Follow us on Twitter
twitter icon@FreshPatents


Configuration Item patents

      

This page is updated frequently with new Configuration Item-related patent applications.




 System and  optimizing event alerts in an information technology (it) infrastructure management system patent thumbnailSystem and optimizing event alerts in an information technology (it) infrastructure management system
System and method for optimizing event alerts in an information technology (it) infrastructure management system are disclosed. In one embodiment, the method comprises tracking one or more event alerts triggered by monitoring tools.
Wipro Limited


 Event correlation and calculation engine patent thumbnailEvent correlation and calculation engine
Apparatus and methods for learning and implementing rules for remediating system errors are provided. The method may include identifying a configuration item that is not in compliance with a configuration baseline.
Bank Of America Corporation


 Method and  a self-adjusting calibrator patent thumbnailMethod and a self-adjusting calibrator
A self-adjusting calibrator is provided. The calibrator may include a calibrator datastore.
Bank Of America Corporation


 Auto discovery of configuration items patent thumbnailAuto discovery of configuration items
Implementations of a system, method and apparatus described herein execute a discovery process to identify a plurality of computing devices within a computer network and a respective configuration associated with each of the plurality of computing devices. Upon discovery of a first computing device configured by an agent, configuration management of the computer network is searched for a definition used by the agent to configure the first computing device, and the discovery process for the first computing device is modified based on the definition to identify a first plurality of configuration items associated with a current configuration of the first computing device.
Servicenow, Inc.


 Deleting configuration items in a configuration management database patent thumbnailDeleting configuration items in a configuration management database
Embodiments of the present invention provide automated systems and methods for selectively finding and deleting dormant data (out of data, inactive data) in a configuration management database (cmdb), or in a database which has similar characteristics. The method includes using a directed graph where each node of the directed graph represents a configuration item, and traversing the directed graph in order to determine inactive or dormant data, and all of the objects which depend on that data.
International Business Machines Corporation


 Automatically discovering topology of an information technology (it) infrastructure patent thumbnailAutomatically discovering topology of an information technology (it) infrastructure
Provided is a method of automatically discovering topology of an information technology (it) infrastructure. Topology relationships amongst configuration items (ci) present in a semi-structured data generated by an information technology component of the it infrastructure are determined.
Hewlett Packard Enterprise Development Lp


 Monitoring a computing environment patent thumbnailMonitoring a computing environment
Monitoring a computing environment can include monitoring configuration attributes, performance metrics, and event indicators of a configuration item (ci). Monitoring a computing environment can include determine a monitoring level for the cis by applying a number of rules that define monitoring levels based on the configuration attributes, performance metrics, and event indicators of the ci..
Hewlett Packard Enterprise Development Lp


 Method and device for negotiating media capability patent thumbnailMethod and device for negotiating media capability
A method includes sending, by a first device, a first message to a second device, sending a third message to the second device, where the first message includes information about at least one media capture capability supported by the first device, and at least one first association identifier, the third message includes at least one configuration item supported by the first device and at least one second association identifier, and the at least one first association identifier corresponds to the at least one second association identifier in a one-to-one manner, and receiving, a second message and a fourth message sent by the second device, where the second message includes at least one media capture capability that is selected by the second device according to the first message and the third message, and at least one third association identifier corresponding to the at least one media capture capability.. .
Huawei Technologies Co., Ltd.


 Business service discovery patent thumbnailBusiness service discovery
A non-transitory machine-readable storage medium is described in which discovery job instructions initiate a discovery job to discover target configuration items associated with a target business service in an information technology infrastructure. The storage medium comprises scoping instructions to, for a first configuration item and in response to a first stop condition not existing, designate the first configuration item as one of the target configuration items and continue the discovery job from the first configuration item to a second configuration item; and for the second configuration item and in response to the first stop condition or a second stop condition existing, stop the discovery job from proceeding from the second configuration item to a third configuration item..
Hewlett-packard Development Company, L.p.


 Intelligent auto-scaling patent thumbnailIntelligent auto-scaling
Provided is a method of auto-scaling. A state change event notification related to a computing resource associated with a computer application is received.
Hewlett-packard Development Company, L.p.


Auto discovery of configuration items

Implementations of a system, method and apparatus described herein execute a discovery process to identify a plurality of computing devices within a computer network and a respective configuration associated with each of the plurality of computing devices. Upon discovery of a first computing device configured by an agent, configuration management of the computer network is searched for a definition used by the agent to configure the first computing device, and the discovery process for the first computing device is modified based on the definition to identify a first plurality of configuration items associated with a current configuration of the first computing device.

Multiple configuration item status value analysis

Embodiments of the present invention provide a method, system and computer program product for configuration item (ci) status value analysis for multiple performance monitors. In one embodiment of the invention, a multi-ci analysis method can be provided.
International Business Machines Corporation

Automated detection of a system anomaly

A method for automated detection of a real it system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the it system. The method may also include detecting anomalies in the monitor measurements.
Hewlett Packard Enterprise Development Lp

Switching devices

A switching device comprises a physical-layer module, a routing module, a control-plane module, a data-plane module, and a storage module. The physical-layer module comprises a plurality of network interfaces and is coupled with the routing, control-plane, and data-plane modules.
Inventec Corporation

Discovering and identifying resource dependencies

Discovering and identifying resource dependencies. Resources are discovered and managed as configuration items, wherein selected configuration items are each assigned a uniform resource identifier (uri) object.
International Business Machines Corporation

Monitoring a computing network

A computer-implemented method of monitoring a computing network includes identifying a topology pattern in a computing network. The method also includes assigning a management template for a configuration item type of the topology-pattern.
Hewlett Packard Enterprise Development Lp

Prioritizing event notices utilizing past-preference pairings

In one example of the disclosure, event notices are received, notice indicative of degradation of a configuration item. Configuration iter past-preference pairings are accessed.

Light app offline updating method, device and terminal

A light app offline updating method and a device and a terminal device are provided. When a terminal device obtains from a server, in case of detecting start-up operation of the light app, an offline configuration item corresponding to the light app, it processes, according to the offline configuration item, offline data in an offline partition of the light app, thus reaching the object of controlling elimination of offline data of the light app by a cloud server and providing users with web browsing under weak network signal or even no network signal, thereby improving user experience..
Xiaomi Inc.

Determining characteristics of configuration files

Determining a characteristic of a configuration file that is used to discover configuration files in a target machine, a computer identifies, using information associated with a configuration item of a machine, a candidate configuration file related to the configuration item of the machine, from among a plurality of files from the machine. The computer extracts a value of a feature of the candidate configuration file and aggregates the candidate configuration file with a second candidate configuration file related to the same configuration item identified from among a plurality of files from a second machine, based on the extracted value.
International Business Machines Corporation

Database application federation

According to an aspect, a system for assisting a user with configuration management may include a configuration management database (cmdb) system having a plurality of configuration items, and an application external to the cmdb system. The cmdb system may associate an invocation string with a first configuration item and the application external to the cmdb system.
Bmc Software, Inc

Virtual software application deployment configurations

Configuration items for a software application can be automatically and/or manually discovered, and the application can be packaged to form a virtual application package. A deployment configuration can include settings for the configuration items.
Microsoft Technology Licensing, Llc

Firewall policy browser

Methods, computer-readable media, systems and apparatuses for firewall policy system are described. A computing system in a network comprising firewalls using a plurality of different formats may obtain configuration data of at least one firewall.
Bank Of America Corporation

Lockless waterfall thread communication

Systems and methods are disclosed for communicating state information of a session between a plurality of processing threads in a hierarchy. The session is passed down through the hierarchy, with one or more threads processing the session at each level of the hierarchy.
Netapp, Inc.

Displaying information technology conditions with heat maps

Displaying information technology conditions with heat maps includes determining a severity value of current issues for each configuration item in an information technology system; generating a graph of the configuration items that visually depicts topological relationships between the configuration items, the graph having a heat map overlay; and assigning pixel colors for each configuration item in the heat map overlay according to their severity value.. .
Hewlett-packard Development Company, L.p.

Aggregation and workflow engines for managing project information

A system includes an aggregation engine that receives a build sheet entry from a user that includes a configuration item, a category, and a value. The system also includes a workflow engine that determines a first approver associated with the configuration item and a second approver associated with the category.
Bank Of America Corporation

Distributed cmdb information within a service management ticketing system

A method and/or computer program product locally manages configuration item (ci) information on ci systems. A request is received for authorized ci information that describes an authorized change to be made to a particular ci system.
International Business Machines Corporation

System recommendations based on incident analysis

In one embodiment, a computer-implemented method includes obtaining incident data related to a plurality of servers, including a first server. Configuration data is obtained for each of the plurality of servers.
International Business Machines Corporation

Communicator with profiles

A communicator has profiles for holding locators for items in a tree-like database for a smart device that monitors a process. The communicator is connected to the smart device and obtains tag and other identity information to find the profile for the smart device.

Authorizing a change within a computer system

Program code generates on a first computer within a computer system a unique key for a computer software application, wherein the computer software application is on a second computer within the computer system. The program code generates on the first computer an authorization code that grants a designated end user access to implement a change to a configuration item on a second computer during a configurable time period.
International Business Machines Corporation

Real-time, distributed administration of information describing dependency relationships among configuration items in a data center

In a data center, real-time, distributed administration of information describing dependency relationships among configuration items may be carried out. In such a data center, each configuration item is associated with an independent agent that is coupled to other agents and maintains a record of dependencies amongst the configuration item associated with the agent and other configuration items.
International Business Machines Corporation

Topological query in multi-tenancy environment

Each node of a topological database that represents an information technology environment with multi-tenancy capability represents a configuration item within the environment and is characterized by a tenant authorization rule that indicates a list of tenants that are authorized to access the corresponding configuration. An unrestricted result to an unrestricted query is obtained, the unrestricted query being representable as a sub-graph isomorphism.

System and controlling liquid chromatograph

Provided is a liquid chromatograph control system for controlling an operation of a liquid chromatograph according to a method file containing a plurality of analysis parameters representing configuration items which determine operational conditions of the liquid chromatograph, including: a) a display section for displaying, for each of the analysis parameters, selectable values of the analysis parameter on a condition-setting screen; b) a grouping section for allowing a user to prepare grouping information for the values of the analysis parameter displayed on the condition-setting screen, the grouping information determining whether or not one value of one analysis parameter and one value of another analysis parameter can be included in one group; and c) a file-creating section for extracting, from the values of the analysis parameters, such values that can be included in one group according to the grouping information, and for creating a method file containing the extracted values.. .
Shimadzu Corporation

Security access for a switch device

A method for providing user access to a network switch appliance, includes: receiving from a user a request to access configuration item for the network switch appliance, the network switch appliance configured to pass packets received from a network to network monitoring instruments; and determining, using a processing unit, whether to allow the user to access the configuration item for the network switch appliance based on information regarding the user.. .

Virtual software application deployment configurations

Configuration items for a software application can be automatically and/or manually discovered, and the application can be packaged to form a virtual application package. A deployment configuration can include settings for the configuration items.

Hotspot identification

Hotspot identification can include receiving data indicating a plurality of reported events each associated with a respective number of configuration items (cis) of a plurality of cis and receiving data indicating a topological dependency of each of the plurality of cis. Hotspot identification can include assigning a weight to each of the respective number of cis, assigning a weight to cis of the plurality of cis having a topological dependency from the respective number of cis, and identifying the hotspot having a weight assigned thereto that satisfies a hotspot weight threshold..

Data detecting firewall

A data detecting method and apparatus for a firewall device connected with a network to identify security threat in the data, where the method is implemented by a fast forwarder in the firewall device and includes: the fast forwarder receives application data; obtains application information in the received application data; determines an application protocol type corresponding to the application data according to the application information and an application identifying table; queries a configuration item for threat detection according to the application protocol type to determine whether the application data requires threat detection; and if the application data does not require threat detection, forwarding the application data. The data detecting method avoids a problem that performance of a firewall is degraded because all application data is sent to a detecting processor in the firewall device for detection, thereby improving an performance of the firewall device..

Detection method, storage medium, and detection device

A detection method includes: calculating a statistic for each of q configuration items, where q is at least one, among a plurality of configuration items, according to a first frequency and a second frequency, when an occurrence of a failure of a certain type is predicted according to a first pattern, which is a combination of p messages output from the q configuration items within a period not longer than a predetermined length of time, where p is not less than q; and generating result information according to the statistic, the result information indicating at least one configuration item in which the failure of a certain type is predicted to occur with a probability that is at least higher than a probability with which the failure of a certain type is predicted to occur in another of the plurality of configuration items.. .

Information processing technique for configuration management database

Upon receiving a request to change an attribute value for a certain configuration item (ci), it is determined whether a first pattern exists that includes a first condition, which is satisfied with change relating to the request. Each pattern includes a first condition relating to a certain change of an attribute value for a first ci and a second condition relating to an attribute value, which is to be changed at a same timing as the certain change, for a second ci that has a predetermined relation with the first ci.

System and verifying configuration item changes

A system and method is provided for managing verification of configuration item changes. Discovered configuration data associated with a configuration item may be received.

Self-service database reporting systems and methods

Users interactively create, customize, and execute reports on data stored in databases using only a web browser. The user can create, customize, and execute reports by selecting various report elements including, for example, data sources, fields, filters, labels, charts, dashboards, and the like.

Automated detection of a system anomaly

A method for automated detection of a real it system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the it system. The method may also include detecting anomalies in the monitor measurements.

Determining cost and risk associated with assets of an information technology environment

A computer determines the cost and risk of assets. The computer analyzes an asset signature, associated with an asset representing a fundamental structural unit of an information technology environment, to determine that the asset is in a non-normal state.

Dynamic routing protocols using database synchronization

A network-connectivity system can receive a remote additive hash for a routing-data collection of a remote network node, and compares the remote additive hash with a local additive hash for a local routing-data collection. A respective additive hash represents one or more network-configuration items of a routing-data collection.

Management server, tenant pattern validation method, and computer system

A management server which manages a tenant pattern being information for forming a tenant being an application system for executing a predetermined application by using computer resources within a computer system, the tenant pattern including a configuration item and an id pool, the management server having: pattern parts information for managing the configuration item as a pattern part that forms the tenant pattern; validation rule information for storing a detail of validation processing for a composition of the tenant pattern; and the management server further comprising: a tenant pattern generation unit; a tenant designing unit for designing a composition of the tenant, and generating a configuration detail for actually building the tenant on the computer system; and a validation execution unit for executing the validation processing for the tenant pattern and the configuration detail based on the validation rule information.. .

Methods and authentication of configuration items via configuration item change analysis

A method comprises retrieving a change history for each of one or more configuration items for a specified time period, retrieving requests for change identifiers utilized for each of the configuration items in the specified time period, generating an audit report for the configuration items in accordance with the retrieved change history and the retrieve request for change identifiers, determining if each attribute value change in the change history of each of the configuration items is authorized, and recording a marker in the change history through which a given configuration item has authorized changes. Determining if each value change is authorized comprises comparing changes in the retrieved change history to the retrieved request for change identifiers for each of the configuration items to distinguish value changes that occurred without a request for change from value changes that occurred with a request for change..

Computer-readable recording medium, failure prediction device and applicability determination method

A failure prediction device generates a failure predictor pattern in accordance with previous cases of failure that has occurred in a first system, the failure predictor pattern being used to detect a predictor of failure in the first system configuration. When a system configuration is changed from the first system configuration to a second system configuration, the failure prediction device calculates the difference information that indicates the difference between the system configurations by using the number of changes that is the accumulated number of times that a change of the configuration item which is included in a system is executed.

System and configuration policy extraction

A method for configuration policy extraction for an organization having a plurality of composite configuration items may include calculating distances in a configuration space between the composite configuration items. The method may also include clustering the composite configuration items into one or more dusters based on the calculated distances.

Supply chain orchestration system with configure-to-order item matching

A system is provided that searches and matches data. The system receives a payload including one or more data values, where the one or more data values represent an item configuration.

Wireless communication apparatus and configuring method thereof

The present disclosure discloses a wireless communication apparatus and a configuring method thereof the configuring method comprises: verifying an account which is logging-in; reading configuration information corresponding to the account after the account has passed the verification, wherein the configuration information is preset by a special-authority account; using the configuration information to configure the wireless communication apparatus. In this way, the present disclosure can use the configuration information customized for the account to configure the wireless communication apparatus automatically, so time for changing configuration items after a user logs in is saved and the user experience is improved..

Method and system for managing basic input/output system (bios) configuration data of bios

Disclosed in the present invention are a method and a system for managing basic input/output (bios) configuration data of a bios. The method includes: reading a bios program code, and executing a bios program; when executing the bios program, executing different code segments in the bios program according to read bios configuration data; and when new bios configuration data is required for executing the bios program, using a value in a new storage area as the new bios configuration data.

Network monitoring

A system may include a monitoring engine to monitor configuration items of each layer of a multilayer network in a synchronized fashion in which each layer is monitored at a predefined time interval following monitoring of configuration items of another layer.. .



Configuration Item topics:
  • Configuration Item
  • Configuration Management
  • Machine Learning
  • Information Technology
  • Executable
  • Synchronization
  • Information Management
  • Control Unit
  • Asset Management
  • Network Device
  • Notification
  • Data Mining
  • Output Device
  • Clustering
  • It Infrastructure


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Configuration Item for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Configuration Item with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.5243

    file did exist - 2751

    2 - 1 - 51