Effect of operations on application requests

    公开(公告)号:US10459937B2

    公开(公告)日:2019-10-29

    申请号:US15198550

    申请日:2016-06-30

    Abstract: A plurality of completion times associated with an application request may be obtained. The plurality of completion times may include a first completion time and a second completion time. A plurality of response times associated with a first asynchronous operation triggered by the application request may be obtained. The plurality of completion times may include a first response time associated with the first completion time and a second response time associated with the second completion time. A first correlation score may be determined describing an effect of the first asynchronous operation on the application request based on the first completion time, the second completion time, the first response time, and the second response time. Visualization data may be generated representing the first correlation score.

    INFORMATION TECHNOLOGY EVENT MANAGEMENT
    32.
    发明申请

    公开(公告)号:US20190327127A1

    公开(公告)日:2019-10-24

    申请号:US15960047

    申请日:2018-04-23

    Abstract: An event management system is monitored for incoming information technology events. Responsive to detecting that the system has received a new event, if the new event is encompassed by any previously created event cluster, the system is instructed to refrain from presenting the new event to a user for handling. If the new event is not encompassed by any previously created event cluster, the system is instructed to present the new event to the user for handling. If the user then performs an ignore or dismiss action in relation to the new event, whether the new event is similar to other events in relation to which the user performed the ignore or dismiss action is determined. If the new event is similar to these other events, a new event cluster against which subsequently received events are compared is created.

    Code coverage testing utilizing test-to-file maps

    公开(公告)号:US10437710B2

    公开(公告)日:2019-10-08

    申请号:US15786353

    申请日:2017-10-17

    Abstract: In some examples, a method may include receiving, by a system comprising a processor, for a first invocation of a first test of a plurality of code coverage tests run at overlapping times, a first report indicating a first subset of files of application code covered by the first test. The method may include generating, by the system, a test-to-file map associating the first subset of files to the first test. The method may include receiving, by the system, a second report indicating a second subset of files of the application code covered by a second invocation of the first test. The method may include modifying, by the system, the test-to-file map to associate the second subset of files to the first test.

    PERTURBATION-BASED ORDER PRESERVING PSEUDONYMIZATION OF DATA

    公开(公告)号:US20190296914A1

    公开(公告)日:2019-09-26

    申请号:US15926460

    申请日:2018-03-20

    Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.

    STATISTICAL PROPERTY PRESERVING PSEUDONYMIZATION

    公开(公告)号:US20190294819A1

    公开(公告)日:2019-09-26

    申请号:US15926296

    申请日:2018-03-20

    Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.

    Decommissioning of source storages
    40.
    发明授权

    公开(公告)号:US10324624B2

    公开(公告)日:2019-06-18

    申请号:US15633149

    申请日:2017-06-26

    Abstract: According to examples, an apparatus may include a processor and a non-transitory computer readable medium storing instructions that cause the processor to classify files stored on a source storage into files for deletion and files for migration based on a storage policy and meta-data, generate aliases to link the files classified for migration to a location on a target storage, copy the files classified for migration from the source storage to the linked location on the target storage, and determine whether the files copied onto the target storage are identical to the files classified for migration on the source storage using a digital key. In response to a determination that the copied files are identical to the files classified for migration, the processor may activate the generated aliases and may decommission the source storage.

Patent Agency Ranking