摘要:
Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A cognitive service monitors a communication between a given user and another user. The communication is exchanged by a mobile device associated with the given user and a mobile device of the other user. The cognitive service determines a context of the communication. The cognitive service detects, based on the context of the communication, a request between the users to share a file maintained by the given user. Upon successfully validating the request, a transfer of the file to the second user is performed.
摘要:
A method and apparatus for password entry, the method comprising: displaying a password inputting keyboard on a display, the keyboard including a character carrier and a position carrier, the character carrier and the position carrier are capable of relative movement between each other so that when the position of a character in the character carrier is corresponding to a position mark on the position carrier, the position of at least one other character in the character carrier is corresponding to at least one other position mark in the position carrier; in response to a user causing relative movement between the character carrier and the position carrier, aligning a character in the character carrier with a position mark in the position carrier; and in response to a lapse of a predetermined time, recording the character and its input order and changing the layout of the password inputting keyboard.
摘要:
A system may receive a frame, divide the frame into objects, select an object from the objects, divide the object into regions, determine a set of attributes for a target region of the regions, assign a priority to the target region, and queue, based on an assignment of a low priority, the target region to a discount rendering instance.
摘要:
A computer implemented method manages a topology for a network computing system. A number of processor units determines tasks for a workload to be performed by computing devices in the network computing system. The number of processor units creates the topology for performing the tasks in the workload. The topology comprises nodes representing the tasks assigned to the computing devices. The nodes are connected to each other based on an execution order for the tasks, and the topology has alternative paths for performing the tasks for the workload. The number of processor units determines energy consumption for the alternative paths in the topology. The number of processor units selects a particular path from the alternative paths for performing the tasks for the workload based on the energy consumption for the alternative paths.
摘要:
A computer-implemented method includes receiving, by a processing unit, from a first tenant, a query to retrieve data from a nonrelational database system. The method further includes determining, by the processing unit, that an index associated with the query is cached in a shared index cache, wherein the shared index cache stores indexes for a plurality of tenants. The method further includes retrieving, by the processing unit, a result of the query based on the index in the shared index cache. The method further includes outputting, by the processing unit, the result of the query.
摘要:
A computer-implemented method, according to one implementation, includes: monitoring requests received for an AI interface prompt in real-time, and determining whether one or more of the requests violate compliance metrics. Risk scores are calculated for requests determined as violating the compliance metrics. The requests determined as violating the compliance metrics are updated by implementing protective measures correlated with the calculated risk scores. Moreover, the updated requests are sent to the AI interface prompt.
摘要:
A method, computer system, and a computer program product is provided for dynamic allocation of resources. A database access pattern is determined by analyzing and monitoring traffic pattern between a pool of resources and a plurality of clients. The relationship between each of the resources is also determined. Access is enabled to a plurality of resources based on the database access and resource relationships, so that the plurality of resources can be accessed but not allocated until processing a request. A consumption model is generated that predicts resource need during a processing request based on the resource relationships, traffic pattern and resources availability. Upon receipt of a subsequent request for processing, consumption model is used to predict resource needs and to dynamically allocate, re-allocate and release the plurality of resources in a cascading manner until completion of subsequent processing request.
摘要:
Reusing containers is provided. It is communicated to a pipeline workload manager that a particular container has finished running a step of a pipeline workload using an agent daemon of the particular container. Pipeline workload information corresponding to the pipeline workload is checked using the pipeline workload manager to determine whether the particular container can be reused to run a particular step in a different pipeline workload. The particular container is provided to be reused to run the particular step in the different pipeline workload without having to perform a prepare container environment sub-step of that particular step based on determining that the particular container can be reused to run that particular step in the different pipeline workload according to the pipeline workload information.
摘要:
An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
摘要:
Validating microservice calls is provided. It is determined whether a microservice call to a microservice hosted by a computer is valid based on a policy in a proactive condition map of a validation proxy that matches the microservice call. In response to determining that the microservice call is invalid based on the policy in the proactive condition map that matches the microservice call, the microservice call is blocked to the microservice. It is determined whether the microservice call needs to be redirected to another microservice based on the policy. In response to determining that the microservice call does need to be redirected to another microservice based on the policy, the microservice call is redirected to the other microservice with a callback to the microservice.