Abstract:
Embodiments of the invention provide a method and an apparatus for automatic verification of a network access control construct for a network switch. In one method embodiment, the present invention accesses an actual network access control construct on a network switching device, the actual network access control construct for defining the device actually coupled with the network switching device. Additionally, a machine-readable map of the network is accessed, the map providing a pre-determined network access control construct defining the device which should be coupled with the network switching device. A validation is performed, wherein the validation verifies that the actual network access control construct on the network switching device correlates with the pre-determined network access control construct defined by the machine-readable map.
Abstract:
Examples disclosed herein relate to calculating a misconduct prediction value. Examples include calculating a misconduct prediction value for a remote computing service provider user account from payment data corresponding to a method of payment for consumption of resources of the service provider and utilization data quantifying consumption of a processing resource of the service provider by an application provided to the service provider in connection with the user account.
Abstract:
A method of accessing a service includes receiving, from a requesting user, a request for a number of accessing users to have access to the service; generating service access data associated with the service; providing, to the requesting user, the generated service access data for distribution to the accessing users; receiving service access data from an accessing user; determining, based in part on the received service access data, whether the service can be provided; and where it is so determined, providing the service to the accessing user.
Abstract:
The present invention provides a method and an apparatus for automatic creation of secure connections between segmented resource farms in a utility computing environment. According to one embodiment, farms are automatically created using visual representations of the farms as a specification. A shared subnet is created as the basis of a secure connection, visual representations of one or more farms are associated with the shared subnet to form the secure connection between the one or more farms.
Abstract:
Embodiments of the invention provide a method and an apparatus for automatic verification of a zone configuration of a plurality of network switches. In one method embodiment, the present invention accesses an actual zone configuration comprising a plurality of network switching devices, the actual zone configuration for defining the switching devices which are actually part of the zone. Additionally, a machine-readable map of the network is accessed, the map providing a pre-determined zone configuration defining the switching devices which should be part of the zone. An automatic verification is performed, wherein the verification verifies that the actual zone configuration of network switching devices correlates with the pre-determined zone configuration defined by the machine-readable map.
Abstract:
Methods and systems for verifying that a virtual network is properly configured are described. Configuration information from devices in the virtual network is received. The configuration information is compared against reference information. The reference information represents the design of the virtual network. Discrepancies between the configuration of the devices and the design of the virtual network are identified.
Abstract:
Embodiments of the invention provide a method and an apparatus for automatic verification of a network access control construct for a network switch. In one method embodiment, the present invention accesses an actual network access control construct on a network switching device, the actual network access control construct for defining the device actually coupled with the network switching device. Additionally, a machine-readable map of the network is accessed, the map providing a pre-determined network access control construct defining the device which should be coupled with the network switching device. A validation is performed, wherein the validation verifies that the actual network access control construct on the network switching device correlates with the pre-determined network access control construct defined by the machine-readable map.
Abstract:
According to one example of the present invention, there is provided, a method of accessing a service. The method comprising: receiving, from a requesting user, a request for a number of accessing users to have access to the service, generating service access data associated with the service, providing, to the requesting user, the generated service access data for distribution to the accessing users, receiving, from an accessing user, service access data, determining, based in part on the received service access data, whether the service can be provided, and where it is so determined, providing the service to the accessing.
Abstract:
The present invention provides a method and an apparatus for creating visual representations of farms that enables connecting farms securely. In one embodiment, a visual representation of a first farm and a visual representation of a second farm are created. A visual representation of a secure connection is created. The visual representation of the first farm is associated with a first end of the visual representation of the secure connection. The visual representation of the second farm is associated with the second end of the visual representation of the secure connection.
Abstract:
Embodiments of the invention provide a method and an apparatus for automatic verification of a zone configuration of a plurality of network switches. In one method embodiment, the present invention accesses an actual network access control construct and an actual zone configuration for a plurality of network switching devices. Additionally, a machine-readable map of the network is accessed, the map providing a pre-determined network access control construct defining the device which should be coupled with the network switching device and a pre-determined zone configuration defining the switching devices which should be part of the zone. An automatic verification is performed, wherein the verification verifies that the actual network access control construct and the actual zone configuration of network switching devices correlates with the pre-determined network access control construct and zone configuration defined by the machine-readable map.