-
公开(公告)号:US20230138727A1
公开(公告)日:2023-05-04
申请号:US17513992
申请日:2021-10-29
Applicant: KYNDRYL, INC.
Inventor: Kim Poh Wong , Firas Bouz , Seema Nagar , Pramod Vadayadiyil Raveendran
Abstract: An approach is provided for determining a carbon footprint-based consumption of cloud resources. Cloud resource requirements and a carbon footprint cap of a workload of a cloud consumer are received. The requirements and cap are based on a sustainability target, published by the cloud consumer, and subscribed by cloud service providers. A list of cloud resources that satisfy the requirements are sent. Carbon emission values of the cloud resources at different load levels of the workload are sent. Based on a service level agreement requirement, a criticality level, and a peak load duration of the workload, and previous success rates of satisfying cloud resource requirements by cloud service providers, an optimized configuration of cloud resource(s) and cloud service provider(s) is selected. The cloud resource(s) are selected from the list and have a carbon footprint that does not exceed the cap at a given load level.
-
22.
公开(公告)号:US11609837B2
公开(公告)日:2023-03-21
申请号:US17303585
申请日:2021-06-02
Applicant: Kyndryl, Inc.
Inventor: Michael James McGuire , James David Cleaver , Pramod Vadayadiyil Raveendran , Seema Nagar , Kuntal Dey , Thuy Luong
Abstract: Monitoring and enhancing performance of containers using a calibration technique is implemented using a computer. Performance of a new container as part of an application running on the computer is checked by comparing a current performance of the new container with baseline data corresponding to the new container. The baseline data is derived from a calibration container corresponding to the new container. The new container is categorized in a category of performance based on the checking of the performance of the new container. An alert can be sent to a device of an administrator regarding the new container meeting a threshold of performance, in response to the new container meeting the threshold of performance. The alert can be sent to the device of the administrator for the administrator to initiate an action pertaining to the new container in response to receiving the alert.
-
公开(公告)号:US11553005B1
公开(公告)日:2023-01-10
申请号:US17351737
申请日:2021-06-18
Applicant: Kyndryl, Inc.
Inventor: Anil Kumar Narigapalli , Laxmikantha Sai Nanduru , Pramod Vadayadiyil Raveendran , Seema Nagar
IPC: G06F15/173 , H04L9/40 , H04L67/10
Abstract: Policy deviations for distributed computing environments are detected and recorded an immutable ledger of transaction provenance from end to end transactions performed in the distributed computing environment. From the immutable ledger, persona data for transaction types is plotted as an bipartite graph. Edge weights of the bipartite graphs are correlated to trust levels between personas from the persona data and the transaction types from the immutable ledger. Trust levels from the edge weights are correlated to rules illustrating when the transaction provenance indicate a policy deviation in the distributed computing environment. The rules are then employed to detect in real time end to end provenance when a policy deviation in the distributed computing environment is occurring. An alert of policy deviations may be sent to stakeholders for the distributed computing environment.
-
公开(公告)号:US20220398515A1
公开(公告)日:2022-12-15
申请号:US17304022
申请日:2021-06-14
Applicant: KYNDRYL, INC.
Inventor: Michael James McGuire , James David Cleaver , Seema Nagar , Pramod Vadayadiyil Raveendran , Vikramsihn Ashok Desai , Thuy Luong
Abstract: In an approach to improve multi-data center environments by minimizing the environmental impact of workloads in multi-data center environments embodiments migrate at least a portion of one or more workloads between one or more data centers automatically to maximize a usage of renewable energy based on a predetermined threshold score of input power and a combination of renewal energy sources. Further, embodiments dictate, by a policy engine, where at least a portion of the one or more workloads can be hosted. Additionally, embodiments control, by a scheduling engine, how, when, and where at least a portion of the one or more workloads will migrate, and perform data replication to migrate data between a plurality of data center locations.
-
25.
公开(公告)号:US20220391302A1
公开(公告)日:2022-12-08
申请号:US17303585
申请日:2021-06-02
Applicant: Kyndryl, Inc.
Inventor: Michael James McGuire , James David Cleaver , Pramod Vadayadiyil Raveendran , Seema Nagar , Kuntal Dey , Thuy Luong
Abstract: Monitoring and enhancing performance of containers using a calibration technique is implemented using a computer. Performance of a new container as part of an application running on the computer is checked by comparing a current performance of the new container with baseline data corresponding to the new container. The baseline data is derived from a calibration container corresponding to the new container. The new container is categorized in a category of performance based on the checking of the performance of the new container. An alert can be sent to a device of an administrator regarding the new container meeting a threshold of performance, in response to the new container meeting the threshold of performance. The alert can be sent to the device of the administrator for the administrator to initiate an action pertaining to the new container in response to receiving the alert.
-
公开(公告)号:US20220107785A1
公开(公告)日:2022-04-07
申请号:US17064514
申请日:2020-10-06
Applicant: KYNDRYL, INC.
Inventor: Pramod Vadayadiyil Raveendran , Seema Nagar , Sougata Mukherjea , Kuntal Dey
IPC: G06F8/20 , G06F9/22 , G06F8/36 , G06F40/279 , G06T7/60
Abstract: A computer generates a set of microservices associated with a monolithic system using a design diagram. The computer receives a system design diagram depicting a monolithic system and associated code artefacts. The computer identifies, using an object detection algorithm, a set of predefined shapes in the diagram, and each shapes is characterized by positioning coordinates. The computer extracts from the design diagram, using a text recognition algorithm, text associated with the shapes and labels them accordingly. The computer identifies, using the positioning coordinates, relationships among said predefined shapes. The computer arranges the predefined shapes into a hypergraph in accordance with, at least in part, said identified relationships. The computer determines similarity values between code artefacts and shape labels and associates artefacts with shapes accordingly. The computer groups, using a community detection algorithm, operatively-related nodes into a plurality of microservice node communities that represents said monolithic system.
-
公开(公告)号:US20220101450A1
公开(公告)日:2022-03-31
申请号:US17034102
申请日:2020-09-28
Applicant: KYNDRYL, INC.
Inventor: RAJMOHAN , Rajeev Thayyil , Kuntal Dey , Pramod Vadayadiyil Raveendran
IPC: G06Q50/00 , G06Q10/00 , G06Q10/08 , G06Q10/10 , G06Q30/02 , G06F16/9536 , G06F21/62 , H04L29/06 , G06K9/46
Abstract: A system and associated methods that enable social media representation and collaboration platform of enterprise information technology (IT) components that enables human-to-human, human-to-machine and machine-to-machine communications to help easily understand the set of enterprise IT components, its configuration(s), its intra/inter relationship(s), better navigation and visibility across various related components, and augmenting system troubleshooting.
-
公开(公告)号:US11277381B2
公开(公告)日:2022-03-15
申请号:US16863206
申请日:2020-04-30
Applicant: KYNDRYL, INC.
Inventor: Pramod Vadayadiyil Raveendran , Seema Nagar , Sougata Mukherjea , Kuntal Dey
IPC: H04L29/06
Abstract: A method for controlling the transfer of data through a firewall. The method includes one or more computer processors establishing a first communication channel between a first server and a second server. The method further includes transmitting, via the first communication channel, information related to a pending transmission of data from the first server to the second server. The method further includes receiving from the second server, via the first communication channel, a set of security information associated with accessing the second server via a second communication channel. The method further includes establishing the second communication channel between the first server and the second server based on the set of security information received from the second server. The method further includes transmitting the data from the first server to the second server utilizing the established second communication channel.
-
-
-
-
-
-
-