-
公开(公告)号:US20190147075A1
公开(公告)日:2019-05-16
申请号:US15813437
申请日:2017-11-15
Applicant: International Business Machines Corporation
Inventor: Mustafa Bal , Canturk Isci , Shripad Nadgowda
Abstract: Techniques facilitating representing and analyzing cloud computing data as pseudo systems are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components comprise a framework component and a generation component. The framework component can recreate a system state of a computing device as a pseudo system state for the computing device. The pseudo system state can be decoupled from an original operating state of the computing device and can comprise data abstracted from the original operating state. The data abstracted can mimic an operation of the computing device. The generation component can create the pseudo system state and can facilitate black-box execution of software over the pseudo system state. The black-box execution of software can comprise running applications in the pseudo system state as if the applications were executing in the original operating state of the computing device.
-
公开(公告)号:US20190124144A1
公开(公告)日:2019-04-25
申请号:US15789649
申请日:2017-10-20
Applicant: International Business Machines Corporation
Inventor: Canturk Isci , Shripad Nadgowda
IPC: H04L29/08 , H04L12/803 , G06F9/30 , H04L29/06
Abstract: Techniques facilitating compliance aware service registry and load balancing are provided. A system can comprise a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can comprise an extraction component that removes a service from a load balancer ring based on a first determination by a verification component that a compliance state of the service is a non-compliant state. Further, the computer executable components can comprise an insertion component that adds the service to the load balancer ring based on a second determination by the verification component that, after a defined amount of time, the compliance state of the service is a compliant state.
-
公开(公告)号:US09547835B2
公开(公告)日:2017-01-17
申请号:US13970881
申请日:2013-08-20
Applicant: International Business Machines Corporation
Inventor: Gaurab Basu , Praveen Jayachandran , Deepak Jeswani , Ravi Kothari , Shripad Nadgowda , Akshat Verma , Balaji Viswanathan
CPC classification number: G06Q10/06311
Abstract: A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled.
Abstract translation: 提供了一种服务方法和相关系统。 该方法包括生成与事件相关联的事件和服务的事件类型。 配置与服务相关联的虚拟或物理机器,并且发布与第一事件相关联的消息。 消息被路由到第二服务的队列,并且第二服务被通知消息。 服务被启用,并且接收到对服务子集的选择。 选择启用。
-
公开(公告)号:US20150058054A1
公开(公告)日:2015-02-26
申请号:US13970881
申请日:2013-08-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Gaurab Basu , Praveen Jayachandran , Deepak Jeswani , Ravi Kothari , Shripad Nadgowda , Akshat Verma , Balaji Viswanathan
IPC: G06Q10/06
CPC classification number: G06Q10/06311
Abstract: A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled.
Abstract translation: 提供了一种服务方法和相关系统。 该方法包括生成与事件相关联的事件和服务的事件类型。 配置与服务相关联的虚拟或物理机器,并且发布与第一个事件相关联的消息。 消息被路由到第二服务的队列,并且第二服务被通知消息。 服务被启用,并且接收到对服务子集的选择。 选择启用。
-
公开(公告)号:US12010145B2
公开(公告)日:2024-06-11
申请号:US17388497
申请日:2021-07-29
Applicant: International Business Machines Corporation
Inventor: Shripad Nadgowda
IPC: H04L9/40
CPC classification number: H04L63/20 , H04L63/0823 , H04L63/0876 , H04L63/105
Abstract: Techniques regarding pipeline security compliance are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a certification component that certifies a result from an execution of a pipeline for a computer application based on a comparison of an implemented security control profile associated with the pipeline and an applicable security control profile identified from a source artifact associated with the computer application.
-
16.
公开(公告)号:US11409501B1
公开(公告)日:2022-08-09
申请号:US17363048
申请日:2021-06-30
Applicant: International Business Machines Corporation
Inventor: Fady Copty , Shripad Nadgowda
Abstract: An approach for detecting non-compliant methodologies in a repository. The approach can generate an abstract model of an Infrastructure as Code (IaC) repository based on security requirements of an IaC. The approach can compare the abstract model to one or more validated abstract models associated with other repositories of a hybrid multi-cloud system. The approach can generate an alert notifying the IaC repository of one or more non-compliant methodology measures. The approach can send the alert to the IaC repository.
-
公开(公告)号:US11151024B2
公开(公告)日:2021-10-19
申请号:US16536465
申请日:2019-08-09
Applicant: International Business Machines Corporation
Inventor: Jinho Hwang , Shripad Nadgowda , Hai Huang , Orna Raz
Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment pipeline for software development and operations (DevOps). One or more running processes are subject to monitoring to identify presence of vulnerabilities. An automated rebuild of the monitored processes is initiated, which includes constructing a map representing a relationship of test code elements corresponding to different portions of source code. The identified vulnerable source code reflected in a new container image is subject to an automatic verification to ascertain if the source code is covered by at least one of the represented test code elements. A risk assessment is employed as part of the verification. A new container image is selectively deployed responsive to the risk assessment.
-
公开(公告)号:US11144289B1
公开(公告)日:2021-10-12
申请号:US16877599
申请日:2020-05-19
Applicant: International Business Machines Corporation
Inventor: Jinho Hwang , Muhammed Fatih Bulut , Ali Kanso , Shripad Nadgowda
Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment (CI/CD) pipeline for software development and operations (DevOps). One or more dependency graphs are generated based on application artifacts. A machine learning (ML) model is leveraged to capture a relationship between components in the dependency graph(s) and one or more pipeline artifacts. Responsive a change of an application artifact, the captured relationship is leveraged to identify an impact of the detected change on the pipeline artifact(s). The CI/CD pipeline is selectively optimized and executed based on the identified impact to improve the efficiency of the pipeline and the deployment time.
-
19.
公开(公告)号:US20210248228A1
公开(公告)日:2021-08-12
申请号:US16787353
申请日:2020-02-11
Applicant: International Business Machines Corporation
Inventor: Shripad Nadgowda , James Doran
Abstract: Techniques regarding managing one or more software application build processes are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a control component that can execute a freeze algorithm that modifies an incorporation of a software artifact within a software application build set. The freeze algorithm can prevent implementation of a change to the software artifact by a version control program.
-
公开(公告)号:US10789368B2
公开(公告)日:2020-09-29
申请号:US15842534
申请日:2017-12-14
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Nikolaos Anerousis , Jinho Hwang , Shripad Nadgowda , Maja Vukovic
Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.
-
-
-
-
-
-
-
-
-