-
公开(公告)号:US12047379B2
公开(公告)日:2024-07-23
申请号:US17444391
申请日:2021-08-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Chun Qing W Wu , Li Ni Zhang , Li Jiang , Wen Rui Zhao , Jing Bo Jiang , Yu Zhao , Li Long Chen
IPC: H04L9/40
CPC classification number: H04L63/101 , H04L63/02 , H04L63/1416
Abstract: Managing security access in real-time to a computer system using control lists includes detecting a security event at a computer system. The security event is analyzed including an analysis of a historical corpus having historical data of security events. An access control list is generated based on the security event. A determination is made when the security event includes abnormal behavior based on the analysis of the security event and the historical corpus. The security event is published to a monitoring system for controlling access to the computer system, in response to the security event.
-
公开(公告)号:US20230039584A1
公开(公告)日:2023-02-09
申请号:US17444391
申请日:2021-08-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Chun Qing W Wu , Li Ni Zhang , Li Jiang , Wen Rui Zhao , Jing Bo Jiang , Yu Zhao , Li Long Chen
IPC: H04L29/06
Abstract: Managing security access in real-time to a computer system using control lists includes detecting a security event at a computer system. The security event is analyzed including an analysis of a historical corpus having historical data of security events. An access control list is generated based on the security event. A determination is made when the security event includes abnormal behavior based on the analysis of the security event and the historical corpus. The security event is published to a monitoring system for controlling access to the computer system, in response to the security event.
-
3.
公开(公告)号:US20210211393A1
公开(公告)日:2021-07-08
申请号:US16734919
申请日:2020-01-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jing Bo Jiang , Li Jiang , Li Ni Zhang , Wen Rui Zhao , Lan Luo , YU ZHAO , Li Long Chen
IPC: H04L12/927 , H04L29/08 , H04L12/911
Abstract: An approach is provided for generating a scaling plan. Plans for onboarding first tenant(s) a cloud computing environment and offboarding second tenant(s) of the cloud computing environment are received. Historical data about behavior of tenants of the cloud computing environment is received. Based on the received plans and the historical data, a scaling plan for scaling computer resources of external systems during the onboarding and the offboarding is generated. The scaling plan specifies a timeline indicating dates and times at which changes in workloads associated with the external systems are required for the onboarding and the offboarding. Based on the scaling plan, a scaling is determined to be needed for computer resource(s) of one of the external systems. Responsive to determining that the scaling is needed, the scaling for the computer resource(s) is triggered at a date and a time indicated by the timeline.
-
公开(公告)号:US10972567B2
公开(公告)日:2021-04-06
申请号:US16374988
申请日:2019-04-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Jing Bo Jiang , Li Ni Zhang , Yu Zhao , Li Jiang , Wen Rui Zhao , Li Long Chen
Abstract: Approaches presented herein enable generation of a multi-dimensional tag metric in a cloud resource management environment. More specifically, a tagging namespace is provided for managing a resource in the cloud resource management environment. This namespace comprises at least two dimensions and a plurality of positions. A set of tags associated with the resource are received into the tagging namespace. A match of each tag of the set of tags to a position within the namespace into which that tag was received is verified and an alert is triggered in the case verification fails. Alternatively, in the case verification is successful, the tag-containing namespace is validated as a multi-dimensional tag metric.
-
公开(公告)号:US20200272756A1
公开(公告)日:2020-08-27
申请号:US16281355
申请日:2019-02-21
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Jian Zhang , Jian Dong Yin , Li Xia , Li Long Chen
IPC: G06F21/62
Abstract: A processor may identify that an application is being downloaded to a computing device. The processor may generate an authorization that regulates data that can be used by the application. The processor may prompt a user to select a first set of addendums for the authorization. The first set of addendums indicate specific data that can be used by the application. The processor may receive a request from the application to access a first specific datum. The processor may determine whether the application is authorized to access the first specific datum.
-
公开(公告)号:US20180189089A1
公开(公告)日:2018-07-05
申请号:US15397979
申请日:2017-01-04
Applicant: International Business Machines Corporation
Inventor: Li Long Chen , Lan Luo , Yuan Bin Teng , Wen Rui Zhao
Abstract: Example embodiments of the present disclosure provide methods, devices, and computer programs for virtual machine image conversion. A delta file system between a file system of a first virtual machine (VM) image and a file system of a first operating system (OS) base image is determined. A file system of a first container base image may be obtained according to the first OS base image. Then, the delta file system may be applied to the file system of the first container base image to create a container image.
-
公开(公告)号:US11514340B2
公开(公告)日:2022-11-29
申请号:US16678564
申请日:2019-11-08
Applicant: International Business Machines Corporation
Inventor: Wen Rui Zhao , Yu Zhao , Li Ni Zhang , Lan Luo , Jing Bo Jiang , Li Long Chen , Li Jiang
IPC: G06F16/9535 , G06N5/04 , G06F16/9032 , G06N20/00
Abstract: Methods and systems for selecting a tool for a project is described. In an example, a processor can run a machine learning model to generate a set of requirements to implement a project. The processor can identify a keyword from the set of requirements. The processor can search for the keyword on a search engine. The processor can receive a search result from the search engine corresponding to the keyword. The processor can identify, based on the search result, a tool that can be used to implement the project, where the tool can be in compliance with the set of requirements.
-
公开(公告)号:US11194926B2
公开(公告)日:2021-12-07
申请号:US16281355
申请日:2019-02-21
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Jian Zhang , Jian Dong Yin , Li Xia , Li Long Chen
IPC: G06F21/62
Abstract: A processor may identify that an application is being downloaded to a computing device. The processor may generate an authorization that regulates data that can be used by the application. The processor may prompt a user to select a first set of addendums for the authorization. The first set of addendums indicate specific data that can be used by the application. The processor may receive a request from the application to access a first specific datum. The processor may determine whether the application is authorized to access the first specific datum.
-
9.
公开(公告)号:US20200073649A1
公开(公告)日:2020-03-05
申请号:US16117109
申请日:2018-08-30
Applicant: International Business Machines Corporation
Inventor: Phillip L. Viana , Lan Luo , Fang Wang , Vanessa Michelini , Yan Du , LI LONG CHEN
Abstract: A method, system, and computer program product are provided for generating a container providing a computing environment. At least one processing device combines a base image of a first type of container, including at least one application and an operating system, with a base image of a second type of container including middleware and configuration information to produce a base image of a target container including, from the first type of container, the at least one application and the operating system, and the middleware and the configuration information from the second type of container. The base image of the target container is executed on a computer to provide the computing environment configured in accordance with the configuration information.
-
公开(公告)号:US09678835B2
公开(公告)日:2017-06-13
申请号:US15042455
申请日:2016-02-12
Applicant: International Business Machines Corporation
Inventor: Stephanie J. Hazlewood , Mohammad Khatibi , Lan Luo , Susanna W. Tai , Amira N. Taiyab
CPC classification number: G06F11/1451 , G06F11/1446 , G06F17/30174 , G06F17/30368 , G06F17/30575 , G06F17/30581
Abstract: According to one embodiment of the present invention, a system for managing data within a plurality of data management architectures comprises at least one processor. The system persists an entity managed by a first data management architecture to a second data management architecture. The first data management architecture manages entity data within one or more data sources, while the second data management architecture manages persisted entities with data from the one or more data sources within a common repository. A modification to data of the persisted entity is detected within the one or more data sources, and the modified data is synchronized with the persisted entity in the repository of the second data management architecture. Embodiments of the present invention further include a method and computer program product for managing data within a plurality of data management architectures in substantially the same manner described above.
-
-
-
-
-
-
-
-
-