Interconnected graph structured database for identifying and remediating conflicts in resource deployment

ABSTRACT

The invention provides an interconnected graph database system, method and computer program product structured for identifying and remediating conflicts in resource deployment. In some embodiments, the present invention is configured to identify a source node of a plurality of first nodes of a first graph database system. The source node is typically associated with a first information technology operational activity. In addition, the present invention is configured for determining a lateral relationship between the source node of the first graph database system and a target node of a plurality of second nodes of a second graph database system. Moreover, the present invention is configured for determining that the lateral relationship between the source node and the target node comprises a conflict, and in response, blocking initiation of the first information technology operational activity.

FIELD OF THE INVENTION

The present invention embraces a system, computer program product, andmethod for operatively connecting multiple multidimensional graphdatabase systems for remediating conflicts in resource deployment.

BACKGROUND

Traditional relational (e.g. SQL) databases typically arrange datawithin tables and employ join algorithms to establish relationshipsbetween sets of data. As the data and relationships amongst the databecome increasingly complex, the computational cost of queryingrelationships becomes highly burdensome for the computing systems whichhost the database. Furthermore, traditional graph databases only allowrelationships or nodes to be defined to a single dimension, which limitsthe level of detail and granularity to which data can be preciselydefined. Moreover, traditional graph database systems are not configuredfor interconnection between nodes of different systems, nor are theyconfigured for identifying or mitigating deployment of conflictingresources. Accordingly, there is a need for an advanced systems thataddresses the above technical problems in existing systems.

BRIEF SUMMARY

The following presents a simplified summary of one or more embodimentsof the invention in order to provide a basic understanding of suchembodiments. This summary is not an extensive overview of allcontemplated embodiments, and is intended to neither identify key orcritical elements of all embodiments, nor delineate the scope of any orall embodiments. Its sole purpose is to present some concepts of one ormore embodiments in a simplified form as a prelude to the more detaileddescription that is presented later.

Embodiments of the present invention provide a system, computer programproduct, and a computer-implemented method for an interconnected graphdatabase structured for identifying and remediating conflicts inresource deployment. The technical system of the invention typicallycomprises a first graph database system having a plurality of firstnodes associated with a first program/plan of an entity. The technicalsystem further comprises a second graph database system having aplurality of second nodes associated with a second program/plan of theentity. The system further comprises a computer apparatus including atleast one processor, at least one memory device with computer-readableprogram code stored thereon and a network communication device. The atleast one processor is operatively coupled to the least one memorydevice and the network communication device such that the processingdevice is configured to execute the computer-readable program. In someembodiments, the invention is structured to identify initiation of afirst information technology operational activity by a user device,wherein the first information technology operational activity isassociated with deployment of a first technology resource; identify asource node of the plurality of first nodes of the first graph databasesystem associated with the first information technology operationalactivity, wherein the source node comprises a property of the sourcenode associated with the first information technology operationalactivity, wherein the first graph database system comprises arelationship between the source node and at least one first node of theplurality of first nodes; determine a relationship path associated withthe source node based on analyzing at least one of the source node, theproperty of the source node and the relationship between the source nodeand at least one first node of the plurality of first nodes; determine alateral relationship between the source node of the first graph databasesystem and a target node of the plurality of second nodes of the secondgraph database system based on at least the relationship path, whereinthe target node of the second graph database system is associated with asecond information technology operational activity, wherein determiningthe lateral relationship comprises (i) determining that that the firstinformation technology operational activity is a cause of the secondinformation technology operational activity, (ii) determining that thefirst technology resource associated with the first informationtechnology operational activity is influenced by the second informationtechnology operational activity, and/or (iii) determining that the firsttechnology resource associated with the first information technologyoperational activity and a second technology resource associated withthe second information technology operational activity have a similaroperation shift; determine that the lateral relationship between thesource node of the first graph database system and the target node ofthe second graph database system comprises a conflict based on at leastanalyzing the lateral relationship; in response to determining that thelateral relationship between the source node of the first graph databasesystem and the target node of the second graph database system comprisesthe conflict, block initiation of the first information technologyoperational activity; and initiate transmission of an alert to the userdevice, wherein the alert comprises a presentation of the determinedlateral relationship comprising the conflict between the source node ofthe first graph database system and the target node of the second graphdatabase system.

In some embodiments, or in combination with any of the previousembodiments, the invention is configured to identify a triggertechnology element associated with the conflict associated with thesource node of the first graph database system and the target node ofthe second graph database system in at least one of the (i) the sourcenode, (ii) the property of the source node and (iii) the relationshipbetween the source node and at least one first node of the plurality offirst nodes; identify a remediation action for the trigger technologyelement required to remediate the conflict associated with the sourcenode of the first graph database system and the target node of thesecond graph database system; modify, in real-time, the triggertechnology element in at least one of the (i) the source node, (ii) theproperty of the source node and (iii) the relationship between thesource node and at least one first node of the plurality of first nodes,based on the remediation action; and resume, initiation of the modifiedfirst information technology operational activity.

In some embodiments, or in combination with any of the previousembodiments, determining the lateral relationship between the sourcenode of the first graph database system and the target node of thesecond graph database system further comprises: augmenting the sourcenode with a first pointer associated with the lateral relationship suchthat the relationship path of the source node comprises the lateralrelationship; and augmenting the target node with a second pointerassociated with the lateral relationship such that a relationship pathof the target node comprises the lateral relationship.

In some embodiments, or in combination with any of the previousembodiments, the invention is configured to identify that the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database is obsolete; modify thesource node to remove the first pointer associated with the lateralrelationship; and modify the target node to remove the second pointerassociated with the lateral relationship.

In some embodiments, or in combination with any of the previousembodiments, determining the lateral relationship between the sourcenode of the first graph database system and the target node of thesecond graph database system further comprises: determining the lateralrelationship between the property of the source node and at least one of(i) the target node, (ii) a property of the target node, and (iii) arelationship between the target node and at least one second node of theplurality of second nodes of the second graph database system.

In some embodiments, or in combination with any of the previousembodiments, determining the lateral relationship between the sourcenode of the first graph database system and the target node of thesecond graph database system further comprises: determining the lateralrelationship between the relationship between the source node and atleast one first node of the plurality of first nodes, and at least oneof (i) the target node, (ii) a property of the target node, and (iii) arelationship between the target node and at least one second node of theplurality of second nodes of the second graph database system.

In some embodiments, or in combination with any of the previousembodiments, the deployment of the first technology resource comprises amodification to the first technology resource.

In some embodiments, or in combination with any of the previousembodiments, the first technology resource comprises system hardware,technology devices, technology applications, operating systems, servers,networks, databases and/or technology processes.

In some embodiments, or in combination with any of the previousembodiments, determining the lateral relationship path associated withthe source node further comprises: constructing a path query comprisingthe source node and a search parameter; translating the path query intoa set of low level instructions; executing, via the second graphdatabase system, the low level instructions to begin a search at thesecond graph database; and retrieving data from the second graphdatabase according to the source node and the search parameter.

In some embodiments, or in combination with any of the previousembodiments, identifying the source node associated with the firstinformation technology operational activity further comprises:determining that the first program associated with the first informationtechnology operational activity; determining the first graph databaseassociated with the first program; and analyzing the first graphdatabase to identify the source node associated with the firstinformation technology operational activity.

In some embodiments, or in combination with any of the previousembodiments, identifying the source node associated with the firstinformation technology operational activity further comprises:determining at least one attribute associated with the first informationtechnology operational activity; constructing a search query comprisingthe at least one attribute; translating the search query into a set oflow level instructions; executing, via the first graph database system,the low level instructions to begin a search of the plurality of firstnodes; and retrieving data from the first graph database according tothe at least one attribute.

In some embodiments, or in combination with any of the previousembodiments, identifying the source node associated with the firstinformation technology operational activity further comprisesidentifying (i) initiation of the construction of the source node or(ii) modification of the source node.

The features, functions, and advantages that have been discussed may beachieved independently in various embodiments of the present inventionor may be combined with yet other embodiments, further details of whichcan be seen with reference to the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described embodiments of the invention in general terms,reference will now be made to the accompanying drawings, wherein:

FIG. 1 illustrates a graph database system environment 100, configuredfor identifying and remediating conflicts in resource deployment, inaccordance with some embodiments of the present invention;

FIG. 2 illustrates a high level schematic representation 200 of programlevels of an entity, in accordance with some embodiments of the presentinvention;

FIG. 3 illustrates a high level schematic representation 300 of aninterconnected graph database system, in accordance with someembodiments of the present invention; and

FIG. 4 illustrates a high level process flow for identifying andremediating conflicts in resource deployment via an interconnected graphdatabase system, in accordance with some embodiments of the presentinvention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Embodiments of the present invention will now be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure will satisfy applicablelegal requirements. Like numbers refer to elements throughout. Wherepossible, any terms expressed in the singular form herein are meant toalso include the plural form and vice versa, unless explicitly statedotherwise. Also, as used herein, the term “a” and/or “an” shall mean“one or more,” even though the phrase “one or more” is also used herein.

In some embodiments, an “entity” or “enterprise” as used herein may beany institution employing information technology resources andparticularly technology infrastructure configured for large scaleprocessing of electronic files, electronic technology event data andrecords, and performing/processing associated technology activities. Insome instances, the entity's technology systems involve performing amultitude of technology activities (e.g., information technologyoperational activities or resource deployment) across multipledistributed technology platforms and across numerous focus area levels,objective levels, objectives, resource targets and/or the like.Typically, these technology activities across multiple distributedtechnology platforms involve large scale processing of technologyactivity files and electronic records. As such, the entity may be anyinstitution, group, association, financial institution, establishment,company, union, authority or the like, employing information technologyresources. In some embodiments, “entity” may refer to an individual oran organization that owns and/or operates a system of networkedcomputing devices and/or systems on which the graph database isimplemented. The entity may be a business organization, a non-profitorganization, a government organization, and the like. In otherembodiments, the entity may be a single individual who wishes to logdata and complex interactions amongst the data sets.

“Computing system”, “computing device,” “server” or “system” as usedherein may refer to a networked computing device within the entitysystem environment or entity system infrastructure (e.g., a systemstructured for storing and/or operating on a graph database and/or asystem for facilitating/performing/monitoring one or more technologychange events or technology incidents, one or more technology resources,etc.). The computing system may include one or more of a processor, anon-transitory storage medium, a communications device, and a display.The computing system may support user logins and inputs from anycombination of similar or disparate devices. Accordingly, the computingsystem may be a portable electronic device such as a smartphone, tablet,or laptop, or the computing system may be a stationary unit such as apersonal desktop computer, networked terminal, or server. In someembodiments, the computing system may be a local or remote server whichis configured to send and/or receive inputs from other computing systemson the network. Furthermore, as used herein the term “user device” or“mobile device” may refer to computing devices such as mobile phones,personal computing devices, tablet computers, wearable devices, and/orany portable electronic device capable of receiving and/or storing datatherein.

Typically, an entity or enterprise is associated with a plurality ofinformation technology operational activities. The “informationtechnology operational activities,” or “resource activities” or“resource deployment” as referred to herein, may comprise anyactivities, operations, transactions, technology change activities,technology incidents, actions and events associated with focus arealevels, objective levels, objectives, resource targets and/or the likeof an entity, associated with day-to day functioning of an entity,associated with operations and control activities of technologyresources of the entity, associated with external networks of theentity, associated with activities performed/initiated by employees,affiliates or customers of the entity, and/or the like.

In some embodiments, the information technology operational activitiesmay comprise operational activities associated with system hardware,operating systems, servers, technology applications, internal networks,storage/databases, user interfaces, authentication operations,middleware, software program products, external networks, softwareapplications, hosting/facilities, business/technology processes,electrical infrastructure, and other technology resources or technologyassets associated with the entity. In some embodiments, the informationtechnology operational activities may be associated with transactionalactivities of the enterprise, comprising technology changes, technologyevents, technology maintenance activities, technology incidents,technology problems, technology releases, technology service requests,technology projects, configuration activities, technology resource/assetmanagement activities, vendor transactions and the like. In someembodiments, the plurality of information technology operationalactivities may comprise technology change events/activities andtechnology incidents. As used herein, the term “event” relates to adiscrete modification, addition, or deletion of a business asset,system, process, product, or the like. Exemplary events may includeinstalling new hardware in an existing entity system, updating softwareused by the entity, implementing a procedural change to a businessprocess, rolling out a new product or service, or updating the entity'swebsite. As used herein, the term “change” relates to any program,project, or event related to the modification, addition, deletion of oneor more business assets, systems, processes, products, or the like. Theterm “technology change” refers to any technology related change. Thetechnology involved in a technology change may include computer hardwareor software.

Technology change events typically comprise intended modifications tothe structure or functioning of one or more technology resources, forexample based on focus area levels, objective levels, objectives,resource targets and/or the like of one of the distributed technologyplatforms of the entity. Technology change events may comprisechanging/modifying the operating system of a server, updating theversions of one or more security/authentication applications of aprocessor, performing hardware changes, addition of networkingcapabilities, hardware/software reconfiguration with/without restart,servicing, or otherwise modifying one or more aspects of the technologyresources. Technology incidents or technology incident activities maycomprise variation in functioning of technology resources (reduction incapacity, slowdown in processing speeds, and the like) notifications,alerts, errors, pause/stops in processes, and the like. In someembodiments, technology incidents may be caused or triggered by theimplementation of technology change events. The technology incidentscaused by technology changes may be referred to a technology changeincidents.

“Graph database,” “graph database system,” or “graph structure database”as used herein, typically refers to a database that employs graphstructures for semantic queries with nodes, edges and properties torepresent and store data. Typically, the graph database comprises one ormore relationships (or edges or graphs), which directly relate dataitems or nodes. The relationships allow data in the data items or nodesto be linked together directly, and retrieved with a single operation.Typically, the graph databases are distinct from relational databaseswhich, if at all, are only configured to store links between data in adatabase in the database itself at the logical level, and typically donot allow easy modification of the logical structure. Moreover,conventional relational databases are typically not capable ofmaneuvering complex hierarchical structures within a database at all,much less across a plurality of databases across multiple distributedtechnology platforms of an entity. Moreover, conventional relationaldatabases are not structured for providing relationships and theirrelationship properties between records, in other words, theseconventional databases do not comprise a relationship level dataabstraction.

“Node” or a “graph database node” as used herein may refer to a datastructure which represents a technology operational activity of theplurality of activities, an entity, an individual, a technologyresource, a technology change event, a technology incident, or the like.The nodes are typically structured to include a pointer to one or morenodes. In general, in some embodiments, each information technologyoperational activity of the plurality of activities, is associated witha “node” comprising properties/attributes, i.e., data/informationregarding the activity. This node may be directed to describing,recording, identifying and/or documenting the activity. Althoughreferred to as “a node”, it is understood that, in some embodiments eachinformation technology operational activity may be associated withmultiple nodes. Here, each step associated with performing theinformation technology operational activity may be associated with aseparate node.

“Relationship,” “graph database relationship,” “edge,” or “graph” asused herein may refer to a data structure that links one node toanother. Typically, the relationship has a source node and a targetnode, and is structured to indicate attributes of the relationshipbetween the nodes (e.g., how the nodes are related, what properties ofthe nodes are integrated/connected, and/or the like). In someembodiments, a node may also have a relationship with itself.

“Property” or “attribute” or “technology element” as used herein mayrefer to a label containing germane information of associated nodes,relationships, and other properties. As such properties may be appliedto nodes, relationships, and other properties. Properties may creategroups of sets organized by common properties, in which nodes,relationships, and properties that have the same property belong to thesame set. Each node, relationship, and property may have more than oneproperty associated with it. In some embodiments, each node orrelationship may be associated with one or more properties or technologyelements comprising data associated with the information technologyoperational activity. In this regard, each of the one or more propertiesor technology elements may comprise data associated with one or moreaspects of the information technology operational activity, comprisingbut not limited to, technology resources/infrastructure involved,activity target, time, location, applications involved, type ofactivity, person/system that initiated/performed the activity, and/orother aspects. Furthermore, the properties or technology elements may bydiscrete components of the graph database, or the properties ortechnology elements may merely refer to one or more portions of a singledata component. For example, a property of a node or relationship maycomprise a sentence or phrase describing an information technologyoperational activity. Here, the property may comprise multipletechnology elements with each individual technology element referring toone or more words in the sentence/phrase. The nodes, relationships andproperties may comprise descriptive data, textual data, unformatteddata, formatted data, or any other available forms of data/informationor a combination of forms. This data may be transformed, formatted,encoded, decoded, or otherwise fundamentally altered during storage,retrieval, data/language processing, and other operations.

As described herein, a “user” is an individual associated with anentity. In some embodiments, a “user” may be an employee (e.g., anassociate, a project manager, an IT specialist, a manager, anadministrator, an internal operations analyst, or the like) of theentity or enterprises affiliated with the entity, capable of operatingthe systems described herein. In some embodiments, a “user” may be anyindividual, entity or system who has a relationship with the entity,such as a customer. In other embodiments, a user may be a systemperforming one or more tasks described herein. “User” as used herein mayrefer to an individual who may utilize the graph database system. Theuser may be an agent, administrator, or employee of the entity who hasauthorization to add, modify, or delete data, or query existing data,nodes and/or relationships. In other embodiments, the user may be aclient or customer of the entity. In yet other embodiments, the user maybe unaffiliated with the entity who has some type of interaction withthe entity's system. In the instances where the entity is a financialinstitution, a user may be an individual or entity with one or morerelationships affiliations or accounts with the entity (for example, afinancial institution). In some embodiments, the user may be an entityor financial institution employee (e.g., an underwriter, a projectmanager, an IT specialist, a manager, an administrator, an internaloperations analyst, bank teller or the like) capable of operating thesystem described herein. In some embodiments, a user may be anyindividual or entity who has a relationship with a customer of theentity or financial institution. For purposes of this invention, theterm “user” and “customer” may be used interchangeably. A “userresource” or “account” may be the relationship that the user has withthe entity. Examples of user resources include a deposit account, suchas a transactional account (e.g. a banking account), a savings account,an investment account, a money market account, a time deposit, a demanddeposit, a pre-paid account, a credit account, or the like. The userresource is typically associated with and/or maintained by an entity.

As used herein, a “user interface” may be a graphical user interface.Typically, a graphical user interface (GUI) is a type of interface thatallows users to interact with electronic devices such as graphical iconsand visual indicators such as secondary notation, as opposed to usingonly text via the command line, such as those associated with the nodes,relationships and other elements of graphical databases. That said, thegraphical user interfaces are typically configured for audio, visualand/or textual communication. In some embodiments, the graphical userinterface may include both graphical elements and text elements. Thegraphical user interface is configured to be presented on one or moredisplay devices associated with user devices, entity systems, processingsystems and the like.

FIG. 1 illustrates a graph database system environment 100, inaccordance with one embodiment of the present invention, configured foridentifying and remediating conflicts in resource deployment. Asillustrated in FIG. 1, the resource processing system 106 is operativelycoupled, via a network 101 to technology resources 150, the one or moregraph database systems (108 a, 108 b), the user system/device 104, andto the third party system 160. In this way, the resource processingsystem 106 can send information to, and receive information from thetechnology resources 150, the one or more graph database systems (108 a,108 b), the user system 104 and the third party system 160 to analyzeand modify, in real-time, information technology operational activitiesand their interdependencies across a plurality of graph database systems(108 a, 108 b) of an entity. FIG. 1 illustrates only one example of anembodiment of the graph database system environment 100, and it will beappreciated that in other embodiments one or more of the systems,devices, or servers may be combined into a single system, device, orserver, or be made up of multiple systems, devices, or servers.

In some embodiments, the data associated with the information technologyoperational activities and the graph databases, may be generated by,provided by, accessed by and/or operated upon by the resource processingsystem 106, by the one or more graph database systems (108 a, 108 b), bytechnology resources 150, the user device 104 and/or other external orthird party systems 160. For example, the system 106 may establishoperative communication channels with the technology resources 150, viathe network 101. The system 106 may identify an information technologyoperational activity associated with a first resource and construct, orcause a graph database system (108 a, 108 b) to construct, a first nodefor the information technology operational activity, including one ormore properties or technology elements comprising data identifying thefirst resource, time stamp of the activity and the like at the graphdatabase system (108 a, 108 b). Continuing with the example, in someembodiments, the system 106 may further construct or cause the graphdatabase system (108 a, 108 b) to construct, relationship(s) between thefirst node and one or more existing nodes.

In some embodiments, other systems such as the user device 104 mayconstruct, or cause a graph database system (108 a, 108 b) to construct,a new node for an information technology operational activity, includingone or more properties or technology elements comprising dataidentifying the activity at the graph database system (108 a, 108 b).The nodes, the properties and/or the data associated with theinformation technology operational activity may be provided by users 102using the user device 104. As described previously, the user 102 mayrefer to employees, technical subject matter experts, operators andother personnel associated with the entity or affiliates of the entity.As an illustration, a user 102 may create a node identifying theserver/system hardware 151 (resource) associated with an applicationupdate (information technology operational activity) initiated by theuser 102. Here, in some embodiments, the system 106 is structured toanalyze the new node sought to constructed by the user device 104, theinformation technology operational activity (application update)associated with the node, relationships with other existing nodes and/orthe like and subsequently may perform one or more transformation actionssuch as preventing deployment of resources associated with theinformation technology operational activity, preventing the user device104 from performing one or more activities/actions, allowing theinformation technology operational activity, allowing deployment ofresources, modifying one or more of the information technologyoperational activity, the associated node or its properties, or thelike.

The graph databases comprising the plurality of nodes, regarding theplurality of information technology activities are typically stored inthe one or more graph database systems (108 a, 108 b). In someembodiments the records (information associated with the nodes,relationships, properties etc.) from the activity record database may beretrieved or accessed based on satisfying requisiteauthentication/authorization requirements. However, it is contemplatedthat some or all of the records may be stored in other memorylocations/devices, for example, memory device 140, the user device 104,technology resources 150 and the like.

The graph database systems (108 a, 108 b) may further be configured tobe ACID (Atomicity, Consistency, Isolation, Durability) compliant inorder to ensure that database transactions are completed in a timely andstable manner. An ACID compliant database comprises atomicity (i.e. eachdatabase transaction is verified for integrity), consistency (i.e. eachdata entry is verified for consistency with database rules), isolation(i.e. each database transaction is able to be processed independently),and durability (i.e. data is resistant to failures).

In some embodiments, each of the graph database systems (108 a, 108 b)may comprise a database control system, which is configured to receiveuser-submitted queries and manage run time access to the database. Theconversion of user-submitted queries may be achieved through a queryprocessor, which may translate the queries and/or commands inputted bythe user into low level instructions which may then be executed by theruntime database manager. In this way, the graph database systems (108a, 108 b) are able to provide a layer of abstraction through which theuser may use identifiable commands to execute the addition, deletion,modification, querying, and retrieval functions of the graph database.The database control system may further serve the function ofmaintaining the structure and fidelity of the data by the use of errorchecking and/or correction.

In some embodiments, each of the graph database systems (108 a, 108 b)may further comprise a database engine which controls, secures andprovides access to the data. The database engine may be responsible forauthorizing and/or authenticating users and restricting some functionsof the graph database depending on the user class. For instance, anadministrator of the entity's systems may be provided with the leastrestrictive rule set, which may allow the administrator to freely add,remove, edit, and query the data within the database. On the other hand,a client of the entity may be provided only with access to the queryfunctions of the database, while a member of the public may be precludedfrom utilizing any of the functions of the graph database.

The graph database systems (108 a, 108 b) may further comprise a reportgeneration utility which extracts information from the databases andpresents it to the user in a number of different formats. The user 102may be able to select specific records for viewing in a desired format,such as graphs, charts, tables, formatted text, and the like. Forexample, the user may be an administrator of the entity, and may wish togather data on cyber-attacks carried out on the entity's systems for thepurposes of strengthening its security countermeasures and/or preventionmethods. If the user wishes to retrieve data on the most frequentlyencountered type of attack, the user may wish to sort the queried datathrough a table to allow for ease of calculations. On the other hand, ifthe user wishes to retrieve data on the geographic locations of theattacks, the user may wish to display the retrieved data on a chart suchas a map. Alternatively, if the user wishes to retrieve data on thefrequency of a particular type of attack over a certain period of time,the user may wish to display the retrieved data on a labeled graph. Asthe system allows for increasingly complex data and relationships, thereport generation utility is also able to display the complex data in away that is most relevant and comprehensible to the user.

The network 101 may be a global area network (GAN), such as theInternet, a wide area network (WAN), a local area network (LAN), nearfield communication network, audio/radio communication network,ultra-high frequency wireless communication network, or any other typeof network or combination of networks. The network 101 may provide forwireline, wireless, or a combination wireline and wireless communicationbetween devices on the network 101.

In some embodiments, the user 102 is an individual associated with theentity. In some embodiments, the user 102 may access the resourceprocessing system 106 through an interface comprising a webpage or auser technology application 122. Hereinafter, “user technologyapplication” is used to refer to an application on the user system 104of a user, a widget, a webpage accessed through a browser, and the like.In some embodiments the user technology application 122 is a user systemapplication stored on the user system 104. In some embodiments the usertechnology application may refer to a third party application or a userapplication stored on a cloud used to access the resource processingsystem through a network. In some embodiments, at least a portion of theuser technology application 122 is stored on the memory device 140 ofthe resource processing system 106. The user 102 may subsequentlynavigate through the interface, retrieve one or more activity records,provide confirmation, or review presented information using a usersystem 104.

FIG. 1 also illustrates the user system 104. The user system 104generally comprises a communication device 110, a display device 112, aprocessing device 114, and a memory device 116. The user system 104 is acomputing system that allows a user 102 to interact with the resourceprocessing system 106 to configure, monitor or control informationtechnology operational activities of the entity. The processing device114 is operatively coupled to the communication device 110, the displaydevice 112, and the memory device 116. The processing device 114 usesthe communication device 110 to communicate with the network 101 andother devices on the network 101, such as, but not limited to the thirdparty system 160 and the resource processing system 106. As such, thecommunication device 110 generally comprises a modem, server, or otherdevice for communicating with other systems/devices on the network 101.In some embodiments the network 101 comprises a network of distributedservers.

The user system 104 comprises computer-readable instructions 120 storedin the memory device 116/data storage, which in one embodiment includesthe computer-readable instructions 120 of the user technologyapplication 122. In this way, a user 102 may remotely communicate withthe resource processing system 106, view retrieved data and visualdisplays, and/or modify the implementation of information technologyoperational activities using the user system 104 and the graph databasesystems (108 a, 108 b). The user system 104 may be, for example, adesktop personal computer, a mobile system, such as a cellular phone,smart phone, personal data assistant (PDA), laptop, or the like.Although only a single user system 104 is depicted in FIG. 1, the systemenvironment 100 may contain numerous user systems 104.

As further illustrated in FIG. 1, the resource processing system 106generally comprises a communication device 136, a processing device 138,and a memory device 140. As used herein, the term “processing device”generally includes circuitry used for implementing the communicationand/or logic functions of the particular system. For example, aprocessing device may include a digital signal processor device, amicroprocessor device, and various analog-to-digital converters,digital-to-analog converters, and other support circuits and/orcombinations of the foregoing. Control and signal processing functionsof the system are allocated between these processing devices accordingto their respective capabilities. The processing device may includefunctionality to operate one or more software programs or one or moremodules, based on computer-readable instructions thereof, which may bestored in a memory device.

The processing device 138 is operatively coupled to the communicationdevice 136 and the memory device 140. The processing device 138 uses thecommunication device 136 to communicate with the network 101 and otherdevices on the network 101, such as, but not limited to the one or moregraph database systems (108 a, 108 b), the third party system 160 andthe user system 104. As such, the communication device 136 generallycomprises a modem, server, or other device for communicating with otherdevices on the network 101.

As further illustrated in FIG. 1, the resource processing system 106comprises computer-readable instructions 142 stored in the memory device140, which in one embodiment includes the computer-readable instructions142 of a resource application 144 configured for systematic dataprocessing of a plurality of information technology operationalactivities.

As further illustrated by FIG. 1, the system environment 100 furthercomprises a one or more graph database systems (108 a, 108 b). Thesystem environment 100 further comprises technology resources 150comprising system hardware 151, technology devices and applications 152,operating systems, servers, technology applications, internal networks,storage/databases 153, user interfaces, authentication operations,middleware, program products, external networks, hosting/facilities,business/technology processes, and other technology resources ortechnology assets associated with the entity. In some embodiments, theresource processing system 106 communicates with the individualtechnology resources 150, via established operative communicationchannels. In this regard, the system 106 may transmit controlinstructions that cause the technology resources 150 to perform one ormore actions, provide activity data, start/stop/modify deployment oractions associated with one or more resources 150 and the like. Thetechnology resources 150 are typically configured to communicate withone another, other devices operated by the entity, and devices operatedby third parties (e.g., customers), such as a third party computingdevice 160, via a network 101. Technology change activities performed onone technology resource may cause a technology conflict orincident/issue on the same technology resource or other technologyresources, by the virtue of their interdependencies.

FIG. 2 illustrates a high level schematic representation 200 of programlevels of an entity, in accordance with some embodiments of theinvention. Typically, an entity or enterprise is associated withmultiple distributed discrete technology platforms that worksimultaneously to perform a myriad of processes associated with theentity. Each of these platforms are typically operate across variousprogram control levels of the entity structure. Typically, the programcontrol levels refer to hierarchical control levels of the entity suchas program control level 1, program control level 2, program controllevel 3, program control level 4, and program control level 5. Thatsaid, an entity may comprise more or fewer program control levels. Eachof the program control levels may be associated with one or more oftechnology sectors, geographical regions, operating divisions orsub-divisions, product divisions, entity functions and/or the likeassociated with the entity.

Typically, the program control level 1 refers to an overarching controllevel, at the highest level of abstraction, associated with implementingand monitoring universal control and performance parameters of theentity using one or more programs, such as program 1A or plan 1A. Forinstance, program 1A or plan 1A may be associated with formulatingand/or implementing enterprise wide strategy/goals.

The program control level 2 may refer to a lower control level under theenterprise control level 1, with lower abstraction, associated withimplementing and monitoring control and performance parameters ofdivisions of the enterprise using one or more programs for achieving theenterprise wide strategy/goals of program 1A. For instance, program/plan2A and program/plan 2B may be associated with formulating and/orimplementing divisional level strategy/goals for achieving theenterprise wide strategy/goals of program 1A.

Similarly, the program control level 3 may refer to a lower controllevel under the divisional control level 2, with lower abstraction,associated with implementing and monitoring control and performanceparameters of sub-divisions of the enterprise using one or moreprograms/plans for achieving the divisional level strategy/goals ofprograms 2A and 2B. For instance, program/plan 3A and program/plan 3Bmay be associated with formulating and/or implementing sub-divisionallevel strategy/goals for achieving the divisional level strategy/goalsof program 2A and program/plan 3C may be associated with formulatingand/or implementing sub-divisional level strategy/goals for achievingthe divisional level strategy/goals of program 2B.

Moreover, the program control level 4 may refer to a lower control levelunder the sub-divisional control level 3, with lower abstraction,associated with implementing and monitoring control and performanceparameters of functions of the enterprise using one or moreprograms/plans for achieving the sub-divisional level strategy/goals ofprograms 3A and 3B. For instance, program/plan 4A-4C may be associatedwith formulating and/or implementing functional level strategy/goals forachieving the sub-divisional level strategy/goals of programs 3A-3B.

Similarly, the program control level 5 may refer to a lower controllevel under the functional control level 4, with lower abstraction,associated with implementing and monitoring control and performanceparameters of operations of the enterprise using one or moreprograms/plans for achieving the functional level strategy/goals ofprograms 4A-4C and the sub-divisional level strategy/goals of program3C. For instance, program/plans 5A-5C may be associated with formulatingand/or implementing operational level strategy/goals for achieving thefunctional level strategy/goals of programs 4A-4C and program/plans5D-5E may be associated with formulating and/or implementing operationallevel strategy/goals for achieving the sub-divisional levelstrategy/goals of program 3C.

Typically, each of these programs/plans operate upon the multipledistributed discrete technology platforms and the technology resources150 for implementing the requisite goal/strategy. In some embodiments,each of the programs/plans comprise one or more information technologyoperational activities (interrelated and/or discrete activities) whichare implemented/performed in a predetermined order, e.g., sequentiallyand/or in parallel, for implementing the associated goal/strategy of theprogram/plan. In the embodiments described herein, the programs/plansare constructed in the form of graph databases (e.g., those stored ingraph database systems (108 a, 108 b)) such that each informationtechnology operational activity of the program is constructed as one ormore nodes of the graph database. Moreover, the various programs/plansand/or information technology operational activities (e.g., nodes whenthe programs are constructed in a graph database) of the programs may becreated by, stored on, operated by and modified by different discretesystems within the entity infrastructure (e.g., the resource processingsystem 106, technology resources 150, graph database systems (108 a, 108b), user device 104, third party system 160, etc.).

However, the various programs/plans and their information technologyoperational activities are typically interdependent and interconnectedwith respect to their operations of the distributed discrete technologyplatforms and the technology resources 150, and the variousprograms/plans across the control levels are typically implemented inparallel to perform a myriad of processes and steps associated with thegoals/strategies. As an illustrative example, implementation of a firstinformation technology operational activity of program 5D at theoperational level, stored at a first database system 108 a, may requirea modification to a particular technology resource 151 (e.g., atechnology change event such as modification to an operating system ofthe technology resource), which may be imitated by a first user/system104. However, a second information technology operational activity ofanother program 3A at the sub-divisional level, stored at a seconddatabase system 108 b, may utilize the same technology resource 151 andrequire the technology resource 151 to be in its pre-modified state. Themodification of the technology resource 151 may result in a technologyincident for implementation of the program 3A, i.e., the modification tothe technology resource 151 adversely affects program 3A or themodification is in conflict with the implementation of the secondinformation technology operational activity of program 3A or the programitself.

Conventional systems are not capable of identifying theinterrelationships between the myriad of information technologyoperational activities of the programs/plans across the variouslyprogram control levels, stored in various database systems, in real timeat all, much less identifying conflicts between them. Moreover, evenwithin a single program/plan, it is only possible to identifyrelationships/interdependencies between various information technologyoperational activities, if at all, by parsing and analyzing dataassociated with each of the thousands or tens of thousands ofinformation technology operational activities of the variousprogram/plans of the entity (or analyzing each node of the all of theprograms/plans, all of its property's and all of its relationships inthe event that the program/plan is implemented in a graph database)every time a resource deployment occurs (e.g., modification to anexisting information technology operational activity, initiation of anew information technology operational activity, removal of aninformation technology operational activity, etc.). This process is timeintensive and consumes high processing and memory resources that couldbe otherwise utilized for other operations. Moreover, because theanalysis requires intensive time durations, it is typically not possibleto identify the interdependencies of the information technologyoperational activities prior to the implementation of the resourcedeployment which may result in conflicts may derail multipleprograms/plans across various program control levels. Continuing withthe previous illustrative example, conventional systems may not be ableto identify that implementation of the first information technologyoperational activity of program 5D is interrelated with the secondinformation technology operational activity of program 3A before theresource deployment occurs (the modification to the technology resource151), which would result in the technology incident for implementationof the program 3A, i.e., a conflict, which prevents the completion ofthe program 3A.

The present invention provides an advanced system that addresses theabove technical problems in existing systems and allows for real-timehigh volume data processing using graph structured databases and allowsfor identifying and remediating conflicts and resource deployment. Theinterconnected graph database environment of the present inventionprovides a number of significant enhancements to computing technology incomparison to traditional databases. Firstly, the present invention isstructured for defining relationship paths comprising multipledimensions of properties and relationships across various graphdatabases of different programs/plans to store data and defineproperties and relationships to a level of detail and granularity thatis not technologically possible with currently existing databases. Inparticular, the present invention is also structured to modify the datastructures and the associated query language to allow each node,relationship, and property to be further defined by one or moreproperties and/or relationships. For example, a node of a first graphdatabase may have a property that is defined by another property, whichmay in turn have relationships to nodes, relationships, and otherproperties of another graph database. In this way, the database schemamay be extended in multiple dimensions to the extent necessary toaccurately capture the data to be tracked across the variousprogram/plans and their interrelationships across the various programcontrol levels. In other words, additional layers of properties andrelationships can be defined in relationship to existing nodes,properties and relationships to increase the fidelity of the informationstored in the database. The query language may also be expanded toaccount for the added potential complexity of the database.

Secondly, arranging nodes, relationships, and properties in this mannerallows the system to reduce the time that it takes to retrieve complexdata and relationships in response to identification of resourcedeployment, thereby allowing for real-time identification ofinterrelationships and conflicts. The system of the present invention isboth highly scalable and efficient. Thirdly, the present inventionimproves the functioning of the computing systems on which the databasesare deployed by reducing the computing resources such as processingpower, memory space, storage space, cache space, electric power, andnetworking bandwidth required to run the database and execute searchqueries.

FIG. 3 illustrates a high level schematic representation 300 of aninterconnected graph database system, in accordance with someembodiments of the invention. Specifically, FIG. 3 depicts a line andsymbol diagram representation of some of the data structures that mayexist within the multidimensional graph databases, in accordance withsome embodiments of the present invention. “Graph database,” “graphdatabase system,” or “graph structure database” as used herein,typically refers to a database that employs graph structures forsemantic queries with nodes, edges and properties to represent and storedata. Typically, the graph database comprises one or more relationships(or edges or graphs), which directly relate data items or nodes. Therelationships allow data in the data items or nodes to be linkedtogether directly, and retrieved with a single operation.

As discussed previously, typically, the programs/plans of the entityoperate upon the multiple distributed discrete technology platforms andthe technology resources 150 for implementing associatedgoals/strategies. Each of the programs/plans comprise one or moreinformation technology operational activities (interrelated and/ordiscrete activities) which are implemented/performed in a predeterminedorder, e.g., sequentially and/or in parallel, for implementing theassociated goal/strategy of the program/plan. In the embodimentsdescribed herein, the programs/plans are constructed in the form ofgraph databases (e.g., those stored in graph database systems (108 a,108 b)) such that each information technology operational activity ofthe program is constructed as one or more nodes of the graph database.Moreover, the various programs/plans and/or information technologyoperational activities (e.g., nodes when the programs are constructed ina graph database) of the programs may be created by, stored on, operatedby and modified by different discrete systems within the entityinfrastructure (e.g., the resource processing system 106, technologyresources 150, graph database systems (108 a, 108 b), user device 104,third party system 160, etc.).

Specifically, FIG. 3 illustrates data structures of a portion of a firstgraph database 302, in accordance with some embodiments. This graphdatabase 302 may be stored at a first graph database system 310 (e.g.,similar to the first graph database system 108 a) and is typicallyassociated with a first program/plan for implementing an associatedgoal/strategy (e.g., at least one of programs 1A-5E describedpreviously). FIG. 3 further illustrates data structures of a portion ofa second graph database 304, in accordance with some embodiments. Thisgraph database 304 may be stored at a second graph database system 350(e.g., similar to the second graph database system 108 b) and istypically associated with a second program/plan for implementing anassociated goal/strategy (e.g., at least one of programs 1A-5E describedpreviously).

“Node” or a “graph database node” as used herein may refer to a datastructure which represents a technology operational activity of theplurality of activities, an entity, an individual, a technologyresource, a technology change event, a technology incident, or the like.Specifically, the first graph database 302 may be associated with aplurality of nodes (311, 312, 313, 314, 315, 316, etc.), and the secondgraph database 304 may be associated with a plurality of nodes (351,352, 353, 354, 355, 356, etc.). Moreover, each of the graph databases(302, 304) comprise one or more information technology operationalactivities which are constructed as one or more of the plurality ofnodes. That said, one or more of the plurality of nodes may alsorepresent a technology resource, a technology change event, a technologyincident, an entity, a user/individual, or the like.

The plurality of nodes may be connected to one another via one or morerelationships. Relationship,” “graph database relationship,” “edge,” or“graph” as used herein may refer to a data structure that links one nodeto another. In some embodiments, the relationships are implemented byconstructing pointers between nodes, relationships and/or properties.Typically, the relationship has a source node and a target node, and isstructured to indicate attributes of the relationship between the nodes(e.g., how the nodes are related, what properties of the nodes areintegrated/connected, and/or the like). In some embodiments, a node mayalso have a relationship with itself. Relationships are representedusing solid lines in FIG. 3. For example, the first graph database 302may comprise a relationship R21 between the nodes 311 and 313, arelationship R22 between the nodes 312 and 314, a relationship R23between the nodes 313 and 315, a relationship R24 between the nodes 313and 314 and a relationship R25 between the nodes 314 and 316. Similarly,the second graph database 304 may comprise a relationship R61 betweenthe nodes 351 and 353, a relationship R62 between the nodes 352 and 354,a relationship R63 between the nodes 353 and 355, a relationship R64between the nodes 353 and 356 and a relationship R65 between the nodes354 and 356.

“Property” or “attribute” or “technology element” as used herein mayrefer to a label containing germane information of associated nodes,relationships, and other properties. As such properties may be appliedto nodes, relationships, and other properties. Each node, relationship,and property may have more than one property associated with it.Properties are represented using dashed lines in FIG. 3. As illustrated,the nodes may comprise one or more properties. For example, node 314 ofgraph database 302 comprises a property P32 and node 354 of graphdatabase 304 comprises a property P74. In some embodiments, therelationships themselves may be associated with one or more properties.For example, the relationship R25 between the nodes 314 and 316 of thegraph database 302 may be associated with a property P34 and therelationship R63 between the nodes 353 and 355 of the graph database 304may be associated with a property P73. In some embodiments, theproperties within the graph database may in turn be associated with oneor more other properties. For instance, property P32 of node 314 ofgraph database 302 may be associated with another property P36 (notillustrated). Typically, the system is configured to construct thevarious nodes (311-316 and 351-356), the associated properties andassociated relationships. In this way, the database is more capable ofexpressing complex interactions between the nodes, relationships, andproperties in multiple dimensions.

In some embodiments, the graph databases (302, 304) are constructed bythe system (e.g., resource processing system 106). In some embodiments,the system may allow for a variety of different methods through whichdata may be entered into the graph database. In some embodiments, theuser 102 may directly input the data into the graph database and isgiven the authorization to create nodes, relationships, and propertieswithin the graph databases (302, 304). In other embodiments, data may beacquired via a data feed from third party servers 160. Typically, thesystem is structured to analyze unstructured data from the data feed,interpret it, and transform it into a structured data set to fit intothe structure of the graph database. In other embodiments, the datawithin the graph database may be generated via machine learning. In suchembodiments, data may be generated using existing programs/plans, suchas by crawling the programs/plans to identify connections to be madebetween the various nodes and properties. The data may alternatively begenerated using internal sources. For instance, the system may identifyexisting mappings created using nodes, relationships, and propertieswithin the graph database and suggest additional mappings to the user.

The system is configured to determine, for each node of the plurality ofnodes, a relationship path by evaluating interdependencies between thenodes, properties and relationships. Typically a relationship pathcomprises one or more relationship elements in a predetermined orderindicating (i) the interdependencies between consecutive pairs of theone or more relationship elements and (ii) an overarching relationshipbetween terminating relationship elements of the one or morerelationship elements of the relationship path. The one or morerelationship elements comprise one or more nodes, one or more propertiesand/or one or more relationships. For example, for the node 314 of thefirst graph database 302, the system may analyze the variousrelationships of the node 314 to determine the relationships R22, R24and R25. The system may further analyze the relationship R24 to identifythe associated node 313 and further identify that node 313 isinterrelated with the node 314. In response, the system may furtheranalyze the node 313 to identify the associated relationship R23 withnode 315. In response to determining that node 315 is interrelated withnode 314, the system may determine a first relationship path “node314-relationship R24-node 313-relationship R23-node 315” for the node314, such that the (i) consecutive pairs of the one or more relationshipelements (node 314, relationship R24, node 313, relationship R23, node315) are interdependent and (ii) terminating relationship elements node314 and node 315 are inter dependent to establish an overarchingrelationship. As another example, similarly, for the node 353 of thesecond graph database 304, the system may analyze the relationship R64of the node 353 to identify the associated node 356 and further identifythat node 356 is interrelated with the node 354 via the relationshipR65. In response, the system may further analyze the node 3354 toidentify the associated relationship R623 with node 352. In response todetermining that node 353 is not interrelated with node 352, the systemmay determine a relationship path “node 353-relationship R64-node356-relationship R65-node 354-property P74” for the node 353, such thatthe (i) consecutive pairs of the one or more relationship elements (node353, relationship R64, node 356, relationship R65, node 354, propertyP74) are interdependent and (ii) terminating relationship elements node353 and property are inter dependent.

The a pair of relationship elements being “related,” “interrelated,”“interdependent” or comprising a relationship as used herein refers to(i) a first relationship element (or its associated informationtechnology operational activity) being a cause of the secondrelationship element (or its associated information technologyoperational activity) of the pair of relationship elements, (ii) atleast one technology resource associated with the first relationshipelement being influenced by the second relationship element (or itsassociated information technology operational activity) of the pair ofrelationship elements, and/or (iii) at least one technology resourceassociated with the first relationship element and at least onetechnology resource associated with the second relationship element ofthe pair having a similar operation shift, Operation shift as usedherein may refer to predetermined, identified or measuredchanges/alterations to the functioning of the technology resourcesinvolved or to the resources themselves, as will be described in detailbelow.

In some embodiments, the system stores the determined relationship pathsof a node (or another relationship element) by augmenting the dataassociated with the node (or another relationship element). In someembodiments, the system stores the determined relationship paths of anode (or another relationship element) at a relationship path storagelocation of the associated graph database. In some embodiments, thesystem determines the relationship paths for a node (or anotherrelationship element), in real time, of its construction. In someembodiments, for a new node (or another relationship element) beingcreated, the system identifies a relationship between the new node andan existing node, and determines a relationship path for the new node byaugmenting an existing relationship path of the existing node with thenew node.

The present invention is further structured to determine a lateralrelationship between a node of the first graph database system andanother node of the plurality of second nodes of the second graphdatabase system, based on at least the relationship paths of the nodes.For example, for the node 314 (source node) of the first graph database302, the system may determine (or retrieve previously determined)relationship paths “node 314-relationship R22-node 312”, “node314-property P32” and “node 314-relationship R25-property P34,” based onidentifying overarching inter dependencies of the paths and identifyinginterdependencies between consecutive pairs of relationship elements, asdescribed above. Next, the system may construct a path query based onthe relationship paths. The path query typically comprises dataassociated with the source node 314 and one or more search parameters.In some embodiments, the search parameters comprise one or moreattributes/features that are common to the relationship elements of oneor more of the relationship paths associated with the source node 314.In some embodiments, the search parameters comprise one or moreattributes/features that associated with the relationship elements ofone or more of the relationship paths of the source node 314. In someembodiments, the one or more search parameters comprise the technologyresources associated with the relationship elements of one or more ofthe relationship paths of the source node 314. The system may thentranslate the path query into a set of low level instructions andtransmit control signals to the second graph database system 350 tocause a runtime database manager of the second graph database system 350to execute the set of low level instructions on the second graphdatabase 304 to begin a search. The system may then retrieve the datafrom the search of the second graph database system 350 and analyze thedata to determine the lateral relationships between nodes of the twograph database systems (310, 350).

In some embodiments, the system may identify a lateral relationshipbetween the source node 314 and the target node 353 based on at leastdetermining that (i) a first information technology operational activityassociated with the source node 314 is a cause of a second informationtechnology operational activity associated with the target node 353. Forinstance, based on analyzing the data retrieved from the second graphdatabase system 350 and the relationship path “node 314-property P32” ofthe source node 314, the system may determine that the source node 314of the first graph database system 310 comprises lateral relationshipwith a target node 353 of the second graph database system 350. Asillustrated, the system may identify a lateral relationship R94 betweenthe source node 314 and the target node 353 based on at leastdetermining that (i) a first information technology operational activity(indicated by property P32) associated with the source node 314 is acause of a second information technology operational activity associatedwith the target node 353. For example, the first information technologyoperational activity associated with the source node 314 may beassociated with a technology change operation (from example,changing/modifying the operating system of a server, updating theversions of one or more security/authentication applications of theserver, performing hardware changes, addition of networkingcapabilities, hardware/software reconfiguration with/without restart,servicing, or otherwise modifying one or more aspects of the server fromone state to another) performed on a first technology resource (forexample, the server). The second information technology operationalactivity associated with the target node 353 maybe associated with anintegrity check operation that is triggered by the technology changeoperation, either directly or indirectly. As another example, the systemmay determine a relationship between the first and a second activity ofthe one or more activities, based on identifying that the targettechnology resource of the first activity/technology change and thetechnology resource causing the second activity/incident are the same.Alternatively, or in addition with the previous instance, the system maydetermine that the first activity/technology change is directed to aproject for improving a certain business/technology process. The systemmay then identify second information technology operational activitythat is caused by the technology change based on determining that thesecond information technology operational activity is directed to aprogram/plan that performs the specified business/technology process.

In some embodiments, the system may identify a lateral relationshipbetween the source node 314 and the target node 353 based on at leastdetermining that (ii) a first technology resource associated with afirst information technology operational activity of the source node 314is influenced by or influences a second information technologyoperational activity associated with the target node 353. For instance,based on analyzing the data retrieved from the second graph databasesystem 350 and the relationship path “node 314-relationship R22-node312” of the source node 314, the system may determine that the sourcenode 314 of the first graph database system 310 comprises lateralrelationship with a target node 353 of the second graph database system350. As illustrated, the system may identify a lateral relationship R96between the source node 314 and the target node 353 based on at leastdetermining that (ii) a first technology resource (indicated by node312) associated with a first information technology operational activityof the source node 314 is influenced by or influences a secondinformation technology operational activity associated with the targetnode 353. For example, the first information technology operationalactivity associated with the source node 314 may be associated with atechnology change operation (from example, changing/modifying theoperating system of a server, updating the versions of one or moresecurity/authentication applications of the server, performing hardwarechanges, addition of networking capabilities, hardware/softwarereconfiguration with/without restart, servicing, or otherwise modifyingone or more aspects of the server from one state to another) performedon a first technology resource indicated by node 312 (for example, theserver). The second information technology operational activityassociated with the target node 353 maybe a technology applicationinterface that runs on the resource 312 (e.g., the server) that would beaffected by the change operation. As another example, the first activitymay be directed to an event comprising one or more alerts/notificationsassociated with a technology resource comprising a specific technologyapplication (indicated by node 312). The system may identify secondactivities with business/technology processes that were active duringthe duration of the alerts and infer that the implementation/functioningof the business/technology processes impacted the specific technologyapplication.

In some embodiments, the system may identify a lateral relationshipbetween the source node 314 and the target node 353 based on at leastdetermining that (iii) a first technology resource associated with thefirst information technology operational activity of the source node 314and a second technology resource associated with the second informationtechnology operational activity of the target node 353 have a similaroperation shift. For instance, based on analyzing the data retrievedfrom the second graph database system 350 and the relationship path“node 314-relationship R25-property P34” of the source node 314, thesystem may determine that the source node 314 of the first graphdatabase system 310 comprises lateral relationship with a target node353 of the second graph database system 350. As illustrated, the systemmay identify a lateral relationship R98 between the source node 314 andthe target node 353 based on at least determining that (ii) a firsttechnology resource (indicated by property P34) associated with thefirst information technology operational activity of the source node 314and a second technology resource (indicated by property P73) associatedwith the second information technology operational activity of thetarget node 353 have a similar operation shift. Operation shift as usedherein may refer to predetermined, identified or measuredchanges/alterations to the functioning of the technology resourcesinvolved or to the resources themselves. For example, the system mayidentify a first information technology operational activity of thesource node 314 comprising an incident involving a first type of problem(for example, a specific type of improper functioning of a firsttechnology application, a first error value reported by a resource,reduction in processing speed of a first resource and the like). Thesystem may then identify a second information technology operationalactivity of the target node 353, wherein the second activity may bedirected to same or similar problems as the first problem (for example,same type of functioning as the first technology application, a seconderror value within a predetermined range of the first value reported bya similar resource, similar reduction in processing speed of a secondresource and the like). Here, the system may determine the relationshipof recurring defects between the first and second information technologyoperational activities, based on determining that first and secondactivities report similar problems/similar operation that occurperiodically, and further infer that these activities are likely causedby same or similar activities. Similarly, the first and secondactivities may be related to a certain type of operation shiftcomprising a specific improvement. The system may identify arelationship between these activities based on inferring that theimprovements are caused by same or similar restoral actions.

FIG. 4 illustrates a high level process flow for identifying andremediating conflicts in resource deployment via an interconnected graphdatabase system, in accordance with some embodiments of the presentinvention. Typically, the system is configured to identify initiation ofa first information technology operational activity by a user device. Asdiscussed, the first information technology operational activity istypically associated with deployment of a first technology resource. Asdiscussed, the first technology resource may comprise system hardware,technology devices, technology applications, operating systems, servers,networks, databases and/or technology processes. In some embodiments,the deployment of the first technology resource comprises one or more ofa modification to the first technology resource, initiation of a newfirst technology resource, modification of features/functions of thefirst technology resource, or the like.

As illustrated by block 402, the system is structured to identify asource node of the plurality of first nodes of the first graph databasesystem associated with the first information technology operationalactivity. As discussed previously, the source node typically comprises aproperty of the source node associated with the first informationtechnology operational activity. Moreover, the first graph databasesystem typically comprises a relationship between the source node and atleast one first node of the plurality of first nodes.

In some embodiments, to identify the source node, the system may firstidentify that a first program/plan (of a plurality of programs/plansassociated with the entity) associated with the first informationtechnology operational activity. The system may then determine a firstgraph database is associated with implementing the first program/plan.Subsequently, the system may then analyzing the first graph database toidentify the source node associated with the first informationtechnology operational activity.

In some embodiments, the user may initiate the resource deployment,i.e., the first information technology operational activity by creatinga particular node at the first graph database system or modifying anexisting node of the first graph database system. Here, the system maycorrelate (i) initiation of the construction of the particular node or(ii) modification of the particular node with the first informationtechnology operational activity and determine that the new/modified nodeis the source node.

In some embodiments, to identify the source node, the system maydetermine at least one attribute (feature, function, associatedtechnology resource, time period, geographical location, IP address,etc.) associated with the first information technology operationalactivity. The system may then construct a search query comprising the atleast one attribute and subsequently translate the search query into aset of low level instructions. The system may then cause the first graphdatabase system to execute the low level instructions to begin a searchof the plurality of first nodes and their properties and relationshipsto identify a match with the least one attribute. The system may thenretrieve data from search of the first graph database and analyze thedata to determine the search query.

Next at block 404, the system is configured to determine a relationshippath associated with the source node based on analyzing at least one ofthe source node, the property of the source node and the relationshipbetween the source node and at least one first node of the plurality offirst nodes. The determination of relationship paths is described indetail above with respect to FIG. 3.

Next, at block 406 the system is configured to determine a lateralrelationship between the source node of the first graph database systemand a target node of the plurality of second nodes of the second graphdatabase system based on at least the relationship path. As previouslydiscussed in detail with respect to FIG. 3, determining the lateralrelationship comprises (i) determining that that the first informationtechnology operational activity is a cause of a second informationtechnology operational activity of the target node, (ii) determiningthat the first technology resource associated with the first informationtechnology operational activity is influenced by the second informationtechnology operational activity, and/or (iii) determining that the firsttechnology resource associated with the first information technologyoperational activity and a second technology resource associated withthe second information technology operational activity have a similaroperation shift.

The determination of the lateral relationship is typically similar tothe manner described in detail with respect to FIG. 3. As discussed, insome embodiments, the lateral relationship may be between a property ofthe source node and at least one of (i) the target node, (ii) a propertyof the target node, and (iii) a relationship between the target node andat least one second node of the plurality of second nodes of the secondgraph database system. Similarly, in some embodiments, the lateralrelationship may be between the relationship between the source node andat least one first node of the plurality of first nodes, and at leastone of (i) the target node, (ii) a property of the target node, and(iii) a relationship between the target node and at least one secondnode of the plurality of second nodes of the second graph databasesystem.

In some embodiments, in response to determining the lateralrelationship, the system may dynamically augment the source node with afirst pointer associated with the lateral relationship such that therelationship path of the source node comprises the lateral relationship.Moreover, the system may also augment the target node with a secondpointer associated with the lateral relationship such that arelationship path of the target node comprises the lateral relationship.In this manner, for future operations/information technology operationalactivities, the system may slimily analyze the pointer(s) associatedwith the lateral relationship to identify conflicts, without requiringrepeated analysis.

Moreover, the system may dynamically and periodically re-analyze thedetermined relationships to ascertain their current validity. Forinstance, the system may identify that the lateral relationship betweenthe source node of the first graph database system and the target nodeof the second graph database is obsolete. The system may then modify thesource node to remove the first pointer associated with the lateralrelationship and modify the target node to remove the second pointerassociated with the lateral relationship, to remove the lateralrelationship pointers.

As illustrated by block 408, the system is configured to determinewhether the lateral relationship between the source node of the firstgraph database system and the target node of the second graph databasesystem comprises a conflict. The system typically determines this basedon at least analyzing the lateral relationship. Typically the conflictindicates that the deployment of the first technology resource for thefirst information technology operational activity would prevent, hinderor otherwise adversely affect the second information technologyoperational activity of the target node.

As illustrated by block 410, in response to determining that the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system comprises theconflict, the system is configured to block initiation of the firstinformation technology operational activity, in real-time. In thisregard, the system may transmit control instructions to the technologyresource (e.g., technology resource 150) to cause the resource to stopoperations related to the first information technology operationalactivity of the source node.

Next at block 412, the system may initiate transmission of an alert tothe user device. The alert typically comprises a presentation of thedetermined lateral relationship comprising the conflict between thesource node of the first graph database system and the target node ofthe second graph database system. The alert may comprise audio, visualand/or vibratory notifications. In some embodiments, transmitting thealerts may further comprise causing the user device to perform one ormore functions. In this regard, the system may lock the display of atleast a portion of a screen of the display device 112, move/rearrangeportions of existing displays on the screen to accommodate therelationship information, change brightness of the screen of the displaydevice 112, until the user 102 performs one or more predeterminedactions/responses. Typically, the alert is transmitted via the network101, via a local area network, near field communication, via theinternet or any other suitable medium. For example, based on determiningthat the user device is offline or in a suspended state, the system maytransmit text alerts/encoded signals that cause the user device toconnect to a suitable network/turn on so that the relationshipinformation may be conveyed to the user 102. In some embodiments, thesystem may perform the blocking action of block 410 only after receivinga confirmation from the user, following the display of the alert.

In some embodiments, the system is further configured to implementremediation actions for mitigating the identified conflict. Here, thesystem may identify a trigger technology element associated with theconflict of the source node of the first graph database system and thetarget node of the second graph database system. Typically the systemanalyzes at least one of the (i) the source node, (ii) the property ofthe source node and (iii) the relationship between the source node andat least one first node of the plurality of first nodes to identify thetrigger technology element. For example, the system may identify atrigger technology element such as time duration of the determinedconflict, particular features/functions of technology resourcesassociated with the conflict, associated operators/individuals, and/orthe like. The system may then identify a remediation action for thetrigger technology element required to remediate the conflict associatedwith the source node of the first graph database system and the targetnode of the second graph database system. For example, the remediationaction may comprise rescheduling one or both of the first informationtechnology operational activity and the second information technologyoperational activity, performing the first and/or second informationtechnology operational activity on other available technology resourcesthat are similar to those identified to be in conflict, etc. The systemmay then modify, in real-time, the trigger technology element in atleast one of the (i) the source node, (ii) the property of the sourcenode and (iii) the relationship between the source node and at least onefirst node of the plurality of first nodes, based on the remediationaction. Subsequently, the system may resume initiation of the modifiedfirst information technology operational activity.

In some embodiments, the present invention provides a framework fordeveloping, monitoring, analyzing and modifying the plurality ofprograms/plans for an entity (such as the plurality of programs 1A-5Edescribed with respect to FIG. 2 across a plurality of program controllevels) for implementing various strategy/goals, via the graph databasesystem environment illustrated in FIG. 1. The functions and featuresprovided by framework provided by the invention are 3-fold, in someembodiments. Firstly, the present invention provides an advanced systemthat allows for real-time high volume data processing using graphstructured databases and is configured for establishing complexrelationship paths across graph databases for various programs/plansacross various program control levels, as described previously. In otherwords, the present invention provides a unique, technical mechanism fornot only interconnecting disparate graph databases but also for definingand tracking the established relationship paths and lateralrelationships and their cumulative effect on strategic objectives of anentity, which would not be possible otherwise.

Secondly, in some embodiments, the system constructs a library ofprograms/plans. Specifically, for each program, the system constructsimperative(s), objective(s), execution path(s) and target structure(s),e.g., via nodes of a graph database for the program. Next, the systemconstructs nodes for actions and changes associated with the programwhich are then mapped onto delivery mechanisms such as current/futureprojects of the entity. The system then constructs program structures ortemplates for each program/plan by stripping data elements (e.g.,initialized variables, properties, specifics regarding technologyresources involved, etc.) that are particular to the program from theconstructed program/plan, while retraining the relationships (e.g.,relationship paths) and constructs of the program/plan. These programstructures are then categorized based on various parameters such as goaltype, program control level type, technology resources involved, and thelike and subsequently stored in a library database. These programstructures may then be retrieved based on the categorizations andutilized to construct new programs/plans by augmenting the programstructure with particulars of the new program/plan. In this manner, theidentified relationship paths and interconnections of existingprograms/plans are retained and extrapolated for new programs/plans,thereby precluding the need for repeated analyses and expenditure ofoperating, time and memory resources.

Thirdly, by constructing and utilizing the program structures in alibrary of programs/plans, the present invention facilitates astandardized planning framework ontology across the entity, whichprovides holistic approach to program/plan construction andimplementation.

Each communication interface described herein generally includeshardware, and, in some instances, software, that enables the computersystem, to transport, send, receive, and/or otherwise communicateinformation to and/or from the communication interface of one or moreother systems on the network. For example, the communication interfaceof the user input system may include a wireless transceiver, modem,server, electrical connection, and/or other electronic device thatoperatively connects the user input system to another system. Thewireless transceiver may include a radio circuit to enable wirelesstransmission and reception of information.

As will be appreciated by one of ordinary skill in the art, the presentinvention may be embodied as an apparatus (including, for example, asystem, a machine, a device, a computer program product, and/or thelike), as a method (including, for example, a business process, acomputer-implemented process, and/or the like), or as any combination ofthe foregoing. Accordingly, embodiments of the present invention maytake the form of an entirely software embodiment (including firmware,resident software, micro-code, and the like), an entirely hardwareembodiment, or an embodiment combining software and hardware aspectsthat may generally be referred to herein as a “system.” Furthermore,embodiments of the present invention may take the form of a computerprogram product that includes a computer-readable storage medium havingcomputer-executable program code portions stored therein.

As the phrase is used herein, a processor may be “configured to” performa certain function in a variety of ways, including, for example, byhaving one or more general-purpose circuits perform the function byexecuting particular computer-executable program code embodied incomputer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

It will be understood that any suitable computer-readable medium may beutilized. The computer-readable medium may include, but is not limitedto, a non-transitory computer-readable medium, such as a tangibleelectronic, magnetic, optical, infrared, electromagnetic, and/orsemiconductor system, apparatus, and/or device. For example, in someembodiments, the non-transitory computer-readable medium includes atangible medium such as a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a compact discread-only memory (CD-ROM), and/or some other tangible optical and/ormagnetic storage device. In other embodiments of the present invention,however, the computer-readable medium may be transitory, such as apropagation signal including computer-executable program code portionsembodied therein.

It will also be understood that one or more computer-executable programcode portions for carrying out the specialized operations of the presentinvention may be required on the specialized computer includeobject-oriented, scripted, and/or unscripted programming languages, suchas, for example, Java, Perl, Smalltalk, C++, SAS, SQL, Python, ObjectiveC, and/or the like. In some embodiments, the one or morecomputer-executable program code portions for carrying out operations ofembodiments of the present invention are written in conventionalprocedural programming languages, such as the “C” programming languagesand/or similar programming languages. The computer program code mayalternatively or additionally be written in one or more multi-paradigmprogramming languages, such as, for example, F #.

Embodiments of the present invention are described above with referenceto flowcharts and/or block diagrams. It will be understood that steps ofthe processes described herein may be performed in orders different thanthose illustrated in the flowcharts. In other words, the processesrepresented by the blocks of a flowchart may, in some embodiments, be inperformed in an order other that the order illustrated, may be combinedor divided, or may be performed simultaneously. It will also beunderstood that the blocks of the block diagrams illustrated, in someembodiments, merely conceptual delineations between systems and one ormore of the systems illustrated by a block in the block diagrams may becombined or share hardware and/or software with another one or more ofthe systems illustrated by a block in the block diagrams. Likewise, adevice, system, apparatus, and/or the like may be made up of one or moredevices, systems, apparatuses, and/or the like. For example, where aprocessor is illustrated or described herein, the processor may be madeup of a plurality of microprocessors or other processing devices whichmay or may not be coupled to one another. Likewise, where a memory isillustrated or described herein, the memory may be made up of aplurality of memory devices which may or may not be coupled to oneanother.

It will also be understood that the one or more computer-executableprogram code portions may be stored in a transitory or non-transitorycomputer-readable medium (e.g., a memory, and the like) that can directa computer and/or other programmable data processing apparatus tofunction in a particular manner, such that the computer-executableprogram code portions stored in the computer-readable medium produce anarticle of manufacture, including instruction mechanisms which implementthe steps and/or functions specified in the flowchart(s) and/or blockdiagram block(s).

The one or more computer-executable program code portions may also beloaded onto a computer and/or other programmable data processingapparatus to cause a series of operational steps to be performed on thecomputer and/or other programmable apparatus. In some embodiments, thisproduces a computer-implemented process such that the one or morecomputer-executable program code portions which execute on the computerand/or other programmable apparatus provide operational steps toimplement the steps specified in the flowchart(s) and/or the functionsspecified in the block diagram block(s). Alternatively,computer-implemented steps may be combined with operator and/orhuman-implemented steps in order to carry out an embodiment of thepresent invention.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of, and not restrictive on, the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible. Those skilled inthe art will appreciate that various adaptations and modifications ofthe just described embodiments can be configured without departing fromthe scope and spirit of the invention. Therefore, it is to be understoodthat, within the scope of the appended claims, the invention may bepracticed other than as specifically described herein.

What is claimed is:
 1. A system for an interconnected graph databaseconfigured for identifying and remediating conflicts in resourcedeployment, the system comprising: a first graph database system,wherein the first graph database system comprises a plurality of firstnodes associated with a first program; a second graph database system,wherein the second graph database system comprises a plurality of secondnodes associated with a second program; a computer apparatus includingat least one processor, at least one memory device withcomputer-readable program code stored thereon and a networkcommunication device; and the at least one processor being operativelycoupled to the least one memory device and the network communicationdevice, wherein the at least one processor is configured to execute thecomputer-readable program code to: identify initiation of a firstinformation technology operational activity by a user device, whereinthe first information technology operational activity is associated withdeployment of a first technology resource; identify a source node of theplurality of first nodes of the first graph database system associatedwith the first information technology operational activity, wherein thesource node comprises a property of the source node associated with thefirst information technology operational activity, wherein the firstgraph database system comprises a relationship between the source nodeand at least one first node of the plurality of first nodes; determine arelationship path associated with the source node based on analyzing atleast one of the source node, the property of the source node and therelationship between the source node and at least one first node of theplurality of first nodes; determine a lateral relationship between thesource node of the first graph database system and a target node of theplurality of second nodes of the second graph database system based onat least the relationship path, wherein the target node of the secondgraph database system is associated with a second information technologyoperational activity, wherein determining the lateral relationshipcomprises (i) determining that that the first information technologyoperational activity is a cause of the second information technologyoperational activity, (ii) determining that the first technologyresource associated with the first information technology operationalactivity is influenced by the second information technology operationalactivity, and/or (iii) determining that the first technology resourceassociated with the first information technology operational activityand a second technology resource associated with the second informationtechnology operational activity have a similar operation shift;determine that the lateral relationship between the source node of thefirst graph database system and the target node of the second graphdatabase system comprises a conflict based on at least analyzing thelateral relationship; in response to determining that the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system comprises theconflict, block initiation of the first information technologyoperational activity; and initiate transmission of an alert to the userdevice, wherein the alert comprises a presentation of the determinedlateral relationship comprising the conflict between the source node ofthe first graph database system and the target node of the second graphdatabase system.
 2. The system of claim 1, wherein the processing deviceis further configured to execute the computer-readable program code to:identify a trigger technology element associated with the conflictassociated with the source node of the first graph database system andthe target node of the second graph database system in at least one ofthe (i) the source node, (ii) the property of the source node and (iii)the relationship between the source node and at least one first node ofthe plurality of first nodes; identify a remediation action for thetrigger technology element required to remediate the conflict associatedwith the source node of the first graph database system and the targetnode of the second graph database system; modify, in real-time, thetrigger technology element in at least one of the (i) the source node,(ii) the property of the source node and (iii) the relationship betweenthe source node and at least one first node of the plurality of firstnodes, based on the remediation action; and resume, initiation of themodified first information technology operational activity.
 3. Thesystem of claim 1, wherein determining the lateral relationship betweenthe source node of the first graph database system and the target nodeof the second graph database system further comprises: augmenting thesource node with a first pointer associated with the lateralrelationship such that the relationship path of the source nodecomprises the lateral relationship; and augmenting the target node witha second pointer associated with the lateral relationship such that arelationship path of the target node comprises the lateral relationship.4. The system of claim 3, wherein the at least one processor is furtherconfigured to execute the computer-readable program code to: identifythat the lateral relationship between the source node of the first graphdatabase system and the target node of the second graph database isobsolete; modify the source node to remove the first pointer associatedwith the lateral relationship; and modify the target node to remove thesecond pointer associated with the lateral relationship.
 5. The systemof claim 1, wherein determining the lateral relationship between thesource node of the first graph database system and the target node ofthe second graph database system further comprises: determining thelateral relationship between the property of the source node and atleast one of (i) the target node, (ii) a property of the target node,and (iii) a relationship between the target node and at least one secondnode of the plurality of second nodes of the second graph databasesystem.
 6. The system of claim 1, wherein determining the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system furthercomprises: determining the lateral relationship between the relationshipbetween the source node and at least one first node of the plurality offirst nodes, and at least one of (i) the target node, (ii) a property ofthe target node, and (iii) a relationship between the target node and atleast one second node of the plurality of second nodes of the secondgraph database system.
 7. The system of claim 1, wherein the deploymentof the first technology resource comprises a modification to the firsttechnology resource.
 8. The system of claim 1, wherein the firsttechnology resource comprises system hardware, technology devices,technology applications, operating systems, servers, networks, databasesand/or technology processes.
 9. The system of claim 1, whereindetermining the lateral relationship path associated with the sourcenode further comprises: constructing a path query comprising the sourcenode and a search parameter; translating the path query into a set oflow level instructions; executing, via the second graph database system,the low level instructions to begin a search at the second graphdatabase; and retrieving data from the second graph database accordingto the source node and the search parameter.
 10. The system of claim 1,wherein identifying the source node associated with the firstinformation technology operational activity further comprises:determining that the first program associated with the first informationtechnology operational activity; determining the first graph databaseassociated with the first program; and analyzing the first graphdatabase to identify the source node associated with the firstinformation technology operational activity.
 11. The system of claim 1,wherein identifying the source node associated with the firstinformation technology operational activity further comprises:determining at least one attribute associated with the first informationtechnology operational activity; constructing a search query comprisingthe at least one attribute; translating the search query into a set oflow level instructions; executing, via the first graph database system,the low level instructions to begin a search of the plurality of firstnodes; and retrieving data from the first graph database according tothe at least one attribute.
 12. The system of claim 1, whereinidentifying the source node associated with the first informationtechnology operational activity further comprises identifying (i)initiation of construction of the source node or (ii) modification ofthe source node.
 13. A computer program product for an interconnectedgraph database configured for identifying and remediating conflicts inresource deployment, the computer program product comprising anon-transitory computer-readable storage medium havingcomputer-executable instructions to: identify initiation of a firstinformation technology operational activity by a user device, whereinthe first information technology operational activity is associated withdeployment of a first technology resource; identify a source node of aplurality of first nodes of a first graph database system associatedwith the first information technology operational activity, wherein thesource node comprises a property of the source node associated with thefirst information technology operational activity, wherein the firstgraph database system comprises a relationship between the source nodeand at least one first node of the plurality of first nodes; determine arelationship path associated with the source node based on analyzing atleast one of the source node, the property of the source node and therelationship between the source node and at least one first node of theplurality of first nodes; determine a lateral relationship between thesource node of the first graph database system and a target node of aplurality of second nodes of a second graph database system based on atleast the relationship path, wherein the target node of the second graphdatabase system is associated with a second information technologyoperational activity, wherein determining the lateral relationshipcomprises (i) determining that that the first information technologyoperational activity is a cause of the second information technologyoperational activity, (ii) determining that the first technologyresource associated with the first information technology operationalactivity is influenced by the second information technology operationalactivity, and/or (iii) determining that the first technology resourceassociated with the first information technology operational activityand a second technology resource associated with the second informationtechnology operational activity have a similar operation shift;determine that the lateral relationship between the source node of thefirst graph database system and the target node of the second graphdatabase system comprises a conflict based on at least analyzing thelateral relationship; in response to determining that the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system comprises theconflict, block initiation of the first information technologyoperational activity; and initiate transmission of an alert to the userdevice, wherein the alert comprises a presentation of the determinedlateral relationship comprising the conflict between the source node ofthe first graph database system and the target node of the second graphdatabase system.
 14. The computer program product of claim 13, whereinthe non-transitory computer-readable storage medium further hascomputer-executable instructions to: identify a trigger technologyelement associated with the conflict associated with the source node ofthe first graph database system and the target node of the second graphdatabase system in at least one of the (i) the source node, (ii) theproperty of the source node and (iii) the relationship between thesource node and at least one first node of the plurality of first nodes;identify a remediation action for the trigger technology elementrequired to remediate the conflict associated with the source node ofthe first graph database system and the target node of the second graphdatabase system; modify, in real-time, the trigger technology element inat least one of the (i) the source node, (ii) the property of the sourcenode and (iii) the relationship between the source node and at least onefirst node of the plurality of first nodes, based on the remediationaction; and resume, initiation of the modified first informationtechnology operational activity.
 15. The computer program product ofclaim 13, wherein determining the lateral relationship between thesource node of the first graph database system and the target node ofthe second graph database system further comprises: determining thelateral relationship between the property of the source node and atleast one of (i) the target node, (ii) a property of the target node,and (iii) a relationship between the target node and at least one secondnode of the plurality of second nodes of the second graph databasesystem.
 16. The computer program product of claim 13, whereindetermining the lateral relationship between the source node of thefirst graph database system and the target node of the second graphdatabase system further comprises: determining the lateral relationshipbetween the relationship between the source node and at least one firstnode of the plurality of first nodes, and at least one of (i) the targetnode, (ii) a property of the target node, and (iii) a relationshipbetween the target node and at least one second node of the plurality ofsecond nodes of the second graph database system.
 17. A computerizedmethod for an interconnected graph database configured for identifyingand remediating conflicts in resource deployment, the computerizedmethod comprising: identifying initiation of a first informationtechnology operational activity by a user device, wherein the firstinformation technology operational activity is associated withdeployment of a first technology resource; identifying a source node ofa plurality of first nodes of a first graph database system associatedwith the first information technology operational activity, wherein thesource node comprises a property of the source node associated with thefirst information technology operational activity, wherein the firstgraph database system comprises a relationship between the source nodeand at least one first node of the plurality of first nodes; determininga relationship path associated with the source node based on analyzingat least one of the source node, the property of the source node and therelationship between the source node and at least one first node of theplurality of first nodes; determining a lateral relationship between thesource node of the first graph database system and a target node of aplurality of second nodes of a second graph database system based on atleast the relationship path, wherein the target node of the second graphdatabase system is associated with a second information technologyoperational activity, wherein determining the lateral relationshipcomprises (i) determining that that the first information technologyoperational activity is a cause of the second information technologyoperational activity, (ii) determining that the first technologyresource associated with the first information technology operationalactivity is influenced by the second information technology operationalactivity, and/or (iii) determining that the first technology resourceassociated with the first information technology operational activityand a second technology resource associated with the second informationtechnology operational activity have a similar operation shift;determining that the lateral relationship between the source node of thefirst graph database system and the target node of the second graphdatabase system comprises a conflict based on at least analyzing thelateral relationship; in response to determining that the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system comprises theconflict, blocking initiation of the first information technologyoperational activity; and initiating transmission of an alert to theuser device, wherein the alert comprises a presentation of thedetermined lateral relationship comprising the conflict between thesource node of the first graph database system and the target node ofthe second graph database system.
 18. The computerized method of claim17, wherein the computerized method further comprises: identifying atrigger technology element associated with the conflict associated withthe source node of the first graph database system and the target nodeof the second graph database system in at least one of the (i) thesource node, (ii) the property of the source node and (iii) therelationship between the source node and at least one first node of theplurality of first nodes; identifying a remediation action for thetrigger technology element required to remediate the conflict associatedwith the source node of the first graph database system and the targetnode of the second graph database system; modifying, in real-time, thetrigger technology element in at least one of the (i) the source node,(ii) the property of the source node and (iii) the relationship betweenthe source node and at least one first node of the plurality of firstnodes, based on the remediation action; and resuming, initiation of themodified first information technology operational activity.
 19. Thecomputerized method of claim 17, wherein determining the lateralrelationship between the source node of the first graph database systemand the target node of the second graph database system furthercomprises: determining the lateral relationship between the property ofthe source node and at least one of (i) the target node, (ii) a propertyof the target node, and (iii) a relationship between the target node andat least one second node of the plurality of second nodes of the secondgraph database system.
 20. The computerized method of claim 17, whereindetermining the lateral relationship between the source node of thefirst graph database system and the target node of the second graphdatabase system further comprises: determining the lateral relationshipbetween the relationship between the source node and at least one firstnode of the plurality of first nodes, and at least one of (i) the targetnode, (ii) a property of the target node, and (iii) a relationshipbetween the target node and at least one second node of the plurality ofsecond nodes of the second graph database system.