摘要:
In accordance with one aspect of the embodiments of this invention there is a method to initiate remote managed infrastructure services for a customer infrastructure site. The method includes, in response to an inquiry from a potential customer, provisioning the potential customer with a remote managed infrastructure services software client; using the provisioned software client, performing an automated process to detect specifics of a customer information technology infrastructure; in response to the customer confirming the detected specifics of customer information technology infrastructure, configuring a remote managed infrastructure service to monitor and manage all or a subset of the detected and confirmed customer information technology infrastructure.
摘要:
In accordance with one aspect of the embodiments of this invention there is a method to operate a network mapping tool. The method includes performing a network mapping operation over a first set of ports to generate a list of hosts that are found to be alive; performing a sequential scan on only those hosts in the list to detect the operating system of each host in the list; and performing a parallel port scan to detect characteristics of only those hosts in the list. The characteristics can include an identification of at least applications and services running on the hosts in the list. The second set of ports can be a full set of ports.
摘要:
In accordance with one aspect of the embodiments of this invention there is a method to operate a network mapping tool. The method includes performing a network mapping operation over a first set of ports to generate a list of hosts that are found to be alive; performing a sequential scan on only those hosts in the list to detect the operating system of each host in the list; and performing a parallel port scan to detect characteristics of only those hosts in the list. The characteristics can include an identification of at least applications and services running on the hosts in the list. The second set of ports can be a full set of ports.
摘要:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
A system and computer program product for enabling monitoring across one or more domains include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
Registration of a plurality of customers, each having an information technology infrastructure, with a manager of remote services is facilitated. Registration of a plurality of service partners with the manager is also facilitated. The manager detects an issue with a given one of the information technology infrastructures of a given one of the customers. Responsive to the detecting, responses from a subset of the service partners for potential selection to address the issue are facilitated. The partners in the subset are ranked based at least in part on ratings of the service partners in a rating database. A top-ranked one of the service partners is assigned to address the issue.
摘要:
High-sensitivity fluid detection devices and more particularly to devices for alleviating toilet water leaks into the bowl and for detecting overflows from the flush tank or the bowl.
摘要:
The present invention concerns methods and apparatus for identifying and assigning meaning to words not recognized by a vocabulary or grammar of a speech recognition system. In an embodiment of the invention, the word may be in an acoustic vocabulary of the speech recognition system, but may be unrecognized by an embedded grammar of a language model of the speech recognition system. In another embodiment of the invention, the word may not be recognized by any vocabulary associated with the speech recognition system. In embodiments of the invention, at least one hypothesis is generated for an utterance not recognized by the speech recognition system. If the at least one hypothesis meets at least one predetermined criterion, a sword or more corresponding to the at least one hypothesis is added to the vocabulary of the speech recognition system. In other embodiments of the invention, before adding the word to the vocabulary of the speech recognition system, the at least one hypothesis may be presented to the user of the speech recognition system to determine if that is what the used intended when the user spoke.