Method of proactive object transferring management

    公开(公告)号:US10249295B2

    公开(公告)日:2019-04-02

    申请号:US15403032

    申请日:2017-01-10

    摘要: Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A cognitive service monitors a communication between a given user and another user. The communication is exchanged by a mobile device associated with the given user and a mobile device of the other user. The cognitive service determines a context of the communication. The cognitive service detects, based on the context of the communication, a request between the users to share a file maintained by the given user. Upon successfully validating the request, a transfer of the file to the second user is performed.

    Discrete Password Entry Using Keyboard with Character and Position Carriers
    12.
    发明申请
    Discrete Password Entry Using Keyboard with Character and Position Carriers 有权
    使用带有字符和位置载体的键盘进行离散密码输入

    公开(公告)号:US20160063228A1

    公开(公告)日:2016-03-03

    申请号:US14832870

    申请日:2015-08-21

    IPC分类号: G06F21/31 G06F3/0362

    摘要: A method and apparatus for password entry, the method comprising: displaying a password inputting keyboard on a display, the keyboard including a character carrier and a position carrier, the character carrier and the position carrier are capable of relative movement between each other so that when the position of a character in the character carrier is corresponding to a position mark on the position carrier, the position of at least one other character in the character carrier is corresponding to at least one other position mark in the position carrier; in response to a user causing relative movement between the character carrier and the position carrier, aligning a character in the character carrier with a position mark in the position carrier; and in response to a lapse of a predetermined time, recording the character and its input order and changing the layout of the password inputting keyboard.

    摘要翻译: 一种用于密码输入的方​​法和装置,所述方法包括:在显示器上显示密码输入键盘,所述键盘包括字符载体和位置载体,所述字符载体和位置载体能够相互之间相对移动, 字符载体中的字符的位置对应于位置载体上的位置标记,字符载体中的至少一个其他字符的位置对应于位置载体中的至少一个其他位置标记; 响应于用户引起字符载体和位置载体之间的相对移动,将字符载体中的字符与位置载体中的位置标记对齐; 并且响应于经过预定时间,记录字符及其输入顺序并改变密码输入键盘的布局。

    Distributed Computing Topology with Energy Savings

    公开(公告)号:US20240231906A1

    公开(公告)日:2024-07-11

    申请号:US18150397

    申请日:2023-01-05

    IPC分类号: G06F9/48 G06F9/38

    CPC分类号: G06F9/4893 G06F9/3838

    摘要: A computer implemented method manages a topology for a network computing system. A number of processor units determines tasks for a workload to be performed by computing devices in the network computing system. The number of processor units creates the topology for performing the tasks in the workload. The topology comprises nodes representing the tasks assigned to the computing devices. The nodes are connected to each other based on an execution order for the tasks, and the topology has alternative paths for performing the tasks for the workload. The number of processor units determines energy consumption for the alternative paths in the topology. The number of processor units selects a particular path from the alternative paths for performing the tasks for the workload based on the energy consumption for the alternative paths.

    DYNAMIC AND CASCADING RESOURCE ALLOCATION
    17.
    发明公开

    公开(公告)号:US20240160482A1

    公开(公告)日:2024-05-16

    申请号:US18054923

    申请日:2022-11-14

    IPC分类号: G06F9/50

    CPC分类号: G06F9/5027

    摘要: A method, computer system, and a computer program product is provided for dynamic allocation of resources. A database access pattern is determined by analyzing and monitoring traffic pattern between a pool of resources and a plurality of clients. The relationship between each of the resources is also determined. Access is enabled to a plurality of resources based on the database access and resource relationships, so that the plurality of resources can be accessed but not allocated until processing a request. A consumption model is generated that predicts resource need during a processing request based on the resource relationships, traffic pattern and resources availability. Upon receipt of a subsequent request for processing, consumption model is used to predict resource needs and to dynamically allocate, re-allocate and release the plurality of resources in a cascading manner until completion of subsequent processing request.

    Resource reuse for pipeline workloads

    公开(公告)号:US11977922B2

    公开(公告)日:2024-05-07

    申请号:US17449534

    申请日:2021-09-30

    IPC分类号: G06F9/50 G06F9/38

    CPC分类号: G06F9/505 G06F9/38

    摘要: Reusing containers is provided. It is communicated to a pipeline workload manager that a particular container has finished running a step of a pipeline workload using an agent daemon of the particular container. Pipeline workload information corresponding to the pipeline workload is checked using the pipeline workload manager to determine whether the particular container can be reused to run a particular step in a different pipeline workload. The particular container is provided to be reused to run the particular step in the different pipeline workload without having to perform a prepare container environment sub-step of that particular step based on determining that the particular container can be reused to run that particular step in the different pipeline workload according to the pipeline workload information.

    Securing microservices utilizing a proactive condition map

    公开(公告)号:US11824836B2

    公开(公告)日:2023-11-21

    申请号:US17453887

    申请日:2021-11-08

    IPC分类号: H04L29/06 H04L9/40

    摘要: Validating microservice calls is provided. It is determined whether a microservice call to a microservice hosted by a computer is valid based on a policy in a proactive condition map of a validation proxy that matches the microservice call. In response to determining that the microservice call is invalid based on the policy in the proactive condition map that matches the microservice call, the microservice call is blocked to the microservice. It is determined whether the microservice call needs to be redirected to another microservice based on the policy. In response to determining that the microservice call does need to be redirected to another microservice based on the policy, the microservice call is redirected to the other microservice with a callback to the microservice.