Abstract: A computerized method for storing a representation of at least one application in a computerized organization, the method comprising determining a structure of at least one application in a computerized organization; and using a processor for generating, and storing, a skeleton characterization of the structure of the application including storing information, characterizing at least one applicative component identified, that is considered stable over time and not storing information, characterizing at least one applicative component identified, that is considered unstable over time.
Abstract: Systems, apparatuses, and methods for classification based automated instance management are disclosed. Classification based automated instance management may include automatically commissioning an application instance based on a plurality of classification metrics, and automatically monitoring the application instance based on the plurality of classification metrics. Automatically monitoring the application instance may include identifying a plurality of instance monitoring policies associated with the application instance based on the plurality of classification metrics. Automatically monitoring the application instance may include automatically suspending the application instance plurality of instance monitoring policies and automatically decommissioning the application based on the plurality of instance monitoring policies.
Type:
Grant
Filed:
December 30, 2015
Date of Patent:
February 21, 2017
Assignee:
ServiceNow, Inc.
Inventors:
Mohan Thimmappa, Abbas Guvenilir, Maalika Tadinada
Abstract: A computerized system and method for generating an application structure for an application in a computerized organization having a plurality of components. An implementation includes generating the application structure for the application by including, in the application structure, applicative components and connections between applicative components identified using a first entry point. In an implementation, the identification of the applicative components and the connections between applicative components includes applying a first set of patterns against a first component associated with the first entry point to identify a first applicative component of the applicative components and a first connection of the connections, the first connection including a second entry point. The applicative components and the connections between applicative components can be recursively identified.
Abstract: A failure resistant distributed computing system includes primary and secondary datacenters each comprising a plurality of computerized servers. A control center selects orchestrations from a predefined list and transmits the orchestrations to the datacenters. Transmitted orchestrations include less than all machine-readable actions necessary to execute the orchestrations. The datacenters execute each received orchestration by referencing a full set of actions corresponding to the received orchestration as previously stored or programmed into the computerized server and executing the referenced full set of actions. At least one of the orchestrations comprises a failover operation from the primary datacenter to the secondary datacenter.
Abstract: Implementations of a system, method and apparatus described herein execute a discovery process to identify a plurality of computing devices within a computer network and a respective configuration associated with each of the plurality of computing devices. Upon discovery of a first computing device configured by an agent, configuration management of the computer network is searched for a definition used by the agent to configure the first computing device, and the discovery process for the first computing device is modified based on the definition to identify a first plurality of configuration items associated with a current configuration of the first computing device. Finally, a service model database is updated with the first plurality of configuration items.
Abstract: A distributed backup method includes defining a server group having a plurality of server computers, and providing each server computer with an identical backup policy and an identical storage policy. The method also includes transmitting, at each server computer of the server group to every other server computer of the server group, advertisement messages describing available storage space for storing backups, and receiving, at each server computer from the server, at least some of the advertisement messages. The method also includes identifying, at a first server computer using the backup policy, at least a first service to be backed up, selecting a second server computer using the received advertisement messages, transmitting, from the first server computer to the second server computer, a backup including information corresponding to the at least one service, and storing the backup, by the second server computer using the storage policy.
Type:
Grant
Filed:
October 31, 2014
Date of Patent:
December 6, 2016
Assignee:
ServiceNow, Inc.
Inventors:
Josiah Sullivan, Jeremy Norris, Vincent Seguin, Joe Davis, Siddharth Shah
Abstract: In a distributed computing system, cloning operations determine when each of multiple backup database instances most recently experienced an update. If a most recently updated backup database instance was updated within a prescribed time period of one or more other backup database instances, a source instance for cloning is deemed to be one of these database instances satisfying a prescribed proximity criteria relative to a designated database instance. If a difference in update times is greater than the prescribed time period for the two most recent backup database instances, the source instance for cloning is deemed to be the most recently updated backup database instance. The control center conducts cloning to a target instance using the selected backup database instance as a source instance.
Type:
Grant
Filed:
January 12, 2016
Date of Patent:
October 4, 2016
Assignee:
ServiceNow, Inc.
Inventors:
Paul Wang, Xiaoyi Ye, Xuejia Lu, Sridhar Chandrashekar
Abstract: A method, system and apparatus for estimating an SLA breach value. The method can include processing resource data to identify an acceptable SLA breach value; and, displaying the acceptable SLA breach value through a user interface. The processing step can include identifying a best practices SLA breach value based upon resource data for an aggregation of customers. Alternatively, the processing step can include identifying an average SLA breach value for a specific customer. As a further alternative, the identifying step can include identifying an average SLA breach value for a specific customer for a specific resource. As yet a further alternative, the processing step can include identifying an SLA breach value trend based upon past measured historical systems management data; and, predicting a future SLA breach value based upon the trend. In all cases, the acceptable SLA breach value can be increased by a fixed proportion.
Type:
Grant
Filed:
July 7, 2014
Date of Patent:
September 13, 2016
Assignee:
ServiceNow, Inc.
Inventors:
Joshua S. Allen, Bryan M. Ellington, Bradford A. Fisher, Robert L. Nielsen, Jacob E. Yackenovich
Abstract: An auditing system is disclosed comprising a Policy Validation Mechanism Program (PVMP) that operates in conjunction with a Workflow Engine (WE), and a Policy Validation Server Program (PVSP) that operates on a Policy Validation Server (PVS) connected to the WE by a secure communication link. The PVMP converts a workflow to a workflow representation (WR) and sends the WR to the PVS. The PVSP compares the steps in the WR to a security policy identified for that WR and determines whether the WR is in compliance. In addition, the PVSP validates a checksum for the WR and logs the checksum for subsequent comparisons. The PVSP uses the checksum to determine whether a policy has changed during execution of the workflow.
Type:
Grant
Filed:
May 23, 2012
Date of Patent:
September 13, 2016
Assignee:
ServiceNow, Inc.
Inventors:
Rhonda L. Childress, Edmond Chow, David Bruce Kumhyr, Stephen James Watt
Abstract: Systems and methods for skeleton-based discovery of an application in a computer network are provided. An implementation of the system includes a processor configured to generate a template for an application topology of the application based on a structure determined by an initial discovery, modify the template during a traversing of the template, and generate a display of the template indicating states of the application according to the impact rules. The application topology is multi-tiered and includes nodes associated with elements of the application and dependencies between the nodes. The states include at least one of an actual state or a scenario state.
Abstract: A computerized method for determining a structure of at least one application in a computerized organization, the method comprising receiving at least one entry point including an identification of a virtual location on a computer network; for each entry point, receiving a determination of an individual applicative component that processes data arriving through that entry point; identifying at least some communicating entry points through which the first applicative component communicates with additional applicative components; and for each of the at least some communicating entry points, using a processor for determining the applicative component that processes data arriving through that communicating entry point; and providing at least a portion of a structure including: applicative components associated with the application and information with regard to which of the applicative component communicates with which.