-
公开(公告)号:US11558448B1
公开(公告)日:2023-01-17
申请号:US17448361
申请日:2021-09-22
Applicant: International Business Machines Corporation
Inventor: Guang Han Sui , Peng Hui Jiang , Xing Xing Shen , Jun Su , Hai Ling Zhang
IPC: H04L29/06 , H04L7/033 , H04L29/08 , H04L29/12 , H04L67/01 , H04L67/562 , H04L67/5682 , G06F1/12 , G06F9/455 , G06F16/25
Abstract: In an approach for a sparse information sharing system, a processor receives a request from a host owner for a host to become a server of an information sharing system, wherein the request specifies at least one type of information the server will maintain and provide to visitors of the server. A processor syncs the server with other servers of the information sharing system with information of the specified at least one type of information. A processor, responsive to the server receiving updated information from a visitor of the server, notifies the other servers of the updated information.
-
公开(公告)号:US11556499B2
公开(公告)日:2023-01-17
申请号:US17154254
申请日:2021-01-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Wei Wu , Peng Hui Jiang , Jin Shi , Jun Su , Xiong Wei Zhao , Jing Yan Ma
Abstract: A method, system and computer program product for container image migration service is provided. The method comprises identifying a latest version of a first customer container image stored in a container image repository. The method further comprises determining the latest version of the first customer container image is a migration image from a last version of the first customer container image; determining a set of commands in the Docker file of the last version of the first customer container image that have migrated to a corresponding set of commands in the Docker file of the migration image; identifying a latest version of a second customer container image having at least one Docker file command in common with at least one command in the set of commands; and recommending imminent migration of the second customer container image to include migration of the at least one Docker file command.
-
公开(公告)号:US11481200B1
公开(公告)日:2022-10-25
申请号:US17498138
申请日:2021-10-11
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Wen Ji Huang , Xiao Ling Chen , Sheng Shuang Li , Wen Bin Han , Jun Su
Abstract: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.
-
公开(公告)号:US20220327144A1
公开(公告)日:2022-10-13
申请号:US17226130
申请日:2021-04-09
Applicant: International Business Machines Corporation
Inventor: Peng Hui Jiang , Meng Wang , Jun Su , DOUGLAS J. COWIE , Li Jia Meng
Abstract: In an embodiment of the present invention, a checkpoint is received, the checkpoint indicating at least one source position of unprocessed object(s) of a plurality of objects on at least one source shard in a database system. In response to detecting a shard change related to the checkpoint to the at least one source shard, the shard change resulting in that the at least one source shard is updated to at least one destination shard, a mapping view is generated for representing position change of the unprocessed object(s) related to the shard change. An updated checkpoint is determined for indicating the at least one destination position of the unprocessed object(s) of the plurality of objects on at least one destination shard in the database system based on the mapping view. With these embodiments, the checkpoint may be managed in a more effective way.
-
公开(公告)号:US20220229804A1
公开(公告)日:2022-07-21
申请号:US17154254
申请日:2021-01-21
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Wei Wu , Peng Hui Jiang , Jin Shi , Jun Su , XIONG WEI ZHAO , Jing Yan Ma
Abstract: A method, system and computer program product for container image migration service is provided. The method comprises identifying a latest version of a first customer container image stored in a container image repository. The method further comprises determining the latest version of the first customer container image is a migration image from a last version of the first customer container image; determining a set of commands in the Docker file of the last version of the first customer container image that have migrated to a corresponding set of commands in the Docker file of the migration image; identifying a latest version of a second customer container image having at least one Docker file command in common with at least one command in the set of commands; and recommending imminent migration of the second customer container image to include migration of the at least one Docker file command.
-
公开(公告)号:US20220092211A1
公开(公告)日:2022-03-24
申请号:US17026360
申请日:2020-09-21
Applicant: International Business Machines Corporation
Inventor: Jun Su , Jin Zhang , Dong Chen , XI MEI KONG
Abstract: Embodiments of the present invention provide a computer system a computer program product, and a method that comprises identifying privacy data within received data by identifying markers that are indicative of privacy data within the received data; generating a respective classification of an object within the identified privacy data; assigning values to the generated respective classification of the object based on a perceived threat level associated with the identified privacy data; and in response to determining that the assigned value of the received data triggers an alert associated with a predetermined threshold for privacy, automatically preventing distribution of the received data from a computing device to another computing device.
-
公开(公告)号:US11143497B2
公开(公告)日:2021-10-12
申请号:US15712225
申请日:2017-09-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: Embodiments of the present disclosure relate to a method, an electronic device and a computer program for determining bending of a flexible display. The flexible display comprises two parallel capacitive layers and an isolator layer between the two parallel capacitive layers, wherein each capacitive layer comprises multiple capacitive electrodes pairs. The method measures capacitance values of the capacitive electrodes pairs. And then the method determines the bending of the flexible display based on the result of measurement.
-
公开(公告)号:US10756907B2
公开(公告)日:2020-08-25
申请号:US15869154
申请日:2018-01-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: Embodiments of the present disclosure relate to a method for verifying an authenticity of a message. The method comprises acquiring a first hash value corresponding to the message, and acquiring a verification code corresponding to the message. The method further comprises computing a second hash value based on the verification code and the message, and verifying the authenticity of the message by comparing the first hash value with the second hash value.
-
公开(公告)号:US20190222425A1
公开(公告)日:2019-07-18
申请号:US15869154
申请日:2018-01-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: Embodiments of the present disclosure relate to a method for verifying an authenticity of a message. The method comprises acquiring a first hash value corresponding to the message, and acquiring a verification code corresponding to the message. The method further comprises computing a second hash value based on the verification code and the message, and verifying the authenticity of the message by comparing the first hash value with the second hash value.
-
公开(公告)号:US10348725B2
公开(公告)日:2019-07-09
申请号:US15403053
申请日:2017-01-10
Applicant: International Business Machines Corporation
Inventor: Su Liu , Jun Su , John D. Wilson , Yin Xia
Abstract: Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device. Upon validating the connection authentication request, a file transfer connection between the wearable devices is established. The service receives a request from one of the wearable devices to transfer a file maintained by an associated mobile device to another mobile device. Upon validating this request, the service sends an authorization to transfer the file.
-
-
-
-
-
-
-
-
-