WO2005083571A1 - Procede de commande d'un systeme informatique agence de façon a avoir une interaction avec d'autres entites - Google Patents

Procede de commande d'un systeme informatique agence de façon a avoir une interaction avec d'autres entites Download PDF

Info

Publication number
WO2005083571A1
WO2005083571A1 PCT/AU2005/000288 AU2005000288W WO2005083571A1 WO 2005083571 A1 WO2005083571 A1 WO 2005083571A1 AU 2005000288 W AU2005000288 W AU 2005000288W WO 2005083571 A1 WO2005083571 A1 WO 2005083571A1
Authority
WO
WIPO (PCT)
Prior art keywords
computing system
interactions
data
dummy
interaction
Prior art date
Application number
PCT/AU2005/000288
Other languages
English (en)
Inventor
David Mark Eagle
Mark Warren Davies
Christopher Franklin Johnson
Andrew James Wisener
Original Assignee
Izuki Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2004901043A external-priority patent/AU2004901043A0/en
Application filed by Izuki Corporation filed Critical Izuki Corporation
Publication of WO2005083571A1 publication Critical patent/WO2005083571A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet

Definitions

  • This invention relates to a method of controlling the operation of a computing system arranged to interact with other entities.
  • Computing systems are used to interact with other entities, be they other computing systems or persons operating computing systems such as personal computers. Sometimes these interactions are part of a transaction. Transactions can occur in many forms including loan enquiries, grocery orders, credit card payments, share purchases, automated trading, fund transfers, flight bookings, and so forth. Growth in online transactions is exponential - Gartner and Forrester each forecasted over US$2 trillion in e-commerce in the US alone in 2004. These type of transactions are controlled by computing systems in the form of web-servers operating under the control of ecommerce software applications. Despite increasing sophistication in online services, applications continue to fail.
  • the present invention provides a method of controlling the operation of a computing system arranged to interact with other entities, the method including the steps of: monitoring the interactions of the computing system and determining whether they meet predetermined conditions; and saving data relating to at least one recent interaction of the computing system if at least one of the pre-determined conditions are not met. If an interaction does not meet pre-determined conditions then this indicates that there may be a problem with the interaction, and thus there may be a problem with the transaction that is being carried out. Data relating to the transaction, being data related to the at least one interaction, is saved. Corrective action may then be taken.
  • the step of monitoring may further include the step of periodically making dummy interactions with the computing system, the dummy interactions mimicking those usually carried out between the computing system and another entity.
  • This method of monitoring verifies that the computing system can successfully handle interactions that are similar to real interactions.
  • Data arising from previous interactions of the computing system may be used as the basis for formulating the dummy interactions.
  • the saved data may be used as the basis for formulating the dummy interactions. In this way, the system can verify whether a problem relating to a real transaction can be reproduced.
  • a plurality of dummy interactions may be formulated from saved data relating to a single interaction, and in each of the formulated dummy interactions, at least one element of the data is varied. This allows for verification of the reproducibility of a problem over a range of similar interactions over a range of values.
  • the method may further include the step of taking corrective action to modify the operation of the computing system if the predetermined conditions are not met. This measure can avoid the current transaction failing and can prevent subsequent interactions from failing in the same way as the transaction involving the interaction that did not meet the pre-determined conditions.
  • the method may further include the step of, if the pre-determined conditions are not met, repeatedly making that dummy interaction until the pre-determined conditions are met. This allows for identifying when a problem has been fixed.
  • the step of monitoring may further include the step of monitoring the progress of real interactions made between the computing system and another entity.
  • the method may further include the step of, if the pre-determined conditions are not met, formulating and making a dummy interaction based on the real interaction.
  • the pre-determined conditions may relate to the content or timing of data sent or received by the computing system.
  • the pre-determined conditions may include the presence within the data of a particular element of data that must fall within a pre-determined range of values.
  • the particular element of data may be a particular value .
  • the step of determining may further include the step of disregarding some of the data.
  • the disregarded data may include date information, advertising information, or any other variable information that is not considered to be critical to the interaction being monitored.
  • the computing system being controlled may be a web based ecommerce system.
  • the present invention provides a system for controlling the operation of a computing system arranged to interact with other entities, the system including: monitoring means for monitoring at least some interactions of the computing system; determining means for determining whether the interactions meets predetermined conditions; and saving means for saving data relating to recent interactions of the computing system if at least one of the pre-determined conditions are not met.
  • the monitoring means may further include interacting means for periodically making dummy interactions with the computing system, the dummy interactions mimicking those usually carried out between the computing system and another entity.
  • the interacting means may use data arising from previous interactions of the computing system as the basis for formulating the dummy interactions.
  • the interacting means uses the saved data as the basis for formulating the dummy interactions.
  • the interacting means may be arranged to formulate a plurality of dummy interactions from saved data relating to a single interaction, and in each of the formulated dummy interactions, at least one element of the data is varied.
  • the system may further include correcting means for taking corrective action to modify the operation of the computing system if the predetermined conditions are not met .
  • the interacting means may be arranged to repeatedly make that dummy interaction until the pre-determined conditions are met.
  • the monitoring means may be further arranged to monitor the progress of real interactions made between the computing system and another entity.
  • the interaction means may be arranged to formulate and make a dummy interaction based on the real interaction.
  • the pre-determined conditions may relate to the content or timing of data sent or received by the computing system.
  • the pre-determined conditions may include the presence within the data of a particular element of data that must fall within a pre-determined range of values.
  • the particular element of data may be a particular value .
  • the determining means may further be arranged to disregard some of the data.
  • the system may be for controlling the operation of a web based ecommerce system.
  • the present invention provides a method of controlling the operation of a computing system arranged to interact with other entities, the method including the steps of: monitoring the interactions of the computing system and determining whether they meet pre- determined conditions; and if the pre-determined conditions are not met, taking corrective action to modify the operation of the computing system.
  • the present invention provides a computer program arranged to instruct a computing system to conduct a method according to either the first or third aspects of the invention.
  • the present invention provides a computer program arranged to instruct a computing system to operate as a system according to the second aspect of the invention.
  • the present invention provides a computer readable medium including a computer program according to the fifth aspect of the invention.
  • Figure 1 is a schematic view of an embodiment of a system for controlling the operation of a computing system according to the present invention.
  • a system 10 for monitoring the operation of a computing system in the form of e-commerce web-farm 13 that is arranged to interact with other entities in the form of web site users (not shown) who each interact with an e-commerce web-site hosted by web-farm 13 by way of a personal computer over an internet connection.
  • System 10 is made up of two web servers 11, 12 each provided with connections to the internet.
  • System 10 includes monitoring means and determining means in this example being in the form of Server 14 and Analyser 15 which both monitor interactions of computing system 13 and determine whether they meet pre-determined conditions.
  • the system includes saving means in this example being in the form of Savers 16 which are arranged to save data relating to interactions of computing system 13 in Saver Data Store 26.
  • Analyser 15 periodically analyses the data saved in Saver Data Store 26 and if at least one pre- determined condition is not met, it operates to take corrective action and/or to save the data.
  • the Server Data Store 26 is periodically flushed of data that is no longer needed to be retained.
  • Server 14 further includes interacting means embodied in software and hardware which periodically makes dummy interactions with web-farm 13. The dummy interactions mimic those usually carried out by the end users.
  • Analyser 15 includes correcting means embodied in software and hardware which can take corrective action to modify the operation of web-farm 13 if at least one of the pre-determined conditions are not met by applying one or more remedial templates 17.
  • the system 10 will hereinafter be referred to as an Application Safety Net.
  • the aims of the Application Safety Net in this embodiment are:
  • the Application Safety Net includes components inside and outside a firewall 18 behind which web-farm 13 sits.
  • the components are designed to run standalone or together depending on the requirements of the operator of web-farm 13.
  • Application Safety Net Framework The operational framework defines how the individual components of the Application Safety Net system combine to become a comprehensive application monitoring system, that is, both reactive and proactive, when failure (usability or technical) occurs 24 hours a day. There are seven components that combine to form the Application Safety Net Framework:
  • Scripter 20 is a GUI tool. Scripter 20 records the navigation and actions performed on the site. Simple scripts can be recorded with no real understanding of how the application being monitored works.
  • scripter 20 As a user surfs through a site or application, scripter 20 records their actions and the source returned to the browser. This process generates the following:
  • Test Data document contains sample test data to be used for the script Scripter 20 uses the Internet Explorer Object Model to request and stream http requests to and from the Scripter software. Session state is maintained, all header, get and post data is recorded. All scripted information, including the users instructions, is recorded in a number of documents.
  • scripter 20 uses these tags to be as definite or general about how to determine if a page response is correct. It also provides the ability to easily upgrade scripter 20 to incorporate new tests and functionality without compromising existing templates.
  • the script meta-data is an XML document, which maps out a script at both the transactional and page level .
  • the transactional level mapping is a way of defining the path through an application at the business transaction level.
  • Scripter 20 identifies which steps of the script represent key steps in a business transaction. This includes critical points in the process that a customer must reach before they can be considered as completing a successful transaction.
  • the Script meta-data defines: • Description of Transaction Step
  • Test Data The test data XML document is used by server 14 to determine what data to apply to the script . In its ⁇ simplest form it contains the exact data that the user entered into all input fields, but it can be configured to select test data from a "database" of test values.
  • Server 14 's main function is to detect problems in an application before a user does by repeatedly simulating an end user.
  • Server 14 runs outside the firewall. It acts like an internet end user surfing the internet and confirms that the pages returned to the browser are the same as the pages recorded in scripter 20.
  • the scripts run are those recorded in scripter 20, the rules used to determine if a page has been returned correctly are defined in the comparison templates generated by scripter 20.
  • Server 14 is a non-intrusive component; it runs completely outside an organization's infrastructure. This method of monitoring has been found by the inventors to be a very successful method of finding and detecting application failure.
  • Server 14 uses the scripts generated by scripter 20. It uses the same architecture as scripter 20 to run scripts and uses the instructions embedded in the script meta-data file and comparison templates to confirm the results. The results are submitted to reporter 24.
  • Server 14 can be set up to always try the same test data or to select from a database of test values, or to randomly select values within a specified range.
  • Server 14 is a Web Service and uses this technology to communicate with the other components .
  • Web Services use XML over the HTTP protocol to allow communication of distributed components over the internet. This allows the components to exchange data over a secure environment. For example, server 14 could pass analyser 15 a request informing it that a script has failed.
  • Saver 16 is a plug-in for a server to enhance its logging ability. Saver 16 can also be configured to perform actions as instructed by a remedial template 17. For example, it can be instructed to redirect to a different page for a given request, this could be a friendly "Site is down" splash page or a different URL.
  • Saver 16 is custom written for each type of application or web server it is required to run on, but the basic architecture does not change.
  • a desirable design requirement for these plug-ins is that they should have a minimal performance overhead and any failure in the plug-in should not cause server 14 to fail.
  • the plug-in is an IIS ISAPI filter 16. These are written to run on the Microsoft Internet Information Server.
  • the filter obtains the list of requests to log from a file supplied by analyser 15.
  • saver 16 When a request is sent to the server that saver 16 is logging then the details are posted to a message queue. A service on the other end of the queue will pick up any messages and put them in the Saver Data Store 26.
  • This asynchronous approach to logging ensures the system is robust and does not impact the web server. In a web farm a number web servers can all log to a single data storage area.
  • Transaction Metadata an xml document detailing which requests to log and details on how session and form data is transmitted.
  • ANALYSER Analyser 15 main function is to keep an eye on actual users currently using an application to check that they are able to use the application successfully. It does this by various means including: (a) comparing the requests the customer makes to the web server and confirming that the customer is reaching critical points in the application within a defined time limit. These critical points and time limits are mapped out during the scripting process. (b) Examining user data input for validity. (c) Examining the paths taken through the application for validity, (d) Examining the data input for values that may invoke other exception conditions in the application. "(e) Various other conditions.
  • Analyser 15 analyses the data logged by saver 16 and takes appropriate actions. This part of the system runs on a standalone server to minimize any impact on the installation.
  • Analyser 15 consists of 3 basic components
  • the Listener - A service continually running analyzing the data in the data store . Based on the rules established by the meta-data, 17 when the listener detects a problem or the cessation of a problem, it informs the Rules Based System (see below) .
  • Rules Based System - A program that determines which remedial templates to activate or deactivate based on conditions observed by the Listener.
  • Web Service Gateway A component that allows communication with external components (Server) .
  • the meta-data provided by scripter 20 gives analyser 15 detailed information on how customers should progress through an application and allows the Analyser to intelligently analyse live activity.
  • Remedial templates 17 define actions to take when instructed by the Analyser 15. When a problem is encountered in an application either by server 14 or analyser 15, a range of remedial actions can be taken.
  • the simplest form of action would be to alert an administrator about the problem, this action is appropriate for problems that are not considered critical or for systems that require human intervention to confirm the exact nature of the problem before taking action.
  • More complex forms of action can include automatically diverting customers to an apology page, or even redirecting customers around a problem area.
  • Remedial templates 17 are xml documents containing detailed machine readable instructions on what actions to take when a system fails.
  • the Analyser determines that an interaction between a user and the system does not satisfy the pre-determined conditions then it can re-submit the interactions making up the transaction up to the point just before the offending interaction.
  • a customer service representative can be activated to make contact with the user whilst the transaction is still occurring, to guide the user through the rest of the transaction.
  • the Alert 22 component performs the action of actually letting someone know when a problem is found. This can range from a simple email to an administrator through to detailed rules for sending various information to different stakeholders and also escalation procedures.
  • the Alert 22 component informs people of problems using a number of mechanisms including:
  • This component includes a comprehensive system notification and escalation system. 7) REPORTER 24
  • Reporter 24 is the central location for viewing and maintaining the following information:
  • Reporter 24 is an ASP.NET web site. It can be hosted on its own server. Like the other components its structure is based on the scripts generated by scripter 20.
  • Reporter 24 also uses Web Service technology to communicate with the other tools. Reporter 24 presents its information in real time, that is, as soon as one of the components completes its processing it sends its messages to reporter 24 ensuring the reporter 24 is displaying up to the minute information.
  • reporter 24 gives the administrator live information on how the site is being used and has been used from a business transaction viewpoint. This includes details on failed and incomplete transactions.
  • server 14 and Analyser When both server 14 and Analyser are implemented, they are set up to work in tandem. Because both server 14 and Analyser are Web Services they can communicate and exchange information. This cross-communication includes:
  • scripter 20 can define complex rules to determine if the application is performing correctly.
  • the scripts used by the system can be updated from time to time to allow for developmental changes to the application being monitored.
  • server 14 can instruct analyser 15 of the problem and analyser 15 can analyse the logs to determine if other users are having a similar problem. Or analyser 15 can be configured to alert someone every time a real user encounters the same problem.
  • Remedial Templates 17 can also be activated or updated either by an administrator or automatically.
  • Verifying Failures Externally Web applications are "stateless", ie. You cannot be certain whether the customer has encountered a genuine failure or has simply "walked away" from the application.
  • analyser 15 When analyser 15 detects a user who has failed to complete a path through an application it can instruct server 14 to take the same path through the application. It can also optionally instruct server 14 to use all or part of the actual data the customer entered. Although it is not possible to be 100% certain that the user has not walked away from the application, a much higher degree of certainty is provided.
  • server 14 can be instructed to sleep for a defined period and then check for an email, or log back on to the site to check progress.
  • the rules for matching an initial order with subsequent "checks for progress" by a customer are defined to the analyser 15 so it can confirm that customers are getting notified and logging on to confirm orders within a defined time limit .
  • server 14 and analyser 15 are both Web Services they can communicate with each other freely. Also, because they base their operation on the same scripts, they each know what the other component is interested in. The components for the Application Safety Net
  • the Application Safety Net is designed to monitor http-based applications, this typically means internet based applications. However, there are a number of existing and emerging technologies that use the http protocol to transmit information. This includes Web Services. The B2B components of many complex systems can be monitored using the Application Safety Net system. Other types of applications that the Application Safety Net can be adapted to protect include SMTP email messaging systems, mobile phone applications, extranets, intranets and Virtual Private Network-based applications.
  • the Application Safety Net system can be installed as a complete system or a customer can select individual modules. For example, a customer may require only server 14 and not analyser 15, or only analyser 15 and not server 14.
  • web-farm 13 hosts a web-site dedicated to on-line selling of DVDs.
  • the payment gateway for the application is provided by an international bank, allowing online credit card payments.
  • the gateway suddenly goes offline at 10:50am which means that customers can no longer make payment at the web-site.
  • Solution 1 Scripter 20 has been configured to perform a full test purchase on the site every 15 minutes and consequently it initiates an Alert to report a failed purchase attempt to support at 11:00am.
  • the Support Team analyses the problem and determines that the gateway is down and that urgent remedial action is needed.
  • the Support Team turns on a Remedial Template 17 to perform 3 tasks:
  • Analyser 15 compiles a report on all customers who have attempted to use the application since 10:45am (the last time a scheduled Script completed successfully) . It sends this report to the Customer Service Team, to examine each transaction and double-check whether each one completed satisfactorily.
  • scripter 20 keeps attempting the script until a purchase can successfully be completed.
  • the Remedial Template 17 is disabled and business continues as normal.
  • Problem 2 Analyser 15 reports that less than 5% of customers from Europe who put DVDs in their cart are completing the transaction and going on to pay for the items. The average for all other regions is between 40% and 50%.
  • the Support Team views a Report on completed European transactions and finds the only completed transactions are for delivery to the UK.
  • the Report shows that all other uses do not complete the process - the vast majority of these get to the delivery charges page and stop.
  • the Support Team instructs the Application Safety Net to send a simulated order for a customer in Belgium to scripter 20 to run as a test and report the results.
  • Personal data from a real Belgian order is anonymised and sent to scripter 20 which runs the Script and reports an error at the delivery charges page and returns an error on the page "SQL Server Error: No Data found at line 131".
  • the problem is passed to IT Support to investigate.
  • the Transaction Saver generates a report of European customers who got to that page in the last week but did not progress. This is sent to Customer Service Team to manage, in order to contact the intending customers and attempt to complete the transactions.
  • a Remedial Template 17 can simply be set up to redirect all orders for the new release to an apology page. This redirection can be instigated automatically whenever the warehousing operation notifies an out-of- stock condition for a specified DVD. Scripter 20 can be set-up to test for stock status on every item, at periodic intervals. In this situation, the Remedial Templates 17 can pre-empt the user reaching an apology page, and instead propose alternates from the same artist, or the same genre, or alternately automatically post an offer of a discount if the customer is prepared to wait for back-orders to be shipped.
  • the application allows customers to view sample preview videos that are "streamed in” from some of the movie studios (ie served live from the movie studios) . These sometimes go offline.
  • Scripter 20 is set to check the existence of the movies at periodic test intervals. If they are found to be offline it instructs the Remedial Template to display a "Movie Offline" page for that movie. This Remedial Template is turned on with no Support Team intervention required.
  • IT Support investigates and realizes that corporate customers can purchase without entering credit card info: they simply get sent an invoice at the end of the month. The original testers had overlooked this, but analyser 15 has discovered the new valid path through the system. IT Support instructs the Transaction Analyser to include this new path as a valid Script to both analyse, monitor and run periodic external tests .
  • the computing system being controlled was a web-farm hosting an e-commerce website.
  • the invention is not limited to this application and the controlled computing system could similarly include :
  • a mobile device such as a laptop, PDA or mobile telephone
  • the entities interacting with the computer system in the above described preferred embodiment were people operating personal computers.
  • the other entities could be any of: • Another computing system running under control of a program, such as automated market trading applications
  • methods and apparatus of the present invention may be implemented by software applications, or partly implemented by software, then they may take the form of program code stored or available from computer readable media, such as CD-ROMS or any other machine readable media, the program code comprising instructions which, when loaded onto a machine such as a computer, the machine then becomes an apparatus for carrying out the invention.
  • the computer readable media may include transmission media, such as cabling, fibre optics or any other form of transmission media. It will also be appreciated that, where methods and apparatus of the present invention are implemented by computing systems, or partly implemented by computing systems, then any appropriate computing system architecture may be utilised. This will include standalone computers, networked computers, and dedicated computing devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

L'invention porte sur un procédé de commande d'un système informatique agencé de façon à avoir une interaction avec d'autres entités, ce procédé consistant à surveiller les interactions du système informatique et à déterminer si elles répondent à des conditions prédéfinies et à sauvegarder des données relatives à au moins une interaction récente du système informatique dans le cas où au moins une des conditions prédéfinies n'est pas respectée.
PCT/AU2005/000288 2004-03-01 2005-03-01 Procede de commande d'un systeme informatique agence de façon a avoir une interaction avec d'autres entites WO2005083571A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2004901043 2004-03-01
AU2004901043A AU2004901043A0 (en) 2004-03-01 A method of controlling the operation of a computing system arranged to interact with other entities

Publications (1)

Publication Number Publication Date
WO2005083571A1 true WO2005083571A1 (fr) 2005-09-09

Family

ID=34891655

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2005/000288 WO2005083571A1 (fr) 2004-03-01 2005-03-01 Procede de commande d'un systeme informatique agence de façon a avoir une interaction avec d'autres entites

Country Status (1)

Country Link
WO (1) WO2005083571A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009068642A1 (fr) * 2007-11-30 2009-06-04 International Business Machines Corporation Procédé pour utiliser des transactions synthétiques programmées de façon dynamique pour surveiller la performance et la disponibilité de systèmes d'affaires électroniques (e-business)
US10291488B1 (en) * 2012-09-27 2019-05-14 EMC IP Holding Company LLC Workload management in multi cloud environment
US10815576B2 (en) 2013-11-20 2020-10-27 University Of Florida Research Foundation, Incorporated Carbon dioxide reduction over carbon-containing materials

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001027849A2 (fr) * 1999-10-13 2001-04-19 Troba, Inc. Gestion d'achats en ligne : modeles des taches
US20010033294A1 (en) * 2000-03-13 2001-10-25 Arlyn Asch Method and system for website maintenance
US6564342B2 (en) * 1999-09-01 2003-05-13 Mercury Interactive Corp Post-deployment monitoring of server performance
US20030115266A1 (en) * 1998-09-30 2003-06-19 Netscout Service Level Corp. Evaluating computer resources
US20030115121A1 (en) * 1999-04-07 2003-06-19 Neil Bremner Method, signal, system, software and user interface for increasing the effectiveness of a supply and demand driven network site
US20030191989A1 (en) * 2002-04-04 2003-10-09 O'sullivan Patrick Charles Methods, systems and computer program products for triggered data collection and correlation of status and/or state in distributed data processing systems
US20030195961A1 (en) * 2002-04-11 2003-10-16 International Business Machines Corporation End to end component mapping and problem - solving in a network environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030115266A1 (en) * 1998-09-30 2003-06-19 Netscout Service Level Corp. Evaluating computer resources
US20030115121A1 (en) * 1999-04-07 2003-06-19 Neil Bremner Method, signal, system, software and user interface for increasing the effectiveness of a supply and demand driven network site
US6564342B2 (en) * 1999-09-01 2003-05-13 Mercury Interactive Corp Post-deployment monitoring of server performance
WO2001027849A2 (fr) * 1999-10-13 2001-04-19 Troba, Inc. Gestion d'achats en ligne : modeles des taches
US20010033294A1 (en) * 2000-03-13 2001-10-25 Arlyn Asch Method and system for website maintenance
US20030191989A1 (en) * 2002-04-04 2003-10-09 O'sullivan Patrick Charles Methods, systems and computer program products for triggered data collection and correlation of status and/or state in distributed data processing systems
US20030195961A1 (en) * 2002-04-11 2003-10-16 International Business Machines Corporation End to end component mapping and problem - solving in a network environment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009068642A1 (fr) * 2007-11-30 2009-06-04 International Business Machines Corporation Procédé pour utiliser des transactions synthétiques programmées de façon dynamique pour surveiller la performance et la disponibilité de systèmes d'affaires électroniques (e-business)
US8326971B2 (en) 2007-11-30 2012-12-04 International Business Machines Corporation Method for using dynamically scheduled synthetic transactions to monitor performance and availability of E-business systems
US10291488B1 (en) * 2012-09-27 2019-05-14 EMC IP Holding Company LLC Workload management in multi cloud environment
US10815576B2 (en) 2013-11-20 2020-10-27 University Of Florida Research Foundation, Incorporated Carbon dioxide reduction over carbon-containing materials

Similar Documents

Publication Publication Date Title
US10007512B2 (en) Bug clearing house
US8688491B1 (en) Testing and error reporting for on-demand software based marketing and sales
US7797200B2 (en) Methods, systems, and computer program products for providing website management services
US8402525B1 (en) Web services security system and method
CN100356321C (zh) 编程生成合成事务以监视web应用的性能和可用性的方法和系统
US20150213282A1 (en) Online Privacy Management System with Enhanced Automatic Information Detection
US8135610B1 (en) System and method for collecting and processing real-time events in a heterogeneous system environment
US20070061421A1 (en) System and method for performing follow up based on user interactions
US20090043669A1 (en) Systems and methods for collaborative federation of support
US11610182B2 (en) System and method for electronic lead verification
US9800615B2 (en) Real-time security monitoring using cross-channel event processor
US20090043882A1 (en) Systems and methods for consolidated service level agreements
JP4933218B2 (ja) リモートアクセス制御装置
US8543647B2 (en) Automated customer incident report management in a social networking system
JP2008117009A (ja) リモートアクセス制御装置
US9626647B2 (en) Providing a contact service
US20170012837A1 (en) Transaction Identification in a Network Environment
US7954062B2 (en) Application status board mitigation system and method
US11379776B2 (en) System and method for validating data
WO2005083571A1 (fr) Procede de commande d'un systeme informatique agence de façon a avoir une interaction avec d'autres entites
US20050261929A1 (en) Method, apparatus and article for tracking and/or rewarding third parties within a networked commercial environment
WO2001027787A1 (fr) Systeme de controle d'evenements et de reponse en boucle fermee
TWI831072B (zh) 開源軟體風險評鑑與智能監控系統及方法
Baldwin Tech Support By Remote Control
Yoshizawa et al. Design and evaluation of integrated monitoring software for SaaS-based systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC EPO FORM 1205A DATED 22.01.07

122 Ep: pct application non-entry in european phase