摘要:
Services of a business process are selected for execution. Ontological data is read from a data source corresponding to sub-process sets of the business process. Each sub-process set comprises at least one service. A first ontological model is generated from the read ontological data. Performance characteristics are read for at least one service. Real time or near real time knowledge information is read regarding resources of a system for executing the business process. A modified ontological model is generated from the read performance characteristics and the real time or near real time system resource knowledge information.
摘要:
The present invention provides a method, system, and computer program product for the autonomic installation and configuration of an enterprise business process on-demand. The method comprises: providing a business process document for expressing the business process, wherein the business process comprises a plurality of components and a workflow; providing a plurality of installation documents, where each installation document describes an installation of a component of the business process; providing a mapping document for mapping each component of the business process to at least one of the installation documents describing the installation of that component; and provisioning the business process on-demand using the business process document, the installation documents, and the mapping document.
摘要:
A method, an apparatus, and computer instructions are provided for automatic discovery and maintenance of business processes in Web services and enterprise development environments. A set of agents are deployed to a set of enterprise containers to collect user function calls and report events to a central business workflow language generator. An event handler collects the events reported and an event grouper groups the events into a single workflow activity. An event correlation engine correlates activities to business workflow language constructions by using a temporal condition handler and a collection counting handler. The temporal condition handler maps activities that are in sequence, in parallel, and are repetitive. The collection counting handler counts the number of times an event is handled. Events and Rules for these events are written on the system based on a variety of business constructs that are particular to given business process definition language. A business workflow language generator then generates a business workflow and a workflow presents the business workflow in a user interface.
摘要:
Techniques are disclosed for efficiently analyzing measurement data for business processes (for example, in a service provider environment). Business process-aware modules or “cubes” are created from the measurement data, using features of a spatially-enabled database system. A “drill-down” approach is provided for investigating underlying information for a cube (including lower-level linked cubes). Data types other than cubes, such as planes from which a cube is constructed, may also be analyzed. The disclosed techniques may be used to provide autonomic systems, which are self-aware, at a business process level. That is, based on results of analyzing data represented by a cube, autonomic adjustments may be made. In a service provider environment, the analysis and/or the autonomic adjustments may be directed toward enabling the service provider to avoid jeopardizing commitments in service level agreements (and the revenue loss that may result when the commitments are not met).
摘要:
A Homologous Pairing Capture Assay is described which enables detection of coalignment between homologous DNA sequences. The assay involves ligating closely positioned homologous sequences to each other thereby generating head-to-head ligation products or inverted repeats. DNA fragments containing an inverted repeat are then converted into hairpin DNA molecules. The hairpin DNA molecules can then be readily separated from DNA molecules free of inverted repeats. Also described are various diagnostic applications and kits relating to the assay.
摘要:
Systems (100) and methods (200) for managing transactional processing. The methods involve executing a first transaction (120) which is blocked by an exclusive lock of at least one second transaction (110) from accessing at least one resource of a system. Thereafter, a determination is made as to whether a Service Level Agreement (“SLA”) associated with the first transaction is being met. If it is determined that the SLA is not being met, the resources needed by the first transaction are identified. Subsequently, all executing transactions, that are using the resources needed by the first transaction, are identified. At least one of the identified transactions is then dynamically slowed down or speed up. The transaction is slowed down or sped up by: adjusting how many records are to be processed in each sub-transaction of the transaction; and/or increasing or decreasing the time period between commit operations of the transaction.
摘要:
A configuration management database (CMDB) that associates a policy with a configuration item (CI) in the CMDB. The policy contains an “applies to” field and a “type descriptor”. When a relationship is created between the CI and a second CI in the CMDB, the policy is associated with the second CI. The type descriptor of the policy may be evaluated and the policy associated with the second CI in response to the evaluation. The policy may contain a type descriptor comprising an instance of a CI type. The policy may contain a type descriptor comprising a CI type. The policy may contain an “applies to” field having a value of “this CI type”. The policy may contain an “applies to” field having a value of “hosting environment of this CI type”. The type descriptor may include a hosted CI component portion and a hosting CI component portion.
摘要:
A method for policy-based program optimization of existing software code is performed where the code is segmented into code modules. The optimization is based on a performance policy that defines a target characteristic and a sacrificial characteristic relating to the existing software code and further defines an allowable degradation of the sacrificial characteristic resulting from optimization of the target characteristic. This method may include identifying code modules that contribute to suboptimal performance of the software code with respect to the target characteristic; identifying code transformations that increase performance of the suboptimal code modules with respect to the target characteristic; and optimizing the identified code modules by selectively applying the code transformations in accordance with the performance policy to increase performance of the software code with respect to the target characteristic.
摘要:
This application discloses a debug tool to prompting display of at least a portion of a simulated output for a circuit design in a debug window, identifying a marker corresponding to a value in the simulated output has been specified for the debug environment, and prompting accentuation of one or more occurrences of the value in the debug window relative to other values in the simulated output based, at least in part, on the marker specified for the debug environment.
摘要:
A method, system and apparatus for autonomically configuring a virtual log. In accordance with the present invention, events flowing into the virtual log can be heuristically processed to determine if any events have been lost. When an event is considered to have been lost, the size of the log associated with the event can be increased. Also, the interval in which the virtual log interacts with the associated log can be decreased so as to ensure that the events will not continue to be lost. When a period of time has elapsed during which no events are heuristically determined to have been lost, either or both of the interval and associated log can be adjusted so as to increase the interval and decrease the size of the associated log.