-
公开(公告)号:US20230305827A1
公开(公告)日:2023-09-28
申请号:US17656245
申请日:2022-03-24
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ting Dai , Muhammed Fatih Bulut , Shripad Nadgowda , Daby Mousse Sow
Abstract: A method, system, and computer program product for software package update handling are provided. The method installs an initial set of software packages in a virtual environment. A package dependency graph is generated representing independent software packages and dependent software packages of the initial set of software packages. One or more software packages are updated with one or more updated software packages to generate a subsequent set of software packages. A compatibility check is performed on the subsequent set of software packages. The method generates an update prerequisite package based on the compatibility check.
-
公开(公告)号:US11727119B2
公开(公告)日:2023-08-15
申请号:US16904688
申请日:2020-06-18
Applicant: International Business Machines Corporation
Inventor: Chen Lin , Muhammed Fatih Bulut
CPC classification number: G06F21/577 , G06F9/4862 , G06F18/217 , G06F18/24323 , G06N20/10 , G06N20/20
Abstract: Embodiments relate to a system, a program product, and a method to support a migration operation. Risk factors associated with a migration operation are assessed. The assessment includes assigning respective risk score values to the identified risk factors, assigning respective weight values to the identified risk factors, and calculating a composite risk score based on the assigned risk score values and the assigned weight values. At least one remediation action is recommended to reduce risk to the migration operation. The at least one recommended remediation action is implemented prior to execution of the migration operation. A migration plan incorporating the remediation action for the migration operation is generated. At least one machine learning (ML) model is employed in connection with (a) the subjecting of the identified risk factors to the assessment and/or (b) the recommending of at least one remediation action to reduce risk to the migration operation.
-
公开(公告)号:US11537602B2
公开(公告)日:2022-12-27
申请号:US15930273
申请日:2020-05-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Muhammed Fatih Bulut , Arun Kumar , Kuntal Dey , Constantin Mircea Adam , Milton H. Hernandez
IPC: G06F16/242 , G06F40/30 , G06N20/00 , G06F16/28 , G06F16/23 , G06F40/284
Abstract: Computer implemented reconstruction of compliance mapping due to an update in a regulation in the compliance mapping by a computing device includes comparing a first version of a regulation in the compliance mapping to a second, updated version of the first regulation. A change in the second version with respect to the first version is identified. The change may be an added control description, a deleted control description, or an updated control description. Upon determining that the change is an updated control description, the updated control description is analyzed to determine a type of update. The mapping of the regulation is reconstructed based on the change and, if the change is an updated control description, the type of update, using at least one of natural language processing and/or machine learning. The risk of the reconstructed mapping is assessed, and a service owner is notified about the risk of the changes.
-
公开(公告)号:US20220382876A1
公开(公告)日:2022-12-01
申请号:US17329448
申请日:2021-05-25
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sai ZENG , Jinho HWANG , Virginia Mayo Policarpio , Lisa M. Chambers , Constantin Mircea Adam , Muhammed Fatih Bulut
IPC: G06F21/57
Abstract: A vulnerability management method includes analyzing a system environment to uncover one or more vulnerabilities. The method includes subsequently identifying one or more system weaknesses corresponding to the one or more uncovered vulnerabilities and analyzing a set of historical data to identify similar past vulnerabilities. The method further includes analyzing available information to extract one or more impacts of the identified similar past vulnerabilities and determining one or more impacts to the present system environment that would correspond to the extracted one or more impacts of the identified similar past vulnerabilities. The method additionally includes recommending one or more actions to remediate the uncovered vulnerabilities.
-
55.
公开(公告)号:US11269625B1
公开(公告)日:2022-03-08
申请号:US17075432
申请日:2020-10-20
Applicant: International Business Machines Corporation
Inventor: Chen Lin , Jinho Hwang , Muhammed Fatih Bulut , Ali Kanso , Shripad Nadgowda
Abstract: A computer system, computer program product, and computer-implemented method to identify one or more re-factoring operations directed at micro-service identification for source code. A genetic algorithm is leveraged to produce an offspring population of re-factoring operations from a parent set. The offspring population is subject to an assessment utilizing one or more objective measures. Responsive to the assessment, one or more identified re-factoring operations are selectively applied to the source code to produce one or more corresponding micro-service candidates.
-
公开(公告)号:US20210398023A1
公开(公告)日:2021-12-23
申请号:US16904688
申请日:2020-06-18
Applicant: International Business Machines Corporation
Inventor: Chen Lin , Muhammed Fatih Bulut
Abstract: Embodiments relate to a system, a program product, and a method to support a migration operation. Risk factors associated with a migration operation are assessed. The assessment includes assigning respective risk score values to the identified risk factors, assigning respective weight values to the identified risk factors, and calculating a composite risk score based on the assigned risk score values and the assigned weight values. At least one remediation action is recommended to reduce risk to the migration operation. The at least one recommended remediation action is implemented prior to execution of the migration operation. A migration plan incorporating the remediation action for the migration operation is generated. At least one machine learning (ML) model is employed in connection with (a) the subjecting of the identified risk factors to the assessment and/or (b) the recommending of at least one remediation action to reduce risk to the migration operation.
-
公开(公告)号:US11074043B2
公开(公告)日:2021-07-27
申请号:US16515358
申请日:2019-07-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Muhammed Fatih Bulut , Anup Kalia , Maja Vukovic , Raghav Batta , Jinho Hwang , Jin Xiao , Rohit Madhukar Khandekar
Abstract: Methods, systems and computer program products for providing automated script review utilizing crowdsourced inputs are provided. Aspects include receiving a new script including a script text and a script description. Aspects include comparing the new script to each of a plurality of previously classified scripts to determine a degree of similarity. Each of the previously classified scripts and the new script have an associated set of attributes. Responsive to determining that the degree of similarity is below a predetermined threshold, aspects include mapping the new script to a crowdsourcing platform to identify a similar script. Aspects also include receiving information indicative of one or more features from the crowdsourcing platform. Responsive to inputting the one or more features into an acceptance model, aspects include generating an acceptance recommendation associated with the new script.
-
公开(公告)号:US20210133254A1
公开(公告)日:2021-05-06
申请号:US16675376
申请日:2019-11-06
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Muhammed Fatih Bulut , Milton H. Hernandez , Maja Vukovic
Abstract: Streamlining compliance reporting and remediation through clustering compliance deviations by receiving inspection scan compliance deviation report data, analyzing the inspection scan compliance deviation report data, in response to the analysis, creating normalized deviation report documents, comparing the normalized deviation report documents, in response to the comparisons, clustering the normalized deviation report documents, creating a common cluster deviation profile comprising clustered deviation reports, and generating a summary system asset compliance report comprising the common cluster deviation profile.
-
公开(公告)号:US20210055933A1
公开(公告)日:2021-02-25
申请号:US16546775
申请日:2019-08-21
Applicant: International Business Machines Corporation
Inventor: Muhammed Fatih Bulut , Constantin Mircea Adam , Milton H. Hernandez , Maja Vukovic
Abstract: Systems, computer-implemented methods, and computer program products that can facilitate compliance policy management and scheduling are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a policy analyzer component that identifies one or more dependency relationships between a first compliance policy and one or more second compliance policies. The computer executable components can further comprise a scheduler component that generates a policy execution plan based on the one or more dependency relationships.
-
公开(公告)号:US20200285558A1
公开(公告)日:2020-09-10
申请号:US16294516
申请日:2019-03-06
Applicant: International Business Machines Corporation
Inventor: Anup Kalia , Muhammed Fatih Bulut , Jinho Hwang , Raghav Batta , Maja Vukovic , Jin Xiao , Rohit Madhukar Khandekar
Abstract: Systems, computer-implemented methods, and computer program products that can facilitate creating and querying a knowledge base of identified topics, computer code actions, and parameters, are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a parameter component that can identify a result parameter in ones of one or more results, wherein the one or more results comprise topics and computer code actions. The computer executable components can further comprise a result component that can select a result of the one or more results based on a mapping of a query to the one or more results, the mapping being based on the result parameter identified in the result and a criterion.
-
-
-
-
-
-
-
-
-