摘要:
Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
摘要:
Techniques for evaluating patent impacts are provided. A claim of a patent is normalized and an abstract of the claim is generated. The abstract is used to search a repository of target sources and their corresponding abstracts. Related abstracts found during the search are returned for purposes of evaluating the claim in view of data sources associated with the related abstracts.
摘要:
A Request for content is validated for a specific level of service that is to be provided over a network when making the request for the content and when delivering the content to satisfy the request over the network. A network transaction is tagged representing the request and the delivery of the content. Resources that comport with the specific level of service are designated to handle the network transaction and the transaction is injected into the network. Usage of the resources is monitored as the network transaction is processed.
摘要:
Network evaluation grid techniques are presented. Local specifications for traffic patterns are evaluated for local traffic on local grids of a grid computing environment and reported out. The local traffic reported out is then evaluated in response to global traffic pattern specifications and a global traffic policy in order to identify one or more remedial actions to take or to recommend in response to that evaluation.
摘要:
An attribution analysis and correlation system can include a content manager and a semantic correlation module. The content manager can receive a list identifying at least one contributor to be evaluated. The content manager can also mine at least one community for content pertaining to the contributor(s). The semantic correlation module can generate correlation results by performing a semantic analysis and correlation on the persistent content and attributions corresponding to the contributor(s).
摘要:
Techniques for secure channel messaging are provided. Resources communicate with one another over temporary and secure communication channels. The channels come in and out of existence or switch between different channels using a variety of information and based on dynamic policy evaluation. In some situations, the channels are randomly generated using a variety of the information. Authorized resources are informed of the channels to use and when to use them for purposes of delivering and receiving messages to communicate.
摘要:
Techniques to pollute electronic profiling are provided. A cloned identity is created for a principal. Areas of interest are assigned to the cloned identity, where a number of the areas of interest are divergent from true interests of the principal. One or more actions are automatically processed in response to the assigned areas of interest. The actions appear to network eavesdroppers to be associated with the principal and not with the cloned identity.
摘要:
Techniques for policy and identity-based workload provisioning are presented. Identities for requestors or workloads and identities for workloads are tied to specific policies. The specific policies are evaluated based on a stage of readiness for resources within a resource pool and based on resource identities for the resources within the resource pool. Resources are then dynamically provisioned based on the identity-based policy evaluation to handle workloads from the resource pool.
摘要:
A directed set can be used to establish contexts for linguistic concepts: for example, to aid in answering a question, to refine a query, or even to determine what questions can be answered given certain knowledge. A directed set includes a plurality of elements and chains relating the concepts. One concept is identified as a maximal element. The chains connect the maximal element to each concept in the directed set, and more than one chain can connect the maximal element to any individual concept either directly or through one or more intermediate concepts. A subset of the chains is selected to form a basis for the directed set. Each concept in the directed set is measured to determine how concretely each chain in the basis represents it. These measurements for a single concept form a vector in Euclidean k-space. Distances between these vectors can be used to determine how closely related pairs of concepts are in the directed set.
摘要:
Techniques are provided for the delivery of client services and for the establishment of client processing environments. A client receives services within a processing environment which is defined by a processing container. The processing container includes one or more processing groups, and each processing group has a particular context that supports one or more applications or services which are processing within that context. The processing groups communicate with one another via connector interfaces included within the processing container. Services and processing containers can be dynamically added or removed from the processing container.