METHOD AND SYSTEM FOR DYNAMICALLY AVOIDING INFORMATION TECHNOLOGY OPERATIONAL INCIDENTS IN A BUSINESS PROCESS
First Claim
1. A method of dynamically avoiding an information technology operational incident in a business process, the method comprising:
- mapping, by an incident avoidance device, real-time unprocessed operational data with respect to an information technology (IT) transaction in the business process against a dynamic baseline for each of a set of relevant key performance indicators (KPI'"'"'s) for the IT transaction;
dynamically detecting, by the incident avoidance system, an anomaly in the real-time unprocessed operational data based on the mapping;
determining, by the incident avoidance system at an about time of the anomaly, one or more contemporaneous anomalies in real-time unprocessed application data and real-time unprocessed infrastructure data with respect to a plurality of applications and a plurality of components of an IT infrastructure respectively, wherein the plurality of applications and the IT infrastructure enables the business process;
dynamically identifying, by the incident avoidance system, a root cause of the anomaly by correlating the anomaly and the one or more contemporaneous anomalies; and
providing, by the incident avoidance system, the root cause for redressal so as to dynamically avoid the IT operational incident.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure relates to method and system for dynamically avoiding information technology (IT) operational incidents in a business process. The method may include mapping real-time unprocessed operational data with respect to an IT transaction in the business process against a dynamic baseline for each of a set of relevant key performance indicators (KPI'"'"'s) for the IT transaction, and dynamically detecting an anomaly in the real-time unprocessed operational data based on the mapping. The method may further include determining, at an about time of the anomaly, one or more contemporaneous anomalies in real-time unprocessed application data and real-time unprocessed infrastructure data with respect to a plurality of applications and a plurality of components of an IT infrastructure respectively. The method may further include dynamically identifying a root cause of the anomaly by correlating the anomaly and the one or more contemporaneous anomalies, and providing the root cause for redressal.
2 Citations
20 Claims
-
1. A method of dynamically avoiding an information technology operational incident in a business process, the method comprising:
-
mapping, by an incident avoidance device, real-time unprocessed operational data with respect to an information technology (IT) transaction in the business process against a dynamic baseline for each of a set of relevant key performance indicators (KPI'"'"'s) for the IT transaction; dynamically detecting, by the incident avoidance system, an anomaly in the real-time unprocessed operational data based on the mapping; determining, by the incident avoidance system at an about time of the anomaly, one or more contemporaneous anomalies in real-time unprocessed application data and real-time unprocessed infrastructure data with respect to a plurality of applications and a plurality of components of an IT infrastructure respectively, wherein the plurality of applications and the IT infrastructure enables the business process; dynamically identifying, by the incident avoidance system, a root cause of the anomaly by correlating the anomaly and the one or more contemporaneous anomalies; and providing, by the incident avoidance system, the root cause for redressal so as to dynamically avoid the IT operational incident. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for dynamically avoiding an information technology operational incident in a business process, the system comprising:
an incident avoidance device comprising at least one processor and a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform operations comprising; mapping real-time unprocessed operational data with respect to an information technology (IT) transaction in the business process against a dynamic baseline for each of a set of relevant key performance indicators (KPI'"'"'s) for the IT transaction; dynamically detecting an anomaly in the real-time unprocessed operational data based on the mapping; determining, at an about time of the anomaly, one or more contemporaneous anomalies in real-time unprocessed application data and real-time unprocessed infrastructure data with respect to a plurality of applications and a plurality of components of an IT infrastructure respectively, wherein the plurality of applications and the IT infrastructure enables the business process; dynamically identifying a root cause of the anomaly by correlating the anomaly and the one or more contemporaneous anomalies; and providing the root cause for redressal so as to dynamically avoid the IT operational incident. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A non-transitory computer-readable medium storing computer-executable instructions for dynamically avoiding an information technology operational incident in a business process, the computer-executable instructions configured for:
-
mapping real-time unprocessed operational data with respect to an information technology (IT) transaction in the business process against a dynamic baseline for each of a set of relevant key performance indicators (KPI'"'"'s) for the IT transaction; dynamically detecting an anomaly in the real-time unprocessed operational data based on the mapping; determining, at an about time of the anomaly, one or more contemporaneous anomalies in real-time unprocessed application data and real-time unprocessed infrastructure data with respect to a plurality of applications and a plurality of components of an IT infrastructure respectively, wherein the plurality of applications and the IT infrastructure enables the business process; dynamically identifying a root cause of the anomaly by correlating the anomaly and the one or more contemporaneous anomalies; and providing the root cause for redressal so as to dynamically avoid the IT operational incident. - View Dependent Claims (18, 19, 20)
-
Specification