-
公开(公告)号:US11514340B2
公开(公告)日:2022-11-29
申请号:US16678564
申请日:2019-11-08
Applicant: International Business Machines Corporation
Inventor: Wen Rui Zhao , Yu Zhao , Li Ni Zhang , Lan Luo , Jing Bo Jiang , Li Long Chen , Li Jiang
IPC: G06F16/9535 , G06N5/04 , G06F16/9032 , G06N20/00
Abstract: Methods and systems for selecting a tool for a project is described. In an example, a processor can run a machine learning model to generate a set of requirements to implement a project. The processor can identify a keyword from the set of requirements. The processor can search for the keyword on a search engine. The processor can receive a search result from the search engine corresponding to the keyword. The processor can identify, based on the search result, a tool that can be used to implement the project, where the tool can be in compliance with the set of requirements.
-
公开(公告)号:US11961039B2
公开(公告)日:2024-04-16
申请号:US16183062
申请日:2018-11-07
Applicant: International Business Machines Corporation
Inventor: Jing Bo Jiang , Li Ni Zhang , Li Jiang , Yu Zhao , Lan Luo , Li Long Chen , Wen Rui Zhao
IPC: G06Q30/01 , G06F16/23 , G06Q10/083 , G06Q30/018 , H04L9/06 , H04L9/00
CPC classification number: G06Q10/0838 , G06F16/2379 , G06Q30/018 , H04L9/0637 , H04L9/0643 , G06Q2220/00 , H04L9/50
Abstract: Techniques are described for linked blockchains that allow computing devices to access information from an acceptance blockchain about acceptance reports stored in an enterprise delivery blockchain that are also linked to a product blockchain that stores information of the products of the acceptance reports. An acceptance report is indicative of operability of a product in a service provided by a service provider. A processor is configured to access the block in the enterprise delivery blockchain, retrieve the acceptance report from the block in the enterprise delivery blockchain, determine an identifier, identified in the block in the enterprise delivery blockchain, to a block in an acceptance blockchain, access the block in the acceptance blockchain via the determined identifier, retrieve from the block in the acceptance blockchain contextual information of the acceptance report, and output the acceptance report and contextual information of the acceptance report.
-
公开(公告)号:US20220035693A1
公开(公告)日:2022-02-03
申请号:US16983163
申请日:2020-08-03
Applicant: International Business Machines Corporation
Inventor: Jing Bo Jiang , Li Ni Zhang , Li Long Chen , Yu Zhao , Wen Rui Zhao , Lan Luo , Li Jiang
Abstract: In an approach to blockchain management of cloud service provisioning failures, one or more computer processors capture one or more application programming interface (API) calls associated with a service provision. One or more computer processors submit the captured one or more API calls to a blockchain ledger. One or more computer processors detect a system failure during the service provision. One or more computer processors extract the submitted one or more API calls from the blockchain ledger. Based on the extracted one or more API calls, one or more computer processors identify a problematic system associated with the system failure.
-
4.
公开(公告)号:US11057315B1
公开(公告)日:2021-07-06
申请号:US16734919
申请日:2020-01-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jing Bo Jiang , Li Jiang , Li Ni Zhang , Wen Rui Zhao , Lan Luo , Yu Zhao , Li Long Chen
IPC: H04L12/927 , H04L12/911 , H04L29/08
Abstract: An approach is provided for generating a scaling plan. Plans for onboarding first tenant(s) a cloud computing environment and offboarding second tenant(s) of the cloud computing environment are received. Historical data about behavior of tenants of the cloud computing environment is received. Based on the received plans and the historical data, a scaling plan for scaling computer resources of external systems during the onboarding and the offboarding is generated. The scaling plan specifies a timeline indicating dates and times at which changes in workloads associated with the external systems are required for the onboarding and the offboarding. Based on the scaling plan, a scaling is determined to be needed for computer resource(s) of one of the external systems. Responsive to determining that the scaling is needed, the scaling for the computer resource(s) is triggered at a date and a time indicated by the timeline.
-
公开(公告)号:US20210142186A1
公开(公告)日:2021-05-13
申请号:US16678564
申请日:2019-11-08
Applicant: International Business Machines Corporation
Inventor: Wen Rui Zhao , Yu Zhao , Li Ni Zhang , Lan Luo , Jing Bo Jiang , Li Long Chen , Li Jiang
IPC: G06N5/04 , G06F16/9535 , G06N20/00 , G06F16/9032
Abstract: Methods and systems for selecting a tool for a project is described. In an example, a processor can run a machine learning model to generate a set of requirements to implement a project. The processor can identify a keyword from the set of requirements. The processor can search for the keyword on a search engine. The processor can receive a search result from the search engine corresponding to the keyword. The processor can identify, based on the search result, a tool that can be used to implement the project, where the tool can be in compliance with the set of requirements.
-
公开(公告)号:US12047379B2
公开(公告)日:2024-07-23
申请号:US17444391
申请日:2021-08-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Chun Qing W Wu , Li Ni Zhang , Li Jiang , Wen Rui Zhao , Jing Bo Jiang , Yu Zhao , Li Long Chen
IPC: H04L9/40
CPC classification number: H04L63/101 , H04L63/02 , H04L63/1416
Abstract: Managing security access in real-time to a computer system using control lists includes detecting a security event at a computer system. The security event is analyzed including an analysis of a historical corpus having historical data of security events. An access control list is generated based on the security event. A determination is made when the security event includes abnormal behavior based on the analysis of the security event and the historical corpus. The security event is published to a monitoring system for controlling access to the computer system, in response to the security event.
-
公开(公告)号:US20230039584A1
公开(公告)日:2023-02-09
申请号:US17444391
申请日:2021-08-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Chun Qing W Wu , Li Ni Zhang , Li Jiang , Wen Rui Zhao , Jing Bo Jiang , Yu Zhao , Li Long Chen
IPC: H04L29/06
Abstract: Managing security access in real-time to a computer system using control lists includes detecting a security event at a computer system. The security event is analyzed including an analysis of a historical corpus having historical data of security events. An access control list is generated based on the security event. A determination is made when the security event includes abnormal behavior based on the analysis of the security event and the historical corpus. The security event is published to a monitoring system for controlling access to the computer system, in response to the security event.
-
8.
公开(公告)号:US20210211393A1
公开(公告)日:2021-07-08
申请号:US16734919
申请日:2020-01-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Jing Bo Jiang , Li Jiang , Li Ni Zhang , Wen Rui Zhao , Lan Luo , YU ZHAO , Li Long Chen
IPC: H04L12/927 , H04L29/08 , H04L12/911
Abstract: An approach is provided for generating a scaling plan. Plans for onboarding first tenant(s) a cloud computing environment and offboarding second tenant(s) of the cloud computing environment are received. Historical data about behavior of tenants of the cloud computing environment is received. Based on the received plans and the historical data, a scaling plan for scaling computer resources of external systems during the onboarding and the offboarding is generated. The scaling plan specifies a timeline indicating dates and times at which changes in workloads associated with the external systems are required for the onboarding and the offboarding. Based on the scaling plan, a scaling is determined to be needed for computer resource(s) of one of the external systems. Responsive to determining that the scaling is needed, the scaling for the computer resource(s) is triggered at a date and a time indicated by the timeline.
-
公开(公告)号:US10972567B2
公开(公告)日:2021-04-06
申请号:US16374988
申请日:2019-04-04
Applicant: International Business Machines Corporation
Inventor: Lan Luo , Jing Bo Jiang , Li Ni Zhang , Yu Zhao , Li Jiang , Wen Rui Zhao , Li Long Chen
Abstract: Approaches presented herein enable generation of a multi-dimensional tag metric in a cloud resource management environment. More specifically, a tagging namespace is provided for managing a resource in the cloud resource management environment. This namespace comprises at least two dimensions and a plurality of positions. A set of tags associated with the resource are received into the tagging namespace. A match of each tag of the set of tags to a position within the namespace into which that tag was received is verified and an alert is triggered in the case verification fails. Alternatively, in the case verification is successful, the tag-containing namespace is validated as a multi-dimensional tag metric.
-
公开(公告)号:US10965634B2
公开(公告)日:2021-03-30
申请号:US16665542
申请日:2019-10-28
Applicant: International Business Machines Corporation
Inventor: Liang Liang Dai , Li Gu , Jing Bo Jiang , Li Jiang , Yang Liu , Xue Ying Zhang
IPC: H04L12/58
Abstract: Methods, systems, and computer program products for enhancing a plurality of electronic communication systems for a plurality of users include, for example, providing data regarding at least one project, and linking the data regarding the at least one project with the plurality of electronic communication systems regarding the plurality of electronic communications for the plurality of users.
-
-
-
-
-
-
-
-
-