摘要:
Electronic contracts or “eContracts” for representing service level agreements are provided. In one illustrative embodiment, the eContract may comprise information pertaining to: (a) descriptions of business transactions in IT terms; (b) financial implications of business transaction service levels; and (c) reporting to be done in business terms. Of course, the eContract may comprise other terms and conditions. In an illustrative aspect of the invention, a system for managing IT resources in terms of business financials comprises an electronic contract authoring system or “ecAuthoring system,” an electronic contract manager module or “ecManager,” and one or more electronic contract agent modules or “ecAgents” that may run on IT elements (e.g., components of the network) that are being managed. Analysts interact with the ecAuthoring system to construct eContracts. An eContract is input to an ecManager that interprets the contract to report on and optimize IT resources based on business financials. The ecManager collaborates with ecAgents to monitor, report, and enforce contracts expressed in such business terms.
摘要:
Electronic contracts or “eContracts” for representing service level agreements are provided. In one illustrative embodiment, the eContract may comprise information pertaining to: (a) descriptions of business transactions in IT terms; (b) financial implications of business transaction service levels; and (c) reporting to be done in business terms. Of course, the eContract may comprise other terms and conditions. In an illustrative aspect of the invention, a system for managing IT resources in terms of business financials comprises an electronic contract authoring system or “ecAuthoring system,” an electronic contract manager module or “ecManager,” and one or more electronic contract agent modules or “ecAgents” that may run on IT elements (e.g., components of the network) that are being managed. Analysts interact with the ecAuthoring system to construct eContracts. An eContract is input to an ecManager that interprets the contract to report on and optimize IT resources based on business financials. The ecManager collaborates with ecAgents to monitor, report, and enforce contracts expressed in such business terms.
摘要:
A system, computer program and method for inspection of a system under inspection. The system may include an inspection program configured to access information available at the system under inspection and generate inspection data for the system under inspection. A runtime platform independent from the inspection program at the system under inspection is configured to limit the limit the contents of the inspection data to a maximum information content. A trusted third-party computer system may assist in selecting the inspection program and transferring the resulting inspection data.
摘要:
Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment.
摘要:
A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
摘要:
Disclosed is a computer program product for managing granularity of a computing infrastructure, wherein the program, when executed on a computer, causes the computer to: identify at least one set of service functions suited to characterization by one or more sets of metrics; create a representation of at least one supplied functionality for the set of service functions for input to a formal process; characterize at least one rule and at least one constraint for input to the formal process; determine at least one set of metrics for evaluating the service functions; quantify benefits associated with at least one of the sets of service functions using the set of metrics; and provide one or more of the sets of service functions as output, wherein the output is based on the metrics determining the output by use of the formal process. Systems and infrastructure are also disclosed.
摘要:
A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
摘要:
The present invention is a method of forming conductive structures comprising the steps of providing a silicon substrate having a first surface of atomically clean (111) silicon, forming an epitaxial CaF.sub.2 insulating layer on the first surface, the insulating layer having an exposed surface opposing the first surface, positioning a metallic mask on the exposed surface, irradiating a predetermined portion of the exposed surface so as to decompose the insulating layer beneath the predetermined portion to thereby form a workpiece having a metallic Ca layer on the first surface of the (111) silicon substrate, removing the mask, annealing the workpiece at a predetermined temperature so as to form an epitaxial CaSi.sub.2 conductive structure, wherein a plane coincident with the first surface bisects the conductive structure. According to one aspect of the invention, the energetic ion beam can be a beam of ionizing radiation. According to another aspect of the invention, the energetic beam can be energetic ion beam whereby both the conductive structure and an underlying impurity region in the substrate can be formed simultaneously.
摘要:
Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment.
摘要:
Devices and methods are provided for automatically analyzing a user's conversation or verbal presentation and providing feedback to the user, in real-time and/or off-line, to make the user aware of improper speech habits and thus enable the user to acquire better language habits while speaking. For example, a device for providing user awareness of speech habits may be a portable device, which can be worn or carried by the user, has various functions for monitoring and analyzing a speech session (e.g. conversation, verbal presentation) of a user and providing notification to the user of improper speech or language habits that are identified during the speech session.