Computing resource inventory system
First Claim
1. A computer-implemented method of managing computing resources of a computing system comprising:
- storing, at a data store of a computing device, (i) a computing resource list that indicates each computing resource of a computing system which comprises one or more computing resources and (ii) computing resource information which describes individual computing resources of the one or more computing resources;
updating, by the computing device, the computing resource list responsive to one or more of (i) an addition of a new computing resource being added to the computing system or (ii) a removal of one of the one or more computing resources from the computing system;
performing, by the computing device, one or more evaluation tasks for one of the one or more computing resources; and
generating, by the computing device, a resource evaluation report for the computing resource based on performance of the one or more evaluation tasks;
wherein a first evaluation task of the one or more evaluation tasks comprisesselecting a first access report provided by the computing resource for a first reporting period,selecting a second access report provided by the computing resource for a second reporting period which occurred subsequent to the first reporting period,comparing a first total number of access rights reported in the first access report to a second total number of access rights reported in the second access report, andindicating, in the resource evaluation report, that the second access report is either a typical access report or an atypical access report based on whether a difference between the first total number of access rights reported and the second total number of access rights reported exceeds a predetermined difference threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of managing computing resources of a computing system are described. A computing resource list and computing resource information may be stored at a data store. The computing resource list may identify a set of computing resources of a computing system, and the computing resource information may respectively describe the computing resources. The computing resource list may be updated in response to a new computing resource being added to the computing system or in response to an existing computing resource being removed from the computing system. Evaluation tasks for the computing resources may be performed, and a resource evaluation report may be generated during performance of at least one of the evaluation task.
-
Citations
20 Claims
-
1. A computer-implemented method of managing computing resources of a computing system comprising:
-
storing, at a data store of a computing device, (i) a computing resource list that indicates each computing resource of a computing system which comprises one or more computing resources and (ii) computing resource information which describes individual computing resources of the one or more computing resources; updating, by the computing device, the computing resource list responsive to one or more of (i) an addition of a new computing resource being added to the computing system or (ii) a removal of one of the one or more computing resources from the computing system; performing, by the computing device, one or more evaluation tasks for one of the one or more computing resources; and generating, by the computing device, a resource evaluation report for the computing resource based on performance of the one or more evaluation tasks; wherein a first evaluation task of the one or more evaluation tasks comprises selecting a first access report provided by the computing resource for a first reporting period, selecting a second access report provided by the computing resource for a second reporting period which occurred subsequent to the first reporting period, comparing a first total number of access rights reported in the first access report to a second total number of access rights reported in the second access report, and indicating, in the resource evaluation report, that the second access report is either a typical access report or an atypical access report based on whether a difference between the first total number of access rights reported and the second total number of access rights reported exceeds a predetermined difference threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification