-
公开(公告)号:US20210373861A1
公开(公告)日:2021-12-02
申请号:US16882811
申请日:2020-05-26
Applicant: International Business Machines Corporation
Inventor: Srinivasan Parthasarathy , Jinho HWANG , Qing Wang , Larisa Shwartz , Michael Elton Nidd , Frank Bagehorn , Jakub Krchák , Altynbek Orumbayev , Michal Mýlek , Ota Sandr , Tomás Ondrej
IPC: G06F8/41 , G06F16/245 , G06F8/75
Abstract: A computer implemented method for identifying an application topology includes identifying a sandbox environment corresponding to an application of interest, analyzing the sandbox environment to identify a set of communication links between services within the sandbox environment indicating a first topology, identifying a production system corresponding to the application of interest, querying the production system to identify a set of structural dependencies indicating a second topology, and creating a complete topology of the cloud application by combining the first topology and the second topology. A computer program product and computer system for identifying an application topology are additionally disclosed herein.
-
公开(公告)号:US20220303302A1
公开(公告)日:2022-09-22
申请号:US17249997
申请日:2021-03-22
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jinho HWANG , Larisa Shwartz , Raghav Batta , Michael Elton Nidd , Jakub Krchak
Abstract: A method, a computer system, and a computer program product for security risk analysis is provided. Embodiments of the present invention may include collecting operational data. Embodiments of the present invention may include building pipelines. Embodiments of the present invention may include localizing security issues using the operational data on an unsupervised model. Embodiments of the present invention may include constructing a semantic graph using shift-left data. Embodiments of the present invention may include constructing a mapping between the operational data and the shift-left data. Embodiments of the present invention may include clustering collected datasets. Embodiments of the present invention may include creating an active learning cycle using ground truth.
-
公开(公告)号:US20220083876A1
公开(公告)日:2022-03-17
申请号:US17023679
申请日:2020-09-17
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jinho HWANG , Larisa Shwartz , Srinivasan Parthasarathy , Qing Wang , Michael Elton Nidd , Frank Bagehorn , Jakub Krchák , Ota Sandr , Tomás Ondrej , Michal Mýlek , Altynbek Orumbayev , Randall M George
Abstract: A method, a computer system, and a computer program product for a shiftleft topology construction is provided. Embodiments of the present invention may include collecting datasets. Embodiments of the present invention may include extracting topological entities from the datasets. Embodiments of the present invention may include correlating a plurality of data from the topological entities. Embodiments of the present invention may include mapping the topological entities. Embodiments of the present invention may include marking entry points for a plurality of subgraphs of the topological entities. Embodiments of the present invention may include constructing a topology graph.
-
公开(公告)号:US20210019120A1
公开(公告)日:2021-01-21
申请号:US16515358
申请日:2019-07-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Muhammed Fatih BULUT , Anup KALIA , Maja VUKOVIC , Raghav BATTA , Jinho HWANG , Jin XIAO , Rohit Madhukar KHANDEKAR
IPC: G06F8/20
Abstract: Methods, systems and computer program products for providing automated script review utilizing crowdsourced inputs are provided. Aspects include receiving a new script including a script text and a script description. Aspects include comparing the new script to each of a plurality of previously classified scripts to determine a degree of similarity. Each of the previously classified scripts and the new script have an associated set of attributes. Responsive to determining that the degree of similarity is below a predetermined threshold, aspects include mapping the new script to a crowdsourcing platform to identify a similar script. Aspects also include receiving information indicative of one or more features from the crowdsourcing platform. Responsive to inputting the one or more features into an acceptance model, aspects include generating an acceptance recommendation associated with the new script.
-
5.
公开(公告)号:US20220156631A1
公开(公告)日:2022-05-19
申请号:US16950228
申请日:2020-11-17
Applicant: International Business Machines Corporation
Inventor: ALI KANSO , Jinho HWANG , Muhammed Fatih Bulut , SHRIPAD NADGOWDA , Chen Lin
Abstract: Systems and methods are provided that integrate a machine-learning model, and more specifically, utilizing a platform as a service (PaaS) cloud to predict probability of success for an operator in an environment. An embodiment comprises a system having: a processor that executes computer executable components stored in memory, trained machine-learning model that predicts probability of success for deployment of an operator in an environment with a namespace of a platform as a service (PaaS) cloud, and a deployment component that receives a first operator and a first namespace and employs the trained machine-learning model to predict success of deployment of the first operator in a first environment.
-
公开(公告)号:US20210350253A1
公开(公告)日:2021-11-11
申请号:US16869647
申请日:2020-05-08
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Qing Wang , Larisa Shwartz , Srinivasan Parthasarathy , Jinho HWANG , Tengfei Ma , Michael Elton Nidd , Frank Bagehorn , Jakub Krchák , Altynbek Orumbayev , Michal Mýlek , Ota Sandr , Tomás Ondrej
IPC: G06N5/04 , G06F16/901 , G06N20/00
Abstract: A method, a computer system, and a computer program product for mapping operational records to a topology graph. Embodiments of the present invention may include generating an event frequent pattern using operational records. Embodiments of the present invention may include integrating topology-based event frequent patterns. Embodiments of the present invention may include mapping the operational records with an embedding engine. Embodiments of the present invention may include predicting incident events. Embodiments of the present invention may include receiving labeled patterns to the embedding engine for an active learning cycle.
-
公开(公告)号:US20200038620A1
公开(公告)日:2020-02-06
申请号:US16050672
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Maja VUKOVIC , Michael S. GORDON , Jinho HWANG , Ryan T. GORDON
Abstract: Systems and methods to facilitate sleep are described. In on example, a cognitive alarm clock system for children learns sleep patterns and activities towards recommending sleep schedules and teaching independence. The system may detect the cognitive state of a child based on voice or cry pattern recognition, a time of day or night, scheduled activities, and social context, among other factors. The system may initiate actions to facilitate sleep in response to the cognitive factors. For example, the system may adjust lighting or push back a wakeup time. In another example, the system may use the cognitive analysis to teach children good sleeping habits by making recommendations to facilitate a good night's rest and encourage independence.
-
公开(公告)号:US20220382876A1
公开(公告)日:2022-12-01
申请号:US17329448
申请日:2021-05-25
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sai ZENG , Jinho HWANG , Virginia Mayo Policarpio , Lisa M. Chambers , Constantin Mircea Adam , Muhammed Fatih Bulut
IPC: G06F21/57
Abstract: A vulnerability management method includes analyzing a system environment to uncover one or more vulnerabilities. The method includes subsequently identifying one or more system weaknesses corresponding to the one or more uncovered vulnerabilities and analyzing a set of historical data to identify similar past vulnerabilities. The method further includes analyzing available information to extract one or more impacts of the identified similar past vulnerabilities and determining one or more impacts to the present system environment that would correspond to the extracted one or more impacts of the identified similar past vulnerabilities. The method additionally includes recommending one or more actions to remediate the uncovered vulnerabilities.
-
公开(公告)号:US20220156065A1
公开(公告)日:2022-05-19
申请号:US16951500
申请日:2020-11-18
Applicant: International Business Machines Corporation
Inventor: Michael Elton Nidd , Altynbek Orumbayev , Jinho HWANG , Larisa Shwartz , Jakub Krchak , Qing Wang , Frank Bagehorn , Ota Sandr , Tomas Ondrej , Srinivasan Parthasarathy , Michal Mylek
Abstract: In an approach to linking operational data with issues, a new event is received. The new event is associated to a story, where the story is related to an identified problem within the system, and further where the new event is associated with the story using machine learning techniques. The story is associated to related change requests based on a similarity between the story and related change requests, where the similarity between the story and the related change requests is associated using the machine learning techniques. A cost is calculated for the story. Responsive to associating the new event with a specific change request, the priority of the specific change request is updated based on the cost for the story.
-
公开(公告)号:US20200038621A1
公开(公告)日:2020-02-06
申请号:US16050804
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Maja VUKOVIC , Michael S. GORDON , Jinho HWANG , Ryan T. GORDON
Abstract: Systems and methods to facilitate sleep are described. In on example, a cognitive alarm clock system for children learns sleep patterns and activities towards recommending sleep schedules and teaching independence. The system may detect the cognitive state of a child based on voice or cry pattern recognition, a time of day or night, scheduled activities, and social context, among other factors. The system may initiate actions to facilitate sleep in response to the cognitive factors. For example, the system may adjust lighting or push back a wakeup time. In another example, the system may use the cognitive analysis to teach children good sleeping habits by making recommendations to facilitate a good night's rest and encourage independence.
-
-
-
-
-
-
-
-
-