COMPLIANCE CONTENT GENERATION
    1.
    发明申请

    公开(公告)号:US20220413847A1

    公开(公告)日:2022-12-29

    申请号:US17358166

    申请日:2021-06-25

    Abstract: A content generation method includes receiving a control document comprising one or more control clauses, identifying actionable content for the one or more control clauses, generating a programming language template for the one or more control clauses, identifying a closest existing control clause from a database for each of the one or more control clause, identifying a programming language implementation of the closest existing control clause, identifying similarities and differences between the programming language implementation and the generated programming language template, and annotating the programming language implementation for the closest existing control clause based on the identified similarities and differences. The method may additionally include determining whether a closest existing control clause exists, providing the generated programming language template to a user responsive to determining that a closest existing control clause does not exist, and receiving feedback from the user regarding the generated programming language template.

    SECURITY VULNERABILITY MANAGEMENT

    公开(公告)号:US20220382876A1

    公开(公告)日:2022-12-01

    申请号:US17329448

    申请日:2021-05-25

    Abstract: A vulnerability management method includes analyzing a system environment to uncover one or more vulnerabilities. The method includes subsequently identifying one or more system weaknesses corresponding to the one or more uncovered vulnerabilities and analyzing a set of historical data to identify similar past vulnerabilities. The method further includes analyzing available information to extract one or more impacts of the identified similar past vulnerabilities and determining one or more impacts to the present system environment that would correspond to the extracted one or more impacts of the identified similar past vulnerabilities. The method additionally includes recommending one or more actions to remediate the uncovered vulnerabilities.

    RECOMMENDING SERVER MANAGEMENT ACTIONS FOR INFORMATION PROCESSING SYSTEMS
    3.
    发明申请
    RECOMMENDING SERVER MANAGEMENT ACTIONS FOR INFORMATION PROCESSING SYSTEMS 有权
    推荐信息处理系统的服务器管理操作

    公开(公告)号:US20140244816A1

    公开(公告)日:2014-08-28

    申请号:US13780272

    申请日:2013-02-28

    CPC classification number: H04L41/065 H04L41/0654 H04L41/0686

    Abstract: One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.

    Abstract translation: 一个或多个实施例识别用于解决与信息技术基础设施中的一个或多个节点相关联的问题的服务器管理动作。 在一个实施例中,生成与至少一个问题票相关联的用于信息处理节点的节点票记录。 基于节点票据记录查询一组节点票证集群。 每组节点票证集合将一组服务器管理动作映射到与节点票证集群相关联的历史节点票据记录集。 先前执行了一组服务器管理动作以解决与至少一个信息处理节点相关联的至少一个操作问题。 基于查询来识别与给定阈值内的节点票记录对应的至少一组节点票证集群相关联的至少一组服务器管理动作。

    COMPLIANCE AWARE APPLICATION SCHEDULING

    公开(公告)号:US20220382583A1

    公开(公告)日:2022-12-01

    申请号:US17330583

    申请日:2021-05-26

    Abstract: A method for scheduling services in a computing environment includes receiving a service scheduling request corresponding to the computing environment and identifying a resource pool and a set of compliance requirements corresponding to the computing environment. The method continues by identifying target resources within the resource pool, wherein target resources are resources which meet the set of compliance requirements, and subsequently identifying a set of available target resources, wherein available target resources are target resources with scheduling availability. The method further includes analyzing the set of available target resources to determine a risk score for each available target resource and selecting one or more of the set of available target resources according to the determined risk scores. The method continues by scheduling a service corresponding to the service scheduling request on the selected one or more available target resources.

    ENTERPRISE CLOUD GARBAGE COLLECTOR
    6.
    发明申请

    公开(公告)号:US20170214588A1

    公开(公告)日:2017-07-27

    申请号:US15006571

    申请日:2016-01-26

    Abstract: Various embodiments collect unproductive resources in a network infrastructure. In one embodiment, data relating to resources of a network infrastructure is collected. An analytics model is selected based on a type of the collected data. The selected analytics model is executed to classify a resource unproductive or productive, and to assign a corresponding confidence level. An action plan for each confidence level is determined and the action plan is executed for the resource. The collected data may include resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. When data is only resource data, a resource mining model is selected. When the data includes reference data, a reference mining model is selected. When the data comprises reference data and resource data, a reference mining model is selected.

Patent Agency Ranking