Abstract:
An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.
Abstract:
Systems, methods, and non-transitory computer-readable storage media for receiving historical data describing behavior of human subject-matter experts, wherein the historical data links customer problems with solutions, receiving a plurality of human-generated algorithms describing patterns for linking customer problems with solutions based on problem-specific diagnostic data, comparing each algorithm of the plurality of algorithms with the historical data to determine respective predictive scores for linking a customer problem type with a particular solution, and ranking at least part of the plurality of algorithms based on the respective similarity scores.
Abstract:
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system.
Abstract:
Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for providing cross-domain communication via a user interface provided in a web browser. A first one or more trusted data network domains for a first user interface component may be identified. A second user interface component provided from a second data network domain accessible via a second one or more servers may be opened for display. A first event message may be transmitted from the second user interface component to the first user interface component. If the second data network domain is within the first one or more trusted data network domains, one or more operations may be performed within the first user interface component in response to the first event message.
Abstract:
A service management system and a method of executing a policy. In one embodiment, the service management system includes: (1) a repository configured to contain device, system, subscriber and service descriptions that define services in terms of a set of systems and devices that assume roles based on at least one of capabilities and attributes thereof and (2) a policy engine coupled to the repository and configured to employ the repository to identify end points relevant to a policy, identify services in which any of the end points play a role, identify subscribers having an identified device of the end points and a subscription to an identified service and cause the policy to be executed with respect to identified devices of identified subscribers and identified systems.
Abstract:
Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for providing contextual information via a user interface provided in a web browser. The user interface may display a plurality of components including a first component displaying object record information associated with an object record stored in a database and a second component displaying contextual information related to the stored object record information. Edited object record information may be received at the client machine. An indication of the edited object record information may be provided to the second user interface component of the user interface in the web browser. A request for updated contextual information related to the edited object record information may be transmitted from the client machine to the server. The updated contextual information may be displayed in the second user interface component of the user interface.
Abstract:
Determining a policy output includes facilitating a communication session for an access terminal at a visited network. The access terminal is associated with a home network. A policy is received at a visited policy server of the visited network. The policy has facets that include an application facet that identifies an application deployable in the home network. The application is identified from the application facet, and the policy output is determined in accordance with the application.
Abstract:
An exemplary method includes a remote support management system 1) receiving a television support request from a user of a television, 2) generating, in response to the television support request, a ticket identifier associated with the television support request, and 3) facilitating, in accordance with the ticket identifier, remote control of the television by a support technician by way of a computing device associated with the support technician. Corresponding methods and systems are also disclosed.
Abstract:
Methods, systems, and computer program products for insider threat detection are provided. Embodiments detect insiders who act on documents and/or files to which they have access but whose activity is inappropriate or uncharacteristic of them based on their identity, past activity, and/or organizational context. Embodiments work by monitoring the network to detect network activity associated with a set of network protocols; processing the detected activity to generate information-use events; generating contextual information associated with users of the network; and processing the information-use events based on the generated contextual information to generate alerts and threat scores for users of the network. Embodiments provide several information-misuse detectors that are used to examine generated information-use events in view of collected contextual information to detect volumetric anomalies, suspicious and/or evasive behavior. Embodiments provide a user threat ranking system and a user interface to examine user threat scores and analyze user activity.
Abstract:
An information processing apparatus includes a receiving part that receives, via a network, a processing request for a process to be performed on management information, an execution time estimating part that estimates an execution time of the process to be performed on the management information, and a selection part that selects a notification method for notifying an execution result of the process to be performed on the management information based on a comparison result of comparing the estimated execution time with a predetermined threshold value.