摘要:
A method, apparatus and computer product that, in a system having a client computer, and apparatus for connecting the client computer to a network having a server for backing up the client computer, enables transferring data from the client computer to the server, by connecting the client computer to the network; backing up data on the client computer to a storage device attached to the network when the client computer is connected to the network; and transferring the data from the storage device to the server, preferably at a time determined by the server.
摘要:
A method and system are disclosed that enable a user to search a large collection of structured and unstructured documents using semantic concepts that the system provides to them, to search the most relevant business activity first, and then using one of the business activities as the additional context to search for specific document or documents that are most relevant. One aspect of the invention provides a methodology to perform concept-based structured search over document collections to obtain search results as business activities and associated relevant documents using the business activity context. The document collections are obtained by aggregating documents corresponding to a business activity. The instances are extracted from the document collections together with any concept-relationship specific heuristics in that domain. Another aspect of the invention enables the enterprise user to enter concepts and instances that define the search parameters using a structured user interface.
摘要:
Techniques for providing at least one user access to one or more documents in a collaborative computing environment in accordance with a search engine are provided. The user is presented with search results, wherein the search results comprise at least one document comprising at least one portion to which the user has no access. A request from the user for access to the at least one document is received. A supervising entity is then notified of the user request to access the at least one document. An instruction from the supervising entity is then received. In accordance with the received instruction, the user is granted access to the at least one document.
摘要:
Techniques for providing at least one user access to one or more documents in a collaborative computing environment in accordance with a search engine are provided. The user is presented with search results, wherein the search results comprise at least one document comprising at least one portion to which the user has no access. A request from the user for access to the at least one document is received. A supervising entity is then notified of the user request to access the at least one document. An instruction from the supervising entity is then received. In accordance with the received instruction, the user is granted access to the at least one document.
摘要:
A system and method for correlating events in data processing resources processing a workload. An event correlation service comprising an event correlation service software framework is provided on a processor unit. The event correlation service is configured, using the event correlation service software framework, for correlating the events from monitored data for the workload, wherein the workload is processed using the data processing resources provided by a provider of the data processing resources. The event correlation service receives monitored data for the workload as the workload is being processed. The monitored data is processed by the event correlation service to identify an occurrence of an event of interest for the workload as the workload is being processed. An output is provided in response to identifying the occurrence of the event of interest.
摘要:
A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution.
摘要:
A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.
摘要:
A system and method of deriving software use and software data object characteristics determine one or more locations on one or more computer storage devices where one or more configuration and data files associated with computer software components are stored, and obtain one or more attributes associated with said one or more computer software components. One or more commands associated with said one or more computer software components may be issued and one or more related information associated with said one or more software computer components resulting from issuing one or more commands may be collected. The related information and the one or more attributes may be mapped to the computer software components to derive information about the computer software component use and data object use characteristics.
摘要:
A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server.
摘要:
A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed.