序号 | 专利名 | 申请号 | 申请日 | 公开(公告)号 | 公开(公告)日 | 发明人 |
---|---|---|---|---|---|---|
41 | 一种多功能的试验数据管理与数据综合分析平台 | CN202310768605.4 | 2023-06-28 | CN117420999A | 2024-01-19 | 邓博文; 张相盟; 姜文; 杨宏伟; 刘宇; 王瑞龙; 吴晓丹; 陶宇轩 |
本发明公开一种多功能的试验数据管理与数据综合分析平台,包括表单内容服务模块、流程中心服务模块、数据安全服务模块、数据集成服务模块与IT基础服务模块;平台采用分布式、开源、微服务架构,部署灵活,能根据负载实现弹性伸缩,极大降低企业总体拥有成本,各服务能独立部署,并通过服务注册中心进行统一注册管理。平台采用微服务、前后分离的架构设计。基于主流的前/后端框架进行开发,后端使用Spring Cloud/Spring Boot等框架构建,前端采用Vue等框架,前后端交互通过接口完成。平台通过微服务治理,实现对应用发布、审核、部署、更新、升级、监控、运维的全生命周期的统一管理。 | ||||||
42 | System and method for it sourcing management and governance covering multi geography, multi sourcing and multi vendor environments | US14148708 | 2014-01-06 | US09965735B2 | 2018-05-08 | Somasundaram Ramesh Babu |
The present invention relates to the field of IT Sourcing Management and more specifically to the IT sourcing management and governance (SMG) covering multi geography, multi sourcing and multi vendor environments at an enterprise level. The enterprise governance solution with core sourcing management functional components includes a contract compliance management module, a IT spend visibility management and reporting module, a value driver management and reporting module, a contract compliance audit management module, a contract evaluation analysis module, a performance management module, with underlying governance processes such as organization change management, stake holder relationship management, governance, compliance and risk management, performance management, service delivery management, service quality management, communication management and reporting. The SMG solution enhances and optimizes relationship between the customer and the vendor organizations by utilizing the core modules regardless of the scope, objectives, contracts, IT sourcing programs, vendors, service delivery locations and region, country and business units. | ||||||
43 | SYSTEM AND METHOD FOR DETERMINING WHETHER A COMPUTER DEVICE IS COMPATIBLE WITH A COMPUTER NETWORK | US13865895 | 2013-04-18 | US20140317264A1 | 2014-10-23 | Mittal M. PAREKH; Joseph SAIB |
A system and method are provided for allowing an administrator to automatically determine whether networked computer devices are configured to use governance software that allocates resource in, or controls or restricts the access of other network devices, to certain portions of the networked storage based upon IT governance protocols, network efficiency and economics. To do this, a company server having governance software stored thereon polls a range of device addresses (e.g., IP addresses) specified by the network administrator or stored on a DNS server with a message formatted using protocols such as WebDAV, SMB/CIFS, FTP, etc., and specific to the governance software. If the device responds to the message, the address of the device, along with an indicia that the device is compatible with the governance software is stored in memory. | ||||||
44 | Controlling and managing identity access risk | US14522804 | 2014-10-24 | US09830568B2 | 2017-11-28 | Dwayne Robert Johnson |
Methods and systems for controlling and managing identity and access management risks are presented. A computing device may generate a maturity model that maps a plurality of access management controls to a plurality of information technology (IT) resources associated with an IT environment. Subsequently, the computing device may determine, for each IT resource of the plurality of IT resources, a plurality of access management maturity scores. Each access management maturity score of the plurality of access management scores may correspond to an access management control of the plurality of access management controls that are associated with the corresponding IT resource. The computing device then may determine an aggregate maturity score for the IT environment based on the plurality of access management maturity scores for the plurality of IT resources. Thereafter, the computing device may provide the maturity model and the aggregate maturity score to at least one governance system. | ||||||
45 | Controlling and Managing Identity Access Risk | US14522804 | 2014-10-24 | US20160048782A1 | 2016-02-18 | Dwayne Robert Johnson |
Methods and systems for controlling and managing identity and access management risks are presented. A computing device may generate a maturity model that maps a plurality of access management controls to a plurality of information technology (IT) resources associated with an IT environment. Subsequently, the computing device may determine, for each IT resource of the plurality of IT resources, a plurality of access management maturity scores. Each access management maturity score of the plurality of access management scores may correspond to an access management control of the plurality of access management controls that are associated with the corresponding IT resource. The computing device then may determine an aggregate maturity score for the IT environment based on the plurality of access management maturity scores for the plurality of IT resources. Thereafter, the computing device may provide the maturity model and the aggregate maturity score to at least one governance system. | ||||||
46 | Transforming a legacy IT infrastructure into an on-demand operating environment | US11201876 | 2005-08-11 | US08775232B2 | 2014-07-08 | Mark K. Chetwood; Martyn J. Dawkes; Christopher J. Holloway; Michael O. Onoufriou; Rashik Parmar |
A transformation engine for transforming a legacy IT infrastructure into an on-demand IT infrastructure in a financial services enterprise, the transformation engine comprising: a determiner component for determining a current status of the legacy IT infrastructure; a comparator component for comparing the determined current status to an idealised set of outcome parameters to determine a set of deviation parameters; and the determiner component determining at least one control point within the set of deviation parameters which require enterprise wide governance. | ||||||
47 | Transforming a legacy IT infrastructure into an on-demand operating environment | US11201876 | 2005-08-11 | US20070038648A1 | 2007-02-15 | Mark Chetwood; Martyn Dawkes; Christopher Holloway; Michael Onoufriou; Rashik Parmar |
A transformation engine for transforming a legacy IT infrastructure into an on-demand IT infrastructure in a financial services enterprise, the transformation engine comprising: a determiner component for determining a current status of the legacy IT infrastructure; a comparator component for comparing the determined current status to an idealised set of outcome parameters to determine a set of deviation parameters; and the determiner component determining at least one control point within the set of deviation parameters which require enterprise wide governance. | ||||||
48 | SYSTEM AND METHOD FOR IT SOURCING MANAGEMENT AND GOVERNANCE COVERING MULTI GEOGRAPHY, MULTI SOURCING AND MULTI VENDOR ENVIRONMENTS | US14148708 | 2014-01-06 | US20150193709A1 | 2015-07-09 | Somasundaram RAMESH BABU |
The present invention relates to the field of IT Sourcing Management and more specifically to the IT sourcing management and governance (SMG) covering multi geography, multi sourcing and multi vendor environments at an enterprise level. The enterprise governance solution with core sourcing management functional components includes a contract compliance management module, a IT spend visibility management and reporting module, a value driver management and reporting module, a contract compliance audit management module, a contract evaluation analysis module, a performance management module, with underlying governance processes such as organization change management, stake holder relationship management, governance, compliance and risk management, performance management, service delivery management, service quality management, communication management and reporting. The SMG solution enhances and optimizes relationship between the customer and the vendor organizations by utilizing the core modules regardless of the scope, objectives, contracts, IT sourcing programs, vendors, service delivery locations and region, country and business units. | ||||||
49 | INFORMATION TECHNOLOGY MAINTENANCE SYSTEM FRAMEWORK | US12054286 | 2008-03-24 | US20080249825A1 | 2008-10-09 | Vishnuraj Rao Kunjur; Lakshmi Narasimhan Narayanan; Raghuttam Joshi; Garima Ganeriwala |
A strategic framework enables improvements in IT system maintenance by taking IT system information as input and outputting useful metrics and/or proposed modifications to achieve efficiency improvements. The strategic framework also can be described as an IT maintenance system assessment and modification tool. The described framework encompasses strategies for effective IT maintenance and improvement. The framework addresses the effectiveness of IT maintenance by focusing on, for example, technology, operations, human and/or non-human resources, and governance solutions. One or more of these dimensions can be assessed and evaluated, for example, to discover and process useful metric information. From the results of a described IT maintenance system assessment, which provides metrics for evaluating efficiency and improvability of IT maintenance systems, an overall roadmap of solutions can be developed. This can be used to form an end-to-end solution for better IT maintenance and portfolio spending in an organization. | ||||||
50 | Collaborative platform for IT service and vendor management | EP12157195.4 | 2012-02-27 | EP2498209A1 | 2012-09-12 | Mohanty, Santosh Kumar; Mazumder, Abhijit Kumar; Gopal, Vijayalakshmi; Banerjee, Shouvik; Majhi, Dillip Kumar; Shome, Manas |
The present invention provides a system and method for providing enterprise level platform that enables collaborative business service delivery and governance through access to underlying infrastructure for connected customer-vendor systems. The said enterprise platform that seamlessly brings together various point solutions with intent of providing a single window that enables access to the underlying infrastructure for a connected customer-vendor IT operations.
|
||||||
51 | COLLABORATIVE PLATFORM FOR IT SERVICE AND VENDOR MANAGEMENT | US13404021 | 2012-02-24 | US20130117195A1 | 2013-05-09 | Santosh Kumar Mohanty; Abhijit Kumar Mazumder; Vijayalakshmi Gopal; Shouvik Banerjee; Dillip Kumar Majhi; Manas Shome |
The present invention provides a system and method for providing enterprise level platform that enables collaborative business service delivery and governance through access to underlying infrastructure for connected customer-vendor systems. The said enterprise platform that seamlessly brings together various point solutions with intent of providing a single window that enables access to the underlying infrastructure for a connected customer-vendor IT operations. | ||||||
52 | COMPUTERIZED INFRASTRUCTURE MANAGEMENT SYSTEM AND METHOD | US14083719 | 2013-11-19 | US20140143782A1 | 2014-05-22 | L. Shekar; Manoj Madhavan; Vikram Hoshing; Vikash Agarwal |
An automation framework that bridges the gaps between the complete manual work and complex maintenance hungry tools. This automation framework enables business-driven automated system administration capabilities and focuses on independent task management between business needs and system administrators in order to model automation in line with the requirements of IT operations. In some embodiments, this framework minimizes manual effort, delegates complex tasks to junior resources without exposing critical systems and incorporates governance. | ||||||
53 | LEGAL COMPLIANCE, ELECTRONIC DISCOVERY AND ELECTRONIC DOCUMENT HANDLING OF ONLINE AND OFFLINE COPIES OF DATA | US12876916 | 2010-09-07 | US20110093471A1 | 2011-04-21 | Brian Brockway; Alan Bunte; Christie J. Van Wagoner; Simon Taylor; Marcus S. Muller; Anand Prahlad; Randy DeMeno; Rammohan G. Reddy |
Systems and methods of electronic document handling permit organizations to comply with legal or regulatory requirements, electronic discovery and legal hold requirements, and/or other business requirements. The systems described provide a unified approach to data management that enables compliance, legal and IT personnel to focus efforts on, e.g., a single data repository. The systems permit users to define and utilize information governance policies that help automate and systematize different compliance tasks. In some examples, organizations may push data in any third-party data format to the systems described herein. The systems may permit compliance or IT personnel to detect when a legally sensitive production file has been changed or deleted. The systems may also provide a unified dashboard user interface. From a dashboard interface, users may perform searches, participate in collaborative data management workflows, obtain data management reports, and adjust policies. Other elements and features are disclosed herein. | ||||||
54 | Application Centric Continuous Integration and Delivery With Automated Service Assurance | US15647697 | 2017-07-12 | US20180060066A1 | 2018-03-01 | Raed Zahi Rihani; Stefan C. Hellstrom; Christopher Ray Brown; Michael Laflamme; Jonovan J. Sanders; Ashley N. Porta; Ken A. Pham; Christina Alexandria Rodgers; Michael Phannareth; Alex Kendis |
An application-centric continuous delivery (ACCID) architecture provides a service that automates the configuration and management of end-to-end application lifecycle management (ALM) tools, through an innovative application-centric metadata model that can be customized through a self-service portal. With the ACCID architecture, IT organizations can provide version management, build automation, test automation, artifact management, infrastructure build, and automated application deployment that is consistent with global IT policy and governance and delivered as a service to organizations. The ACCID architecture references customized application metadata models that describe the application services, ALM requirements, and target infrastructure, to employ end-to-end automation of: the software deployment lifecycle and promotion across application environments, e.g., Development, Test, Pre-Production, and Production environments, using private, public, or hybrid cloud deployment models. | ||||||
55 | Legal compliance, electronic discovery and electronic document handling of online and offline copies of data | US12876916 | 2010-09-07 | US08396838B2 | 2013-03-12 | Brian Brockway; Alan Bunte; Christie J. Van Wagoner; Simon Taylor; Marcus S. Muller; Anand Prahlad; Randy DeMeno; Rammohan G. Reddy |
Systems and methods of electronic document handling permit organizations to comply with legal or regulatory requirements, electronic discovery and legal hold requirements, and/or other business requirements. The systems described provide a unified approach to data management that enables compliance, legal and IT personnel to focus efforts on, e.g., a single data repository. The systems permit users to define and utilize information governance policies that help automate and systematize different compliance tasks. In some examples, organizations may push data in any third-party data format to the systems described herein. The systems may permit compliance or IT personnel to detect when a legally sensitive production file has been changed or deleted. The systems may also provide a unified dashboard user interface. From a dashboard interface, users may perform searches, participate in collaborative data management workflows, obtain data management reports, and adjust policies. Other elements and features are disclosed herein. | ||||||
56 | SYSTEM AND METHOD FOR SOFTWARE LIFECYCLE MANAGEMENT | US11557980 | 2006-11-09 | US20080034347A1 | 2008-02-07 | Subramanyam V; Sangeeta Kar |
A computerized tool and techniques for enabling a software lifecycle management tool for an end user is provided. In one example embodiment, this is accomplished by using a V-process software development lifecycle model built with a workflow engine on an IT governance application. The technique provides an end-to-end life cycle with automatic review processes that complies with an external quality standard, such as level 2 CMMI. Further, the technique provides an on-line reference document including best practices at each phase in the V-process lifecycle. |