摘要:
A system, method and computer program product of using peer collaboration tools to extend the reach of applications by enabling the application to specify a modality policy that is predicated on end-user context when pushing an interaction to the end-user. Various collaboration technologies—including cell phones, email, instant messaging (IM), the short message service (SMS), and pagers—have emerged that people can use to interact with each other even when they are remote and/or mobile. Using collaboration tools as the interface to Web applications eliminates the applications' dependency on Web browsers and allows applications to be accessed even when a Web browser is not available. In addition, collaboration tools are capable of receiving “calls”, which can be exploited by applications to proactively initiate and push an interaction to end users.
摘要:
A model-driven approach is used in Business Solution Monitoring and Control environment. The solution is first described by the high level abstract Platform Independent Model (PIM), which is independent from platform and implementation technologies. This PIM is presented as a Directed Acyclic Graph (DAG) that is constructed by a series of models described in XML. Then the PIM is decomposed into several sub-processes that can be easily transformed into an executable representation, such as BPEL (Business Process Execution Language) or JAVA. BPEL is used as the example to show the model transformation.
摘要:
A system and method for creating and managing a business process integration solution comprises modeling a business strategy including elements representing business measurements and initiatives according to defined business goals and objectives of an entity; modeling business operations of the entity in terms of business process elements including process tasks, artifact flows and artifact repositories, and business commitment elements including incorporating key performance indicators; mapping elements of the strategy model with artifact and process elements of the operations model; and, measuring business performance and comparing performance measurements against the key performance indicators. The business strategy and operation model process elements may be continuously refined over a solution development lifecycle as a result of process measurements and comparing. A business level modeling language is further implemented for formally representing the business operations.
摘要:
A method (and system) of adaptive action management for business solutions includes detecting a business situation, adaptively deciding an action for a detected business situation using information from a knowledge base, and invoking an action service for implementing the action.
摘要:
Auditing system logs of a remote client device is provided. Login session information entered at a workstation device accessing the remote client device to perform an activity associated with a work request is received. An access token is generated based on the login session information and information associated with the work request on the remote client device. The access token is compared with an audit log report of the remote client device that includes the activity associated with the work request performed by the workstation device on the remote client device. It is determined whether information in the access token matches information in the audit log report of the remote client device. In response to determining that the information in the access token does not match the information in the audit log report of the remote client device, an action alert is sent.
摘要:
Systems and methods are provided for the management of assets within an enterprise. Management of assets includes the creation of assets, the derivation and lineage of assets and asset composition. In addition, the creation of artifacts by the assets is provided. Assets and artifacts are maintained within a repository that is accessible throughout the enterprise. In addition, rules are provided for the composition and usage of all assets within the enterprise.
摘要:
A method for configuring a software package for an enterprise includes gathering desired To-be configuration requirements for a software package through at least one questionnaire; gathering current As-is raw data for the enterprise; displaying the To-Be configuration requirements and As-is raw data; comparing the To-Be configuration requirements and As-is raw data; selecting final To-Be configuration requirements; and generating and executing configuration code for the software package to pre-configure the software package with the final To-Be configuration requirements.
摘要:
Process Brokering Services (PBS) are implemented though the concept of Adaptive Documents to facilitate electronic commerce (e-commerce). PBS provides a single point of process control over the various fragmented execution flows and brings together the elements for process integration (views, content, flows) in a unified, scalable architecture on an industry standard platform. The two principal functions of the PBS are brokering of multiple business processes encapsulated in various back-end systems including workflow engines and business applications, and aggregating content from multiple enterprise information systems in the business context and managing the shared access to this based on the roles of the participants. The dynamic services provided by PBS are accessible to clients through the PBS Interface.
摘要:
A model editor is configured to generate an observation model of the activity based on a modeling language. The observation model includes a specification of one or more activity metrics to be monitored. A monitor is configured to receive a plurality of models and events, such that at least one event describes a change in the activity metrics to be monitored. The modeling language may be a graphical notation language.
摘要:
A method, system and computer program product for autonomic security configuration may include controlling a security configuration of at least one resource forming a solution based on a plurality of security requirements. The method may further include applying the plurality of security requirements across a plurality of resources independent of a resource type.