Collective application portfolio migration control

    公开(公告)号:US12131198B2

    公开(公告)日:2024-10-29

    申请号:US17673615

    申请日:2022-02-16

    IPC分类号: G06F9/50 G06F9/48

    摘要: In some examples, collective application portfolio migration control may include determining, for a plurality of applications that are to be clustered for migration to a cloud environment, a coupling coefficient that represents a type of coupling between pairs of applications from the plurality of applications, a proximity coefficient that represents application proximities, and a connectedness coefficient that represents application connections. A combined application relatedness coefficient may be determined based on the coupling coefficient, the proximity coefficient, and the connectedness coefficient. A portfolio graph may be generated based on the combined application relatedness coefficient to generate migration application clusters to duster the plurality of applications. Migration of the plurality of applications to the cloud environment may be controlled based on the migration application clusters.

    Anomalous activity detection in container images

    公开(公告)号:US12124572B2

    公开(公告)日:2024-10-22

    申请号:US17716741

    申请日:2022-04-08

    摘要: According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that may cause the processor to identify a container image group of a plurality of container image groups to which a subject container image corresponds, in which each of the plurality of container image groups is assigned a respective behavioral profile. The processor may also determine whether activities in the subject container image comply with corresponding activities identified in the behavioral profile of the identified container image group. Based on a determination that at least one activity in the subject container image fails to comply with a corresponding at least one activity identified in the behavioral profile of the identified container image group, the processor may determine that the subject container image includes an anomalous activity and output an alert indicating that the subject container image includes an anomalous activity.

    Artificial right atrium design for failing Fontans

    公开(公告)号:US12121712B2

    公开(公告)日:2024-10-22

    申请号:US17103570

    申请日:2020-11-24

    IPC分类号: A61M1/10 A61M60/258 A61M60/50

    摘要: An artificial chamber including a first conduit, a second conduit, a third conduit, and a wall defining a space; in which the first conduit and the second conduit are positioned opposite one another; in which the third conduit is opposite the wall; and in which the wall has a concave surface is disclosed. The chamber can be part of a system for providing pulmonary support. The system includes the chamber and a first pump connected to the third conduit, and connected to a fourth conduit; in which the chamber receives fluid via the first conduit and the second conduit, in which the first pump receives fluid from the chamber via the third conduit; and in which the fourth conduit transports fluid from the first pump to a first blood vessel. Methods of making a chamber and a system, and methods of using the chamber and system are also disclosed.

    Rule-based anonymization of datasets

    公开(公告)号:US12099631B2

    公开(公告)日:2024-09-24

    申请号:US17462865

    申请日:2021-08-31

    IPC分类号: G06F21/62 G06N20/00

    CPC分类号: G06F21/6254 G06N20/00

    摘要: Embodiments herein facilitate a rule-based anonymization of an original dataset. The system may include a processor including a data privacy evaluator and a rules engine. The data privacy evaluator may receive at least one anonymized dataset corresponding to a predefined strategy of anonymization. The at least one anonymized dataset may include a variation from the original dataset by at least one of a privacy metric and a consistency metric. The data privacy evaluator may evaluate the at least one anonymized dataset and may generate a final output value based on a first output and a second output. The processor may assess the final output value with respect to a predefined threshold through the rules engine. If the final output value may be equal or higher than the predefined threshold, the system may permit an access to the anonymized dataset.

    Determination of likely related security incidents

    公开(公告)号:US12026253B2

    公开(公告)日:2024-07-02

    申请号:US17477316

    申请日:2021-09-16

    IPC分类号: G06F21/55 H04L9/40

    摘要: According to examples, an apparatus may include a processor and a memory on which is stored machine-readable instructions that when executed by the processor, may cause the processor to identify a first set of entities corresponding to a security incident, identify anomalies associated with the first set of entities that occurred around a predefined time period with respect to the incident, identify a second set of entities associated with the identified anomalies, identify a set of incidents that share a common entity from the second set of entities, determine a probability of likelihood that the set of incidents normally share the common entity, determine whether the determined probability of likelihood falls below a predefined threshold, and based on the determined probability of likelihood falling below the predefined threshold, output an indication that the security incident and the set of incidents are likely related.

    Policy-based application architecture generation

    公开(公告)号:US12019776B2

    公开(公告)日:2024-06-25

    申请号:US17733726

    申请日:2022-04-29

    摘要: In some examples, policy-based application architecture generation may include generating, based on a knowledge model schema, data residency policies, and a data classification ontology, a knowledge model, and determining, based on the knowledge model, whether an application includes regulated data. Based on an analysis of application data and user data, user location and regulated data insights may be generated to determine location specific data residency policies. Location specific regulated data in-flow and data source hosted location insights may be analyzed to determine a location compliance assessment that includes an indication of whether a location associated with the application is compliant or not compliant with the location specific data residency policies. Based on an indication of non-compliance, a strategy may be generated for compliance of application architecture for the application with the location specific data residency policies, and re-architecting of the application architecture may be implemented.