Claims
- 1. In a computer system, a computer-implemented method for facilitating auditing of said computer system, comprising:
receiving a request for a codeword from a user of said computer system; ascertaining first data from said computer system, said first data including at least one of a number of active components found in said computer system and a number of inactive components found in said computer system; ascertaining second data from said computer system, said second data including identification data, said identification data identifying at least one of said computer system and a software program executing on said computer system; forming said codeword using said first data and said second data, wherein said codeword includes said first data and said second data; and providing said codeword to said user.
- 2. The method of claim 1 further comprising:
ascertaining third data from said computer system, said third data including current time information; and utilizing said third data in said forming said codeword, wherein said codeword also includes said third data.
- 3. The method of claim 1 wherein said forming further includes encrypting said first data and said second data.
- 4. The method of claim 3 wherein said encrypting employs a public key encryption technique.
- 5. The method of claim 3 wherein said forming further includes encoding said first data and said second data.
- 6. The method of claim 5 wherein said encoding represents ASCII encoding.
- 7. The method of claim 1 wherein said forming includes encoding said first data and said second data.
- 8. The method of claim 1 further comprising:
ascertaining third data from said computer system, said third data including temporary capacity data for said computer system; and utilizing said third data in said forming said codeword, wherein said codeword also includes said third data.
- 9. The method of claim 1 further comprising:
ascertaining third data from said computer system, said third data including historical compliance data for said computer system, said historical compliance data including a plurality of compliance data vectors collected over multiple rotations of a periodic inventory schedule, each of said compliance data vectors having one of a first state and a second state, said first state representing a state wherein said computer system is in compliance with a predefined set of parameters during a rotation of said periodic inventory schedule, said second state representing a state wherein said computer system is out of compliance with said predefined set of parameters during said rotation of said periodic inventory schedule; and utilizing said third data in said forming said codeword, wherein said codeword also includes said third data.
- 10. The method of claim 9 wherein said plurality of compliance data vectors are represented in said codeword as a bit pattern, a value of each bit in said bit pattern is set to a first value if said computer system is in said first state, said value of said each bit in said bit pattern is set to a second value if said computer system is in said second state, a location of a given bit in said bit pattern indicating a specific rotation of said periodic inventory schedule during which compliance information associated with said given bit is collected.
- 11. The method of claim 1 wherein said first data pertains to CPUs.
- 12. The method of claim 1 wherein said first data pertains to quantities of memory.
- 13. The method of claim 1 wherein said first data pertains to cells.
- 14. The method of claim 1 wherein said first data pertains to software components.
- 15. In a first computer system, a computer-implemented method for facilitating auditing of a second computer system, comprising:
receiving a codeword from a user of said second computer system, said codeword being furnished by said user after said user obtains said codeword from said second computer system, said codeword containing information pertaining to a plurality of parameters associated with said second computer system; ascertaining first data from said codeword, said first data representing identification data identifying at least one of said second computer system and a software program executing on said second computer system; comparing said first data against another copy of said identification data associated with said second computer system, said another copy of said identification data being obtained independently of said codeword; and if said first data is different from said another copy of said identification data, generating an error message for transmission to said user.
- 16. The method of claim 15 further comprising:
ascertaining second data from said codeword, said second data including at least one of a number of active components found in said second computer system and a number of inactive components found in said second computer system; comparing said second data with a respective one of expected active components data and expected inactive components data, said expected active components data representing a number of components expected to be active in said second computer system, said expected inactive components data representing a number of components expected to be inactive in said second computer system; and if said number of active components found in said second computer system exceeds said number of components expected to be active in said computer system, performing steps (a)-(c) below:
(a) ascertaining a temporary capacity availability from said codeword, (b) determining whether said temporary availability is adequate to support an excess number of active components, said excess number of active components representing the difference between said number of active components found in said second computer system and said number of components expected to be active in said computer system, and (c) designating said second computer system out of compliance if said temporary availability is inadequate to support said excess number of active components.
- 17. The method of claim 16 wherein said second data pertains to CPUs.
- 18. The method of claim 15 further comprising:
ascertaining second data from said codeword, said second data including at least one of a number of active components found in said second computer system and a number of inactive components found in said second computer system; comparing said second data with a respective one of expected active components data and expected inactive components data, said expected active components data representing a number of components expected to be active in said second computer system, said expected inactive components data representing a number of components expected to be inactive in said second computer system; and if said comparing compares said number of active components found in said second computer system with said expected active component data, designating said second computer system out of compliance if said number of active components found in said computer system is greater than said expected active component data; and if said comparing compares said number of inactive components found in said second computer system with said expected inactive component data, designating said second computer system out of compliance if said number of inactive components found in said second computer system is less than said expected inactive component data;
- 19 The method of claim 18 wherein said second data pertains to CPUs.
- 20. The method of claim 18 further comprising ascertaining a historical compliance data from said codeword, said historical compliance data including a plurality of compliance data vectors collected from said second computer system over multiple rotations of a periodic inventory schedule, each of said compliance data vectors having one of a first state and a second state, said first state representing a state wherein said second computer system is in compliance with a predefined set of parameters during a rotation of said periodic inventory schedule, said second state representing a state wherein said second computer system is out of compliance with said predefined set of parameters during said rotation of said periodic inventory schedule.
- 21. The method of claim 20 wherein said plurality of compliance data vectors are represented in said codeword as a bit pattern, a value of each bit in said bit pattern is set to a first value if said second computer system is in said first state, said value of said each bit in said bit pattern is set to a second value if said second computer system is in said second state, a location of a given bit in said bit pattern indicating a specific rotation of said periodic inventory schedule during which compliance information associated with said given bit is collected.
- 22. The method of claim 18 wherein said second data pertains to quantities of memory.
- 23. The method of claim 18 wherein said second data pertains to cells.
- 24. The method of claim 18 wherein said second data pertains to software components.
- 25. The method of claim 18 further comprising decrypting said codeword.
- 26. The method of claim 18 wherein said user furnishes said codeword using the Internet.
- 27. The method of claim 26 wherein said codeword is received at a portal accessible to said first computer system.
- 28. An article of manufacture comprising a program storage medium having computer readable codes embodied therein, said computer readable code being configured for facilitating auditing of a computer system, comprising:
computer readable codes for receiving a request for a codeword from a user of said computer system; computer readable codes for ascertaining first data from said computer system, said first data including at least one of a number of active components found in said computer system and a number of inactive components found in said computer system; computer readable codes for ascertaining second data from said computer system, said second data including identification data, said identification data identifying at least one of said computer system and a software program executing on said computer system; computer readable codes for forming said codeword using said first data and said second data, wherein said codeword includes said first data and said second data; and computer readable codes for providing said codeword to said user.
- 29. The article of manufacture of claim 28 further comprising:
computer readable codes for ascertaining third data from said computer system, said third data including current time information; and computer readable codes for utilizing said third data in said forming said codeword, wherein said codeword also includes said third data.
- 30. The article of manufacture of claim 28 further including computer readable codes for encrypting said first data and said second data.
- 31. The article of manufacture of claim 28 further comprising:
computer readable codes for ascertaining third data from said computer system, said third data including historical compliance data for said computer system, said historical compliance data including a plurality of compliance data vectors collected over multiple rotations of a periodic inventory schedule, each of said compliance data vectors having one of a first state and a second state, said first state representing a state wherein said computer system is in compliance with a predefined set of parameters during a rotation of said periodic inventory schedule, said second state representing a state wherein said computer system is out of compliance with said predefined set of parameters during said rotation of said periodic inventory schedule; and computer readable codes for utilizing said third data in said forming said codeword, wherein said codeword also includes said third data.
- 32. The article of manufacture of claim 31 wherein said plurality of compliance data vectors are represented in said codeword as a bit pattern, a value of each bit in said bit pattern is set to a first value if said computer system is in said first state, said value of said each bit in said bit pattern is set to a second value if said computer system is in said second state, a location of a given bit in said bit pattern indicating a specific rotation of said periodic inventory schedule during which compliance information associated with said given bit is collected.
- 33. The article of manufacture of claim 28 wherein first second data pertains to CPUs.
- 34. The article of manufacture of claim 28 wherein said first data pertains to quantities of memory.
- 35. The article of manufacture of claim 28 wherein said first data pertains to cells.
- 36. The article of manufacture of claim 28 wherein said first data pertains to software components.
Parent Case Info
[0001] This patent application relates to a commonly assigned patent application entitled “Methods And Apparatus For Managing The Execution Of A Task Among A Plurality Of Autonomous Processes,” by inventors Edgar I. Circenis and Bradley A. Klein Ser. No. ______ (Attorney Docket No. 200208246-1), a patent application entitled “Methods And Apparatus For Managing Temporary Capacity In A Computer System,” by inventors Edgar I. Circenis and Bradley A. Klein Ser. No. ______ (Attorney Docket No. 200300339-1), and a commonly assigned patent application entitled “Methods And Apparatus For Rapidly Activating Inactive Components In A Computer System,” by inventors Edgar I. Circenis and Bradley A. Klein Ser. No. ______ (Attorney Docket No. 200208237-1), all of which are filed on even date herewith and incorporated herein by reference.