-
公开(公告)号:US12050933B2
公开(公告)日:2024-07-30
申请号:US17305849
申请日:2021-07-15
申请人: Kyndryl, Inc.
发明人: Seng Chai Gan , Shikhar Kwatra , Iranna Dharmaraya Ankad , Anil Bindu Lingambudi , Komminist Weldemariam
CPC分类号: G06F9/5016 , G06F3/0604 , G06F3/0631 , G06F3/0644 , G06F3/067 , G06F9/505 , G06F9/5083
摘要: Configuration and dynamic profiling of storage class memory (SCM) devices is provided. Information is retrieved that includes historical SCM device configurations, historical SCM device utilization, functional and non-functional properties of a plurality of SCM devices on a host node, current real time utilization of the plurality of SCM devices by an application workload of a customer running on the host node, and relationships between the plurality of SCM devices, needs of the customer, and resource capabilities and real time resource utilization on the host node. A configuration of each respective SCM device is determined based on retrieved information and an artificial intelligence-predicted SCM device future utilization trajectory of the customer. Each respective SCM device is dynamically configured with a set of SCM device partitions according to a corresponding SCM device profile based on the determined configuration of each respective SCM device of the plurality of SCM devices.
-
公开(公告)号:US11689523B2
公开(公告)日:2023-06-27
申请号:US16818987
申请日:2020-03-13
申请人: Kyndryl, Inc.
发明人: Cesar Augusto Rodriguez Bravo , Kevin Jimenez Mendez , Ramamohan Chennamsetty , Mauro Marzorati
IPC分类号: H04L9/40
CPC分类号: H04L63/083 , H04L63/0861 , H04L63/107 , H04L63/20
摘要: Techniques are described with respect to facilitating password creation via a secure device in a defined corporate environment. An associated method includes receiving an authentication request associated with an authorized client of a client system in the defined corporate environment and initializing the secure device with respect to the client system responsive to validating the authentication request. The method further includes creating a password for the client system in compliance with policy criteria associated with the defined corporate environment, encrypting the password, and distributing the password via at least one predetermined technique. In an embodiment, the method further includes creating access control credentials for the client system in compliance with the policy criteria associated with the defined corporate environment.
-
3.
公开(公告)号:US11656855B2
公开(公告)日:2023-05-23
申请号:US17346420
申请日:2021-06-14
CPC分类号: G06F8/443 , G06F8/77 , G06F11/3688
摘要: An approach is disclosed that receives a code segment from a source code file. The received code segment is inputted to a trained knowledge manager from which one or more comparable code segments are received. Each of the comparable code segments are identified as having similar functionality as the selected code segment and each of the comparable code segments has a set of metadata. The metadata is used to select one of the comparable code segments and this selected code segment is used to replace the original code segment in the source code file.
-
公开(公告)号:US11620381B2
公开(公告)日:2023-04-04
申请号:US17135553
申请日:2020-12-28
申请人: KYNDRYL, INC.
摘要: Techniques for dynamic server groups that can be patched together using stream clustering algorithms, and learning components in order to reuse the repeatable patterns using machine learning are provided herein. In one example, in response to a first risk associated with a first server device, a risk assessment component patches a server group to mitigate a vulnerability of the first server device and a second server device, wherein the server group is comprised of the first server device and the second server device. Additionally, a monitoring component monitors data associated with a second risk to the server group to mitigate the second risk to the server group.
-
公开(公告)号:US11615714B2
公开(公告)日:2023-03-28
申请号:US16862805
申请日:2020-04-30
申请人: Kyndryl, Inc.
摘要: An approach is provided in which the approach converts a set of learning content into a teaching content vector representation. The approach determines a learning preference mode of a user based on a set of user responses responding to a set of learning type segments, and computes an environmental context vector representation of a physical environment surrounding the user. The approach conducts a conversation with the user based on the learning preference mode, the environmental context vector representation, and the teaching content vector representation.
-
公开(公告)号:US11526806B2
公开(公告)日:2022-12-13
申请号:US16784954
申请日:2020-02-07
发明人: Ritu Singh , Rakesh Ranjan , Simao Liu
摘要: An approach is provided in which the approach trains a machine learning model using reference entries included in a reference dataset. During the training, the machine learning model learns a first set of unidirectional associations between the reference entries. The approach inputs a user dataset into the trained machine learning model and generates a second set of unidirectional associations between user dataset entries included in the user dataset. The approach builds a hierarchical relationship of the user dataset based on the second set of unidirectional associations and manages the user dataset based on the hierarchical relationship.
-
公开(公告)号:US11507353B1
公开(公告)日:2022-11-22
申请号:US17375088
申请日:2021-07-14
摘要: An approach is provided in which a method, system, and computer program product load a first program and a second program on a target host that includes a host kernel. The first program and the second program are both pre-compiled on a build system that is different from the target host. The method, system, and computer program product execute at least a subset of the first program on the host kernel and the subset of the first program captures a set of kernel structure information from the host kernel. The method, system, and program product load, at the target host, the set of kernel structure information into the second program at one or more placeholder locations. Then, the method, system and program product execute at least a subset of the second program with the set of kernel structure information on the target kernel.
-
公开(公告)号:US11388273B2
公开(公告)日:2022-07-12
申请号:US16403579
申请日:2019-05-05
摘要: An approach is provided in which a microservice fabric controller initiates a call flow that includes a set of transactions through a microservices chain that includes a set of microservices. The microservice fabric controller detects a transaction failure at one of the microservices that is positioned in the microservices chain subsequent to at least one successful microservice. In turn, the microservice fabric controller retries the transaction on the failed microservice without disrupting the previously successful microservice.
-
公开(公告)号:US11372707B2
公开(公告)日:2022-06-28
申请号:US16783652
申请日:2020-02-06
发明人: Yu Zhuang , Bo Chen Zhu , Xu Liu , Jun Su , Xu Bin Liu
摘要: An approach is provided in which a set of provision information is generated from a set of provisioners that are in process of fulfilling a client's provision request. The approach creates a set of provision events based on the set of provision information and, in response to detecting a failure of the provision request, the approach generates a provision chain from the set of provision events. The provision chain links the set of provision events based on correlation rules and identifies at least one isolation point of the failure. The approach informs the client of the at least one isolation point of the failure identified in the provision chain.
-
公开(公告)号:US11367440B2
公开(公告)日:2022-06-21
申请号:US16563440
申请日:2019-09-06
摘要: An approach is provided that uses a digital assistant during an online meeting. The digital assistant receives a request to attend an online meeting at a scheduled date and time. The digital assistant is associated with a user that is invited to attend the online meeting. The digital assistant is automatically logged onto the online meeting over the computer network when the scheduled date and time arrive. During the online meeting, the digital assistant detects a voice command from one the human participants of the online meeting. The digital assistant detects that the voice command is detected to the digital assistant. The digital assistant then performs a function that corresponds to the detected voice command.
-
-
-
-
-
-
-
-
-