-
公开(公告)号:US07904753B2
公开(公告)日:2011-03-08
申请号:US12348984
申请日:2009-01-06
IPC分类号: G06F11/00
CPC分类号: G06F11/079 , G06F11/0709 , G06F11/0793 , G06Q30/02
摘要: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive disruption data for an enterprise and determine optimal selected disruption data from the received disruption data. Additionally, the programming instructions are operable to correlate triggering events of the optimal selected disruption data to one or more systemic root cause categories and identify a systemic root cause based on the triggering events of the optimal selected disruption data. Furthermore, the programming instructions are operable to determine an optimal enterprise solution set based on the identified systemic root cause and determine an optimal enterprise transformation set based on the optimal enterprise solution set. Moreover, the programming instructions are operable to output the optimal enterprise transformation set for implementing the optimal enterprise transformation set in the enterprise.
摘要翻译: 在具有计算机可执行代码的计算机基础设施中实现一种方法,其有形地体现在具有编程指令的计算机可读存储介质上。 编程指令可操作以接收企业的中断数据,并根据接收到的中断数据确定最佳选择的中断数据。 另外,编程指令可操作以将最佳选择的中断数据的触发事件与一个或多个系统根本原因类别相关联,并且基于最佳选择的中断数据的触发事件来识别系统根本原因。 此外,编程指令可操作以基于所识别的系统根本原因来确定最佳企业解决方案集合,并且基于最佳企业解决方案集合确定最优企业变换集合。 此外,编程指令可操作以输出用于实现企业中的最佳企业变革集的最优企业变革集。
-
公开(公告)号:US20100174949A1
公开(公告)日:2010-07-08
申请号:US12348984
申请日:2009-01-06
IPC分类号: G06F11/07
CPC分类号: G06F11/079 , G06F11/0709 , G06F11/0793 , G06Q30/02
摘要: A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive disruption data for an enterprise and determine optimal selected disruption data from the received disruption data. Additionally, the programming instructions are operable to correlate triggering events of the optimal selected disruption data to one or more systemic root cause categories and identify a systemic root cause based on the triggering events of the optimal selected disruption data. Furthermore, the programming instructions are operable to determine an optimal enterprise solution set based on the identified systemic root cause and determine an optimal enterprise transformation set based on the optimal enterprise solution set. Moreover, the programming instructions are operable to output the optimal enterprise transformation set for implementing the optimal enterprise transformation set in the enterprise.
摘要翻译: 在具有计算机可执行代码的计算机基础设施中实现一种方法,其有形地体现在具有编程指令的计算机可读存储介质上。 编程指令可操作以接收企业的中断数据,并根据接收到的中断数据确定最佳选择的中断数据。 另外,编程指令可操作以将最佳选择的中断数据的触发事件与一个或多个系统根本原因类别相关联,并且基于最佳选择的中断数据的触发事件来识别系统根本原因。 此外,编程指令可操作以基于所识别的系统根本原因来确定最佳企业解决方案集合,并且基于最佳企业解决方案集合确定最优企业变换集合。 此外,编程指令可操作以输出用于实现企业中的最佳企业变革集的最优企业变革集。
-
公开(公告)号:US20090132419A1
公开(公告)日:2009-05-21
申请号:US11940401
申请日:2007-11-15
申请人: Garland Grammer , Shallin Joshi , William Kroeschel , Sudir Kumar , Arvind Sathi , Mahesh Viswanathan
发明人: Garland Grammer , Shallin Joshi , William Kroeschel , Sudir Kumar , Arvind Sathi , Mahesh Viswanathan
IPC分类号: H04L9/00
CPC分类号: G06F21/6245
摘要: A method and system for obfuscating sensitive data while preserving data usability. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed.
摘要翻译: 一种在保护数据可用性的同时对敏感数据进行模糊处理的方法和系统。 识别应用程序的范围内数据文件。 范围内数据文件包括必须被屏蔽以保护其机密性的敏感数据。 收集数据定义。 识别主敏感数据字段。 主要敏感数据字段的数据名称被归一化。 主要敏感数据字段根据灵敏度进行分类。 根据对数据执行的规则,从应用于每个数据元素的预定义集合中选择适当的掩蔽方法。 被屏蔽的数据被分析以检测无效数据。 开发屏蔽软件,并应用输入注意事项。 执行所选择的掩蔽方法,并执行操作和功能验证。
-
公开(公告)号:US20120272329A1
公开(公告)日:2012-10-25
申请号:US13540768
申请日:2012-07-03
申请人: Garland Grammer , Shallin Joshi , William Kroeschel , Sudir Kumar , Arvind Sathi , Mahesh Viswanathan
发明人: Garland Grammer , Shallin Joshi , William Kroeschel , Sudir Kumar , Arvind Sathi , Mahesh Viswanathan
IPC分类号: G06F21/24
CPC分类号: G06F21/6245
摘要: An approach for obfuscating sensitive data while preserving data usability is presented. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed.
摘要翻译: 提出了一种在保护数据可用性的同时对敏感数据进行混淆的方法。 识别应用程序的范围内数据文件。 范围内数据文件包括必须被屏蔽以保护其机密性的敏感数据。 收集数据定义。 识别主敏感数据字段。 主要敏感数据字段的数据名称被归一化。 主要敏感数据字段根据敏感度进行分类。 根据对数据执行的规则,从应用于每个数据元素的预定义集合中选择适当的掩蔽方法。 被屏蔽的数据被分析以检测无效数据。 开发屏蔽软件,并应用输入注意事项。 执行所选择的掩蔽方法,并执行操作和功能验证。
-
公开(公告)号:US20090228314A1
公开(公告)日:2009-09-10
申请号:US12043745
申请日:2008-03-06
CPC分类号: G06F8/20 , G06Q10/06 , G06Q10/0639
摘要: In one illustrative embodiment, a computer implemented method for an accelerated service delivery service is provided. The computer implemented method comprises receiving input data describing a source service model and a target service model, comparing the source service model and the target service model and, identifying differences between the source service model and the target service model to form a first set of identified differences, and responsive to an identification of differences, creating a set of transforms for the first set of identified differences. The computer implemented method further identifying differences between the set of transforms and the described target service model, to form a second set of identified differences. The computer implemented method evaluating the second set of identified differences to determine whether results are acceptable and responsive to a determination that results are acceptable, accepting the target service model.
摘要翻译: 在一个说明性实施例中,提供了一种用于加速服务传送服务的计算机实现的方法。 计算机实现的方法包括接收描述源服务模型和目标服务模型的输入数据,比较源服务模型和目标服务模型,识别源服务模型与目标服务模型之间的差异,以形成第一组识别 差异,并且响应于差异的识别,为第一组识别的差异创建一组变换。 计算机实现的方法进一步识别变换集合和所描述的目标服务模型之间的差异,以形成第二组识别的差异。 计算机实现的方法评估第二组确定的差异以确定结果是否可接受并且响应于结果是可接受的确定,接受目标服务模型。
-
-
-
-