affording entitlement to use of an instance of a software application during a particular time frame, logic adapted for determining a license use signature from recorded license attribution information, logic adapted for receiving a notification of an instance not attributed to a license, and logic adapted for attributing the non-attributed instance to one of the plurality of licenses as a function of the license use signature, wherein each license has an entitlement value defining a maximum number of entitlement slots that may be attributed to that license during the time frame and any given instance of the software application may consume any number of the entitlement slots including zero entitlement slots.
摘要:
For monitoring a data processing system, a sequence of critical conditions with increasing severity indexes is defined. Each critical condition is detected when a corresponding state parameter exceeds a threshold value with a predefined persistence over time. The persistence may be specified by a minimum number of repeated occurrences of this event, with a maximum number of consecutive non-occurrences that are allowed between them. Whenever critical conditions are detected, the monitoring application retrieves the severity index of the last detected critical condition with the highest severity index, and calculates an incremental index indicative of how closely the state parameter is approaching the next critical condition. An indicator of the health of the system may be generated by subtracting the severity index of the last critical condition plus the incremental index from an optimal value.
摘要:
A mechanism for advising users on how to optimize their virtualisation infrastructure to minimise their software costs. There are two aspects to solution. The first aspect considers the distribution of software in the virtualised environment. The second aspect determines the proper licence types (e.g., sub-capacity or full capacity) for the virtualised environment, based on the usage of the software products therein.
摘要:
A method (200) for delivering information (for example, monitoring data) is proposed. The information is collected (235) on a central server (110) from remote sources (105), in order to be provided to multiple clients (120) in response to corresponding requests. In the method of the invention, an interest index is calculated (280) according to the number of preceding requests of the information that have been submitted in the past (so as to estimate the interest of the clients for the information); moreover, a significance index is calculated (220) according to a probability of a current value of the information that is uploaded onto the server by the corresponding source (so as to estimate its importance for the clients). A frequency for refreshing the information on the server can then be determined (245) according to both the interest index and the significance index. In this way, the refresh frequency self-adapts to the expected behavior of the clients.