GENERATING A SCALING PLAN FOR EXTERNAL SYSTEMS DURING CLOUD TENANT ONBOARDING/OFFBOARDING

    公开(公告)号:US20210211393A1

    公开(公告)日:2021-07-08

    申请号:US16734919

    申请日:2020-01-06

    Abstract: An approach is provided for generating a scaling plan. Plans for onboarding first tenant(s) a cloud computing environment and offboarding second tenant(s) of the cloud computing environment are received. Historical data about behavior of tenants of the cloud computing environment is received. Based on the received plans and the historical data, a scaling plan for scaling computer resources of external systems during the onboarding and the offboarding is generated. The scaling plan specifies a timeline indicating dates and times at which changes in workloads associated with the external systems are required for the onboarding and the offboarding. Based on the scaling plan, a scaling is determined to be needed for computer resource(s) of one of the external systems. Responsive to determining that the scaling is needed, the scaling for the computer resource(s) is triggered at a date and a time indicated by the timeline.

    INTELLIGENT AUTHORIZATION AND PROTECTION OF USER DATA

    公开(公告)号:US20200272756A1

    公开(公告)日:2020-08-27

    申请号:US16281355

    申请日:2019-02-21

    Abstract: A processor may identify that an application is being downloaded to a computing device. The processor may generate an authorization that regulates data that can be used by the application. The processor may prompt a user to select a first set of addendums for the authorization. The first set of addendums indicate specific data that can be used by the application. The processor may receive a request from the application to access a first specific datum. The processor may determine whether the application is authorized to access the first specific datum.

    VIRTUAL MACHINE IMAGE CONVERSION
    6.
    发明申请

    公开(公告)号:US20180189089A1

    公开(公告)日:2018-07-05

    申请号:US15397979

    申请日:2017-01-04

    Abstract: Example embodiments of the present disclosure provide methods, devices, and computer programs for virtual machine image conversion. A delta file system between a file system of a first virtual machine (VM) image and a file system of a first operating system (OS) base image is determined. A file system of a first container base image may be obtained according to the first OS base image. Then, the delta file system may be applied to the file system of the first container base image to create a container image.

    Intelligent authorization and protection of user data

    公开(公告)号:US11194926B2

    公开(公告)日:2021-12-07

    申请号:US16281355

    申请日:2019-02-21

    Abstract: A processor may identify that an application is being downloaded to a computing device. The processor may generate an authorization that regulates data that can be used by the application. The processor may prompt a user to select a first set of addendums for the authorization. The first set of addendums indicate specific data that can be used by the application. The processor may receive a request from the application to access a first specific datum. The processor may determine whether the application is authorized to access the first specific datum.

    Plural architecture master data management

    公开(公告)号:US09678835B2

    公开(公告)日:2017-06-13

    申请号:US15042455

    申请日:2016-02-12

    Abstract: According to one embodiment of the present invention, a system for managing data within a plurality of data management architectures comprises at least one processor. The system persists an entity managed by a first data management architecture to a second data management architecture. The first data management architecture manages entity data within one or more data sources, while the second data management architecture manages persisted entities with data from the one or more data sources within a common repository. A modification to data of the persisted entity is detected within the one or more data sources, and the modified data is synchronized with the persisted entity in the repository of the second data management architecture. Embodiments of the present invention further include a method and computer program product for managing data within a plurality of data management architectures in substantially the same manner described above.

Patent Agency Ranking