Abstract:
A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.
Abstract:
A vulnerability management method includes analyzing a system environment to uncover one or more vulnerabilities. The method includes subsequently identifying one or more system weaknesses corresponding to the one or more uncovered vulnerabilities and analyzing a set of historical data to identify similar past vulnerabilities. The method further includes analyzing available information to extract one or more impacts of the identified similar past vulnerabilities and determining one or more impacts to the present system environment that would correspond to the extracted one or more impacts of the identified similar past vulnerabilities. The method additionally includes recommending one or more actions to remediate the uncovered vulnerabilities.
Abstract:
One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.
Abstract:
A method for scheduling services in a computing environment includes receiving a service scheduling request corresponding to the computing environment and identifying a resource pool and a set of compliance requirements corresponding to the computing environment. The method continues by identifying target resources within the resource pool, wherein target resources are resources which meet the set of compliance requirements, and subsequently identifying a set of available target resources, wherein available target resources are target resources with scheduling availability. The method further includes analyzing the set of available target resources to determine a risk score for each available target resource and selecting one or more of the set of available target resources according to the determined risk scores. The method continues by scheduling a service corresponding to the service scheduling request on the selected one or more available target resources.
Abstract:
One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.
Abstract:
Various embodiments collect unproductive resources in a network infrastructure. In one embodiment, data relating to resources of a network infrastructure is collected. An analytics model is selected based on a type of the collected data. The selected analytics model is executed to classify a resource unproductive or productive, and to assign a corresponding confidence level. An action plan for each confidence level is determined and the action plan is executed for the resource. The collected data may include resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. When data is only resource data, a resource mining model is selected. When the data includes reference data, a reference mining model is selected. When the data comprises reference data and resource data, a reference mining model is selected.