Abstract:
As disclosed herein, a computer program product, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer program product further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.
Abstract:
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.
Abstract:
One embodiment of the invention comprises a method for constructing a graph pertaining to a specified metric. Measured values of the specified metric are selectively stored, wherein each stored value comprises a data point. The method further includes routing successive data points to a location associated with the graph, wherein a first number of data points are included in a specified graph time period. The method further includes using a value that represents a particular data level of detail to divide the specified graph time period into multiple time intervals, wherein each time interval includes a second number of data points. The method further includes selectively processing the second number of data points of a time interval, in accordance with prespecified criteria, to determine a most representative value for that time interval. The most representative values of respective time intervals are then used to construct the graph.
Abstract:
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.
Abstract:
As disclosed herein a method, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The method further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system. A computer system, and a computer program product corresponding to the above method are also disclosed herein.
Abstract:
One embodiment of the invention comprises a method for constructing a graph pertaining to a specified metric. Measured values of the specified metric are selectively stored, wherein each stored value comprises a data point. The method further includes routing successive data points to a location associated with the graph, wherein a first number of data points are included in a specified graph time period. The method further includes using a value that represents a particular data level of detail to divide the specified graph time period into multiple time intervals, wherein each time interval includes a second number of data points. The method further includes selectively processing the second number of data points of a time interval, in accordance with prespecified criteria, to determine a most representative value for that time interval. The most representative values of respective time intervals are then used to construct the graph.
Abstract:
As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer system further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.
Abstract:
A monitoring and alert methodology ascertains conditions that may result in a combined sewer overflow (CSO) event. The method employs a semantic model of a combined sewer system that includes specification information describing the components of the combined sewer system. Sensors distributed throughout the components of the combined sewer system sense operating parameter information for those components. A monitoring and alerting (MA) information handling system (IHS) receives operating parameter information from the sensors. The MA IHS analyzes the operating parameter information received from the sensors together with the specification information in the semantic model of the combined sewer system to determine if a combined sewer overflow (CSO) event is possible. The MA IHS generates an alert to provide notification of a possible CSO event if the MA IHS determines that a CSO event is possible. In this manner, an operator may take early corrective action before a CSO event occurs.
Abstract:
A monitoring and alert methodology ascertains conditions that may result in a combined sewer overflow (CSO) event. The method employs a semantic model of a combined sewer system that includes specification information describing the components of the combined sewer system. Sensors distributed throughout the components of the combined sewer system sense operating parameter information for those components. A monitoring and alerting (MA) information handling system (IHS) receives operating parameter information from the sensors. The MA IHS analyzes the operating parameter information received from the sensors together with the specification information in the semantic model of the combined sewer system to determine if a combined sewer overflow (CSO) event is possible. The MA IHS generates an alert to provide notification of a possible CSO event if the MA IHS determines that a CSO event is possible. In this manner, an operator may take early corrective action before a CSO event occurs.
Abstract:
As disclosed herein a computer system, executed by a computer, includes receiving, from a user, a request for access to a shared system, wherein the request comprises a user identifier and a user password corresponding to the user, and determining privileges corresponding to the shared system using the user identifier. The computer system further includes requesting, from an identity manager, a shared identifier and a shared password corresponding to the shared system, receiving, from the identity manager, the shared identifier and the shared password, and using the shared identifier and the shared password to enable the user to use the shared system.