Kerrie Holley

Kerrie Holley

United States
8K followers 500+ connections

Activity

Join now to see all activity

Publications

  • s Your Company Ready for Cloud: Choosing the Best Cloud Adoption Strategy for Your Business

    IBM Press

    A guide that emphasizes the need for a Cloud Adoption Strategy offering guidance on cloud Investment decisions and adoption. Provides information on making and evolving your strategy so that it remains relevant during changing business conditions.

    See publication
  • Harnessing Data to Fight Crime

    Huffington Post

    Police can now rely on computer and communications systems that provide immediate access to everything that is known about a particular crime or person. This article shows how technology and analytic technology can help fight crime.

    See publication
  • 100 SOA Questions: Asked and Answered

    Prentice Hall

    100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, practitioners and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer, consultant, technical manager, and strategist.

    The book is designed for the experienced SOA practitioner and someone just beginning their journey, The reader can easily skip to a…

    100 SOA Questions brings together authoritative answers to the most crucial questions business, technical, practitioners and architectural decision-makers ask about SOA. It draws on the immense experience of two SOA experts who’ve participated in more than 100 SOA projects in the roles of architect, designer, consultant, technical manager, and strategist.

    The book is designed for the experienced SOA practitioner and someone just beginning their journey, The reader can easily skip to a domain of interest such as business, architecture, organization or governance.

    See publication
  • SOA Governance: Achieving and Sustaining Business and IT Agility

    Persons/IBM Press

    Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven Governance

    Inadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices for governing IT in any service-oriented environment.

    The authors begin by introducing a comprehensive SOA governance model that has worked in the field. They define what must be governed, identify key stakeholders, and…

    Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven Governance

    Inadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices for governing IT in any service-oriented environment.

    The authors begin by introducing a comprehensive SOA governance model that has worked in the field. They define what must be governed, identify key stakeholders, and review the relationship of SOA governance to existing governance bodies as well as governance frameworks like COBIT. Next, they walk you through SOA governance assessment and planning, identifying and fixing gaps, setting goals and objectives, and establishing workable roadmaps and governance deliverables. Finally, the authors detail the build-out of the SOA governance model with a case study.

    The authors illuminate the unique issues associated with applying IT governance to a services model, including the challenges of compliance auditing when service behavior is inherently unpredictable. They also show why services governance requires a more organizational, business-centric focus than “conventional” IT governance.

    Coverage includes

    * Understanding the problems SOA governance needs to solve

    * Establishing and governing service production lines that automate SOA development activities

    * Identifying reusable elements of your existing IT governance model and prioritizing improvements

    * Establishing SOA authority chains, roles, responsibilities, policies, standards, mechanisms, procedures, and metrics
    * Implementing service versioning and granularity
    * Refining SOA governance frameworks to maintain their vitality as business and IT strategies change

    See publication
  • Governance White Papers

    IBM

    Many White Papers on Governance from 2005 to 2012

    Other authors
    See publication
  • Towards an On Demand Service-oriented Architecture

    IBM Systems Journal Volume 44, Number 1

  • Powerful Enterprise Architecture and Information Technology Strategies

    Sys-Con

    The promises of services-oriented architecture, enterprise architecture (EA), and information technology (IT) strategies - to change IT from inhibitor to enabler of business flexibility and align IT with business strategies - are remarkably similar. However, for many companies, their EA and IT strategies have not become the catalyst for the intelligence enterprise, the sense-and-respond organization, the agile enterprise, or the adaptive enterprise.

    See publication
  • Migrating to a SOA

    IBM DeveloperWorks

    This is the first in a series of papers intended to help one understand the value of a service-oriented architecture (SOA), and to develop a realistic plan for evaluating current infrastructure and migrating it to a true service-oriented architecture. It is intended that after reading this paper, one will understand why it is claimed that a SOA is the best platform for carrying existing assets into the future, as well as enabling the rapid and correct development of future applications.

    See publication

Patents

  • Method for Capturing Evolving Data

    Filed US US20180268014A1

    A method for capturing evolving data, comprising observing a data graph, identifying a first entity within the graph, defining a first property of the first entity, and identifying a first data value corresponding to the property and the entity. The method further comprises associating a second entity with the first entity at first data value, and forming a dimension of the first entity with associations to other entities within the graph for different data values of the first property…

    A method for capturing evolving data, comprising observing a data graph, identifying a first entity within the graph, defining a first property of the first entity, and identifying a first data value corresponding to the property and the entity. The method further comprises associating a second entity with the first entity at first data value, and forming a dimension of the first entity with associations to other entities within the graph for different data values of the first property. Identifying the first entity comprises identifying a property of the first entity representing a dimension but the property does not relate to other entities through the dimension. Defining the first property comprises identifying an attribute of the first entity that will not change; establishing the attribute as the first property.

    See patent
  • Dynamic Digital Shelves using Big Data

    Filed US US20170061519A1

    A dynamic digital shelf system includes an interface for identification of a customer: a digital shelf manager in communication with the interface to: retrieve a store's products and services available according to the store's inventory; retrieve an enriched customer profile of a customer's interests wherein the enriched customer profile is enhanced by big data; retrieve a product to product metadata map; develop a customer insights profile to weight the customer's interests with respect to the…

    A dynamic digital shelf system includes an interface for identification of a customer: a digital shelf manager in communication with the interface to: retrieve a store's products and services available according to the store's inventory; retrieve an enriched customer profile of a customer's interests wherein the enriched customer profile is enhanced by big data; retrieve a product to product metadata map; develop a customer insights profile to weight the customer's interests with respect to the store's products and services according to the store's criteria in the product to product metadata map; identify the store's products and services matching the enriched customer profile for products and services using the customer insights profile; and output the identified store's products and services. Included is a display in communication with the digital shelf manager to display the identified products and services output from the digital shelf manager which are personalized to the customer.

    See patent
  • Inferring Insights from Enhanced User Input

    Issued US US10108333B2

    A method and associated systems for inferring insights from enhanced user input. A computerized messaging system identifies a user operating a mobile, location-enabled, “scribble” device and associates the user or the device with a domain of interest or with other metadata that characterizes the user. When the user enters an ad hoc “scribble” input via the device, the system automatically tags the input with the user's location, with sensory data received from one or more sensor devices, and…

    A method and associated systems for inferring insights from enhanced user input. A computerized messaging system identifies a user operating a mobile, location-enabled, “scribble” device and associates the user or the device with a domain of interest or with other metadata that characterizes the user. When the user enters an ad hoc “scribble” input via the device, the system automatically tags the input with the user's location, with sensory data received from one or more sensor devices, and with ancillary data received from extrinsic data repositories. The system may then consider this ancillary and sensory data in order to identify or infer rules or insights associated with the user and the scribble. These rules may then be used to identify targeted, user-specific steps to perform in response to receiving the scribble, where these user-specific steps accommodate a user preference without exposing confidential user information to a public data repository.

    See patent
  • Dynamic Visualization of Big Data

    Filed US US9633090B2

    Dynamic visualization of big data is provided. Data describing a user is received from at least one of a plurality of data sources. One or more characteristics of the user are determined based, at least in part, on the data describing the user. One or more visual indicators are determined based, at least in part, on the one or more characteristics of the user. A visual representation of the user is presented. The visual representation is based, at least in part, on the one or more visual…

    Dynamic visualization of big data is provided. Data describing a user is received from at least one of a plurality of data sources. One or more characteristics of the user are determined based, at least in part, on the data describing the user. One or more visual indicators are determined based, at least in part, on the one or more characteristics of the user. A visual representation of the user is presented. The visual representation is based, at least in part, on the one or more visual indicators.

    Other inventors
    See patent
  • Modification of cloud application service levels based upon document consumption

    Issued US US9300547 B2

    An approach for modifying cloud application service levels based upon analysis of documents is provided. The approach performs automated ingestion of documents to determine criticality and needs of certain applications, and develops an understanding of existing cloud environments and service level agreements. The approach may further suggest or automatically reassign applications to the cloud infrastructure to meet the needs of an application.

    Other inventors
    See patent
  • System and methods for locating mobile devices using location and presence information

    Issued US 8786438B2

    A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices.

    Other inventors
    See patent
  • System and Methods for Locating Mobile Devices using Location and Presence Information

    Issued US US8264352B2

    A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location…

    A location based service and method configured to provide recovery assistance for a misplaced or stolen mobile device. The location based system and method is configured to locate (recover) high value mobile devices using location, presence and other IMS (IP Multimedia Subsystem) based telecommunications network assets. The method includes leveraging location dips performed for other services to drive a recovery process for a mobile device to thereby reduce resource overhead on a location platform; locating the mobile device using the location dips performed for other services; and sending a notification to a subscriber of the location of the mobile device for recovery of the mobile device.

    See patent
  • Assigning Security Levels to a Shared Component

    Issued US US7934093B2

    Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager…

    Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step.

    See patent
  • System and Method for Maintaining Functionality During Component Failures

    Issued US 20080082863

    Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The…

    Maintaining functionality during component failures is presented. During application registration, a recovery engine generates a recovery plan for the application. The recovery plan includes recovery actions that correspond to each component that the application intends to access. When an application encounters an unavailable component, the recovery engine provides a recovery action to the application which instructs the application how to proceed, such as accessing a backup component. The recovery engine tracks unavailable components and, when a subsequent application registers that intends to use an unavailable component, the recovery engine provides the subsequent application a recovery action, instructing the subsequent application how to proceed.

    Other inventors
    See patent
  • Method for Transforming an Enterprise Based on Linkages Among Business Components, Business Processes and Services

    Filed US 20100250300

Organizations

  • ACM and IEEE

    -

Recommendations received

3 people have recommended Kerrie

Join now to view

More activity by Kerrie

View Kerrie’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kerrie directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Kerrie Holley

Add new skills with these courses