Technology

 

First off, Open Loop vs Closed Loop Automation - What is the Difference?

We make closed-loop automation software. The following video explains the difference between open (all current automation) and closed loop automation.

Definition: Open-loop automation is when an infrastructure is provisioned, deployed, and maintained without necessarily receiving feedback; and if feedback is received, an Open-loop will not take action on it, instead, it will require a human to look into it and take action; i.e. the loop is not only open, but it also REQUIRES HUMAN INTERVENTION to succeed. Closed-loop hyper automation, on the other hand, is when feedback is received and is taken into account for further action to be taken automatically by the controller WITHOUT ANY HUMAN INTERVENTION (other than the initial design of the automation logic itself, but not the task the said logic automates).


R-able Closed-Loop Automation Modules, Versions & Core Features

(Click on the table to expand)

Blazing Speed

People eat, sleep, vacation and sometimes ask for a raise. Our hyper-automation software is different. Automation doesn't understand the concept of "good enough" and it honestly thinks 9-5 are just random numbers. Everything it does, it will result in the best possible outcome. What does that mean to the IT manager? Imagine a year long project completing in a month. > Click

> Click to collapse


Lets see how automation may affect the speed of a long-running project. Can you guess which Data Center Migration project was automated and which was not?

 

Low Cost

You don't have to hire a team of professionals to routinely manually manage resource provisioning, configuration, troubleshooting, hardware setup, and so on. Automation saves time and money. How much money? Click to see just on example of what our software can do. > Click

> Click to collapse


If you are an Oracle DBA / Manager you know how important it is to test and apply patches. The following shows a metrics comparison score card for automating the process. It only assumes you apply the quarterly patches to a fleet of 1,000 database servers. Note the quality score and the yearly cost comparison.

.

The autopatching feature is just one part of what our software can automate.


High Quality

People commit mistakes. That's a fact. No matter much effort your team puts in, they are bound to make errors, several of them, in fact. In the case of Closed-Loop Automation, the definition files are a single source of truth. There is just always one file in one place. There's never any confusion about what they do. You execute them repeatedly and get predictable results every time. > Click

> Click to collapse


Now, lets compare the quality. Unlike a conventional DBA issue resolution, the closed-loop hyperautomated solution takes advantage of the SNOW/Ansible API. The DBA doesn’t get pages in the middle of the night for TBs out-of-space alerts anymore. Ansible resolves the error automatically, according to Oracles best practices, in seconds. It also checks all the SAN or ASM space, makes the capacity planning decisions and even orders new disks and checks on the status of previous requests. The only notifications we get is for the DBA manager, who may get an occasional alert only if a disk provisioning was not done by another team). The example below is for just one feature, Oracle tablespace issues resolution. There are two screenshots. Which will result in a better outcome for the business as a whole - the one step logic, or the automated one, with the Oracles Best Practices already embedded?

High Resilience

Resource provisioning and configuration is often a labor-intensive and skill-intensive task, usually handled by higly paid and skilled resources. When one or more of them leaves the organization, they take their knowledge with them. Not only that, the years of training you've invested in the person will now benefit your competition from now on. With hyper-automation, resource provisioning intelligence remains with the organization in the form of definition files. > Click

> Click to collapse


What used to be physical (servers) is now just definition code that explains to the Cloud what it is. You owe it to yourself to protect your investment. With hyper-automation, the task definitions and automation workflows never leave your repository. The administrators don't even see the low level code, which runs by itself when ServiceNow requires it.


Accountability

There is never any pointing fingers at each other with our software. When you need to trace changes to definition files, you can do it with ease. They are versioned, and therefore all changes are recorded for your review at a later point. So, once again, there's never any confusion on which module did what, when, where and for what ticket. > Click

> Click to collapse


There is no need to enter any ServiceNow task or incident information before or after an administrator did his/her job because it is the ticketing system that initiated the work in the first place.

Infinite Scalability

The load a current DBA team carries can be increased by 5%-10%. If you want more, you have to hire more DBAs. With a Closed-Loop implementation, you may increase your workload exponentially, before you even start considering a Control Node upgrade. > Click

> Click to collapse


A conventional administrator may withstand a 10%-20% workload increase for a short period only (a few days, not more than that). Try to double the load and our happy DBA will turn into a helpless mess in less than a week. It isnt just the compensation issue. Even if you put a million bucks in front of a person, after a short period human nature always takes over.

:

 

Our closed-loop automation software will do an equally brilliant job whether it simultaneously works on one server or a thousand of them at the same time. Here is the difference between the two runs, just the lines marked in red. Now, imagine you have to hire a thousand database administrators on your payroll. With us, you won't ever have to!


Secure Encryption

We use the AES256 symmetric encryption algorithm for securing all sensitive passwords, variables, secrets, API keys and other credentials in our Vault, preventing them from being exposed in plain text even once. > Click

> Click to collapse


What is the best way of ensuring your mission critical passwords are never distributed to unathorized personnel? The answer is obvious. Do not distribute to any personnel at all. Let the robots take care of the encryption.


 

Technical Description and Intellectual Property

(click to expand/collapse)

PATENT: REUSABLE AUTOMATION MODULES FOR CONFIGURATION CHANGES OF IT ASSETS


Application # 63/856,135


USPTO Receipt

COOPERATIVE PATENT CLASSIFICATION (CPC): G06F9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
G PHYSICS
G06 COMPUTING; CALCULATING OR COUNTING
G06F ELECTRIC DIGITAL DATA PROCESSING

Int. C. : G06F 15/16 (2006.01) H04L 2/24 (2006.01) H04L 12/26 (2006.01) HO4L 12/28 (2006.01) HO4L 12/58 2006.01) HO4L 29/06 (2006.01)
U.S. C.: H04L 12/24 (2013.01); H04L 12/2602 (2013.01); H04L 12/2801 (2013.01); H04L 41/00 (2013.01); H04L 41/046 (2013.01); H04L 41/048 (2013.01); H04L 41/0654 (2013.01); H04L 41/0813 (2013.01); H04L 41/082 (2013.01); H04L 41/0803 (2013.01); H04L 41/0806 (2013.01); H04L 51/00 (2013.01); H04L 51/04 (2013.01); H04L 51/046 (2013.01); H04L 65/40 (2013.01); H04L 65/403 (2013.01)
USPC.: 709/223; 709/201; 709/202; 709/203; 709/205; 709/206; 709/217; 709/218; 709/219; 709/224; 709/225; 709/227; 705/305; 705/30; 705/32; 705/7.13; 705/7.14; 705/7.16; 718/100; 718/102
FIELD OF THE INVENTION: This invention relates generally to information technology (IT) systems, and more specifically to systems and methods for automating and deploying IT solutions.

ABSTRACT

A system and methods for automating the provisioning, administration and maintenance of information technology (IT) assets within an enterprise is described. The method comprises the fixed steps of once defining a configuration change within the IT ticketing system and identifying the necessary tasks to enable the change; as well as the repeating dynamic steps of assigning the tasks their specific variables at run time, and then executing the resulting output scripts, and closing the main configuration change ticket. The method allows round the clock, vendor-agnostic unattended execution of changes in disparate systems, spanning multiple IT departments in real-time.

BACKGROUND OF THE INVENTION

The role of the ticketing systems has changed over time. Originally, in the physical on-premises world, the purpose of the helpdesk was three fold: making sure the ticket is approved by the rightful asset owner; then routing the work item to the correctly privileged team in full possession of the necessary technical knowledge; and finally, there is a record of the configuration change preserved in the ticket after it has been closed.  The process worked as follows. A user would open a change request, for example to refresh a database from another. The ticket then would be routed to the database administration team. The management would approve the request and assign it to a person. The DBA then would schedule and execute the configuration change, upload the output logs and close the change request. In the physical world the Helpdesk was a digital switchboard, a place for a user to raise an incident, or for the IT professional to resolve it.
With the advent of the cloud, the paradigm shifted.  The physical server became a snippet of JSON definition code. The administrator also became obsolete.  The technical knowledge was replaced by automated decision workflows.  The Cloud afforded us the opportunity for automating long running business processes spanning multiple departments or even companies. For example, a Cloud automation service that allows a company to create workflows as visual diagrams and coordinate multiple cross-Clouds services. Such Cloud automation is well-suited for long-running workflows with complex logic, error handling, and parallel executions of serverless applications, requiring close integration with the Cloud services.
The following outlines such challenges for the enterprise automation.

INFLEXIBILITY OF CURRENT AUTOMATION OFFERINGS

Slow, Compartmentalized, Single-Use Automation: It takes months or even years to properly automate a process (new versions come out, new requirements are raised, new API’s tested, etc.) When such a process is successfully automated, the effort and the code are rarely reused by other departments or business units. That means when it is time to automate the following application or business process, the enterprise automation department has to start from scratch. The ROI from the current automation offerings by the Cloud vendors may be described as “too little, too late and for too few”.

SKILL GAP

Lack of Expertise: Organizations struggle to find qualified cloud automation and DevOps engineers, delaying initiatives and leading to potential security vulnerabilities.
Rapid Evolution of Technology: Cloud technologies change quickly, making it challenging for professionals to stay updated and adapt to new tools and practices.

MULTI-CLOUD AND HYBRID COMPLEXITY

Unified Management: Managing and governing infrastructure, data, and applications across various cloud platforms (multi-cloud) and environments (hybrid cloud) remains a significant hurdle.
Integration Challenges: Integrating automation tools across different cloud providers, each with its unique APIs and frameworks, can be complex and time-consuming.
Lack of Standardization: Multi-cloud environments often result in disparate configurations, creating inconsistencies and security gaps.

SECURITY AND COMPLIANCE CHALLENGES

Attack Surface Expansion: Cloud environments expand the attack surface, requiring more robust security measures and automation for detection and response.
Misconfigurations and Human Error: Cloud infrastructure misconfigurations are a common cause of data breaches, highlighting the need for automated remediation and proactive monitoring.
Lack of Visibility: Limited visibility into cloud infrastructure and application behavior makes it difficult to detect and respond to threats in real time.
Regulatory Compliance: Ensuring compliance with data privacy regulations (e.g., GDPR, HIPAA) across complex cloud environments presents a significant challenge.

COST OPTIMIZATION

Cloud Waste: Identifying and eliminating unused or underutilized cloud resources is crucial to control costs and maximize the return on investment.
Dynamic Cloud Pricing: Fluctuations in cloud pricing and service options require continuous monitoring and adjustments to optimize costs effectively.

AUTOMATION WORKFLOW MANAGEMENT

Current Automation Software Inflexibility: All pre-packaged software or Cloud services need time to become fully integrated into an enterprise’s current platform.
Lack of Internal Standards: Before a process may be automated, it has to follow certain internal conventions; their absence prolongs the automation project or makes it impossible. It is of paramount importance to develop and adopt standardized processes and best practices for building, deploying, and managing automation workflows.
Complex Workflows: Designing and managing complex automation workflows with multiple steps and dependencies can be challenging, especially in multi-cloud environments.
Monitoring and Observability: Gaining comprehensive insights into the behavior and performance of automated systems requires robust monitoring and observability tools and strategies.

Without a doubt, in the context of the Cloud, automation plays a big role. However, while the services automate a large portion of traditional IT tasks, they don't entirely eliminate the need for technical expertise. Instead, they shift the focus of the administrator’s role from routine low level operational tasks to higher-level architectural decisions, performance optimization, and data governance. That is a business side of the IT industry that may not be appealing to the former on-prem DBA, and even if it is, it takes years to begin to understand that side of the IT business and decades to master it. Also, the Cloud DBA is expected to be very diverse in his/her knowledge, sometimes unreasonably so. After all, such complex automated workflows rarely include just one database vendor or service. There are hundreds of them now, all mutate and change every day, and a Cloud professional is actually expected to be an expert in all. The second factor that presents a significant challenge for the enterprise automation is its cost. Even if a company hired a small team of top notch DevOps professionals that worked exclusively on automating one business process, such an automation effort would require months or even years to document and code. All other work will have to be put on hold while that happens. A smaller company may not have enough time and resources for such a long running and expensive undertaking. A larger enterprise suffers as well, as almost none of the automation efforts are reusable. That implies an automation effort for one project or department is almost never reused by another. Consequently, the smaller companies can’t even afford to enter the custom enterprise automation market, while the larger enterprises are extremely inefficient at it. What is needed, therefore, are systems and methods of reducing the administrative and cost burden associated with IT tasks automation.
While there are other inventions addressing the deficiencies above, they all are too piece-meal (partial and unsystematic) and designed to aid the administrator, instead of replacing him/her entirely. Such inventions usually do not benefit the enterprise as a business entity. For example, let’s say a database team gets some new software feature that may flash a screen with suggestions prior to an execution, or verifies passwords. Will that small feature speed up major product releases or long running projects? Will it put the company as whole ahead of its competition? The answer is a resounding “no”.  It doesn’t matter how many features or shortcuts the conventional automation methods introduce. They all rely on a human being somewhere in the chain of the IT maintenance and human are not a very efficient, scalable or secure resource. The only way to automate the IT process or task delivery is to automate it end to end, from opening a service ticket to closing it. The present invention addresses such challenges.

 

BRIEF SUMMARY OF THE INVENTION

Essentially, the current invention takes advantage of the fact that in the cloud everything is code. All configuration change requests are either raised on a schedule, or requested to be run once by a user. Both of these triggers may be coded in a Cloud-readable format. Once the task is raised, the system performs all the necessary organizational and functional pre-checks, obtains valid approvals, assigns the task an automation module, which performs all the tasks in their correct sequence.  The invention consists of three resources: an existing ticketing system, an automation software unit and the actual asset, be it a service or an instance.



Pic.1. High Level Architecture, Tools and Their Purpose

Conventionally, the work item was assigned to a person.  Each such task iteration is considered entirely different in the conventional automation systems. For example, a refresh executed this quarter has a different task ID than the previous quarter. In ours, there is only one refresh, be it an Oracle database, Sybase, SQL Server or any other software. The role of the ticketing system is extended in our case. Our system stores reusable  task templates for all major time consuming, repeating, hard to control tasks and processes – upgrades, refreshes, migrations, etc. Except, in our implementation, there is no administrator. Rather, the ticketing system assigns the work to automation software instead of a person (Ansible in our implementation). The automation software contacts the Cloud to get the asset tags, then contacts the Vault to securely retrieve the passwords, fills out the Ticketing System task template with its automation logic stored in YML playbooks, runs the resulting script iterations on disparate systems the second the task was opened and approved.



Pic. 2. Example of Process Automation (A vendor-Agnostic Multi-Cloud Database Refresh)



Pic. 3. Example of Oracle Implementation of the Refresh Logic in Ansible.

Here is a PDF version of the picture above. It has a clickable explanation for each step and here is an incomplete code repository used in the demo above: https://github.com/symianarmy/oracle_database_refresh_itsm

 

DETAILED DESCRIPTION AND BEST MODE OF IMPLEMENTATION

A list of common database task modules is developed – upgrades, patching, refreshes, code migrations, custom jobs, etc. Each such task is assigned a unique identifier. So, a RFRSH_DBS means a database refresh of some sort, for example, or an UPGRD_DBS implies a database upgrade. Then for every variation of the specific task - type, vendor, Cloud, version, etc – a workflow of general automation roles is pre-written. For example, if a company uses only two vendor and two version variations of database software, all four RFRSH_DBS task automation roles have to be pre-created. Each automated refresh role is a logical answer to the question “if money were no object, what would be the most efficient possible way to execute this job? In this case, there will be one Ansible playbook called RFRSH_DBS with four roles inside, each will work with a specific asset. At run time, the Ticketing System (ServiceNow in our example) determines which task template should be filled out with what Cloud asset tags to successfully run. The system then creates specific scripts and runs them in parallel on multiple assets, need be. Essentially, the Ticketing System decides whether or not to run, what to run, when and where; the automation unit decides how to do the job efficiently, in general, by what methods, in which order; and the Cloud asset tags, or the Ticketing System, feed the run-time variables. It is Ansible automation that runs the scripts, not a person. The logs then are uploaded to the Ticketing System. There is no administrator in our implementation. The modern IT enterprise is too diverse, complex and ever-changing to efficiently maintain with people’s knowledge. In addition to opening, approving, auto-assigning and executing a specific configuration change, the system keeps track of dependencies between tasks. Such dependencies may span multiple departments or IT teams. The following describes such task dependencies.

Start to Finish (SF): is a logical relationship (or dependency) in which a finishing event of a Successor Activity is dependent on the starting event of a Predecessor Activity. Two activities L and M having SF relationship with 2 days of Lag:
M(F) = L(S) + 2 days
Finish to Start (FS): a Successor Activity cannot start until a Predecessor Activity has finished. Two activities J and K having FS relationship with 1 day of Lead:
K(F) = J(F) – 1 day
Start to Start (SS):  a successor activity cannot start until its predecessor activity has started. Two activities J and K having SS relationship with 1 day of Lead:
K(S) = J(S) – 1 day
Finish to Finish (FF):  in which a successor activity cannot finish until its predecessor activity has finished. Two activities L and M having FF relationship with 1 minute of Lag:
M(F) = L(F) + 1 minute

The budgetary, operational and functional automated pre-checks may include such business rules such as “never refresh PROD from a lower environment database”.

 

CLAIMS

The algorithms and operations presented herein are not inherently related to any particular computer or other system or apparatus. Various general-purpose systems may also be used with programs in accordance with the descriptions herein, or it may prove convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will be apparent to those of skill in the art, along with equivalent variations. In addition, embodiments of the invention are not described with reference to any particular programming language or software vendor. It is appreciated that a variety of programming languages may be used to implement the present teachings as described herein, and any references to specific languages are provided for disclosure of enablement and best mode of embodiments of the invention.
Embodiments of the invention are well suited to a wide variety of computer network systems over numerous topologies. Within this field, the configuration and management of large networks include storage devices and computers that are communicatively coupled to dissimilar computers and storage devices over a network, such as the Internet.
What is claimed is:

Pic. 4. Claims

REDACTED

PRIOR ART

 

1. System and method for supporting collaborative activity

Description: https://patentimages.storage.googleapis.com/b0/38/20/51a09649c150f4/US08275836-20120925-D00000.png

US US8275836B2 Douglas Beaven Virtualagility Inc.

Priority 1999-05-07 • Filed 2011-12-07 • Granted 2012-09-25 • Published 2012-09-25

Similar A system for supporting collaborative activity in a network includes a storage component storing data related to the network and a model of the network; a processor that accesses the stored data and the model to process the data according to the model, where the stored data relates to the …

 

2. System for performing collaborative tasks

Description: https://patentimages.storage.googleapis.com/8f/cf/6d/b2ed5b1dd358c0/US08095594-20120110-D00000.png
US US8095594B2 Douglas F. Beaven VirtualAgility, Inc.

Priority 1999-05-07 • Filed 2007-10-30 • Granted 2012-01-10 • Published 2012-01-10

Similar A system for performing collaborative tasks which permits collaborators to determine the form of a model of the collaborative work, to modify the model in the course of the collaborative work, and to use the model to access information related to the collaborative work. A graphical user interface …

3. Exchanging project-related data in a client-server architecture

Description: https://patentimages.storage.googleapis.com/57/d3/92/a81c3b9c7429d4/US09632768-20170425-D00000.png

US US9632768B2 Jimin Li Oracle America, Inc.

Priority 2002-11-18 • Filed 2013-05-13 • Granted 2017-04-25 • Published 2017-04-25

Similar Techniques are described for exchanging data between software applications, such as project-related data between a project management software application (“PMSA”) and an unaffiliated organizational project tracking software application (“OPTSA”). A computing architecture with multiple interacting …

4. Integrated system for software application development

Description: https://patentimages.storage.googleapis.com/e9/d2/f7/63bdb1626fbcd1/US10001975-20180619-D00000.png

US US10001975B2 Shridhar V. Bharthulwar Shridhar V. Bharthulwar

Priority 2015-09-21 • Filed 2016-09-21 • Granted 2018-06-19 • Published 2018-06-19

Similar Methods and systems are disclosed for developing a software application through requirements specification, design, effort estimation, assigning and tracking work items, development, testing, collaboration and project management. The system is structured as an integrated software development …

5. Identification of related event groups for IT service monitoring system

Description: https://patentimages.storage.googleapis.com/e7/72/26/67e184b0a6a70d/US11870558-20240109-D00000.png

US US11870558B1 Vineetha Bettaiah Splunk Inc.

Priority 2014-10-09 • Filed 2023-03-24 • Granted 2024-01-09 • Published 2024-01-09

Similar An example method of identification of related event groups for a service monitoring system includes: receiving a sample set of events from a service monitoring system; choosing, based the sample set of events, a set of fieldnames for defining factors; generating a plurality of event group …

6. Computer development assessment system

Description: https://patentimages.storage.googleapis.com/b2/6d/05/57baba5292e331/US09158655-20151013-D00000.png

US US9158655B2 Rajat Wadhwani Bank Of America Corporation

Priority 2013-05-01 • Filed 2013-07-09 • Granted 2015-10-13 • Published 2015-10-13

Similar An apparatus of one embodiment assesses standards compliance during computer development and includes an interface, a memory, and a processor. The interface is operable to receive a selection from a user, the selection including an assessment ruleset to be used for evaluating a computer change.

7. Analyzing econometric data via interactive chart through the alignment of …

Description: https://patentimages.storage.googleapis.com/a4/29/97/b67596f07f75f5/US10497064-20191203-D00000.png

US US10497064B2 Richard Chadwick Wagner Prevedere Inc.

Priority 2011-07-25 • Filed 2013-12-10 • Granted 2019-12-03 • Published 2019-12-03

Similar The invention disclosed is a system for providing an aggregated econometric database with selectable sources of economic data. The econometric database is accessible to a system application that graphically displays econometric data over selected periods, and allows display of external economic …

8. Data processing systems and methods for populating and maintaining a …

Description: https://patentimages.storage.googleapis.com/7e/44/b4/9691673e8bcead/US11409908-20220809-D00000.png

US US11409908B2 Kabir A. Barday OneTrust, LLC

Priority 2016-06-10 • Filed 2021-04-19 • Granted 2022-08-09 • Published 2022-08-09

Similar A centralized data repository system, in various embodiments, is configured to provide a central data-storage repository (e.g., one or more servers, databases, etc.) for the centralized storage of personally identifiable information (PII) and/or personal data for one or more particular data …

9. Automatic event group action interface

Description: https://patentimages.storage.googleapis.com/e5/ca/04/7db498b4d996a4/US10193775-20190129-D00000.png

US US10193775B2 Tristan Antonio Fletcher Splunk Inc.

Priority 2014-10-09 • Filed 2016-09-26 • Granted 2019-01-29 • Published 2019-01-29

Similar An automatic service monitor in an information technology environment is equipped to automatically identify and group recognized events based on user-defined criteria, and to automatically perform user-defined operations against the group and its members at the detection of user-specified …

10. Method and system for handling program, project and asset scheduling management

Description: https://patentimages.storage.googleapis.com/2b/12/24/106ead9d117864/US08738414-20140527-D00000.png

US US8738414B1 Ajay R. Nagar Ajay R. Nagar

Priority 2010-12-31 • Filed 2011-12-28 • Granted 2014-05-27 • Published 2014-05-27

Similar The invention comprises management of programs and mega-programs with emphasis on project level and above in a hierarchy that enables aggregation of information navigating up, and breakdown of details navigating down the hierarchy. It provides the flexibility of combining real-time management of …

12. Integrated asset tracking, task manager, and virtual container for data center …

Description: https://patentimages.storage.googleapis.com/37/6c/0a/8757f452f2c13a/112014023800192-pct00001.png

WO EP US CN JP KR BR KR101763735B1 ??? ?. ???? ??? ?????

Priority 2011-08-16 • Filed 2012-08-16 • Granted 2017-08-01 • Published 2017-08-01

Similar The present invention relates to an infrastructure management system (IMS) asset tracking system, an IMS task manager (ITM), and an IMS virtual container or a virtual container feature to mitigate issues such as employee scheduling problems, lost asset issues, Integration.

13. Migration services for systems

Description: https://patentimages.storage.googleapis.com/4d/0d/00/59b7bfef8eb044/US09098364-20150804-D00000.png

US US9098364B2 George Davis Oracle International Corporation

Priority 2013-07-09 • Filed 2013-07-09 • Granted 2015-08-04 • Published 2015-08-04

Similar Systems and methods for systems migration are provided. A migration engine to perform system migration operations is provided. One or more processors may be configured to execute instructions to perform one or more of the following. Information indicative of one or more migration candidates …

14. Automatic event group actions

Description: https://patentimages.storage.googleapis.com/a1/e6/af/7916ae4b07ee29/US10209956-20190219-D00000.png

US US10209956B2 Tristan Antonio Fletcher Splunk Inc.

Priority 2014-10-09 • Filed 2016-09-26 • Granted 2019-02-19 • Published 2019-02-19

Similar An automatic service monitor in an information technology environment is equipped to automatically identify and group recognized events based on user-defined criteria, and to automatically perform user-defined operations against the group and its members at the detection of user-specified …

15. Managing event group definitions in service monitoring systems

Description: https://patentimages.storage.googleapis.com/7d/35/66/9d6ff3c2811893/US12120005-20241015-D00000.png

US US12120005B1 Vineetha Bettaiah Splunk Inc.

Priority 2014-10-09 • Filed 2021-06-04 • Granted 2024-10-15 • Published 2024-10-15

Similar Network connected devices are controlled via the transmission of action messages to prevent or correct conditions that impair the operation of the networked information technology (IT) assets. The service monitoring system (SMS) monitoring the IT environment groups together related notable events …

16. System and interface for managing temporary work

WO EP US CN JP AU CA CN110770771B ? ??????????

Priority 2017-02-13 • Filed 2018-02-13 • Granted 2024-06-25 • Published 2024-06-25

Similar Described herein are embodiments of a system that allows various entities involved in placing candidates into a job (e.g., recruitment, personnel configuration, and client computer systems and/or devices) to systematically interact to perform functions that conventional systems cannot perform. For …

17. Transitioning between iterations in agile software development

Description: https://patentimages.storage.googleapis.com/69/dc/14/44e5d021f48818/US09858069-20180102-D00000.png

US US9858069B2 Robert Holler Versionone, Inc.

Priority 2008-10-08 • Filed 2015-09-08 • Granted 2018-01-02 • Published 2018-01-02

Similar A computer-implemented method of managing work items associated with agile software development includes displaying a first group of incomplete work items associated with a current iteration of an agile software development project. In response to a first user input, a first incomplete work item …

18. Systems and methods of mobile banking reconciliation

WO EP US AU AU2020102486A4 Brock Stephen Abernethy Xero Limited

Priority 2014-05-08 • Filed 2020-09-29 • Granted 2020-11-19 • Published 2020-11-19

Similar A mobile banking reconciliation application allows a user to reconcile a business's records with banking records associated with one or more accounts of the business. The mobile banking reconciliation application can access an accounting system to obtain business records and banking records …

19. Software with improved view of a business process

Description: https://patentimages.storage.googleapis.com/5e/d5/fa/938152d7833791/US11687859-20230627-D00000.png

WO US US11687859B2 Kamyar Jambor-Sadeghi Aurea Software, Inc.

Priority 2008-11-05 • Filed 2021-09-07 • Granted 2023-06-27 • Published 2023-06-27

Similar The proper visualization of a business process plays a key role in analyzing, changing, simulating and monitoring the business process. Most BPMS systems today, provide a modeling environment where the business user can define and visualize business processes as BPMN diagrams. Some more advanced …

20. Software portfolio management system and method

Description: https://patentimages.storage.googleapis.com/aa/6b/09/5a1b68568fbb34/US20220300281A1-20220922-D00000.png

WO US US20220300281A1 Michael M. Bissonette RTConfidence, Inc.

Priority 2019-01-11 • Filed 2022-06-06 • Published 2022-09-22

Similar A software-based product development portfolio management system and method that may be implemented using a software as a service (SaaS) model that allows users (based on access rights) to: create and update valid project plans using integrated management tools and techniques, view near-real-time …

21. Customer relationship management system and method

Description: https://patentimages.storage.googleapis.com/7f/08/32/f45d41f439cf88/US09342292-20160517-D00000.png

WO EP US JP US9342292B2 Jacob Taylor Sugarcrm Inc.

Priority 2005-08-12 • Filed 2013-06-30 • Granted 2016-05-17 • Published 2016-05-17

Similar A software-based customer relationship management system and method.

22. Consent receipt management systems and related methods

Description: https://patentimages.storage.googleapis.com/50/c6/b0/b022b6d5ab40cd/US20190215344A1-20190711-D00000.png

US US20190215344A1 Kabir A. Barday OneTrust, LLC

Priority 2016-06-10 • Filed 2019-02-15 • Published 2019-07-11

Similar A consent receipt management system may, for example, be configured to track data on behalf of an entity that collects and/or processes persona data related to: (1) who consented to the processing or collection of personal data; (2) when the consent was given (e.g., a date and time); (3) what …

23. Automatic Entity Definitions Based on Derived Content

Description: https://patentimages.storage.googleapis.com/bd/b1/a0/194eb0c4f89923/US20200019555A1-20200116-D00000.png

US US20200019555A1 Arun Ramani Splunk Inc.

Priority 2014-10-09 • Filed 2019-09-25 • Published 2020-01-16

Similar A service monitoring system (SMS) produces key performance indicator (KPI) scores that indicate the performance of a service. To produce the KPI scores, the SMS may process the data for a large number of machine entities that perform the service. This data can be processed on a per-entity basis to …

24. Software test automation system and method

Description: https://patentimages.storage.googleapis.com/e7/59/f0/2a003e77f21b47/US20200319997A1-20201008-D00000.png

WO EP US CA US20200319997A1 Dale H. Ellis Turnkey Solutions Corp.

Priority 2014-04-08 • Filed 2019-12-16 • Published 2020-10-08

Similar A method for testing an updated version of an existing software application. The method may comprise analyzing a user interface screen of the updated version of the existing software application to identify previously existing controls and updated controls and automatically capturing, via a …

25. Construction management method, system, computer readable medium, computer …

Description: https://patentimages.storage.googleapis.com/c0/72/d8/8b2b30d6353ba2/US20230009537A1-20230112-D00000.png

WO EP US AU IL US20230009537A1 Adam S. Yellin REQpay Inc.

Priority 2019-09-11 • Filed 2022-02-28 • Published 2023-01-12

Similar A system for construction management including a device having at least one processor and a memory storing at least one program for execution by the at least one processor, the at least one program including instructions, when, executed by the at least one processor cause the at least one …

26. XBRL-based intelligent financial cloud platform system, construction method and …

Description: https://patentimages.storage.googleapis.com/38/0a/e3/51309e1c6a301c/HDA0001059766820000011.png

WO US CN CN106296378B ?? ????????????

Priority 2016-07-26 • Filed 2016-07-26 • Granted 2021-06-01 • Published 2021-06-01

Similar 1. The intelligent financial cloud platform system based on the XBRL is characterized by comprising a tenant cloud bill, a document tool, an accounting tool and a cloud center, wherein the tenant cloud bill, the document tool, the accounting tool and the cloud center are deployed on a server;

27. Managing and classifying assets in an information technology environment using …

Description: https://patentimages.storage.googleapis.com/49/8c/69/ed428d081dcd60/US20180276254A1-20180927-D00000.png

US US20180276254A1 David M. Whitlock Tripwire, Inc.

Priority 2011-08-29 • Filed 2018-03-19 • Published 2018-09-27

Similar Disclosed below are representative embodiments of methods, apparatus, and systems for managing and classifying assets in an information technology (“IF”) environment using a tag-based approach. The disclosed tag-based classification techniques can be implemented through a graphical user interface.

28. Consent receipt management systems and related methods

Description: https://patentimages.storage.googleapis.com/59/85/84/21d7c2e9b22f16/US20200311310A1-20201001-D00000.png

US US20200311310A1 Kabir A. Barday OneTrust, LLC

Priority 2016-06-10 • Filed 2020-06-15 • Published 2020-10-01

Similar A consent receipt management system is configured to: (1) automatically cause a prior, validly received consent to expire (e.g., in response to a triggering event); and (2) in response to causing the previously received consent to expire, automatically trigger a recapture of consent. In particular …

29. Bi-directional communication between change management tool and implementation …

Description: https://patentimages.storage.googleapis.com/76/2a/05/76afab26444831/US09152413-20151006-D00000.png

US US9152413B2 Kia Behnia Bmc Software, Inc.

Priority 2006-04-28 • Filed 2014-11-06 • Granted 2015-10-06 • Published 2015-10-06

Similar Task implementation tools are registered to interface with a change management tool. The change management tool configures a plurality of tasks to implement a change to an information technology infrastructure's configuration, and sends a plurality of task instructions to the plurality of task …

30. Consent receipt management systems and related methods

Description: https://patentimages.storage.googleapis.com/2c/72/1c/32af07996c71a2/US10796020-20201006-D00000.png

US US10796020B2 Kabir A. Barday OneTrust, LLC

Priority 2016-06-10 • Filed 2020-02-24 • Granted 2020-10-06 • Published 2020-10-06

Similar In particular embodiments, a consent receipt management system is configured to track and analyze one or more attributes of a user interface via which data subjects are requested to provide consent (e.g., consent to process, collect, and/or store personal data) in order to determine which of the …

31. Adaptive key performance indicator thresholds updated using training data

Description: https://patentimages.storage.googleapis.com/c5/5a/2a/bd92d8cc9d9572/US10776719-20200915-D00000.png

US US10776719B2 Sonal Maheshwari Splunk Inc.

Priority 2014-10-09 • Filed 2019-01-10 • Granted 2020-09-15 • Published 2020-09-15

Similar Techniques are disclosed for providing adaptive thresholding technology for Key Performance Indicators (KPIs) that are updated using training data. Adaptive thresholding technology may automatically assign new values or adjust existing values for one or more thresholds of one or more time policies …

32. A kind of visualization quick development platform based on jbpm workflow …

CN CN105700888B ??? ?????????????

Priority 2016-01-14 • Filed 2016-01-14 • Granted 2019-10-01 • Published 2019-10-01

Similar The invention discloses a kind of visualization quick development platforms based on jbpm workflow engine, including information collocation module, for checking and disposition data source and Application Server information, Statistical monitor information is checked and configured, is connect …

33. Security migration in a business intelligence environment

Description: https://patentimages.storage.googleapis.com/22/72/65/c849fa0ba88e3d/US10616203-20200407-D00000.png

US US10616203B2 Lance W. Hankins Motio, Inc.

Priority 2012-03-15 • Filed 2018-06-25 • Granted 2020-04-07 • Published 2020-04-07

Similar In various implementations, local identifiers associated with users may be utilized to enable access one or more functions in a Business Intelligence (BI) Environment. A mapping may be generated to associate local identifiers and users. The mapping may be utilized to enable access in the BI …

34. Systems and methods for documenting, analyzing, and supporting information …

Description: https://patentimages.storage.googleapis.com/9d/e1/72/df550bd6734b73/US10740083-20200811-D00000.png

US US10740083B2 Ricky D. Phipps BizDox, LLC

Priority 2014-04-01 • Filed 2018-03-26 • Granted 2020-08-11 • Published 2020-08-11

Similar Systems and methods of the present disclosure facilitate managing information technology (IT) infrastructure. The system can include a server configured to retrieve data records for first and second IT assets, each asset comprising at least one of a computing device, a software application, an end …

35. Electronic idea notebook

Description: https://patentimages.storage.googleapis.com/cd/ec/2f/70163b47dad272/US10192201-20190129-D00000.png

US US10192201B1 Uma S. Valeti UMA Valeti LLC

Priority 2010-12-30 • Filed 2016-02-01 • Granted 2019-01-29 • Published 2019-01-29

Similar A computer-implemented method includes receiving, from a device associated with a user of a hosted computer system, entries in a template of an electronic invention disclosure form; linking the invention disclosure form to at least one portion of an inventor's notebook containing disclosure of an …

36. Specifying characteristics of a permissible query on an output of a data …

Description: https://patentimages.storage.googleapis.com/33/5b/6f/69c20472843d19/US20220215124A1-20220707-D00000.png

WO EP US CN US20220215124A1 Tomer TURGEMAN Microsoft Technology Licensing, Llc

Priority 2019-04-18 • Filed 2022-03-23 • Published 2022-07-07

Similar Embodiments of the present disclosure are directed to techniques for constructing and configuring a data privacy pipeline to generate collaborative data in a data trustee environment. An interface of the trustee environment can serve as a sandbox for parties to generate, contribute to, or …

37. Systems and methods for preparing and submitting documents to comply with …

Description: https://patentimages.storage.googleapis.com/13/1c/ae/e158a5af8c92d3/US08813178-20140819-D00000.png

US US8813178B1 Niraj Khanna Niraj Khanna

Priority 2011-08-01 • Filed 2012-07-31 • Granted 2014-08-19 • Published 2014-08-19

Similar Systems and methods for preparing and submitting documents to a regulatory agency in an on-line environment are provided, which are used for the purpose of complying with various securities regulations. The systems generally include a server that hosts a website in which a user may access, prepare …

38. Intelligent software auto development system with real-time collaboration …

Description: https://patentimages.storage.googleapis.com/2e/30/ba/fcd3f9deb53d2b/112019126207811-pat00001.png

KR KR102237877B1 ??? ???? ??????

Priority 2019-12-06 • Filed 2019-12-06 • Granted 2021-04-09 • Published 2021-04-09

Similar The present invention relates to a real-time collaboration support intelligent software automatic development system and method thereof. In the present invention, an application generating means for automatically and intelligently generating a screen code and a business logic code in a visual …

39. Collaboration tool

Description: https://patentimages.storage.googleapis.com/8e/c6/b2/9a0e15bdba0d97/US11978019-20240507-D00000.png

US CA US11978019B2 Andrew Culver Iliv Technologies, Inc.

Priority 2010-04-30 • Filed 2022-08-02 • Granted 2024-05-07 • Published 2024-05-07

Similar A method for enabling collaboration between individuals to design, construct and maintain a building. The method comprises providing a network based computer system including at least one server and multiple clients. The multiple clients allow respective individuals to interact with the server.

40. Methods and systems for processing building information modeling (bim)- based …

Description: https://patentimages.storage.googleapis.com/0d/83/ea/d1e610958fffac/US20210224431A1-20210722-D00000.png

WO EP US DK NO US20210224431A1 Laurence Skoropinski Viewpoint, Inc.

Priority 2013-09-20 • Filed 2021-02-05 • Published 2021-07-22

Similar A method for operating a building information modeling (BIM) system, is provided. The method includes at a BIM server, receiving a data alteration request from a client computing device for altering data in one of a building model, a hierarchical structure of building model data, and a …

41. Consent receipt management systems and related methods

Description: https://patentimages.storage.googleapis.com/bf/92/28/83d401c654898a/US20200034569A1-20200130-D00000.png

US US20200034569A1 Kabir A. Barday OneTrust, LLC

Priority 2016-06-10 • Filed 2019-10-04 • Published 2020-01-30

Similar A consent receipt management system may, for example, be configured to track data on behalf of an entity that collects and/or processes persona data related to: (1) who consented to the processing or collection of personal data; (2) when the consent was given (e.g., a date and time); (3) what …

42. Annotating collaborative content to facilitate mining key content as a runbook

Description: https://patentimages.storage.googleapis.com/ac/d6/8c/98741cb093cd1a/US10671263-20200602-D00000.png

US US10671263B2 Richard A. King International Business Machines Corporation

Priority 2015-09-25 • Filed 2018-08-21 • Granted 2020-06-02 • Published 2020-06-02

Similar Aspects include methods, systems, and computer programs to tag collaborative content to facilitate mining key content as a runbook. The method includes providing a user interface allowing a user to annotate portions of content in a collaborative effort system, the content comprising one or more …

43. Document automatic modularization and multi-terminal independent right-limiting …

Description: https://patentimages.storage.googleapis.com/f8/48/a7/3cb313f1b0bafb/HDA0002140346630000011.png

CN CN110442851B 

Priority 2019-07-23 • Filed 2019-07-23 • Granted 2022-12-06 • Published 2022-12-06

Similar The invention relates to a method for document automatic modularization and multi-terminal independent right-limiting editing based on Office Word, which comprises the following operation steps: the method comprises the following steps: editing by a document editor: editing a document basic …

44. Detecting anomalies in key performance indicator values

Description: https://patentimages.storage.googleapis.com/82/4d/5c/4aad0ca0bb0450/US11875032-20240116-D00000.png
US US11875032B1 Manish Sainani Splunk Inc.

Priority 2014-10-09 • Filed 2022-04-28 • Granted 2024-01-16 • Published 2024-01-16

Similar Techniques are disclosed for anomaly detection based on a predicted value. A search query can be executed over a period of time to produce values for a key performance indicator (KPI), the search query defining the KPI and deriving a value indicative of the performance of a service at a point in …

45. System and method for a blockchain based automated certifiable workflow process

Description: https://patentimages.storage.googleapis.com/ac/e7/08/15dc89828f5405/US20200028691A1-20200123-D00000.png

US US20200028691A1 Sujay Rao Honeywell International Inc.

Priority 2018-07-20 • Filed 2018-09-05 • Published 2020-01-23

Similar A method and system for implementing a blockchain network for distributing at least maintenance information related to an aircraft service between a plurality of trusted agents including: executing permissions by each of the trusted agents to participate in the blockchain network to interconnect …

46. Upgrade of heterogeneous multi-instance database clusters

Description: https://patentimages.storage.googleapis.com/24/cc/2f/7abdb1e432b46c/US12204500-20250121-D00000.png

US US12204500B2 Rajat NIGAM Oracle International Corporation

Priority 2013-11-21 • Filed 2020-02-14 • Granted 2025-01-21 • Published 2025-01-21

Similar A method, system, and computer program product for management of large multi-database installations. The method form commences by analyzing a multiple database installation to determine a set of candidate upgrade operations to apply to individual instances of heterogeneous databases in the …

47. Project management system and method

Description: https://patentimages.storage.googleapis.com/c1/c3/ce/c1e65244a1669e/US11074527-20210727-D00000.png

US US11074527B2 Roger L. Correll The United States Of America, As Represented By The Secretary Of The Navy

Priority 2009-05-26 • Filed 2018-07-29 • Granted 2021-07-27 • Published 2021-07-27

Similar A project management system comprising a first, second, third, fourth and fifth processing sequences embodied in a computer readable medium. The first processing sequence is operable to provide a user interface to display a plurality of alert indicia corresponding to a plurality of alert status of …

48. Mobile ticketing

Description: https://patentimages.storage.googleapis.com/9d/5e/45/4329194c7b6427/US09881260-20180130-D00000.png

WO US US9881260B2 Nathaniel Parker Moovel North America, Llc

Priority 2012-10-03 • Filed 2013-10-03 • Granted 2018-01-30 • Published 2018-01-30

Similar Embodiments of a transit ticket system are provided. The transit ticket system may include a mobile computing device configured to (i) download a mobile ticketing application from a ticket management server, the mobile ticketing application including a graphical data sheet, a ticket dictionary, …

49. Systems and methods for data warehousing in private cloud environment

Description: https://patentimages.storage.googleapis.com/45/91/ae/845f1d0881f55b/US10235439-20190319-D00000.png

US US10235439B2 Kevin Sullivan State Street Corporation

Priority 2010-07-09 • Filed 2015-08-12 • Granted 2019-03-19 • Published 2019-03-19

Similar A system and method are disclosed for private cloud computing and for the development and deployment of cloud applications in the private cloud. The private cloud computing system and method of the present invention include as components at least a cloud controller, a cloud stack, Service Registry …

50. Display of dynamic contextual pivot grid analysis

Description: https://patentimages.storage.googleapis.com/27/f4/55/fc010e3da26664/HDA0001638647130000011.png

EP US CN CN108351883B B·????? ???????

Priority 2015-10-24 • Filed 2016-10-24 • Granted 2022-04-19 • Published 2022-04-19

Similar Display of dynamic contextual pivot grid analysis Cross Reference to Related Applications The present application claims priority from U.S. patent application Ser. No.15/217,847 entitled "DISPLAY OF DYNAMIC CONTEXTUAL PIVOT GRID ANALYTICS" filed on 2016, 7, 22, 2016, U.S. patent application Ser.

51. Order details confirmation system

Description: https://patentimages.storage.googleapis.com/e3/5f/a3/91622fbba2c6ec/0006889616-2.png

JP JP6889616B2 ? ?? ????????

Priority 2017-05-31 • Filed 2017-05-31 • Granted 2021-06-18 • Published 2021-06-18

Similar And estimated ability to create, working drawing information created and construction diagram creation function to create the appearance view and fit view Nde Captures Product specifications information from the estimated creation function in response to orders, by construction diagram creation …

END OF PATENT

PATENT: SYSTEM AND METHODS FOR AUTOMATED APPROVALS OF IT CONFIGURATION CHANGES


Application # 63/856,670


USPTO Receipt

 

COOPERATIVE PATENT CLASSIFICATION (CPC): G06F9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

G PHYSICS

G06 COMPUTING; CALCULATING OR COUNTING

G06F ELECTRIC DIGITAL DATA PROCESSING

 

Int. C. : G06F 15/16 (2006.01) H04L 2/24 (2006.01) H04L 12/26 (2006.01) HO4L 12/28 (2006.01) HO4L 12/58 2006.01) HO4L 29/06 (2006.01)

U.S. C.: H04L 12/24 (2013.01); H04L 12/2602 (2013.01); H04L 12/2801 (2013.01); H04L 41/00 (2013.01); H04L 41/046 (2013.01); H04L 41/048 (2013.01); H04L 41/0654 (2013.01); H04L 41/0813 (2013.01); H04L 41/082 (2013.01); H04L 41/0803 (2013.01); H04L 41/0806 (2013.01); H04L 51/00 (2013.01); H04L 51/04 (2013.01); H04L 51/046 (2013.01); H04L 65/40 (2013.01); H04L 65/403 (2013.01)

USPC.: 709/223; 709/201; 709/202; 709/203; 709/205; 709/206; 709/217; 709/218; 709/219; 709/224; 709/225; 709/227; 705/305; 705/30; 705/32; 705/7.13; 705/7.14; 705/7.16; 718/100; 718/102

FIELD OF THE INVENTION: This patent application introduces a novel approach to automating and deploying IT solutions, offering unique features and benefits in the field of information technology (IT) systems.

 

ABSTRACT

A system and methods for pre-approving closed-loop automated configuration changes of information technology (IT) assets within an enterprise are described. The method comprises the steps of creating operational and iterative approval policies within a Helpdesk ticketing system; then using both for one time pre-approval of an automation workflow designed to run repeatedly. The method allows a continuous reuse of prior approvals and leads to increased deployment efficiency, reduced lead times, faster time to value and minimizes change failures.

 

BACKGROUND OF THE INVENTION

 

To accelerate IT tasks and changes, organizations can optimize their change approval policies by leveraging automation, defining clear approval workflows, and implementing dynamic routing based on risk and impact. This involves identifying low-risk changes that can be pre-approved, automating approvals based on predefined criteria, and routing high-risk changes to the appropriate stakeholders or Change Advisory Boards (CABs). The following are some of the recent strategies being implemented by organizations to significantly reduce the time it takes to approve and implement IT changes, leading to faster delivery of services and improved business outcomes.

 

Risk-based categorization: Classify changes based on their potential impact and risk level (e.g., low, medium, high).

Automated approvals: Pre-approve low-risk changes that meet specific criteria, eliminating manual intervention.

Dynamic routing: Route changes based on predefined rules to the relevant approvers, ensuring appropriate oversight and faster approvals.

Standardized workflows: Establish clear, documented workflows for different change types to ensure consistency and efficiency.

Delegation of authority: Allow for delegation of approval authority to ensure timely approvals, even when key personnel are unavailable.

Reduce manual steps: Minimize manual intervention by automating approvals and leveraging technology.

Regularly review and refine: Continuously monitor the change approval process, identify bottlenecks, and make adjustments to improve efficiency.

 

The approaches above helped the enterprise in delivering a better quality of service in a shorter period of time. However, they fell short at automating of long-running, complex workflows spanning multiple departments or even BU’s for two reasons, or, rather, in two domains:

a)     Time domain. The current approval methods are designed for one time execution, while automation executes tasks repeatedly, sometimes in different contexts or asset combinations, requiring a different set of necessary approvals for each such task iteration.

b)    Ownership domain. The current approval process is lacking in the sense the conventional or even open-loop automation approval is granted to a department or a person (sometimes even linked to an administrators employee ID), but closed-loop automation is neither a person or department.  

 

Clearly, these barriers were raised to make sure only the authorized personnel in full possession of the valid credentials and the necessary technical expertise will execute the task. Otherwise, it may be done incorrectly or even not done at all. But with the advent of the Cloud automation, when everything is 01 and 1s – the administrators knowledge, the asset itself, the passwords – all of these barriers designed to protect the asset and technology from us is now hurting us because of its inefficiency. In the Cloud, there are thousands of assets with hundreds of tags, each ever changing. It is an insurmountable challenge to keep track of all of the new risks involved in these technologies and assets. That is why an automated method of approvals is necessary.

In an effort to resolve these deficiencies, either the workflow has to be approved in its entirety ahead of the launch of the executions as a template, or each iteration ((re)execution) of an automated workflow has to be (re)approved separately, in real-time, before it can run (the latter will slow down the automation speed significantly, even with existing pre-approval policies already in place).

 

BRIEF SUMMARY OF THE INVENTION

 

The current invention is designed to work as follows. Instead of approving each occurrence of a task separately, the process is designed to approve the task as a template (meaning its operational approval policy within the ticketing system), and additionally we also approve how this task or process is allowed to iterate (the iterative approval policy). To put it simply, instead of repeatedly approving a task every time, we simply once 1) define what a task is in a broader sense in the context of the enterprise (a refresh, for example); 2) define how it is run each time to consistently produce a desired/different result; 3) define once by what criteria a particular task iteration is either APPROVED or REJECTED. Then we simply inspect each automated workflow JSON/YML code to determine whether or not the particular iteration code should be approved or rejected automatically.

An operational policy for a database refresh, for example, would define which department may refresh its data from what other department (but not necessarily when, by what means and methods). An operational policy is a subject of discussion between two VPs, for example. An iterative policy, on the other hand, would define how this particular iteration of the main refresh is to be executed – from what tools, versions, to specific asset variables, naming conventions and tags.

 

Pic. 1. Decision flow for APPROVING or REJECTING a Close-Loop Automated Approval Process

CLAIMS

<REDACTED>

 

PRIOR ART

 

Sort by · Relevance  Group by · None  Deduplicate by · Family  Results / page · 10 

Automated configuration of log-coordinated storage groups

 

Description: https://patentimages.storage.googleapis.com/5c/e6/a2/4cb7128ab7181d/US10025802-20180717-D00000.png

US US10025802B2 Allan Henry Vermeulen Amazon Technologies, Inc.

Priority 2014-09-19 • Filed 2014-09-19 • Granted 2018-07-17 • Published 2018-07-17

A configuration manager of a storage service receives a set of service requirements, comprising one or more of: a performance requirement for one or more types of storage operations, or an access interface type requirement Based on the service requirements, a candidate storage configuration that …

System and method for managing information technology models in an intelligent …

 

Description: https://patentimages.storage.googleapis.com/3f/59/b1/b0190ac16c6a90/US09191380-20151117-D00000.png

US US9191380B2 Eric W. B. Anderson Novell, Inc.

Priority 2009-11-25 • Filed 2010-03-19 • Granted 2015-11-17 • Published 2015-11-17

The system and method described herein for managing information technology models in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the …

Method and system for automation tool set for server maintenance actions

 

Description: https://patentimages.storage.googleapis.com/8c/16/e1/d1b531658fda43/US11169815-20211109-D00000.png

US US11169815B2 Syed Waqas Ali Bby Solutions, Inc.

Priority 2018-01-16 • Filed 2019-01-15 • Granted 2021-11-09 • Published 2021-11-09

Embodiments of a system, methods, and other techniques and configurations for automation of computing system maintenance activities such as reboots, software installations, re-configuration, or other actions are generally described herein. In an example, an automation tool set is designed to …

Governance pools in hierarchical systems

 

Description: https://patentimages.storage.googleapis.com/35/a9/54/d99757e55bd0b2/US11036692-20210615-D00000.png

US US11036692B2 Byron Kevin McKenzie Oracle International Corporation

Priority 2016-09-17 • Filed 2017-07-12 • Granted 2021-06-15 • Published 2021-06-15

Various techniques are disclosed herein for storing and managing master data in hierarchical data systems. Several related concepts, embodiments, and examples are disclosed, including techniques for incremental rationalization in a hierarchical data model, techniques for implementing governance …

Deployment of infrastructure in pipelines

 

Description: https://patentimages.storage.googleapis.com/1b/65/00/7ae45ac02d2d77/US11281457-20220322-D00000.png

US US11281457B2 Felix Walter Blue JODOIN Amazon Technologies, Inc.

Priority 2017-08-16 • Filed 2019-05-30 • Granted 2022-03-22 • Published 2022-03-22

A system, such as a system of a computing resource service provider, detects changes to a pipeline template package that encodes information associated with application code and infrastructure that may be utilized as part of deploying the application code in stages of a pipeline. An infrastructure …

Process management system and method

 

Description: https://patentimages.storage.googleapis.com/b4/71/e7/ba5886b6204c03/US08296170-20121023-D00000.png

WO US US8296170B2 Jay O'Brien Bp Logix

Priority 2009-09-24 • Filed 2010-09-20 • Granted 2012-10-23 • Published 2012-10-23

A business process or project management system provides for creation of a project or process definition which includes all activities required to complete the process as well as any dependencies, conditions, and deadlines for each activity, and participants designated to carry out the activities.

Lifecycle transitions in log-coordinated data stores

 

Description: https://patentimages.storage.googleapis.com/25/96/e1/d767b65428a4bb/US10373247-20190806-D00000.png

US US10373247B2 Allan Henry Vermeulen Amazon Technologies, Inc.

Priority 2014-09-19 • Filed 2014-09-19 • Granted 2019-08-06 • Published 2019-08-06

Based at least in part on an optimization goal determined for a storage group comprising a plurality of data stores for which writes requests are coordinated by a log-based transaction manager, one or more lifecycle transitions are identified for data objects stored in a first data store. In …

Adaptive system for network and security management

 

Description: https://patentimages.storage.googleapis.com/dd/61/21/f9fab05316721a/US20230396632A1-20231207-D00000.png

WO EP US US20230396632A1 Praveen Hebbagodi Netenrich, Inc.

Priority 2022-06-03 • Filed 2023-05-31 • Published 2023-12-07

Systems and methods are described for identifying computer risk. A system may receive a set of input signals from independent sources. The system may use a header tracing component to discover and manage service dependencies and maps based on the input signals. The system may then configure new …

Automated access, key, certificate, and credential management

 

Description: https://patentimages.storage.googleapis.com/22/0f/ed/28029139ea71ba/US10277632-20190430-D00000.png

WO EP US SG US10277632B2 Tatu J. Ylonen Ssh Communications Security Oyj

Priority 2011-12-21 • Filed 2016-08-29 • Granted 2019-04-30 • Published 2019-04-30

Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating …

UDP broadcast for a user interface in a download and configuration gaming …

 

Description: https://patentimages.storage.googleapis.com/e9/7d/77/569788a5ae9ccb/US09278284-20160308-D00000.png

US US9278284B2 Ryan Ruppert Bally Gaming, Inc.

Priority 2006-11-10 • Filed 2014-05-15 • Granted 2016-03-08 • Published 2016-03-08

A method for sending a notification message using a modified form of User Datagram Protocol (UDP) multicast notification system in a client-server architecture. The method includes: determining that the server wants to send a notification message, wherein the server is a Download and Configuration …