Abstract:
A computer-implemented method, computer program product, and computing system is provided for switching between software agents. A first software agent communicatively coupled to a host device and at least one server may be identified. A configuration file associated with the first software agent may be transformed for operation with a second software agent. The first software agent may be switched to the second software agent in response to transforming the configuration file associated with the first software agent.
Abstract:
A method and system for teaching an object of a deictic reference to a machine. A processor of the machine teaches the object of the deictic reference to the machine which results in the machine learning the object. The teaching includes: the processor finds an item in a region indicated by a physical pointing gesture, by the user, that points to the object; the processor shines a laser light on the item and in response, the processor receives a negative spoken indication from the user that the item shined on by the laser light is not the object; in response to the negative spoken indication from the user, the processor interacts with the user in an iterative procedure wherein the machine learns the object in a final iteration of the procedure. The processor stores the learned object in a storage repository.
Abstract:
A method of automatic security parameter renewal includes determining if a security parameter satisfies a renewal condition, and automatically updating the security parameter when the renewal condition is satisfied. The automatically updating the security parameter includes modifying a certificate in dependent components of an application of the security parameter, by a central certification server, upon receipt of a new certificate.
Abstract:
A method to generate an executable orchestration process includes: querying a user to enter first computer code for activating a service; querying the user to enter second computer code for undoing actions performed in the activating; loading pre-defined third computer code for determining whether the activated service is a success or has an error, based on the service; loading pre-defined fourth computer code for correcting the error; generating an executable orchestration function from the first through fourth computer code; and generating the orchestration process from the executable orchestration function.
Abstract:
An approach for sharing an asset in a peer-to-peer (P2P) network is provided. After a computer sends a request to a new node for a new subscription and prior to the computer receiving the new subscription, the new node requests a digital certificate or permission from a user. The new node receives the digital certificate or permission. The new node determines a number of P2P connections in the network does not exceed a threshold amount and determines that no bandwidth degradation exists in the network. Responsive to receiving the digital certificate or permission, determining the number of P2P connections does not exceed the threshold, and determining that no bandwidth degradation exists in the network, the new node transfers the asset to the computer and updates a local list of nodes authorized to receive assets shared by the new node by adding an identification of the computer.
Abstract:
An approach for sharing an asset in a peer-to-peer network is provided. After determining a locally stored first list does not include meta data specifying the asset, a new node is identified. In response to receiving a subscription from the new node, a second list locally stored at the new node is received. The second list includes the meta data and an identification of a source node that has the asset. The first list is updated to include the meta data and the identification of the source node. The updated first list is searched and in response, the meta data and the identification of the source node are detected. Based on the detected meta data and identification, the source node is identified. A request to retrieve the asset is sent to the source node, and in response, the asset is received.
Abstract:
Automated deactivation of service to enable effective resource reusability in a computing system, may include receiving a request to destroy a virtual machine, the virtual machine running in a virtual data center comprising one or more software components allocated for servicing a customer. In response, a provisioning module may be notified to remove the virtual machine. Based on the number of resources determined to be left as available, deactivation of pending actions on the virtual machine may be performed at the time the virtual machine is being removed or as an automatic scheduled job to be performed at a scheduled time.
Abstract:
A method, computer program product, and computer system for prioritization of data collection and analysis for incident detection. Data points within a plurality of monitor data corresponding to effects of incidents may be identified by a computing device. The plurality of monitor data may be converted to a set of time series extracted from the plurality of monitor data. The set of time series may be aligned and summarized. A causal relationship graph may be constructed between the set of time series extracted from the plurality of monitor data. Features may be prioritized by likelihood of importance in incident analysis based upon, at least in part, the causal relationship graph.
Abstract:
A computer-implemented method, computer program product, and computing system is provided for switching between software agents. A first software agent communicatively coupled to a host device and at least one server may be identified. A configuration file associated with the first software agent may be transformed for operation with a second software agent. The first software agent may be switched to the second software agent in response to transforming the configuration file associated with the first software agent.
Abstract:
A method, computer program product, and computer system for prioritization of data collection and analysis for incident detection. Data points within a plurality of monitor data corresponding to effects of incidents may be identified by a computing device. The plurality of monitor data may be converted to a set of time series extracted from the plurality of monitor data. The set of time series may be aligned and summarized. A causal relationship graph may be constructed between the set of time series extracted from the plurality of monitor data. Features may be prioritized by likelihood of importance in incident analysis based upon, at least in part, the causal relationship graph.