摘要:
Generally speaking, systems, methods and media for managing an application usage metering system are disclosed. Embodiments of the method may include initiating discovery agents for one or more server resources and interrogating by the discovery agents the one or more server resources to discover a plurality of discrete server processes and associated discovery data for each process. Embodiments may also include collecting discovery data for the discovered discrete server processes in a centralized repository and mapping one or more of the processes to an application and a customer based on the collected discovery data. Further embodiments may also include performing an administrative function based on the mapped discrete server processes, such as generating a customer bill, generating a report based on the mapped discrete server processes, assigning a customer to a process, or changing a status of a discrete server process.
摘要:
An audit tool (AT) operates in cooperation with an audit tool manager (ATM), a policy file (PF) and a query file (QF) in order to provide a real time display of usage within an on-demand service system. The ATM identifies the data to be gathered. Using the ATM, the user identifies comparison points, maps the comparison points to audit controls, defines policies and develops SQL queries to report transactions and record quantities. The AT gathers data, displays the gathered data, and compares the data points, and alerts the user to a discrepancy. The AT displays the compared data points side by side so that real time visual verification can be made, and the AT also alerts the user to discrepancies.
摘要:
Multiple policy engines may be integrated with a change and configuration change database to enable coordination of multiple policies by an embodiment comprising: a data center having a plurality of configuration items and connected to a network; a database connected to the network; a plurality of policy engines connected to the network; wherein each of the plurality of policy engines is configured to apply one or more policies to the data center in accordance with an awareness of all configuration item changes made by all other policy engines connected to the network; wherein the awareness comprises a plurality of relationships, each relationship being between a policy data and a configuration item.
摘要:
Methods and systems are provided for the synchronization of data elements between structured documents that utilize these data elements in the management of information technology systems and data repositories from which the data elements can be obtained. Synchronization is facilitated by the use of an active data model containing model elements associated with the data elements and containing sufficient information for the synchronization. These active data models can be created specifically for a given structured document, created by modifying a generic active data model or created as a composite of existing active data models. Synchronization updates are obtained from a central trusted data source or, using a coordination adaptor, from alternative data sources having the desired level of trust. The active data models can be decomposed into adaptive business objects that are used in the management of the information technology system.
摘要:
An audit tool (AT) operates in cooperation with an audit tool manager (ATM), a policy file (PF) and a query file (QF) in order to provide a real time display of usage within an on-demand service system. The ATM identifies the data to be gathered. Using the ATM, the user identifies comparison points, maps the comparison points to audit controls, defines policies and develops SQL queries to report transactions and record quantities. The AT gathers data, displays the gathered data, and compares the data points, and alerts the user to a discrepancy. The AT displays the compared data points side by side so that real time visual verification can be made, and the AT also alerts the user to discrepancies.
摘要:
Generally speaking, systems, methods and media for managing an application usage metering system are disclosed. Embodiments of the method may include initiating discovery agents for one or more server resources and interrogating by the discovery agents the one or more server resources to discover a plurality of discrete server processes and associated discovery data for each process. Embodiments may also include collecting discovery data for the discovered discrete server processes in a centralized repository and mapping one or more of the processes to an application and a customer based on the collected discovery data. Further embodiments may also include performing an administrative function based on the mapped discrete server processes, such as generating a customer bill, generating a report based on the mapped discrete server processes, assigning a customer to a process, or changing a status of a discrete server process.
摘要:
An audit tool (AT) operates in cooperation with an audit tool manager (ATM), a policy file (PF) and a query file (QF) in order to provide a real time display of usage within an on-demand service system. The ATM identifies the data to be gathered. Using the ATM, the user identifies comparison points, maps the comparison points to audit controls, defines policies and develops SQL queries to report transactions and record quantities. The AT gathers data, displays the gathered data, and compares the data points, and alerts the user to a discrepancy. The AT displays the compared data points side by side so that real time visual verification can be made, and the AT also alerts the user to discrepancies.
摘要:
Under the present invention, communication flows between applications in the multi-tiered environment are identified. For each communication flow identified, bandwidth consumption is determined. In general, the bandwidth consumption for a communication flow is determined based on a set of variables that includes one or more of the following: whether the communication flow is persistent, a payload/package size of the communication flow, a quantity of destination computers (endpoints) for the communication flow, a required delivery time for the communication flow, a desired network utilization for the communication flow, and a rate of simultaneous use of applications involved the communication flow. Once determined, the bandwidth consumption for the individual communication flows can be aggregated to determine the total bandwidth consumption across the environment. Using this value, decisions can be made about the best way to deploy or arrange the environment.