GENERATION OF MICROSERVICES FROM A MONOLITHIC APPLICATION BASED ON RUNTIME TRACES

    公开(公告)号:US20210334194A1

    公开(公告)日:2021-10-28

    申请号:US16855565

    申请日:2020-04-22

    Abstract: Systems, computer-implemented methods, and computer program products to facilitate generation of microservices from a monolithic application based on runtime traces are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a model component that learns cluster assignments of classes in a monolithic application based on runtime traces of executed test cases. The computer executable components can further comprise a cluster component that employs the model component to generate clusters of the classes based on the cluster assignments to identify one or more microservices of the monolithic application.

    AUTOMATED TRANSFORMATION OF APPLICATIONS TO A TARGET COMPUTING ENVIRONMENT

    公开(公告)号:US20210294600A1

    公开(公告)日:2021-09-23

    申请号:US16823649

    申请日:2020-03-19

    Abstract: A system can include a memory that stores computer-executable components and a processor, operably coupled to the memory, that can execute the computer-executable components stored in the memory. The computer-executable components can include a model generator component that can execute a search function on an application based on a set of application component topics to identify application components of the application that facilitate execution of the application. A configuration property extractor component can analyze the application based on the application components and can determine configuration properties associated with operating the application components. An application builder component can process the application components and the configuration properties and can generate instructions that facilitate execution of the application in a target computing environment.

    Contextual automation of information technology change services

    公开(公告)号:US11062088B2

    公开(公告)日:2021-07-13

    申请号:US15838827

    申请日:2017-12-12

    Abstract: Techniques facilitating causing a information technology change service action in response to a received instructive command are provided. In one example, a computer-implemented method can comprise receiving a command from a device, wherein an intent of the command relates to performing an information technology change service action. The computer-implemented method can also comprise determining the intent of the command and selecting a service from a federation of services based on the information indicative of the intent of the command. The computer-implemented method can further comprise ordering the service relative to another service of the federation of services based on a determined level of confidence that the service will facilitate performing the information technology change service action. Moreover, the computer-implemented method can comprise activating the service based on an order of the service relative to the other service and the information indicative of the intent of the command.

    USER/GROUP SERVICING BASED ON DEEP NETWORK ANALYSIS

    公开(公告)号:US20190019221A1

    公开(公告)日:2019-01-17

    申请号:US15649272

    申请日:2017-07-13

    Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices. Inferred user profiles may be verified using social and/or geographical data.

    PREDICTIVE NETWORK TRAFFIC MANAGEMENT
    36.
    发明申请
    PREDICTIVE NETWORK TRAFFIC MANAGEMENT 审中-公开
    预测网络交通管理

    公开(公告)号:US20170054641A1

    公开(公告)日:2017-02-23

    申请号:US14830964

    申请日:2015-08-20

    CPC classification number: H04W24/08 H04L47/823

    Abstract: Predictive network traffic management in a computer network. Information relating to events likely to have an adverse impact on network traffic, based on predefined parameters of network performance, is collected from the Internet. Details that may be used to predict network traffic density is extracted from the collected events information, and a predicted traffic density, based on the details is generated. Based on the predicted network traffic density, a traffic pattern is generated. A best-matching traffic pattern template to the generated traffic pattern is identified in a store of traffic pattern templates. Based on the best-matching traffic pattern template, bandwidth on the network is provisioned via an SDN controller.

    Abstract translation: 计算机网络中的预测性网络流量管理。 根据网络性能的预定义参数,可能对网络流量有不利影响的事件信息从互联网收集。 从收集的事件信息中提取可用于预测网络流量密度的细节,并且基于细节生成预测的交通密度。 根据预测的网络流量密度,生成流量模式。 在业务模式模板的存储中识别出与生成的流量模式的最佳匹配流量模式模板。 基于最佳匹配的流量模式模板,通过SDN控制器提供网络带宽。

    Modernization of an application for related image generation

    公开(公告)号:US11928519B2

    公开(公告)日:2024-03-12

    申请号:US17162069

    申请日:2021-01-29

    CPC classification number: G06F9/5055 G06F9/45529 G06F9/5077 G06N5/025

    Abstract: Systems, computer-implemented methods, and computer program products to facilitate modernization of an application are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a determination component that determines one or more relevant surrounding contexts for a raw entity. The computer executable components also can comprise a matching component that matches the one or more relevant surrounding contexts with one or more known surrounding contexts of one or more known entities. The computer executable components further can comprise a type identification component that identifies an entity type for the raw entity based on the matching of the one or more relevant surrounding contexts with the one or more known surrounding contexts.

Patent Agency Ranking