Rationalizing functions to identify re-usable services
First Claim
1. A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of:
- a) applying a similar functionality analysis on the functions of a network, comprising the steps of the computer;
i) retrieving a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name;
ii) for each function, determining whether the name is the same or similar to a name of another function and if the name is not the same or similar to any other function, continuing with the analysis at step (a)(vi);
iii) for each function, determining whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determining whether the name of the function corresponds to a filter used in the network,if the name of the function corresponds to a filter used in the network, continuing with the analysis at step (a)(viii);
otherwise continuing with the analysis at step (a)(vi);
iv) determining whether there is a common name which can represent the plurality of functions being compared;
if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continuing with the analysis at step (a)(ix);
v) for all functions which are not linked to a common name, continuing with the analysis at step (a)(ix);
vi) for each function, determining whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;
if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and
if the function is to be reanalyzed, returning to step (a)(i);
vii) for each function, determining whether a proper pattern is being used;
if the proper pattern is not being used;
if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and
if the function is to be reanalyzed, returning to step (a)(i);
viii) for function, determining if there is a facade in which the function can be associated with and if there is a facade that can be associated with the function, associating the function with the facade for access by a user through the facade; and
ix) storing the plurality of functions in a repository;
b) retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table;
c) categorizing the functions within the pivot table;
d) filtering the pivot table by a functional area of the pivot table;
e) recreating the pivot table based on the functional area; and
f) differentiating exposable functions within the pivot table from non-exposable functions by attributes of the functions to determine which functions provide service to more than one consumer and are invoked through a standardized interface.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of: applying a similar functionality analysis on the functions of a network; retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table; categorizing the functions within the pivot table; filtering the pivot table by a functional area of the pivot table; recreating the pivot table based on the functional area; and differentiating the exposable functions within the pivot table from non-exposable functions by attributes of the functions.
-
Citations
15 Claims
-
1. A method of dynamically offering upgraded services in a network comprising functions, the method comprising a computer performing the steps of:
-
a) applying a similar functionality analysis on the functions of a network, comprising the steps of the computer; i) retrieving a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determining whether the name is the same or similar to a name of another function and if the name is not the same or similar to any other function, continuing with the analysis at step (a)(vi); iii) for each function, determining whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determining whether the name of the function corresponds to a filter used in the network,if the name of the function corresponds to a filter used in the network, continuing with the analysis at step (a)(viii);
otherwise continuing with the analysis at step (a)(vi);iv) determining whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continuing with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continuing with the analysis at step (a)(ix); vi) for each function, determining whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and if the function is to be reanalyzed, returning to step (a)(i); vii) for each function, determining whether a proper pattern is being used;
if the proper pattern is not being used;
if the function is not to be reanalyzed, deleting the function and continuing the analysis at step (a)(ix); and
if the function is to be reanalyzed, returning to step (a)(i);viii) for function, determining if there is a facade in which the function can be associated with and if there is a facade that can be associated with the function, associating the function with the facade for access by a user through the facade; and ix) storing the plurality of functions in a repository; b) retrieving the plurality of functions stored by the similar functionality analysis from the repository, and creating a pivot table; c) categorizing the functions within the pivot table; d) filtering the pivot table by a functional area of the pivot table; e) recreating the pivot table based on the functional area; and f) differentiating exposable functions within the pivot table from non-exposable functions by attributes of the functions to determine which functions provide service to more than one consumer and are invoked through a standardized interface. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for dynamically offering upgraded services in a network comprising functions, the computer program product comprising:
a computer comprising at least one processor, one or more memories, and one or more computer-readable, storage devices having program instructions embodied therewith, the program instructions executable by the computer; a) program instructions, stored on at least one of the one or more storage devices, to apply a similar functionality analysis on the functions of a network, comprising program instructions to; i) retrieve a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determine whether the name is the same or similar to a name of another function and if the name is not the same or similar to any other function, continue with the analysis at step (a)(vi); iii) for each function, determine whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determine whether the name of the function corresponds to a filter used in the network,if the name of the function corresponds to a filter used in the network, continue with the analysis at step (a) (viii);
otherwise continue with the analysis at step (a)(vi);iv) determine whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continue with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continue with the analysis at step (a)(ix); vi) for each function, determine whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and
→
if the function is to be reanalyzed, return to step (a)(i);vii) for each function, determine whether a proper pattern is being used;
if the proper pattern is not being used;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); viii) for function, determine if there is a facade in which the function can be associated with and if there is a facade that can be associated with the function, associate the function with the facade for access by a user through the facade; and ix) store the plurality of functions in a repository; b) program instructions, stored on at least one of the one or more storage devices, to retrieve the plurality of functions stored by the similar functionality analysis from the repository, and create a pivot table; c) program instructions, stored on at least one of the one or more storage devices, to categorize the functions within the pivot table; d) program instructions, stored on at least one of the one or more storage devices, to filter the pivot table by a functional area of the pivot table; e) program instructions, stored on at least one of the one or more storage devices, to recreate the pivot table based on the functional area; and f) program instructions, stored on at least one of the one or more storage devices, to differentiate exposable functions within the pivot table from non-exposable functions by attributes of the functions to determine which functions provide service to more than one consumer and are invoked through a standardized interface. - View Dependent Claims (7, 8, 9, 10)
-
11. A computer system for dynamically offering upgraded services in a network comprising functions, the computer system comprising:
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; a) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to apply a similar functionality analysis on the functions of a network, comprising program instructions to; i) retrieve a plurality of candidate services from the network, each functions having a description, at least one attribute, and a name; ii) for each function, determine whether the name is the same or similar to a name of another function and if the name is not the same or similar to any other function, continue with the analysis at step (a)(vi); iii) for each function, determine whether the description is the same or similar to a description of another function; and
if the description of a function is not the same or similar to the description of another function, determine whether the name of the function corresponds to a filter used in the network,if the name of the function corresponds to a filter used in the network, continue with the analysis at step (a)(viii);
otherwise continue with the analysis at step (a)(vi);iv) determine whether there is a common name which can represent the plurality of functions being compared; if there is a common name which can represent the plurality of functions being compared, linking each of the plurality of functions with the common name and continue with the analysis at step (a)(ix); v) for all functions which are not linked to a common name, continue with the analysis at step (a)(ix); vi) for each function, determine whether the name is compliant with a verb and noun guide; and
if the name is noncompliant with the verb and noun guide;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); vii) for each function, determine whether a proper pattern is being used;
if the proper pattern is not being used;if the function is not to be reanalyzed, delete the function and continue the analysis at step (a)(ix); and if the function is to be reanalyzed, return to step (a)(i); viii) for function, determine if there is a facade in which the function can be associated with and if there is a facade that can be associated with the function, associate the function with the facade for access by a user through the facade; and ix) store the plurality of functions in a repository; b) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to retrieve the plurality of functions stored by the similar functionality analysis from the repository, and create a pivot table; c) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to categorize the functions within the pivot table; d) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to filter the pivot table by a functional area of the pivot table; e) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to recreate the pivot table based on the functional area; and f) program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to differentiate exposable functions within the pivot table from non-exposable functions by attributes of the functions to determine which functions provide service to more than one consumer and are invoked through a standardized interface. - View Dependent Claims (12, 13, 14, 15)
Specification