Images List Premium Download Classic

Configuration Item

Configuration Item-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW Auto-tuning security analysis tool configuration via correlation analysis
International Business Machines Corporation
May 17, 2018 - N°20180139226

A configuration for a security analysis tool is received from a user. The configuration includes two or more configuration items. Each configuration item is a parameter in the configuration of the security analysis tool that has a plurality of possible values. A correlation between the two or more configuration items is determined. The correlation is based on one or more ...
Multi-stage network discovery
Servicenow, Inc.
May 03, 2018 - N°20180123889

In a multi-stage network discovery system, a target device is identified by a logical address and associated with a configuration item (ci) record stored in a configuration management database (cmdb). A receiver module receives first probe data from a first probe running against the target device, the first probe data comprising constant attribute data of the target device, stores at ...
System and method for configuration management database governance
Servicenow, Inc.
May 03, 2018 - N°20180121486

A method for configuration management database governance comprising: identifying a first configuration item and a second configuration item; identifying a relationship between the first configuration item and the second configuration item; identifying a relationship rule governing the relationship between the first configuration item and the second configuration item; determining whether the relationship between the first configuration item and the second ...
Configuration Item Patent Pack
Download + patent application PDFs
Configuration Item Patent Applications
Download + Configuration Item-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Configuration Item-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Auto-tuning security analysis tool configuration via correlation analysis
International Business Machines Corporation
March 22, 2018 - N°20180083991

A configuration for a security analysis tool is received from a user. The configuration includes two or more configuration items. Each configuration item is a parameter in the configuration of the security analysis tool that has a plurality of possible values. A correlation between the two or more configuration items is determined. The correlation is based on one or more ...
Configuration item integrity
Hewlett Packard Enterprise Development Lp
January 18, 2018 - N°20180018212

Example implementations relate to configuration item integrity. For example, a computing device may include a processor. The processor may receive a request for feedback specifying data integrity associated with a configuration item migrated from a first system to a second system. The configuration item is associated with a data source. The data integrity indicates quality and completeness of the configuration ...
Detection device for prohibited relationship among setting values
Konica Minolta, Inc.
January 11, 2018 - N°20180011665

A terminal device as a prohibited relationship detection device detects presence or absence of a prohibited relationship, when change of a setting value related to a job condition is received, based on a pjl (printer job language) index table to classify a plurality of configuration items of which input of setting values is received on the terminal device into a ...
Configuration Item Patent Pack
Download + patent application PDFs
Configuration Item Patent Applications
Download + Configuration Item-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Configuration Item-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Configuration discovery service data visualization
Amazon Technologies, Inc.
December 28, 2017 - N°20170373932

Configuration items of an environment for a client of a configuration discovery service are identified. A view category is selected for the target environment. A set of configuration items for which information regarding recent configuration changes is to be provided is identified. Data which can be used to display a graphical representation of at least a portion of the environment ...
Radio bearer reconfiguration method, radio bearer establishment method, user equipment, and base station
Huawei Technologies Co., Ltd.
December 07, 2017 - N°20170353992

Embodiments of the present disclosure relate to the field of communications technologies, and provide a radio bearer reconfiguration method, a radio bearer establishment method, user equipment, and a base station. The method includes receiving, by a ue, a radio bearer reconfiguration indication sent by abase station, where the radio bearer reconfiguration indication includes a radio bearer identifier and a target ...
Configuration-driven sign-up
Microsoft Technology Licensing, Llc
November 30, 2017 - N°20170346912

Systems and methods for conducting a sign-up process according to configuration data are presented. As indicated, the sign-up process is driven by configuration data, typically though not exclusively contained in an accessible configuration file, to conduct a sign-up process. According to the configuration data, the sign-up process utilizing the base set of executable code may conduct a sign-up process that ...
Verifying configuration management database configuration items
International Business Machines Corporation
November 23, 2017 - N°20170337236

A verification check is performed for a configuration management database (cmdb) configuration item (ci), the cmdb ci being an information technology asset of a computing environment and being previously discovered as part of a cmdb ci discovery procedure for a cmdb system, and discovered on a hosting component hosting the cmdb ci. The discovery procedure provides configuration data associated with ...
Deployment of a network resource based on a containment structure
Servicenow, Inc.
October 26, 2017 - N°20170310745

Systems and methods for the deployment of network resource information based on a containment structure are herein disclosed as comprising, in an implementation, determining, using a configuration item representative of a resource within the configuration management database, a first set of properties associated with a resource type, wherein the first set of properties comprises a subset of the global property ...
Multi-stage network discovery
Servicenow, Inc.
October 26, 2017 - N°20170310547

In a multi-stage network discovery system, a target device is identified by a logical address and associated with a configuration item (ci) record stored in a configuration management database (cmdb). A receiver module receives first probe data from a first probe running against the target device, the first probe data comprising constant attribute data of the target device, stores at ...
Identification and reconciliation of network resource information
Servicenow, Inc.
October 26, 2017 - N°20170308601

Systems and methods for the identification and reconciliation of network resource information are herein disclosed. In an implementation, a system includes instructions stored in memory for processing a request received from a data source to update a record of a network resource by receiving data relating to an attribute of a network resource of a computer network from a first ...
Configuration Item Patent Pack
Download + patent application PDFs
Configuration Item Patent Applications
Download + Configuration Item-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Configuration Item-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method for incident root cause analysis
E.s.i. Software Ltd
July 27, 2017 - N°20170213142

A method of incident root cause analysis in an information technology (it) system, wherein upon occurrence of an incident collecting changes to configuration items and/or system parameters on computer stations during a predetermined time prior to the incident, calculating a change lifetime for each of the collected changes, comparing the change lifetime to the time of occurrence of the ...
System and method for contextual clustering of granular changes in configuration items
Esi Software Ltd.
July 06, 2017 - N°20170195178

A method of clustering changes to configuration items in an information technology (it) system, including collecting changed configuration items executed on computer stations connected in a network implementing the information technology system, storing the collected configuration items in a database, analyzing contextual information related to the configuration items to identify clusters having similar characteristics, clustering the configuration items based on ...
Automated change monitoring and improvement recommendation system for incident reduction in information technology infrastructure
International Business Machines Corporation
June 22, 2017 - N°20170180201

A method includes obtaining, from a service management database, one or more change tickets and one or more incident tickets relating to an information technology infrastructure, defining one or more change-incident pairs based on linkages between the incident tickets and the change tickets, identifying, from the change-incident pairs, one or more dimensions affecting outcomes of implementation of one or more ...
Discovering linkages between changes and incidents in information technology systems
International Business Machines Corporation
June 22, 2017 - N°20170178038

A method comprises obtaining, from a service management database, one or more change tickets and one or more incident tickets relating to an information technology infrastructure, extracting, from the change tickets and the incident tickets, one or more dimensions indicating potential causality between one or more changes and one or more incidents, identifying configuration items of the information technology infrastructure ...
Repeat execution of root cause analysis logic through run-time discovered topology pattern maps
International Business Machines Corporation
May 18, 2017 - N°20170141945

Methods, systems, and computer program products for repeat execution of rca logic through run-time discovered topology pattern maps are provided herein. A computer-implemented method includes determining one or more topology paths of configuration items from a collection of multiple views of a target system; identifying one or more patterns from the one or more topology paths of configuration items; comparing ...
Event clusters
Hewlett Packard Enterprise Development Lp
May 11, 2017 - N°20170134226

Event clusters can in an example embodiment include converting a description of an event associated with a configuration item (ci) to a standardized description, classifying the event based on a comparison of the standardized description of the event with a standardized description of a prior event included in an existing event cluster, and assigning the classified event to an event ...
Method and system for sharing, distributing, ranking, and searching medical device configuration items
General Electric Company
May 04, 2017 - N°20170124271

Various embodiments include a system and method for sharing, distributing, ranking, and searching medical device configuration items. The method can include receiving a request, transmitted over a network to a server, to search medical configuration items stored at the server. Each of the medical configuration items may be associated with a rating. Each of the medical configuration items may be ...
System and method for optimizing event alerts in an information technology (it) infrastructure management system
Wipro Limited
April 13, 2017 - N°20170104652

System and method for optimizing event alerts in an information technology (it) infrastructure management system are disclosed. In one embodiment, the method comprises tracking one or more event alerts triggered by monitoring tools. The method further comprises determining a probable usage for at least one configuration item associated with the one or more event alerts. The method further comprises determining ...
Loading