REPRESENTING AND ANALYZING CLOUD COMPUTING DATA AS PSEUDO SYSTEMS

    公开(公告)号:US20190147075A1

    公开(公告)日:2019-05-16

    申请号:US15813437

    申请日:2017-11-15

    Abstract: Techniques facilitating representing and analyzing cloud computing data as pseudo systems are provided. A system comprises a memory that stores, and a processor that executes, computer executable components. The computer executable components comprise a framework component and a generation component. The framework component can recreate a system state of a computing device as a pseudo system state for the computing device. The pseudo system state can be decoupled from an original operating state of the computing device and can comprise data abstracted from the original operating state. The data abstracted can mimic an operation of the computing device. The generation component can create the pseudo system state and can facilitate black-box execution of software over the pseudo system state. The black-box execution of software can comprise running applications in the pseudo system state as if the applications were executing in the original operating state of the computing device.

    COMPLIANCE AWARE SERVICE REGISTRY AND LOAD BALANCING

    公开(公告)号:US20190124144A1

    公开(公告)日:2019-04-25

    申请号:US15789649

    申请日:2017-10-20

    Abstract: Techniques facilitating compliance aware service registry and load balancing are provided. A system can comprise a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can comprise an extraction component that removes a service from a load balancer ring based on a first determination by a verification component that a compliance state of the service is a non-compliant state. Further, the computer executable components can comprise an insertion component that adds the service to the load balancer ring based on a second determination by the verification component that, after a defined amount of time, the compliance state of the service is a compliant state.

    Modularly managed service platform
    13.
    发明授权
    Modularly managed service platform 有权
    模块化管理的服务平台

    公开(公告)号:US09547835B2

    公开(公告)日:2017-01-17

    申请号:US13970881

    申请日:2013-08-20

    CPC classification number: G06Q10/06311

    Abstract: A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled.

    Abstract translation: 提供了一种服务方法和相关系统。 该方法包括生成与事件相关联的事件和服务的事件类型。 配置与服务相关联的虚拟或物理机器,并且发布与第一事件相关联的消息。 消息被路由到第二服务的队列,并且第二服务被通知消息。 服务被启用,并且接收到对服务子集的选择。 选择启用。

    Modularly Managed Service Platform
    14.
    发明申请
    Modularly Managed Service Platform 有权
    模块化管理服务平台

    公开(公告)号:US20150058054A1

    公开(公告)日:2015-02-26

    申请号:US13970881

    申请日:2013-08-20

    CPC classification number: G06Q10/06311

    Abstract: A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled.

    Abstract translation: 提供了一种服务方法和相关系统。 该方法包括生成与事件相关联的事件和服务的事件类型。 配置与服务相关联的虚拟或物理机器,并且发布与第一个事件相关联的消息。 消息被路由到第二服务的队列,并且第二服务被通知消息。 服务被启用,并且接收到对服务子集的选择。 选择启用。

    Certification of computer pipeline results

    公开(公告)号:US12010145B2

    公开(公告)日:2024-06-11

    申请号:US17388497

    申请日:2021-07-29

    Inventor: Shripad Nadgowda

    CPC classification number: H04L63/20 H04L63/0823 H04L63/0876 H04L63/105

    Abstract: Techniques regarding pipeline security compliance are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a certification component that certifies a result from an execution of a pipeline for a computer application based on a comparison of an implemented security control profile associated with the pipeline and an applicable security control profile identified from a source artifact associated with the computer application.

    Dynamic automation of DevOps pipeline vulnerability detecting and testing

    公开(公告)号:US11151024B2

    公开(公告)日:2021-10-19

    申请号:US16536465

    申请日:2019-08-09

    Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment pipeline for software development and operations (DevOps). One or more running processes are subject to monitoring to identify presence of vulnerabilities. An automated rebuild of the monitored processes is initiated, which includes constructing a map representing a relationship of test code elements corresponding to different portions of source code. The identified vulnerable source code reflected in a new container image is subject to an automatic verification to ascertain if the source code is covered by at least one of the represented test code elements. A risk assessment is employed as part of the verification. A new container image is selectively deployed responsive to the risk assessment.

    Dynamic automation of selection of pipeline artifacts

    公开(公告)号:US11144289B1

    公开(公告)日:2021-10-12

    申请号:US16877599

    申请日:2020-05-19

    Abstract: An artificial intelligence (AI) platform to support a continuous integration and deployment (CI/CD) pipeline for software development and operations (DevOps). One or more dependency graphs are generated based on application artifacts. A machine learning (ML) model is leveraged to capture a relationship between components in the dependency graph(s) and one or more pipeline artifacts. Responsive a change of an application artifact, the captured relationship is leveraged to identify an impact of the detected change on the pipeline artifact(s). The CI/CD pipeline is selectively optimized and executed based on the identified impact to improve the efficiency of the pipeline and the deployment time.

    AUTOMATED AND AUDITABLE FRAMEWORK TO CONTROL SOFTWARE COMPONENT CHANGES IN AN APPLICATION BUILD PROCESS

    公开(公告)号:US20210248228A1

    公开(公告)日:2021-08-12

    申请号:US16787353

    申请日:2020-02-11

    Abstract: Techniques regarding managing one or more software application build processes are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a control component that can execute a freeze algorithm that modifies an incorporation of a software artifact within a software application build set. The freeze algorithm can prevent implementation of a change to the software artifact by a version control program.

    Compliance-aware runtime generation based on application patterns and risk assessment

    公开(公告)号:US10789368B2

    公开(公告)日:2020-09-29

    申请号:US15842534

    申请日:2017-12-14

    Abstract: Systems, computer-implemented methods and/or computer program products that facilitate compliance-aware runtime generation of containers are provided. In one embodiment, a computer-implemented method comprises: identifying, by a system operatively coupled to a processor, information used by a target application to containerize; determining whether one or more risk violations exist for the information within one or more defined thresholds; determining whether a compliance or a security violation exists in the information, wherein the determining whether the compliance or security violation exists is performed based on a determination by the risk assessment component that one or more risk violations do not exist; and generating a new container of components corresponding to defined components of the target application that allow the target application to execute without an underlying operating system, wherein the generating is based on a determination that no compliance or security violation exists in the information.

Patent Agency Ranking