摘要:
A method for processing requests from a client to a server, the method comprising: receiving a service request from the client at a service manager implemented on the server; negotiating the type of workflow engine to use between the server and the client; negotiating the type of notification to use between the server and the client; receiving a further service request from the client at the service manager, the further service request using the negotiated type of workflow engine and the negotiated type of notification; creating a surrogate client executing on the server, the surrogate client interfacing the client with a service provider application executing on the server; providing a reference to the surrogate client to the client; the surrogate client receiving requests from the client and forwarding a surrogate request to the service provider application, the surrogate request including a predicted request based on multiple requests from the client; and the surrogate client receiving a notification from the service provider application and forwarding the notification to the client.
摘要:
A method for voice browsing an integrated voice response server is described. The method includes visually displaying a representation of a choice tree for a service, where the service includes an audio menu of available actions. A selection of an action displayed in the representation is received. The method also includes automatically navigating the audio menu in order to initiate the selected action. Apparatus and computer readable media are also described.
摘要:
Disclosed is a method, system and a computer program for correlating an incident service ticket with an incident resource ticket. The method includes, in response to a creation of an incident service ticket in a certain service category; searching with a data processor for open incident resource tickets of the same or similar category; searching with the data processor based on a set of similarity rules for corresponding critical configuration items defined in business service configuration items and, if both searches succeed, searching with the data processor found incident resource tickets ordered by time using found critical configuration items and, if a match is found, declaring the incident service ticket to be correlated with the matching incident resource ticket. The exemplary embodiments further provide that, if both searches do not succeed, or if a match is not found, obtaining input from a dependency tree for the business service configuration items and if no related service configuration items for the service category are identified then concluding the performance of the method, otherwise searching with the data processor found incident resource tickets ordered by time using found related service configuration items. If no associated resource tickets are available then the method performs constraint adaptive probing of resources determined from the dependency tree to attempt to generate at least one corresponding resource ticket, and to search on any corresponding resource tickets that are generated for related configuration items.
摘要:
Techniques are provided for globalizing handling of service management items. The techniques include obtaining a service management item in a language convenient to a first of two or more actors, translating the service management item into a language-neutral format to obtain a language-neutral service management item, applying one or more annotators to the service management item, translating the language-neutral service management item into a language convenient to a second of two or more actors acting on the service management item, and routing the translated service management item to the second of two or more actors. Techniques are also provided for generating a database of service management items in a language-neutral format.
摘要:
Test characteristics are determined at vertices of a rectangle defined on a sequential probability ratio test plot of a number of failures of a new physical system versus a number of failures of a baseline physical system. Based on the test characteristics, errors of first and second order are approximated as planes. Based on the approximating, intercepts of accept and reject boundaries are estimated. Based on slopes of the planes and actual values of the errors of the first and second orders, a starting point is determined on a graph of values of an intercept of the reject boundary and values of an intercept of the accept boundary. A minimum of an operating characteristic function is determined by alternative advances, commencing at the starting point, parallel to an axis representing the accept boundary intercept and an axis representing the reject boundary intercept.
摘要:
A system and method are provided for adaptive approximating of a user for role authorization in a hierarchical inter-organization model. The system includes an authorization redirector for receiving a request for an access control decision for a user. The system further includes an adaptive authorizer for dynamically determining, at run-time, a user role approximation for the user responsive to the request. The user role approximation is based on at least one of a system state and a system goal corresponding to a hierarchical inter-organizational model.
摘要:
A method for creating and using a short-hand interpretation dictionary in a collaboration environment includes creating or editing a document in a collaboration environment, said document comprising at least one short-hand notation; and replacing the at least one short-hand notation with an interpretation from at least one short-hand dictionary.
摘要:
The present invention is a method and apparatus for safe ontology reasoning. In one embodiment, a method for building safe sub-ontology that includes one or more elements of a given ontology includes designating at least one the elements as a sensitive element, where a sensitive element is an element not to be revealed. The method then designates a safe sub-ontology such that the safe sub-ontology does not include any elements that, alone or in combination, allow inference of a sensitive element, in accordance with one or more given inference rules. In another embodiment, a method for building a potential sub-ontology includes designating at least one of the elements as a sensitive element and including a maximal number of the elements in the potential sub-ontology, wherein the maximal number includes the greatest number of elements that can be revealed, cumulatively, without allowing inference of a sensitive element, in accordance with one or more given inference rules.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to server provisioning in a heterogeneous computing environment and provide a method, system and computer program product for secure and verified distributed orchestration and provisioning. In one embodiment of the invention, a server provisioning method can be provided. The server provisioning method can include establishing grouping criteria, grouping different target computing nodes into different groups of target computing nodes according to the established grouping criteria, server provisioning a root node in each of the different groups of target computing nodes, and relying upon the root node in each of the different groups to peer-to-peer server provision remaining nodes in each of the different groups.
摘要:
Test characteristics are determined at vertices of a rectangle defined on a sequential probability ratio test plot of a number of failures of a new physical system versus a number of failures of a baseline physical system. Based on the test characteristics, errors of first and second order are approximated as planes. Based on the approximating, intercepts of accept and reject boundaries are estimated. Based on slopes of the planes and actual values of the errors of the first and second orders, a starting point is determined on a graph of values of an intercept of the reject boundary and values of an intercept of the accept boundary. A minimum of an operating characteristic function is determined by alternative advances, commencing at the starting point, parallel to an axis representing the accept boundary intercept and an axis representing the reject boundary intercept.