会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Modularized customization of a model in a model driven development environment
    • 在模型驱动的开发环境中模块化定制模型
    • US09052906B2
    • 2015-06-09
    • US13470273
    • 2012-05-12
    • Michael FloresLeonard S. Hand
    • Michael FloresLeonard S. Hand
    • G06F9/44
    • G06F8/35
    • A method for the modularized customization of a model within a model driven development environment includes selecting a template specifying a base model and different points of variability of a base model in a model driven development environment and transmitting over a data communications network an electronic form configured to receive data in different data fields representative of the points of variability. Thereafter, a submission of the electronic form can be received and data from the received submission representative of the points of variability can be extracted. Instructions can be added to a control file corresponding to the points of variability and the control file can be processed to generate artifacts in an import file specifying the points of variability. Finally, the import file can be imported into the model driven development environment and the base model modified with the points of variability of the artifacts.
    • 一种用于在模型驱动的开发环境中对模型进行模块化定制的方法,包括在模型驱动的开发环境中选择指定基本模型的基本模型和不同的可变性点的模板,并通过数据通信网络将电子表格配置为 在不同数据字段中接收代表变异点的数据。 此后,可以接收电子表格的提交,并且可以提取来自所接收的提交的代表变异点的数据。 可以将指令添加到与可变性点对应的控制文件中,并且可以处理控制文件以在指定可变性点的导入文件中生成工件。 最后,导入文件可以导入到模型驱动的开发环境中,基础模型用工件的变化点修改。
    • 3. 发明申请
    • MODULARIZED CUSTOMIZATION OF A MODEL IN A MODEL DRIVEN DEVELOPMENT ENVIRONMENT
    • 模型驱动开发环境中模型的模块化自定义
    • US20130305213A1
    • 2013-11-14
    • US13470273
    • 2012-05-12
    • Michael FloresLeonard S. Hand
    • Michael FloresLeonard S. Hand
    • G06F9/44
    • G06F8/35
    • A method for the modularized customization of a model within a model driven development environment includes selecting a template specifying a base model and different points of variability of a base model in a model driven development environment and transmitting over a data communications network an electronic form configured to receive data in different data fields representative of the points of variability. Thereafter, a submission of the electronic form can be received and data from the received submission representative of the points of variability can be extracted. Instructions can be added to a control file corresponding to the points of variability and the control file can be processed to generate artifacts in an import file specifying the points of variability. Finally, the import file can be imported into the model driven development environment and the base model modified with the points of variability of the artifacts.
    • 一种用于在模型驱动的开发环境中对模型进行模块化定制的方法,包括在模型驱动的开发环境中选择指定基本模型的基本模型和不同的可变性点的模板,并通过数据通信网络将电子表格配置为 在不同数据字段中接收代表变异点的数据。 此后,可以接收电子表格的提交,并且可以提取来自所接收的提交的代表变异点的数据。 可以将指令添加到与可变性点对应的控制文件中,并且可以处理控制文件以在指定可变性点的导入文件中生成工件。 最后,导入文件可以导入到模型驱动的开发环境中,基础模型用工件的变化点修改。
    • 6. 发明授权
    • Identifying stray assets in a computing enviroment and responsively taking resolution actions
    • 识别计算环境中的流浪资产,并对其采取行动
    • US08775607B2
    • 2014-07-08
    • US12964894
    • 2010-12-10
    • Gary L. DetroJoe HackettLeonard S. HandAdam A. Nemati
    • Gary L. DetroJoe HackettLeonard S. HandAdam A. Nemati
    • G06F15/173
    • H04L41/0853G06F11/3006G06F11/3051H04L41/0866
    • In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed.
    • 在发现阶段,可以使用一组可疑规则来确定计算环境的每个环境资产是否被视为可疑资产或标准环境资产,其中可疑资产是计算环境的环境资产的子集。 在确认阶段,可以使用一组流浪规则来确定每个疑犯资产是否被视为流动资产,其中流浪资产是可疑资产的子集。 杂散资产可以是由在计算环境中活跃并且消耗计算环境的资源而不是计算环境的活动进程所需的配置管理系统所定义和配置的资产,并且不被其他活动环境资产所用。 对于每个流浪资产,可以执行至少一个解决动作(例如,警报动作,收容动作,删除动作)。
    • 8. 发明申请
    • UTILIZING SIGNATURES TO DISCOVER AND MANAGE DERELICT ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT
    • 利用信息技术环境发现和管理资源的标志
    • US20130246782A1
    • 2013-09-19
    • US13887609
    • 2013-05-06
    • ROMELIA H. FLORESJOSEPH E. HACKETTLEONARD S. HAND
    • ROMELIA H. FLORESJOSEPH E. HACKETTLEONARD S. HAND
    • G06F9/44
    • G06F9/4401G06F9/5061H04L63/1416H04L63/1433
    • A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets.
    • 可以分析一组资产签名。 每个资产签名都可以与资产相关联。 可以根据资产签名发现资产。 资产可以代表信息技术(IT)环境的基本结构单元。 可以进行多阶段筛选过程以发现遗弃资产。 在第一阶段,具有正常状态的资产能够根据分析相应资产签名的结果而变为可疑状态。 在第二阶段,具有可疑状态的资产能够被选择性地改变到正常状态或者废除状态。 可以为每组资产维护资产管理系统记录。 资产管理系统的每个记录可以是配置项(CI),其指示该组资产是否处于正常状态,可疑状态或废弃状态。 资产管理系统可以定期回收遗失资产所消耗的资源。
    • 9. 发明申请
    • ROUTING SERVICE REQUESTS BASED ON LOWEST ACTUAL COST WITHIN A FEDERATED VIRTUAL SERVICE CLOUD
    • 基于联合虚拟服务云中最低实际成本的路由服务请求
    • US20120290348A1
    • 2012-11-15
    • US13106230
    • 2011-05-12
    • JOSEPH E. HACKETTLEONARD S. HAND
    • JOSEPH E. HACKETTLEONARD S. HAND
    • G06Q10/00G06F15/173
    • G06Q10/06315G06F9/5072G06Q10/06G06Q10/101
    • A method for providing a virtual cloud service at the lowest actual cost can begin with an optimal transaction handler of a federated virtual service cloud maintaining a virtual resource pool of transactional units. Each transactional unit can represent a service application deployed to a cloud service provided by a cloud service provider having a usage-based service cost model that allows transactional units to be placed in an inactive state to suspend its operating expense. Operational metrics data for the cloud service providers can be continuously captured. In response to a service request, the transactional unit that meets fulfillment requirements of the service request and incurs a lowest actual cost can be determined based upon cost factors derived from the operational metrics data, the usage-based service cost model, and a current usage state of the virtual resource pool. The received service request can be routed to the determined transactional unit.
    • 以最低实际成本提供虚拟云服务的方法可以从保持事务单元的虚拟资源池的联合虚拟服务云的最优事务处理程序开始。 每个事务单元可以表示部署到由云服务提供商提供的云服务的服务应用,其具有基于使用的服务成本模型,其允许事务单元处于非活动状态以暂停其操作费用。 可以持续捕获云服务提供商的操作度量数据。 响应于服务请求,可以基于从操作度量数据,基于使用的服务成本模型和当前使用导出的成本因素来确定满足服务请求的满足要求并产生最低实际成本的事务单元 虚拟资源池的状态。 接收到的服务请求可以路由到确定的事务单元。