-
公开(公告)号:US09916174B2
公开(公告)日:2018-03-13
申请号:US14722451
申请日:2015-05-27
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Heng Guo Ge , Jing Lu , Da Shen , Jun Yao
IPC: G06F9/46 , G06F9/455 , H04L12/707
CPC classification number: G06F9/45558 , G06F2009/4557 , G06F2009/45595 , H04L45/22
Abstract: Methods, computer program products, and network authority devices are presented. The methods include, for instance: updating a source network with migration information of a virtual machine to redirect network traffic for the virtual machine to a destination network; and updating at least one remote network with the migration information of the virtual machine. In one embodiment, the updating includes updating the source network concurrent with a migration of the virtual machine to minimize interruption of the network traffic. In another embodiment, the updating includes updating a network device of the source network to forward the network traffic for the virtual machine to another network device of the destination network. In a further embodiment, the updating includes updating the source network to redirect the network traffic from at least one client on the at least one remote network.
-
42.
公开(公告)号:US12248456B2
公开(公告)日:2025-03-11
申请号:US17708440
申请日:2022-03-30
Applicant: International Business Machines Corporation
Inventor: Jia Tian Zhong , Peng Hui Jiang , Dong Hui Liu , Xing Xing Shen , Jia Yu , Yong Yin , Jing Lu , Xiao Yan Tang
IPC: G06F16/23
Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
-
公开(公告)号:US20250036468A1
公开(公告)日:2025-01-30
申请号:US18225420
申请日:2023-07-24
Applicant: International Business Machines Corporation
Inventor: Dong Hui Liu , Jing Lu , Peng Hui Jiang , NAIJIE LI , Xiao Yan Tang , Jia Yu
Abstract: The illustrative embodiments provide for dynamic tuning of pre-initialization environment provisioning and management. An embodiment includes accepting a request from a group of applications to generate a performance-based index table for a workload based on a feature of the applications and generating the performance-based index table. The embodiment includes building a label feature by analyzing a static program feature of the applications and the performance-based index table. The embodiment includes constructing, using clustering algorithms, a model for provisioning a pre-initialization environment using the label features. The embodiment includes loading the applications into a pre-initialization environment. The embodiment includes introducing a selection policy for a switch in the pre-initialization environment in multiple applications to balance usage of a resource. The embodiment includes updating input to the model in response to monitoring a traffic of requests and collecting real time runtime data of the workload.
-
公开(公告)号:US11947993B2
公开(公告)日:2024-04-02
申请号:US17353945
申请日:2021-06-22
Applicant: International Business Machines Corporation
Inventor: Ming Ran Liu , Jing Lu , Naijie Li , Xiao Yan Tang , Yuan Zhai , Kershaw S. Mehta
CPC classification number: G06F9/463 , G06F9/34 , G06F9/45508 , G06F9/544 , G06F9/546
Abstract: A computer-implemented method includes creating a first file control block in a primary runtime environment with a first addressing mode and a second file control block in a secondary runtime environment with a second addressing mode, where both the first file control block and the second file control block describe a status of a first file of a caller program in the primary runtime environment. The parameters of the first file of the caller program in the primary runtime environment are passed to a target callee program in the secondary runtime environment. An anchor is added in the first file control block as a link to the second file control block. The first file control block are the second file control block synchronized with updates to the first file in the primary runtime environment and the passed parameters of the first file in the secondary runtime environment.
-
公开(公告)号:US20240095359A1
公开(公告)日:2024-03-21
申请号:US17948400
申请日:2022-09-20
Applicant: International Business Machines Corporation
Inventor: Dong Hui Liu , Peng Hui Jiang , Jing Lu , Jia Yu , Jun Su , Xiao Yan Tang , Yong Yin
CPC classification number: G06F21/566 , G06F21/51 , G06F2221/033
Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
-
公开(公告)号:US20230367745A1
公开(公告)日:2023-11-16
申请号:US17663182
申请日:2022-05-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Dong Hui Liu , Peng Hui Jiang , Jing Lu , Xiao Yan Tang , Jun Su , Jia Yu , Yong Yin
IPC: G06F16/174
CPC classification number: G06F16/1756
Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
-
公开(公告)号:US11689362B2
公开(公告)日:2023-06-27
申请号:US17162767
申请日:2021-01-29
Applicant: International Business Machines Corporation
Inventor: Si Bin Fan , David Kaminsky , Tao Liu , Jing Lu , Xiao Yan Tang , Jun Zhang
CPC classification number: H04L9/0869 , G06F7/582 , H04L9/0637 , H04L9/14 , H04L9/3239 , H04L9/3242 , H04L9/3247 , H04L9/34 , G06F7/58 , H04L9/50
Abstract: An example operation may include one or more of generating an initial seed and allocating one or more authorized bits of the initial seed to a plurality of blocks in a distributed ledger, storing the initial seed and an identification of which authorized bits of the initial seed are allocated to each block of the distributed ledger, receiving a final seed value that is partially generated by each of a plurality of nodes configured to access the distributed ledger based on authorized bits of respective blocks updated by each respective node, and generating a random sequence value based on the final seed value and storing the random sequence value in a block of the distributed ledger.
-
公开(公告)号:US11675593B2
公开(公告)日:2023-06-13
申请号:US17462071
申请日:2021-08-31
Applicant: International Business Machines Corporation
Inventor: Jing Lu , Dong Hui Liu , Xiao Yan Tang , Yong Yin , Peng Hui Jiang , Xiang Zu , Jia Yu
CPC classification number: G06F9/3838 , G06F8/65 , G06F8/656 , G06F9/34 , G06F9/44521 , G06F9/541
Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
-
公开(公告)号:US20230061270A1
公开(公告)日:2023-03-02
申请号:US17462071
申请日:2021-08-31
Applicant: International Business Machines Corporation
Inventor: Jing Lu , Dong Hui Liu , Xiao Yan Tang , Yong Yin , Peng Hui Jiang , Xiang Zu , Jia Yu
Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
-
公开(公告)号:US11556356B1
公开(公告)日:2023-01-17
申请号:US17483776
申请日:2021-09-23
Applicant: International Business Machines Corporation
Inventor: Naijie Li , Jing Lu , Xiao Yan Tang , Ming Ran Liu , Yuan Zhai , Kershaw S. Mehta
Abstract: A call to an external interface to execute a target callee program associated with a first addressing mode in a secondary runtime environment (RTE) is received from a caller program associated with a second addressing mode running in a primary RTE. An address of a share area (SA) storing existing dynamic link object information in the primary RTE in storage is passed to the secondary RTE. The SA is accessible by both the caller program and the target callee program. In response to a request to load a dynamic link object by an initiating program during execution of the target callee program in the secondary RTE, an entry address of the dynamic link object is retrieved in the SA. The dynamic link object is loaded based on the retrieved entry address of the dynamic link object.
-
-
-
-
-
-
-
-
-