Methods for decomposing events from managed infrastructures

ABSTRACT

A system for clustering events includes a first engine that receives message data from a managed infrastructure which includes managed infrastructure physical hardware and supports the flow and processing of information. A second engine determines common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure. Membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information. Events are produced that relate to the managed infrastructure while converting the events into words and subsets used to group the events that relate to failures or errors in the managed infrastructure, including the managed infrastructure physical hardware. The second engine or a third engines uses a source address for each event to assign a graph coordinate to each of an event and making a change to at least a portion of the managed infrastructure.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the priority benefit of all of the following:This application is Continuation of patent application Ser. No.15/350,950 filed Nov. 14, 2016, Continuation of patent application Ser.No. 14/262,890 filed Apr. 28, 2014, Issued as Pat. No. 9,535,973 on Jan.03, 2017, which claims benefit to U.S. Patent Application 61/816,867,filed Apr. 29, 2013.

BACKGROUND

Field of the Invention

This invention relates generally to event/message processing, and moreparticularly to systems for clustering messages/events received frominfrastructure.

Description of the Related Art

The World Wide Web is increasingly becoming a more important and morefrequently used form of communication between people. The primary formof web-based communication is electronic mail. Other forms ofcommunication are also used, however, such as news groups, discussiongroups, bulletin boards, voice-over IP, and so on. Because of the vastamount of information that is available on the web, it can be difficultfor a person to locate information that may be of interest. For example,a person who receives hundreds of electronic mail messages/events frominfrastructure a day may find it impractical to take the time to storethe messages/events from infrastructure in folders of the appropriatetopic. As a result, it may be difficult for the person to later find andretrieve all messages/events from infrastructure related to the sametopic. A similar situation arises when a person tries to locate newsgroups or discussion groups of interest. Because there may be noeffective indexing of these groups, it can be difficult for the personto find groups related to the topic of interest.

Some attempts have been made to help the retrieval of information ofinterest by creating web directories that provide a hierarchicalorganization of web-based information. The process of creating thedirectories and deciding into which directory a particular piece ofinformation (e.g., a news group) should go is typically not automated.Without an automated approach it is impractical to handle the massiveamounts of web-based information that are being generated on a dailybasis. Moreover, because a person may not be fully aware of the entireweb directory hierarchy or may not fully understand the semantics ofinformation, the person may place the information in a directory that isnot the most appropriate, making later retrieval difficult. It would bedesirable to have an automated technique that would help organize suchinformation.

The advent of global communications networks such as the Internet hasprovided alternative forms of communicating worldwide. Additionally, ithas increased the speed at which communications can be sent andreceived. Not only can written or verbal messages/events frominfrastructure be passed through the Internet, but documents, soundrecordings, movies, and pictures can be transmitted by way of theInternet as well. As can be imagined, inboxes are being inundated withcountless items. The large volume can more than difficult to manageand/or organize for most users.

In particular, a few of the more common activities that a user performswith respect to email, for example, are: sorting of new messages/eventsfrom infrastructure, task management of using messages/events frominfrastructure that can serve as reminders, and retrieval of pastmessages/events from infrastructure. Retrieval of recent messages/eventsfrom infrastructure can be more common than older messages/events frominfrastructure. Traditional systems employed today support at least someaspect of these three activities using folders such as an inbox,task-oriented folders, and user-created folders, respectively. However,this as well as other existing approaches present several problems. Thefolders make stark divisions between the three activities which are notconducive or coincident with user behavior, in general. For example,tasks are not visible to the user, or rather are “out of sight, out ofmind”, and thus can be easily, if not frequently, neglected, overlooked,or forgotten. In addition, in many current systems any given message canonly be in one folder at a time. Hence, the particular message cannotserve multiple activities at once. Other current systems have attemptedto ease these problems; however, they fall short as well for similarreasons.

A user can communicate using one or more different messaging techniquesknown in the art: email, instant messaging, social network messaging,cellular phone messages/events from infrastructure, etc. Typically, theuser can accumulate a large collection of messages/events frominfrastructure using one or more of these different messagingtechniques. This user collection of messages/events from infrastructurecan be presented as a large collection of messages/events frominfrastructure with limited options of grouping or clustering themessages/events from infrastructure.

One way of grouping messages/events from infrastructure is to groupmultiple emails into an email thread. An email thread is a collection ofemails that are related based on the subjects of the emails. Forexample, one user sends an email to one or more users based on a givensubject. Another user replies to that email and a computer would markthose two emails as belonging to a thread. Another way for groupingmessages/events from infrastructure is put the messages/events frominfrastructure into folders. This can be done manually by the user orcan be done automatically by the user setting up rules for messageprocessing.

Document clustering and classification techniques can provide anoverview or identify a set of documents based upon certain criteria,which amplifies or detects certain patterns within its content. In someapplications these techniques lead to filtering unwanted email and inother applications they lead to effective search and storage strategies.An identification strategy may for example divide documents intoclusters so that the documents in a cluster are similar to one anotherand are less similar to documents in other clusters, based on asimilarity measurement. One refers to the process of clustering andclassification as labeling. In demanding applications labeling cangreatly improve the efficiency of an enterprise, especially for storageand retrieval applications, provided that it is stable, fast, efficient,and accurate.

Users of information technology must effectively deal with countlessunwanted emails, unwanted text messages/events from infrastructure andcrippling new viruses and worms every day. This largely unnecessarilyhigh volume of network traffic decreases worker productivity and slowsdown important network applications. One of the most serious problems intoday's digital economy has to do with the increasing volume of spam. Assuch, recipients of email as well as the service providers needeffective solutions to reduce its proliferation on the World Wide Web.However, as spam detection becomes more sophisticated, spammers inventnew methods to circumvent detection. For example, one prior artmethodology provides a centralized database for maintaining signaturesof documents having identified attributes against which emails arecompared, however, spammers now modify the content of their email eitherslightly or randomly such that the message itself may be intelligible,but it evades detection under various anti-spam filtering techniquescurrently employed.

At one time, at least 30 open relays dominated the world, burstingmessages/events from infrastructure at different rates and differentlevels of structural variation. Because certain types of email mutate orevolve, as exemplified by spam, spam-filtering detection algorithms mustconstantly adjust to be effective. In the case of spam email, forexample, the very nature of the spam corpus undergoes regime changes.Therefore, clustering optimality depends heavily on the nature of thedata corpus and the changes it undergoes.

Decomposing a traffic matrix has proven to be challenging. In onemethod, a matrix factorization system is used to extract applicationdependencies in an enterprise network, a cloud-based data center, andother like data centers, using a temporal global application trafficgraph dynamically constructed over time and spatial local trafficobserved at each server of the data center. The data center includes aplurality of servers running a plurality of different applications, suchas e-commerce and content delivery. Each of the applications has anumber of components such as a, web server, application server anddatabase server, in the application's dependency path, where one or moreof the components are shared with one or more of the other applications.

Because such data centers typically host a large number of multi-tierapplications, the applications requests are overlapped, both in thespatial and temporal domains, making it very difficult for conventionalpairwise statistical correlation techniques to correctly extract theseinterleaved but independent applications. A matrix-based representationof application traffic is used which captures both system snapshots andtheir historical evolution. The system and method decomposes a matrixrepresentation of application graphs into small sub-graphs, eachrepresenting a single application.

The number of applications is usually unknown a priori due tointerleaving and overlapping application requests, which further imposesa challenge to discovery of the individual application sub-graphs. Inone prior method and system, the number of applications is determinedusing low rank matrix estimation either with singular valuedecomposition or power factorization based solvers, under complete andincomplete traffic data scenarios, with theoretical bound guarantee.

Traffic tapping from switches is limited by the capability of switchesas well as the monitoring hosts. A switch typically can mirror only afew ports at the same time. In addition, monitoring data collected overmultiple switches, each with multiple ports may result in high-volumeaggregate network traffic and potentially packet loss. Both cases leadto significant loss in the monitoring data.

One system and method to overcome this problem utilizes historical datato provide redundancy and employs power factorization based techniquesto provide resilience to data loss and estimation errors. In one systemand method, a distributed network monitors and centralizes dataprocessing to determine application dependency paths in a data center.

The majority of current service management solutions are rule based. Theconcept behind rule-based systems is that you start with the system youare monitoring, analyze and model it, turning it into a series ofbusiness logic rules that respond to events as they occur. For example,in response to some logged text, you apply logic that turns the textinto a database record to which you apply more logic that turns it intoan alert, before applying again more logic to connect the alert to atrouble ticket.

The fundamental problem with this approach is that the rules aredependent on a point in time snapshot of what is out there that you aremanaging, which is subject to continual change. So, every time theinfrastructure alters the business logic must be modified. Clearly therule-based approach is not a scalable way of running a business.

SUMMARY

An object of the present invention is to provide systems for creatingevent clusters.

Another object of the present invention is to provide systems forcreating event clustering that includes a sigalizer engine.

A further object of the present invention is to provide systems forcreating event clustering that determine one or more common steps fromevents and produces clusters relating to alerts and or events.

Yet another object of the present invention is to provide systems thatcreate event clustering using a plurality of sigalizer engines todetermine one or more common steps from events, and utilize graphs, hopand proximity of a source of an event.

These and other objects of the present invention are achieved in asystem for clustering events. A first engine receives message data froma managed infrastructure that includes managed infrastructure physicalhardware which supports the flow and processing of information. A secondengine determines common characteristics of events and produces clustersof events relating to the failure of errors in the managedinfrastructure. Membership in a cluster indicates a common factor of theevents that is a failure or an actionable problem in the physicalhardware managed infrastructure directed to supporting the flow andprocessing of information. Events are produced that relate to themanaged infrastructure while converting the events into words andsubsets used to group the events that relate to failures or errors inthe managed infrastructure, including the managed infrastructurephysical hardware. The second engine or a third engines uses a sourceaddress for each event to assign a graph coordinate to each of an eventand making a change to at least a portion of the managed infrastructure.

DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates one embodiment of an event clustering system of thepresent invention.

FIG. 2 illustrates a token counter, text extraction and implementationof Shannon entropy in one embodiment of the present invention.

FIGS. 3(a)-3(c) illustrate embodiments of dashboards that can beaccessed by users of the event clustering system.

FIG. 4 illustrates processing of alerts, and a matrix M, in oneembodiment of the present invention.

FIG. 5 illustrates an embodiment of a sigalizer engine and the creationof alerts where member of cluster indicates common factors in oneembodiment of the present invention.

FIG. 6 illustrates k-mean decomposition, a created graph with graphcoordinates in one embodiment of the present invention.

FIG. 7 illustrates one embodiment of alert mapping and vector generationin one embodiment of the present invention.

FIG. 8 illustrates NMF decomposition in one embodiment of the presentinvention.

FIG. 9 illustrates the interaction of link access modules with a messagebus, algorithm engines, cluster creation and a situation room in oneembodiment of the present invention.

FIG. 10 illustrates one embodiment of a deduplication engine that can beused with the present invention.

FIG. 11 illustrates one embodiment of actions that can be takenfollowing event clustering generation.

FIG. 12 is a schematic diagram of a processing system according to anembodiment.

FIG. 13 is an example process that may be implemented using the systemsshown in FIG. 1.

FIG. 14 is an example software architecture diagram that may beimplemented using the systems shown in FIG. 1.

FIG. 15 is a screen display of a dashboard display system that may beused to configure a dashboard.

FIG. 16 is a screen display of the dashboard external interface screenthat may allow another software program to transmit data in the datarange.

FIG. 17 is a screen display that allows a user to choose a chart view inorder to display data in a graphical format.

FIG. 18 is an example screen display showing the data mapping feature ofthe dashboard configuration screen.

FIG. 19 is an example screen display showing the graphical display ofthe data using the dashboard configuration shown in FIGS. 4-7.

FIGS. 20 through 22 illustrate one embodiment of a mobile deviceinfrastructure that can be used with the clustering system of thepresent invention.

DETAILED DESCRIPTION

As used herein, the term engine refers to software, firmware, hardware,or other component that can be used to effectuate a purpose. The enginewill typically include software instructions that are stored innon-volatile memory (also referred to as secondary memory) and aprocessor with instructions to execute the software. When the softwareinstructions are executed, at least a subset of the softwareinstructions can be loaded into memory (also referred to as primarymemory) by a processor. The processor then executes the softwareinstructions in memory. The processor may be a shared processor, adedicated processor, or a combination of shared or dedicated processors.A typical program will include calls to hardware components (such as I/Odevices), which typically requires the execution of drivers. The driversmay or may not be considered part of the engine, but the distinction isnot critical.

As used herein, the term database is used broadly to include any knownor convenient means for storing data, whether centralized ordistributed, relational or otherwise.

As used herein a mobile device includes, but is not limited to, a cellphone, such as Apple's iPhone®, other portable electronic devices, suchas Apple's iPod Touches®, Apple's iPads®, and mobile devices based onGoogle's Android® operating system, and any other portable electronicdevice that includes software, firmware, hardware, or a combinationthereof that is capable of at least receiving a wireless signal,decoding if needed, and exchanging information with a server to send andreceive cultural information data including survey data. Typicalcomponents of mobile device may include but are not limited topersistent memories like flash ROM, random access memory like SRAM, acamera, a battery, LCD driver, a display, a cellular antenna, a speaker,a BLUETOOTH® circuit, and WIFI circuitry, where the persistent memorymay contain programs, applications, and/or an operating system for themobile device.

As used herein, the term “computer” is a general purpose device that canbe programmed to carry out a finite set of arithmetic or logicaloperations. Since a sequence of operations can be readily changed, thecomputer can solve more than one kind of problem. A computer can includeof at least one processing element, typically a central processing unit(CPU) and some form of memory. The processing element carries outarithmetic and logic operations, and a sequencing and control unit thatcan change the order of operations based on stored information.Peripheral devices allow information to be retrieved from an externalsource, and the result of operations saved and retrieved. Computer alsoincludes a graphic display medium.

As used herein, the term “Internet” is a global system of interconnectedcomputer networks that use the standard Internet protocol suite (TCP/IP)to serve billions of users worldwide. It is a network of networks thatconsists of millions of private, public, academic, business, andgovernment networks, of local to global scope, that are linked by abroad array of electronic, wireless and optical networking technologies.The Internet carries an extensive range of information resources andservices, such as the inter-linked hypertext documents of the World WideWeb (WWW) and the infrastructure to support email. The communicationsinfrastructure of the Internet consists of its hardware components and asystem of software layers that control various aspects of thearchitecture.

As used herein, the term “extranet” is a computer network that allowscontrolled access from the outside. An extranet can be an extension ofan organization's intranet that is extended to users outside theorganization in isolation from all other Internet users. An extranet canbe an intranet mapped onto the public Internet or some othertransmission system not accessible to the general public, but managed bymore than one company's administrator(s). Examples of extranet-stylenetworks include but are not limited to:

-   -   LANs or WANs belonging to multiple organizations and        interconnected and accessed using remote dial-up    -   LANs or WANs belonging to multiple organizations and        interconnected and accessed using dedicated lines    -   Virtual private network (VPN) that is comprised of LANs or WANs        belonging to multiple organizations, and that extends usage to        remote users using special “tunneling” software that creates a        secure, usually encrypted network connection over public lines,        sometimes via an ISP.

As used herein, the term “Intranet” is a network that is owned by asingle organization that controls its security policies and networkmanagement. Examples of intranets include but are not limited to:

-   -   A LAN    -   A Wide-area network (WAN) that is comprised of a LAN that        extends usage to remote employees with dial-up access    -   A WAN that is comprised of interconnected LANs using dedicated        communication lines A Virtual private network (VPN) that is        comprised of a LAN or WAN that extends usage to remote employees        or networks using special “tunneling” software that creates a        secure, usually encrypted connection over public lines,        sometimes via an Internet Service Provider (ISP).

For purposes of the present invention, the Internet, extranets andintranets collectively are referred to as (“Network Systems”).

For purposes of the present invention, the term “Infrastructure” means,information technology, the physical hardware used to interconnectcomputers and users, transmission media, including telephone lines,cable television lines, and satellites and antennas, and also therouters, aggregators, repeaters, computers, network devices,applications, and other devices that control transmission paths,software used to send, receive, and manage the signals that aretransmitted, and everything, both hardware and software, that supportsthe flow and processing of information.

As used herein, “event message” or “event” is defined as a change instate. An event is anything that happens, or is contemplated ashappening in message form or event form relating to infrastructure. Anevent can include a time stamp, and a name for the entity changingstate.

Referring to FIG. 1, a system 10 is provided for clustering eventsreceived from an infrastructure 14.

In one embodiment the system 10 is an event clustering system 10 thatincludes an extraction engine 12 in communication with an infrastructure14. As a non-limiting example, infrastructure 14 includes, computers,network devices, appliances, mobile devices, applications, connectionsof any of the preceding, text or numerical values from which those textor numerical values indicate a state of any hardware or softwarecomponent of the infrastructure 14. The infrastructure 14 generates datathat includes attributes. As a non-limiting example, the data isselected from at least one of, time, source a description of the event,textural or numerical values indicating a state of the infrastructure14. The extraction engine 12 breaks event messages into subsets ofmessages that relate to failures or errors in the infrastructure 14. Thesubsets of messages can be grouped into clusters.

In one embodiment, the extraction engine 12 includes a server. Theextraction engine 12 extracts text components from the event messagesand converts them into words and subtexts. The extraction engine 12 thenreformats data from the event messages to create reformatted data. Inone embodiment, the reformatted data is received at a system bus.

The extraction engine 12 receives infrastructure 14 data and producesevents and populates a database 16 with a dictionary of event entropy.This can be achieved with a token counter as illustrated in FIG. 2. As anon-limiting example, the database 16 can be a no-SOL relationaldatabase 16.

In one embodiment, an entropy database 16 is generated with the word andsubtexts. As a non-limiting example the entropy database is generatedusing Shannon Entropy, −In (1/NGen) and normalizes the words andsubtexts as follows:−L P.(t) log P(t)

-   -   where, P(t,)=probability of each item is selected randomly from        an entire dataset.

An entropy database can be provided. In one embodiment, the entropynormalizes events across data, datasets, from the infrastructure 14. Asa non-limiting example, normalized entropy for events is mapped from acommon, 0.0 and a non-common, 1.0, as discussed hereafter. Entropy isassigned to the alerts. The entropy for each event is retrieved from anentropy dictionary, as it enters the system 10. This can be donecontinuously in parallel with other operation of the extraction engine12 or run non-continuously.

In one embodiment, illustrated in FIGS. 3(a)-3(b) a dashboard 18,associated with a situational room, are included which allows entitiesand/or people to manipulate messages/events from infrastructure, alertsor events.

An alert engine 20 receives the events and creates alerts that aremapped into a matrix “M” of events, as illustrated in FIG. 4 and as morefully explained hereafter. As a non-limiting example, Mk is the matrixof events.

A sigalizer engine 22 includes a plurality of engines as illustrated inFIG. 5. As non-limiting examples, an NMF engine 24, a k-means clusteringengine 26 and a topology proximity engine 28 are provided. Eachsignalizer engine 22 includes a processor and an arithmetic logic unit“ALU”. Examples of suitable ALUs are found in EP 0171190 and EP 0271255,fully incorporated herein by reference. In one embodiment, the sigalizerengine 22 determines one or more steps from events and produces clustersrelating to the alerts and or events.

The sigalizer engine 22 determines sigalizer common steps to ascertainhow many clusters to extract from events. Membership in a clusterindicates a common factor, which can be a failure or an actionableproblem in the infrastructure 14. The sigalizer engine 22 generatesclusters of alerts. In one embodiment, an independent failure countdetection engine 29 is used for the production of common stepsdesignated as “k” from events. The independent failure count detectionengine 29 can use SVD decomposition. The SVD decomposition is acontinuation of a determination of sigalizer 22 common steps.

K is the number obtained from the common sigalizer steps. As anon-limiting example, common sigalizer steps are designated as Mi, wherei are unique events and are the rows of M, j represents the time bucketsin M. A value for Mi equals the number of occurrences of event i in timebucket j. This is the common input to the sigalizer engines 22.

The topology proximity 28 creates a graph coordinate system, FIG. 6. Inone embodiment the topology proximity 28 uses a source address for eachevent to assign a graph coordinate 30 of a graph 32, with nodes, to theevent with an optional subset of attributes being extracted for eachevent and turned into a vector. The topology proximity engine 28executes a graph topology and proximity algorithm.

Mk undergoes K-means decomposition, FIG. 7. Each event is a transformedvector, where (Vo is transformed time stamp, Vi, −Vn and so forth aretransformed graph coordinates 30) are grouped into k clusters such thatd (Vi, V2,) is minimized. In one embodiment, the topology engine 28inputs a list of devices and a list of hops, where hop is a connectionbetween components or nodes in the infrastructure 14.

As a non-limiting example, the graph 32 can be constructed of any numberof points or nodes: A, B, C, and D, which relate to the source of anevent. The result is a connecting graph 32, FIG. 6.

The topology proximity engine 28 receives the coordinate's mapping, andclusters are generated. V base nodes calculate a minimum hops to everyother node which gives coordinate and the graph coordinates 30 aremapped.

In one embodiment, the k-means clustering engine 26 uses the graphcoordinates 30 to cluster the events using a k-means algorithm todetermine hop proximity of the source of the event.

M,k is processed by the sigalizer engine 22. Mab is transformed to Aak®

Bkb, where a equals rows, and b equals columns, x defines the normaloperation of matrix multiplication. M is the matrix as stated above, andk is as recited above.

The NMF algorithm produces two matrices, A and B, FIG. 8. A representsby cluster (a common failure) and B represents time bucket by cluster (acommon failure). In one embodiment, the NMF engine 24 factors the matrixM into A and B, where A are deemed to be significant and are extracted,e.g., clusters deemed significant are extracted. The system 10 looks forsignificantly high values as compared to statistically significantvalues in the A and B matrix. If they are not statistically significant,they are dropped. The statistically significant elements of Mare used todetermine a cluster. As a non-liming example, the determination ofsignificance is based on high signatures in the matrix. As above, thosethat are not high enough are dropped and not included in the output ofclusters which is produced.

Each alert is mapped to a vector, Vo-Vn, where Vo is a time stamp t; Viis an attribute of alert. In one embodiment, attributes of an event aremapped to a vector V.

The vectors are grouped into k clusters using k-means such that d(Vi,V2.) is a minimum in its own cluster.

In one embodiment the grouping is executed also using a standardEuclidian distance. In one embodiment, a weighting of components issupplied. The system 10 transforms the alert attributes into a numbervalue that is used as the components of the vector. As a non-limitingexample, an alert attribute is a textual value. In one embodiment,similar attributes are mapped to numbers that are also similar or closerelative to the graph, with the closeness being dynamic and can bepredetermined, changed, modified, set, and the like.

In one embodiment of the matrix, M, columns are slices in time and therows are unique alerts. A unique alert is received from thededuplication engine which eliminates duplications and creates uniquealerts.

In one embodiment, the matrix, M is created with alert/time and a fixednumber of common alerts. The matrix M can be dynamic and change in time.The matrix M includes rows that can be unique alerts. The matrixincludes columns that are time buckets, and a number of occurrences areplotted.

Evaluated events are either discarded or passed to clusters with alertsare collected into time buckets and mapped in the matrix M. In oneembodiment, a bucket width is a parameter that can be an input to thesignalize engine 22.

Outputs from the sigalizer engines 22 are received at a compare andmerge engine 34. The compare and merge engine 34 communicates with oneor more user interfaces 36 in the situation room 18, FIG. 9. The threesigalizer algorithms are used with the comparison or merger engine 34and clusters are published on the system bus 38 for display in thesituation room 18.

As a non-limiting example, the bus 38 can be a publication message bus.As a non-limiting example, the bus 38 processes anything that goes fromA to B, and from B to A. In one embodiment, a data bus web server iscoupled to user interfaces as illustrated in.

As illustrated in FIG. 9, a plurality of link access modules 40 are incommunication with the data bus 38 and receive messages/events. Eventsare received by a coordinator 42 that executes clustering of the events.

In one embodiment, normalized words and subtexts are mapped to a common,0.0 and a non-common, 1.0, as illustrated in FIG. 2.

The alerts can be run in parallel with the activities of the system 10.The alerts are passed to the sigalizer engine 22, FIG. 5.

In one embodiment, a deduplication engine 44 is used for event messagesof data streams received from the client, FIG. 10. The deduplicationengine 44 eliminates duplicate copies of repeating data. In oneembodiment, the deduplication engine reduces a number of bytes innetwork data transfers that need to be sent.

A computer scripting language script language can be included thatalters the events or flow of events. As non-limiting examples, thescripting language can be, Java, C, C++, C#, Objective-C, PHP, VB,Python, Pearl, Ruby, Javascript and the like.

In one embodiment, the NMF, k-means, and/or topology proximityalgorithms are optionally repeated. The repeating can be performed byvarying k from the previously performed common steps in the sigalizerengine 22, and optionally along with the SVD decomposition.

Optionally, generated clusters are tested against a quality functionsupplied by the system 10 which evaluates a cluster's uniformity. In oneembodiment, the system 10 selects a best set clusters against thequality clusters.

As a non-limiting example, clusters are examiner against a customersupplied configuration database for each source of an event. As anon-limiting example, the examining can be performed to determine: atype of device; impacted users; relevant support experts, and the like,FIG. 11.

EXAMPLE 1

As a non-limiting example, the NMF algorithm can be executed as follows:

Let Mi by an x p non-negative matrix, (i.e., with M>0, and k>O aninteger). Non-negative Matrix Factorization (NMF) consists in finding anapproximationX=W H(A B),  (1)where W, Haren k and k p non-negative matrices, respectively. Inpractice, the factorization rank r is often chosen such that r<<min(n,p) but is determined.

The main approach to NMF is to estimate matrices W and H as a localminimum: 1) M

=A B

A, B seed randomly tentatively adjusts A, B until the Frobenius distance

II M-A B II is minimized where

-   D is a loss function that measures the quality of the approximation.    Common loss functions are based on either the Frobenius distance or    the Kullback-Leibler divergence.-   R is an optional regularization function, defined to enforce    desirable properties on matrices Wand H, such as smoothness or    sparsity.

EXAMPLE 2

As a non-limiting example, a k-means algorithm is used as follows: Givena set of event vectors (x1, x2, . . . , Xn), where each observation is ad-dimensional real vector, k-means clustering aims to partition thenobservations into k sets (k n) 5={S1, S2, . . . , Sk} so as to minimizethe within-cluster sum of squares (WCSS):

$\underset{s}{argmin}{\sum\limits_{i = 1}^{k}{\sum\limits_{x_{j}\epsilon\; S_{i}}{{x_{j} - \mu_{i}}}^{2}}}$where Jli is the mean of points in Sj.

In one embodiment of the situation room 18, as illustrated in FIG. 1, asystem 110 is provided for creating, and displaying in a dashboarddirected to the system 10 from clustering messages received from theinfrastructure 14, also known as the dashboard system for the situationroom 18.

In one embodiment, the situation room 18 has a display that can beinteractive. The situation room 18 can be coupled to or includes adashboard design system 112, display computer system 114, and a datasystem 116.

In one embodiment, the system includes dashboard converter logic 118,data range determination logic 132, dashboard component generator 122,external interface logic 124, graphic library 126, and network interfacelogic 128. In one embodiment, the system includes data processingcomputing systems.

In one embodiment, the dashboard file converter logic 118 converts thesituations and alerts from system 10 from clustering messages receivedfrom the infrastructure 14 data structures and data, to be compatiblewith or match with the interface logic 124.

In one embodiment, the logic 118 provides communication between thegraphical dashboard and the problem walls from clustering messagesreceived from the infrastructure 14.

The problem walls from clustering messages received from theinfrastructure 14 are provided as disclosed above.

In one embodiment, the logic 132, dashboard component generator 122 andthe external interface logic 124 is each used for designing the problemwalls from clustering messages received from the infrastructure 14.

A dashboard or SWF file can be included that establishes a data range,type of components and the external interface. In one embodiment, thelogic 132 is used for a data range in a spreadsheet associated with thedashboard file used to generate a visual display.

In one embodiment, a dashboard component generator 122 is provided thatallows a user to place problem walls from clustering messages receivedfrom the infrastructure 14 components with various attributes onto acanvas. The canvas can be a space where various visual components are.

In one embodiment, the user is able to choose components directed toproblem walls from clustering messages received from infrastructure 14elements from a different components. These can be included in a paneland the user can then place them on the canvas in any way that the userdesires.

In one embodiment, the components are provided by the client, by thesystem, by third parties, and from third parties. Examples of othercomponents include but are not limited to, graphs, style ofpresentation, additional information, comparisons, trends, artisticelements, text, and the like. In some embodiments, the user, or clientcan select the background, margins, presentation of elements and thelike.

In one embodiment, an external interface logic 124 is provided. Theinterface logic allows a dashboard to provide data ranges, permutations,trends, activities, and the like associated with problem walls fromclustering messages received from the infrastructure 14. In oneembodiment, interface logic 124 allows the business application softwareto export application data to be displayed in a dashboard in aninteractive visual format.

In various embodiments, a network interface logic 128 and 130 allows forconnectivity of the dashboard design system 112, display computer system114 and data system 116 to each other, or to public networks. In oneembodiment, a graphical file that has been configured by the computersystem

112 are stored in the data storage system 136. In one embodiment, thegraphic file is used for data mapping, both during and after designtime, and can generate the display during a period of execution. Theexternal adapter can be utilized for communication between the datastorage system 136 and the graphical file.

In one embodiment, network interface logics 128 and 130 allow computersystems 112, 114 and 116 to connect to each other and the other computersystems. As a non-limiting example, the network interface logic 128 and130 can be one or more computers or web servers that provide a graphicaluser interface for clients or third parties that access the subsystemsof system 112, 114 or 116 through the internet or an intranet protocol.The network interface logic 128 and 130 can include other logicsconfigured to provide interfaces for other types of devices, includingbut not limited to mobile devices, server-based computing systems, andthe like.

As a non-limiting example, in one embodiment, the display computersystem 114 includes, network interface logic 130, context viewer system138, data storage system 136 and dashboard display system 140.

In another embodiment, the dashboard display system 140 is included inthe context viewer system 138, and be executed in a machine, one or moredisplay and other computers, with machine-readable storage media, cache,memory, flash drive or internal or external hard drive or in a cloudcomputing environment, non-transitory computer readable media ornon-transmissible computer-readable media, with stored instructionsexecuted by the machine to perform the operations. In one embodiment,the context viewer system 138 is a program product that performs variousprocessing functions. As non-limiting examples, these functions caninclude, receiving data from the data source, preparing data byaggregating, providing access to visualization capabilities, and thelike.

In one embodiment, the data storage system 136 stores data related toproblem walls from clustering messages received from the infrastructure14 applications executed on the display computer system 114.

In one embodiment, the data storage system 136 stores problem walls fromclustering messages received from the infrastructure 14 data orstatistical data. As a non-limiting example, the dashboard displaysystem 140 communicates with the display computer system 114 to displayproblem walls from clustering messages received from infrastructure 14data in a dashboard in a visual manner or in visual components usinggraphics. Displaying problem walls from clustering messages receivedfrom infrastructure 14 data graphically may include displaying bargraphs and/or pie charts or other visual displays. In order to generatethe dashboard display, the client can map dashboard data fields to theproblem walls from clustering messages received from infrastructure 14data fields. This allows access of data from problem walls fromclustering messages received from infrastructure 14 without datareplication.

Embodiments of the data storage system 136 may store a variety ofinformation including application data in database 130. The applicationdata database 130 may receive data from the data system 116. The datastorage system 136 may provide data to the context viewer system 138.More specifically, the data storage system 136 may provide data to thedata aggregation logic 142. The data storage system 136 may receiveappropriate data mapping instructions from the data mapping logic 144and query the data system 116 to correlate the data from one mappedfield in the dashboard tool to the mapped fields in the application data146.

Embodiments of the dashboard display system 140 may be provided on thedisplay computer system 114. In an example embodiment, the dashboarddisplay system 140 may transfer data from various data sources or datafrom various applications to external data ranges of the graphic fileand display the graphical interface during runtime operations. Thedashboard display system 140 may include all of the features discussedabove with regard to the dashboard design system 112. Also, thedashboard display system 140 also includes a dashboard execution logic148 and external interface logic 150. The external interface logic 150may have similar features as the external interface logic 124 of thedashboard design system 112. The external interface logic 150 may exposeselected data ranges of the dashboard to the business software data. Theexternal interface logic 150 may allow the business application softwareto export application data to be displayed in the dashboard in a visualformat instead of a textual format. During runtime when displaying thedashboard in the business application, the dashboard execution logic 148is configured to receive the data from the business application andgenerate a Flash Island interactive display as designed by the dashboarddesign system 112 or dashboard display system 140.

The data system 116 includes an application logic 152 and applicationdata 146. The data system 116 may be configured to provide data andcommunicate with the display computer system 114. The application logic152 is the server side of the application that provides back endinformation to the

context viewer system 138. For example, the application logic 152 maycomprise an Enterprise Resource Planning (ERP), Customer RelationManagement (CRM) or Business Intelligence (BI) system. Businessintelligence may refer to

computer-based techniques used to analyze business data, such as salesrevenue by products and/or departments or associated costs and incomes.The application data 146 may include relational or other types ofdatabases. The application data 146 includes various fields that may bemapped to the fields exposed by the external dashboard interface.

FIG. 13 is an example process that may be implemented using the systemshown in FIG. 12. Initially, at step 154, in an example embodiment adashboard design user may build a dashboard using a dashboard buildingsoftware. The dashboard design user may configure the dashboard duringdesign time. In an example embodiment, design time may include thedesign user configuring the dashboard layout and exposing a related datarange. The dashboard design system 112 may be used to create a dashboardlayout. Building the dashboard includes placing components on the canvasand configuring the properties associated with those components. Asdiscussed above, the components may be among other components, a chartor graph. At step 156, the dashboard design user may determine andspecify using a graphical user interface the data ranges for thedashboard. After creating the

dashboard, at step 158, the dashboard may be exported automatically orby input from the dashboard design user to a SWF file format. Steps 154,156 and 158 may be performed by the dashboard design user using thedashboard configuration system 112.

A business user may perform the other steps of FIG. 13 by using thedisplay computer system 114. In an example embodiment, the businessuser's steps may be performed during runtime. In this embodiment,runtime includes displaying of the dashboard in a business applicationusing data from business application data sources. In anotherembodiment, the business user may perform the steps described above withregard to the dashboard design user. At step 160, the business user mayopen the context viewer system where the business user may select achart view 198 as shown in FIG. 17. In the chart view tab, the businessuser may assign the dashboard or SWF® file to a query view by specifyingthe location of the file. At step 162, the dashboard data ranges thatwere determined at step 156 may be mapped to query view fields. In anexample embodiment, the data from the data source 136 (or 116) is placedin the mapped location in the dashboard. In another example embodiment,the mapping between application data and graphical interface data mayidentify which application data may be shown in the reserved placeholderof the dashboard. After mapping the data ranges, at step 164 thedashboard may be displayed in the business application. In oneembodiment the business application may be software applications thatprovide various functionalities such as, customer relationshipmanagement, enterprise resource management, product lifecyclemanagement, supply chain management and supplier relationshipmanagement. In another embodiment, the dashboard may be configured toreceive data from the data system 116 after the mapping has occurred orthe data may be accessed during runtime.

FIG. 14 is an example software architecture that may be implementedusing the system in FIG. 12. The software architecture diagram shown inFIG. 14, shows various software layers, such as, graphic player 166,component Dynamic HTML or Java® Script 168, and Server (Java® or Java®based or other high level programming language based) 170 layers. Inparticular, the generic adapter 172 may be built with the Flash Islandlibrary, which may facilitate the client-side communication between HTMLand JavaScript® The Dynamic HTML 168 may load the generated dashboard ina graphic file, or Flash/SWF representation. The generic adapter 172 mayconvert the Java® context into structures that match the dashboard'sexternal interface format or the dashboard format. The generic adapter172 allows the business user to generate a dashboard in a businessanalytic software using the most updated data from a data source withoutwriting any customized software. The generic adapter 172 may loaddashboard data ranges and convert the associated data into an XML®string that may be used for further conversion into an ABAP® string,which may be used by the business analytic software.

In another embodiment, the generic adapter 172 may convert the FlashIsland properties into dashboard structures. In an example embodiment,the generic adapter 172 may be used to load external dashboard rangesduring the configuration stage, at step 162. In this embodiment, thegeneric adapter 172 may push application data to the data ranges definedin step 162. In another embodiment, the generic adapter 172 may providean application programming interface between the graphic player 166 andthe server 170. The generic adapter 172 may load dashboard rangesautomatically and the dashboard data ranges may be converted into XMLstrings. The XML string may be converted into Java® or ABAP® code whichmay be executed by the business application 174, to display a dashboard.The server 170 may include NetWeaver®, ABAP® or Java® languageprogramming and the server may include various systems that aresupported in the business software

suit, the runtime 382, application 174, database 176 and businessintelligence application 178. In another embodiment, the functionalityof the server 170 may be implemented by the display computing system114. In yet another embodiment the functionality of server 170 may bedivided between the display computing system 114 and data system 116. Inanother embodiment, the graphic player 166 may be implemented on thedashboard design system 112. Additionally or alternatively, thefunctionality of the graphic player 166 may be implemented on thedisplay computing system 114.

FIG. 15 shows a screen display 180 of the dashboard designer that may beused to design a dashboard display according to the system shown in FIG.12. The dashboard designer may be executed by the dashboard designsystem 112. The dashboard may be created on the canvas 182. A dashboarddesign user may place the components from the component panel on thecanvas 182. As shown in FIG. 15, the canvas 182 has a bar graph 184 anda pie chart 186 that are displayed in this example dashboard. Thedashboard 180 shown in FIG. 15 is using example data from thespreadsheet shown at the bottom of FIG. 15. For example, the labels ofthe bar graph “Incorrect labeling”, “Wrong component” and “Materialdefects” are from the spreadsheet shown below. In particular, the cellrange from 84 to 05 440 was selected as input into the properties of thebar graph and the pie chart. Next, the data in the bar graph and the piechart is received from cell range 85 to 05. In order to generate thisdashboard the dashboard design user may associate various data fieldswith particular component properties.

FIG. 16 is a screen display of the dashboard external interface that canpermit another software program to access the dashboard controls anddisplay. The external interface connection 188 may allow data from theapplication system to be passed to a cell range of the dashboard or SWFfile, using push technology. During the execution of the dashboard orruntime, data may be pushed or sent from the data source, based on themapping, to the dashboard. In this embodiment, the data may betransferred in tabular form across an interface. In another embodimentthe external interface connection 188 may allow the use of pulltechnology, where the data is pulled by the context viewer system 138.In another embodiment, during the configuration of the dashboard whenthe “Generate XC Fields” button is clicked, the defined data ranges willbe pulled to the system 150, for example in FIG. 16. The externalinterface connection 188 may be configured using a definition tab 190,range name 192, range type, range 194 and access type properties.External interface connections allow a dashboard design user to exposeselected data ranges relating to the dashboard display. The range name192 in FIG. 16 is shown as Labels and the range 194 being assigned,“Table 1 !$8$4:$0$4” which is the cell range from 84 to 04. In thisexample embodiment, the labels from 84 to 04 will be used for mappingthe Labels field. After specifying the data range, the dashboard designuser may export the dashboard as a file, the file may be executed byvarious software program including business software.

FIG. 17 is a screen display that allows a user to choose a chart view inorder to display a dashboard. In particular, the query view 196 is partof the context viewer application and includes various data types from abusiness analytics database. If the user chooses to view a chart, theuser may select the chart view 198. After a user selects the chart view198 then the user may be presented with a screen shown in FIG. 18.

FIG. 18 is an example screen display showing the data mapping for thedashboard configuration screen. Screen 210 shows a user interface wherethe user may select (using a pull down menu) the type of technology 212the

user plans to use for the chart view display. Here, the user may selectthe type of dashboard file that was created as the technology. Next, thefile path 214 of the exported dashboard or SWF file may be specified.After choosing a SWF file, the user may select the “Upload file torepository” button 730 in order to save a graphic file (SWF file) in thesystem 138. After selecting button 740 “Generate XC Fields”, may be thename of the dashboard external data ranges (e.g. “Damages” and “Labels”in FIG. 16). In the mapping shown in FIG. 18, the user may enter orbrowse for the name of data source (Query ID). For example, the Query IDshown in this example is “ZOK_QN”. This entry is mapped against the datasource that may be stored in the application data 146. The user maysearch for the Query Field ID, which is a specific field of data sourceQuery ID (e.g. field “CODE TEXT” of Query ID “ZOK_QN” in the providedexample). Creating this mapping allows the dashboard to utilize the datain the application data 146 or 130. As can be appreciated thatprogramming in a textual or visual manner is not required and the usermay create the dashboard, export the dashboard, map the fields anddisplay the dashboard as shown in FIG. 19 using a graphical userinterface that responds to a pointing device (e.g. mouse, pen or displaydevice that is sensitive to touch or ocular movement).

FIG. 19 is an example screen display showing the graphical display ofthe data using the dashboard configuration from FIGS. 15-18. FIG. 19shows a dashboard 216 that includes the bar graph 218 and pie chart 220.The labels and the value data in the bar and the pie charts 218 and 220are from the business software and are different than the data used inFIG. 15. Therefore, the user can create a display of a dashboard inanother application by using an external connection that may expose datafields to permit the visualization of any type of data.

The embodiments refer to a dashboard that may be a web-based or othertechnology based display on which real time data is collated, processed

and displayed from multiple data sources that belong to one or morebusinesses. Other terms that may be used to describe a dashboard,include, digital dashboard, enterprise dashboard, business dashboard,executive dashboard, operational dashboard, B1 dashboard, databasedashboard, Web dashboard, performance dashboard, score card, KPIdashboard, metrics dashboard and so on. Dashboards may be designed tohelp any user monitor what's happening or has happened in the pastvisually or at a glance. Dashboards may provide the user a means torapidly monitor the current status. Accordingly, dashboards must bedesigned to take advantage of the strengths of visual perception,cognition and work around or augment the user's weaknesses.

Embodiments can include a system for displaying data stored on computerreadable non-transitory media. The system configured to access one ormore data fields within a file. The file having been configured using anexternal connection adapter. The system may include a display computersystem configured to map the accessed one or more data fields to datafrom one or more data sources, the mapping being performed based on auser input via a graphical user interface. In this embodiment, thesystem may be configured to display on the display computer system adashboard according to the configuration setting stored in the file, thedashboard may show a graphical representation of the data from the oneor more data sources and information from the one or more data fields.

In another embodiment, the dashboard includes dashboard display systemthat processes the data from the one or more data sources and displays avisual representation of the data in a graph or chart form.Alternatively or additionally, the dashboard includes a component thatis modified by using a graphical user interface such that the dashboarddisplay or components are modified.

In another embodiment, the file is generated by a first software programlocated in the dashboard design system that is configured to generatethe dashboard. The display computing system may further compriseexecuting a second software program on the display computer system toretrieve the data from the one or more data sources and displaying thedashboard. The display computing system may include converting, using ageneric adapter, the data from the one or more data sources into datastructures that are compatible with a format of the graphic file.

In another embodiment the data is converted from the one or more datasources into data structures that are compatible with a format of thefile using the external connection adapter. The file can be a short webformat file that exposes

one or more data fields that may be mapped to fields in one or more datasources. In another embodiment, the mapping may occur via a graphicaluser interface free of receiving textual programming code from the user.

In another embodiment, a computer-implemented method is stored on acomputer readable media. Visualization software is integrated with adata processing application that includes configuring a dashboarddisplay using a dashboard design system. The dashboard display can useone or more first data ranges from a spreadsheet as example data. Anexternal connection adapter can be used to provide access to one or morefirst data ranges that are to be displayed in the dashboard display.

In other embodiments, the dashboard display is exported in a graphicfile format. In certain embodiments, one or more first data ranges areaccessed from the dashboard display using a display computing system. Inone embodiment, one or more first data ranges are connected to one ormore second data ranges from one or more data sources. The dashboard candisplay using data from the one or more second data ranges.

In one embodiment, the dashboard displays with the problem walls fromclustering messages received from infrastructure 14 data can use agraphical user interface that is free from receiving textual or textualprogramming code from the client. In this embodiment the method mayinclude processing place problem walls from clustering messages receivedfrom managed infrastructure 14 from the one or more data sources anddisplaying a visual representation of the data in a graph or chart form.This can include a method that includes a component that may be modifiedby using a graphical user interface that results in a modification ofthe dashboard display.

In one embodiment, a method is provided that includes a dashboarddisplay generated by a first software program that generates a visualdisplay. This can include, executing a second software program on thedisplay computer system to retrieve the data from the one or more datasources and displaying the dashboard and the method may includeconverting, using a generic adapter, the data from the one or more datasources into data structures that are compatible with a format of thefile.

In one embodiment, the exporting can include converting the placeproblem walls from clustering messages received from infrastructure 14data from the one or more second data sources into data structures thatare compatible with the graphic file format. In one embodiment, this caninclude converting using an external interface adapter. A graphic fileformat can be a short web format that allows software to access the oneor more first data ranges.

In another embodiment, a user interface system has an externalconnection adapter configured to provide access to one or more datafields within a file. As a non-limiting example, this can include adisplay computer system that maps using a graphical user interface theone or more data fields to data from

one or more data sources. The display computer system can generate adashboard display from a configuration in the file. In one embodiment,the display includes place problem walls from clustering messagesreceived from infrastructure 14 data from one or more data sources andinformation from one or more data fields. A graphical user interface canbe provided that is free of receiving textual programming code from theuser.

In one embodiment, a first software executed on a display computersystem that generates the dashboard in a visual graphic display. Asecond software program can be included to execute on the displaycomputer system and retrieve the data from the one or more data sourcesand display the dashboard display. A generic adapter can be utilized toconvert the data from the one or more data sources into one or more datastructures that are compatible with a format of the file.

In one embodiment, a graphical user interface can modify a component andthis can be used to modify the dashboard display.

In one embodiment, an external connection adapter converts the data fromthe one or more data sources into data structures that are compatiblewith a format of the file using the external connection adapter.

The logics can be machine-readable media for carrying or havemachine-executable instructions or data structures stored thereon. The

machine-readable media can be any available media that may be accessedby a general purpose or special purpose computer or other machine with aprocessor. As a non-limiting example, a variety of machine-readablemedia can be utilized, including but not limited to: RAM, ROM, EPROM,EEPROM, CD-ROM or other optical disk storage, magnetic disk storage orother magnetic storage devices, non-transitory computer readable mediaor non-transmissible computer-readable media or any other medium whichmay be used to carry or store desired program code in the form ofmachine-executable instructions or data structures and which may beaccessed by a general purpose or special purpose computer or othermachine with a processor. With the dashboard system, any such type ofconnection is termed a machine-readable medium. It will be appreciatedthat the machine-readable medium can include combinations of thepreceding.

As non-limiting examples, with the dashboard system, machine-executableinstructions can be: instructions and data which cause a general purposecomputer, special purpose computer, or special purpose processingmachines to perform a certain function or group of functions, and thelike.

The dashboard system can be implemented by a program product includingmachine-executable instructions, such as program code. As a non-limitingexample, this can be program modules executed by machines in networkedenvironments. As non-limiting examples, the program modules can includeroutines, programs, objects, components, data structures, and the like,that perform particular tasks or implement particular abstract datatypes. As non-limiting examples the dashboard system can utilize,machine-executable instructions, associated data structures, and programmodules as program code for executing steps of the methods disclosedherein.

As non-limiting examples, the dashboard system can be executed in anetworked environment using logical connections to one or more remotecomputers having processors. AS non-limiting examples, suitable networkcomputing environments can be, computers, including personal computers,mobile devices, multi-processor systems, microprocessor-based orprogrammable consumer electronics, network PCs, minicomputers, mainframecomputers, and the like.

In certain embodiments, the dashboard system can be executed indistributed computing environments where tasks are performed by localand remote processing devices that are linked. As non-limiting examples,the linking can be by, hardwired links, wireless links, combination ofhardwired or wireless links, and the like, through a communicationsnetwork. In one embodiment, computing environment, program modules maybe located in both local and remote memory storage devices.

As a non-limiting example, one embodiment of a system for implementingthe overall system or portions of the embodiments can include a generalpurpose computing computers in the form of computers, including aprocessing unit, a system memory or database, and a system bus thatcouples various system components including the system memory to theprocessing unit. The database or system memory cam include read onlymemory (ROM) and random access memory (RAM).

As a non-limiting example, the database can be a magnetic hard diskdrive for reading from and writing to a magnetic hard disk, a magneticdisk drive for reading from or writing to a removable magnetic disk, andan optical disk drive for reading from or writing to a removable opticaldisk such as a CD ROM or other optical media, and the like.

As a non-limiting example, the drives and their associatedmachine-readable media can be used to provide nonvolatile storage ofmachine executable instructions, data structures, program modules andother data for the computer. It should also be noted that the word“terminal” as used herein is intended to encompass computer input andoutput devices. User interfaces, as described herein may include acomputer with monitor, keyboard, a keypad, a mouse, joystick or otherinput devices performing a similar function.

Referring now to FIGS. 20 through 22, diagrams are provided illustratingembodiments of a mobile or computing device that can be used asinfrastructure 14 with system 10.

Referring to FIGS. 20-22, the mobile or computing device can include Adisplay that can be a touch sensitive display. The touch-sensitivedisplay is sometimes called a “touch screen” for convenience, and mayalso be known as or called a touch-sensitive display system. The mobileor computing device may include a memory (which may include one or morecomputer readable storage mediums), a memory controller, one or moreprocessing units (CPU's), a peripherals interface, Network Systemscircuitry, including but not limited to RF circuitry, audio circuitry, aspeaker, a microphone, an inpuVoutput (1/0) subsystem, other input orcontrol devices, and an external port. The mobile or computing devicemay include one or more optical sensors. These components maycommunicate over one or more communication buses or signal lines.

It should be appreciated that the mobile or computing device is only oneexample of a portable multifunction mobile or computing device, and thatthe mobile or computing device may have more or fewer components thanshown, may combine two or more components, or a may have a differentconfiguration or arrangement of the components. The various componentsshown in FIG. 21 may be implemented in hardware, software or acombination of hardware and software, including one or more signalprocessing and/or application specific integrated circuits.

Memory may include high-speed random access memory and may also includenon-volatile memory, such as one or more magnetic disk storage

devices, flash memory devices, or other non-volatile solid-state memorydevices. Access to memory by other components of the mobile or computingdevice, such as the CPU and the peripherals interface, may be controlledby the memory controller.

The peripherals interface couples the input and output peripherals ofthe device to the CPU and memory. The one or more processors run orexecute various software programs and/or sets of instructions stored inmemory to perform various functions for the mobile or computing deviceand to process data.

In some embodiments, the peripherals interface, the CPU, and the memorycontroller may be implemented on a single chip, such as a chip. In someother embodiments, they may be implemented on separate chips.

The Network System circuitry receives and sends signals, including but

not limited to RF, also called electromagnetic signals. The NetworkSystem circuitry converts electrical signals to/from electromagneticsignals and communicates with communications networks and othercommunications devices via the electromagnetic signals. The NetworkSystems circuitry may include well-known circuitry for performing thesefunctions, including but not limited to an antenna system, an RFtransceiver, one or more amplifiers, a tuner, one or more oscillators, adigital signal processor, a CODEC chipset, a subscriber identity module(SIM) card, memory, and so forth. The Network Systems circuitry maycommunicate with networks, such as the Internet, also referred to as theWorld Wide Web (WWW), an intranet and/or a wireless network, such as acellular telephone network, a wireless local area network (LAN) and/or ametropolitan area network (MAN), and other devices by wirelesscommunication.

The wireless communication may use any of a plurality of communicationsstandards, protocols and technologies, including but not limited toGlobal System for Mobile Communications (GSM), Enhanced Data GSMEnvironment (EDGE), high-speed downlink packet access (HSDPA), widebandcode division multiple access (W-CDMA), code division multiple access(COMA), time division multiple access (TDMA), BLUETOOTH®, WirelessFidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/orIEEE 802.11n), voice over Internet Protocol (VoiP), Wi-MAX, a protocolfor email (e.g., Internet message access protocol (IMAP) and/or postoffice protocol (POP)), instant messaging (e.g., extensible messagingand presence protocol (XMPP), Session Initiation Protocol for InstantMessaging and Presence Leveraging Extensions (SIMPLE), and/or InstantMessaging and Presence Service (IMPS)), and/or Short Message Service(SMS)), or any other suitable communication protocol, includingcommunication protocols not yet developed as of the filing date of thisdocument.

The audio circuitry, the speaker, and the microphone provide an audiointerface between a user and the mobile or computing device. The audiocircuitry receives audio data from the peripherals interface, convertsthe audio data to an electrical signal, and transmits the electricalsignal to the speaker. The speaker converts the electrical signal tohuman-audible sound waves. The audio circuitry also receives electricalsignals converted by the microphone from sound waves. The audiocircuitry converts the electrical signal to audio data and transmits theaudio data to the peripherals interface for processing. Audio data maybe retrieved from and/or transmitted to memory and/or the NetworkSystems

circuitry by the peripherals interface. In some embodiments, the audiocircuitry also includes a headset jack (FIG. 20). The headset jackprovides an interface between the audio circuitry and removable audioinput/output peripherals, such as output-only headphones or a headsetwith both output (e.g., a headphone for one or both ears) and input(e.g., a microphone).

The 1/0 subsystem couples input/output peripherals on the mobile orcomputing device, such as the touch screen and other input/controldevices, to the peripherals interface. The 1/0 subsystem may include adisplay controller and one or more input controllers for other input orcontrol devices. The one or more input controllers 1 receive/sendelectrical sign aIs from/to other input or control devices. The otherinput/control devices may include physical buttons (e.g., push buttons,rocker buttons, etc.), dials, slider switches, and joysticks, clickwheels, and so forth. In some alternate embodiments, input controller(s)may be coupled to any (or none) of the following: a keyboard, infraredport, USB port, and a pointer device such as a mouse. The one or morebuttons may include an up/down button for volume control of the speakerand/or the microphone. The one or more buttons may include a pushbutton. A quick press of the push button may disengage a lock of thetouch screen or begin a process that uses gestures on the touch screento unlock the device, as described in U.S. patent application Ser. No.11/322,549, “Unlocking a Device by Performing Gestures on an UnlockImage,” filed Dec. 23, 2005, which is hereby incorporated by referencein its entirety. A longer press of the push button may turn power to themobile or computing device on or off. The user may be able to customizea functionality of one or more of the buttons. The touch screen is usedto implement virtual or soft buttons and one or more soft keyboards.

The touch-sensitive touch screen provides an input interface and anoutput interface between the device and a user. The display controllerreceives and/or sends electrical signals from/to the touch screen. Thetouch screen displays visual output to the user. The visual output mayinclude graphics, text, icons, video, and any combination thereof(collectively termed “graphics”). In some embodiments, some or all ofthe visual output may correspond to user-interface objects, furtherdetails of which are described below.

A touch screen has a touch-sensitive surface, sensor or set of sensorsthat accepts input from the user based on haptic and/or tactile contact.The touch screen and the display controller (along with any associatedmodules and/or sets of instructions in memory) detect contact (and anymovement or breaking of the contact) on the touch screen and convertsthe detected contact into interaction with user-interface objects (e.g.,one or more soft keys, icons, web pages or images) that are displayed onthe touch screen. In an exemplary embodiment, a point of contact betweena touch screen and the user corresponds to a finger of the user.

The touch screen may use LCD (liquid crystal display) technology, or LPD(light emitting polymer display) technology, although other displaytechnologies may be used in other embodiments. The touch screen and thedisplay controller may detect contact and any movement or breakingthereof using any of a plurality of touch sensing technologies now knownor later developed, including but not limited to capacitive, resistive,infrared, and surface acoustic wave technologies, as well as otherproximity sensor arrays or other elements for determining one or morepoints of contact with a touch screen.

A touch-sensitive display in some embodiments of the touch screen may beanalogous to the multi-touch sensitive tablets described in thefollowing

U.S. Pat. No. 6,323,846 (Westerman et al.), U.S. Pat. No. 6,570,557(Westerman et al.), and/or U.S. Pat. No. 6,677,932 (Westerman), and/orU.S. Patent Publication 2002/0015024A1, each of which is herebyincorporated by reference

in their entirety. However, a touch screen displays visual output fromthe portable mobile or computing device, whereas touch sensitive tabletsdo not provide

visual output.

A touch-sensitive display in some embodiments of the touch screen may beas described in the following applications: (1) U.S. patent applicationSer. No. 11/381,313, “Multipoint Touch Surface Controller,” filed May12, 2006; (2) U.S. patent application Ser. No. 10/840,862, “MultipointTouchscreen,” filed May 6, 2004; (3) U.S. patent application Ser. No.10/903,964, “Gestures For Touch Sensitive Input Devices,” filed Jul. 30,2004; (4) U.S. patent application Ser. No. 11/048,264, “Gestures ForTouch Sensitive Input Devices,” filed Jan. 31, 2005; (5) U.S. patentapplication Ser. No. 11/038,590, “Mode-Based Graphical User InterfacesFor Touch Sensitive Input Devices,” filed Jan. 18, 2005; (6) U.S. patentapplication Ser. No. 11/228,758, “Virtual Input Device Placement On ATouch Screen User Interface,” filed Sep. 16, 2005; (7) U.S. patentapplication Ser. No. 11/228,700, “Operation Of A Computer With A TouchScreen Interface,” filed Sep. 16, 2005; (8) U.S. patent application Ser.No. 11/228,737, “Activating Virtual Keys Of A Touch-Screen VirtualKeyboard,” filed Sep. 16, 2005; and (9) U.S. patent application Ser. No.11/367,749, “Multi-Functional Hand-Held Device,” filed Mar. 3, 2006. Allof these applications are incorporated by reference herein in theirentirety.

The touch screen may have a resolution in excess of 1000 dpi. In anexemplary embodiment, the touch screen has a resolution of approximately1060 dpi. The user may make contact with the touch screen using anysuitable object or appendage, such as a stylus, a finger, and so forth.In some embodiments, the user interface is designed to work primarilywith finger-based contacts and gestures, which are much less precisethan stylus-based input due to the larger area of contact of a finger onthe touch screen. In some embodiments, the device translates the roughfinger-based input into a precise pointer/cursor position or command forperforming the actions desired by the user.

In some embodiments, in addition to the touch screen, the mobile orcomputing device may include a touchpad (not shown) for activating ordeactivating particular functions. In some embodiments, the touchpad isa touch-sensitive area of the device that, unlike the touch screen, doesnot display visual output. The touchpad may be a touch-sensitive surfacethat is separate from the touch screen or an extension of thetouch-sensitive surface formed by the touch screen.

In some embodiments, the mobile or computing device may include aphysical or virtual click wheel as an input control device. A user maynavigate among and interact with one or more graphical objects(henceforth referred to as icons) displayed in the touch screen byrotating the click wheel or by moving a point of contact with the clickwheel (e.g., where the amount of movement of the point of contact ismeasured by its angular displacement with respect to a center point ofthe click wheel). The click wheel may also be used to select one or moreof the displayed icons. For example, the user may press down on at leasta portion of the click wheel or an associated button. User commands andnavigation commands provided by the user via the click wheel may beprocessed by an input controller as well as one or more of the modulesand/or sets of instructions in memory. For a virtual click wheel, theclick wheel and click wheel controller may be part of the touch screenand the display controller, respectively. For a virtual click wheel, theclick wheel may be either an opaque or semitransparent object thatappears and disappears on the touch screen display in response to userinteraction with the device. In some embodiments, a virtual click wheelis displayed on the touch screen of a portable multifunction device andoperated by user contact with the touch screen.

The mobile or computing device also includes a power system for poweringthe various components. The power system may include a power managementsystem, one or more power sources (e.g., battery, alternating current(AC)), a recharging system, a power failure detection circuit, a powerconverter or inverter, a power status indicator (e.g., a light-emittingdiode (LED)) and any other components associated with the generation,management and distribution of power in portable devices.

The mobile or computing device may also include one or more sensors,including not limited to optical sensors. FIG. 30 illustrates how anoptical sensor coupled to an optical sensor controller in 1/0 subsystem.The optical sensor may include charge-coupled device (CCD) orcomplementary metal-oxide semiconductor (CMOS) phototransistors. Theoptical sensor receives light from the environment, projected throughone or more lens, and converts the light to data representing an image.In conjunction with an imaging module 58 (also called a camera module);the optical sensor may capture still images or video. In someembodiments, an optical sensor is located on the back of the mobile orcomputing device, opposite the touch screen display on the front of thedevice, so that the touch screen display may be used as a viewfinder foreither still and/or video image acquisition. In some embodiments, anoptical sensor is located on the front of the device so that the user'simage may be obtained for videoconferencing while the user views theother video conference participants on the touch screen display. In someembodiments, the position of the optical sensor can be changed by theuser (e.g., by rotating the lens and the sensor in the device housing)so that a single optical sensor may be used along with the touch screendisplay for both video conferencing and still and/or video imageacquisition.

The mobile or computing device may also include one or more

proximity sensors. In one embodiment, the proximity sensor is coupled tothe peripherals interface. Alternately, the proximity sensor may becoupled to an input controller in the 1/0 subsystem. The proximitysensor may perform as described

in U.S. patent application Ser. No. 11/241,839, “Proximity Detector InHandheld Device,” filed Sep. 30, 2005; Ser. No. 11/240,788, “ProximityDetector In Handheld Device,” filed Sep. 30, 2005; Ser. No. 13/096,386,“Using Ambient Light Sensor To Augment Proximity Sensor Output”; Ser.No. 13/096,386, “Automated Response To And Sensing Of User Activity InPortable Devices,” filed Oct. 24, 2006; and Ser. No. 11/638,251,“Methods And Systems For Automatic Configuration Of Peripherals,” whichare hereby incorporated by reference in their entirety. In someembodiments, the proximity sensor turns off and disables the touchscreen when the multifunction device is placed near the user's ear(e.g., when the user is making a phone call). In some embodiments, theproximity sensor keeps the screen off when the device is in the user'spocket, purse, or other dark area to prevent unnecessary batterydrainage when the device is a locked state.

In some embodiments, the software components stored in memory mayinclude an operating system, a communication module (or set ofinstructions), a contact/motion module (or set of instructions), agraphics module (or set of instructions), a text input module (or set ofinstructions), a Global Positioning System (GPS) module (or set ofinstructions), and applications (or set of instructions).

The operating system (e.g., Darwin, RTXC, LINUX, UNIX, OS X, WINDOWS, oran embedded operating system such as VxWorks) includes various softwarecomponents and/or drivers for controlling and managing general systemtasks (e.g., memory management, storage device control, powermanagement, etc.) and facilitates communication between various hardwareand software components.

The communication module facilitates communication with other

devices over one or more external ports and also includes varioussoftware components for handling data received by the Network Systemscircuitry and/or the external port. The external port (e.g., UniversalSerial Bus (USB), FIREWIRE, etc.) is adapted for coupling directly toother devices or indirectly over a network (e.g., the Internet, wirelessLAN, etc.). In some embodiments, the external port is a multi-pin (e.g.,30-pin) connector that is the same as, or similar to and/or compatiblewith the 30-pin connector used on iPod (trademark of Apple Computer,Inc.) devices.

The contact/motion module may detect contact with the touch screen (inconjunction with the display controller) and other touch sensitivedevices (e.g., a touchpad or physical click wheel). The contact/motionmodule includes various software components for performing variousoperations related to detection of contact, such as determining ifcontact has occurred, determining if there is movement of the contactand tracking the movement across the touch screen, and determining ifthe contact has been broken (i.e., if the contact has ceased).Determining movement of the point of contact may include determiningspeed (magnitude), velocity (magnitude and direction), and/or anacceleration (a change in magnitude and/or direction) of the point ofcontact. These operations may be applied to single contacts (e.g., onefinger contacts) or to multiple simultaneous contacts (e.g.,“multitouch”/multiple finger contacts). In some embodiments, thecontact/motion module and the display controller also detect contact ona touchpad. In some embodiments, the contact/motion module and thecontroller detects contact on a click wheel.

Examples of other applications that may be stored in memory includeother word processing applications, JAVA-enabled applications,encryption, digital rights management, voice recognition, and voicereplication.

In conjunction with touch screen, display controller, contact module,graphics module, and text input module, a contacts module may be used tomanage an address book or contact list, including: adding name(s) to theaddress book; deleting name(s) from the address book; associatingtelephone number(s), e-mail address(es), physical address(es) or otherinformation with a name; associating an image with a name; categorizingand sorting names; providing telephone numbers or e-mail addresses toinitiate and/or facilitate communications by telephone, videoconference, e-mail, or IM; and so forth.

The foregoing description of various embodiments of the claimed subjectmatter has been provided for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit the claimedsubject matter to the precise forms disclosed. Many modifications andvariations will be apparent to the practitioner skilled in the artParticularly, while the concept “component” is used in the embodimentsof the systems and methods described above, it will be evident that suchconcept can be interchangeably used with equivalent concepts such as,class, method, type, interface, module, object model, and other suitableconcepts. Embodiments were chosen and described in order to bestdescribe the principles of the invention and its practical application,thereby enabling others skilled in the relevant art to understand theclaimed subject matter, the various embodiments and with variousmodifications that are suited to the particular use content plated.

What is claimed is:
 1. A system for clustering events, comprising: afirst engine that receives message data from a managed infrastructurethat includes managed infrastructure physical hardware which supportsthe flow and processing of information; a second engine that determinescommon characteristics of events and produces clusters of eventsrelating to the failure of errors in the managed infrastructure, wheremembership in a cluster indicates a common factor of the events that isa failure or an actionable problem in the physical hardware managedinfrastructure directed to supporting the flow and processing ofinformation, and producing events that relate to the managedinfrastructure while converting the events into words and subsets usedto group the events that relate to failures or errors in the managedinfrastructure, including the managed infrastructure physical hardware;a compare and merge engine that receives outputs from the second engine,the compare and merge engine communicating with one or more userinterfaces in a situation room; and wherein the second engine or a thirdengines uses a source address for each event make a change to at least aportion of the managed infrastructure, and in response to producingevents that relate to the managed infrastructure while converting theevents into words and subsets physical changes are made to managedinfrastructure physical hardware.
 2. The system of claim 1, wherein thefirst engine is an extraction engine.
 3. The system of claim 2, whereinthe first engine in operation receives messages from the managedinfrastructure.
 4. The system of claim 3, wherein the first engine inoperation produces events that relate to the managed infrastructure. 5.The system of claim 4, wherein the events are converted into words andsubsets used to group the events into clusters that relate to failuresor errors in the managed infrastructure.
 6. The system of claim 1,wherein the second engine is a signalizer engine.
 7. The system of claim1, wherein the second engine is configured to determine one or morecommon characteristics of events and produces clusters relating toevents.
 8. The system of claim 1, wherein the managed infrastructure isfrom a business organization.
 9. The system of claim 8, wherein themanaged infrastructure includes, computers, network devices, appliances,mobile devices, text or numerical values from which those text ornumerical values indicate a state of any hardware or software componentof the managed infrastructure.
 10. The system of claim 9, wherein themanaged infrastructure generates data that include attributes selectedfrom at least one of, time, source a description of the event, texturalor numerical values from which those text or numerical values indicate astate of any hardware or software component of the managedinfrastructure.
 11. The system of claim 1, further comprising: apublication message bus.
 12. The system of claim 1, further comprising:a data bus web server coupled to one or more user interfaces.
 13. Thesystem of claim 1, wherein a plurality of link access modules are incommunication with a data bus.
 14. The system of claim 1, furthercomprising: a database.
 15. The system of claim 1, wherein theextraction engine reformats data from the events to create reformatteddata.
 16. The system of claim 15, wherein the reformatted data isreceived at The system bus.
 17. A system for clustering events,comprising: a first engine that receives message data from a managedinfrastructure that includes managed infrastructure physical hardwarewhich supports the flow and processing of information; a second enginethat determines common characteristics of events and produces clustersof events relating to the failure of errors in the managedinfrastructure, where membership in a cluster indicates a common factorof the events that is a failure or an actionable problem in the physicalhardware managed infrastructure directed to supporting the flow andprocessing of information, and producing events that relate to themanaged infrastructure while converting the events into words andsubsets used to group the events that relate to failures or errors inthe managed infrastructure, including the managed infrastructurephysical hardware; and wherein the second engine or a third engine usesa source address for each event make a change to at least a portion ofthe managed infrastructure, and the second engine includes one or moreof an Non-negative Matrix Factorization NMF engine, a k-means clusteringengine and a topology proximity engine; and in response to producingevents that relate to the managed infrastructure while converting theevents into words and subsets physical changes are made to managedinfrastructure physical hardware.
 18. A system for clustering events,comprising: a first engine that receives message data from a managedinfrastructure that includes managed infrastructure physical hardwarewhich supports the flow and processing of information; a second enginethat determines common characteristics of events and produces clustersof events relating to the failure of errors in the managedinfrastructure, where membership in a cluster indicates a common factorof the events that is a failure or an actionable problem in the physicalhardware managed infrastructure directed to supporting the flow andprocessing of information, and producing events that relate to themanaged infrastructure while converting the events into words andsubsets used to group the events that relate to failures or errors inthe managed infrastructure, including the managed infrastructurephysical hardware; a third engine coupled to the first and secondengines, the second engine or third engines use a source address foreach event make a change to at least a portion of the managedinfrastructure, the third engine assigning a graph coordinate to theevent; and wherein an optional subset of attributes is extracted foreach event and turned into a vector; and in response to producing eventsthat relate to the managed infrastructure while converting the eventsinto words and subsets physical changes are made to managedinfrastructure physical hardware.
 19. The system of claim 18, whereinthe third engine inputs a list of devices and a list a connectionsbetween components or nodes in the managed infrastructure.
 20. Thesystem of claim 18, wherein the second engine includes or is coupled toa k-means clustering engine that user graph coordinates to generate oneor more clusters that brings together events with similarcharacteristics.
 21. The system of claim 18, wherein the second engineincludes or is coupled to an NMF engine that first extracts clustersthat have greater importance.
 22. The system of claim 21, wherein theclusters are assign a start and an end time.
 23. A system for clusteringevents, comprising: a first engine that receives message data from amanaged infrastructure that includes managed infrastructure physicalhardware which supports the flow and processing of information; a secondengine that determines common characteristics of events and producesclusters of events relating to the failure of errors in the managedinfrastructure, where membership in a cluster indicates a common factorof the events that is a failure or an actionable problem in the physicalhardware managed infrastructure directed to supporting the flow andprocessing of information, and producing events that relate to themanaged infrastructure while converting the events into words andsubsets used to group the events that relate to failures or errors inthe managed infrastructure, including the managed infrastructurephysical hardware and; wherein the second engine or a third engine usesa source address for each event make a change to at least a portion ofthe managed infrastructures; wherein a dictionary is generated with wordand subtexts using Shannon Entropy, −In(1/NGen) and normalizes the wordsand subtexts; and in response to producing events that relate to themanaged infrastructure while converting the events into words andsubsets physical changes are made to managed infrastructure physicalhardware.
 24. The system of claim 23, wherein normalized words andsubtexts are mapped from a common 0.0 to a non-common 1.0.
 25. Thesystem of claim 23, further comprising: an entropy database that inoperation normalizes entropy for events.
 26. The system of claim 25,wherein normalized entropy for events is mapped to a common, 0.0 and anon-common, 1.0.