摘要:
A method includes receiving a first query by a computing device and assigning the first query to a plurality of cognitive engines, wherein each of the plurality of cognitive engines include different characteristics for processing data. The method also includes, responsive to receiving a response from each of the plurality of cognitive engines for the first query, comparing the received responses from the plurality of cognitive engines. The method also included responsive to determining a difference between a first response from a first cognitive engine and a second response from a second cognitive engine is above a predetermined threshold value, performing a response mediation process until the difference is below the predetermined threshold value. The method also includes selecting a first final response from the received responses for the first query and the second query and displaying the first final response to a user.
摘要:
An approach for managing photograph metadata anonymization is provided. The approach receives, by one or more processors, a photograph file, wherein the photograph file comprises a digital photograph and a first metadata. The approach receives, by one or more processors, a rule set for modifying the first metadata. The approach determines, by one or more processors, whether at least one rule of the rule set corresponds to a datum of the first metadata. Responsive to determining at least one rule corresponds to at least one datum of the first metadata, the approach modifies, by one or more processors, the first metadata based on the rule set to create a second metadata. The approach stores, by one or more processors, the first metadata in a database.
摘要:
A method and a distributed backup system for data backup are provided. The distributed backup system comprises a plurality of computer devices connected by a network. In the system, one of the computer devices comprises a program for managing data backup in the distributed data backup system. In the system, one of the computer devices comprises a first storage space for storing its own files and a second storage space for storing backup files of other computer devices. In the system, the one of the computer devices comprises a first database for storing metadata files of its own files and a second database for storing metadata files of the backup files of the other computer devices.
摘要:
A method and a distributed backup system for data backup are provided. The distributed backup system comprises a plurality of computer devices connected by a network. In the system, one of the computer devices comprises a program for managing data backup in the distributed data backup system. In the system, one of the computer devices comprises a first storage space for storing its own files and a second storage space for storing backup files of other computer devices. In the system, the one of the computer devices comprises a first database for storing metadata files of its own files and a second database for storing metadata files of the backup files of the other computer devices.
摘要:
A method and system for tracking a course of a cable using electromagnetic waves. A first distance between a first transceiver and a second transceiver is determined by determining a total transmission time for a first wireless signal traveling in a linear line from the first transceiver to the second transceiver and back to the first transceiver in the linear line, wherein the first transceiver and the second transceiver each include a receiver and a transmitter. A second distance between the first transceiver and the second transceiver is determined by comparing a phase difference between the first signal received by the second transmitter and a second signal received by the second transmitter, wherein the second signal was transmitted from the first transceiver into the cable and received by the second transceiver wirelessly from the cable, and wherein the first signal and the second signal are phase aligned.
摘要:
A method and system for tracking a course of a cable using electromagnetic waves. A first transceiver sends to a second transceiver a first signal wirelessly in a linear line. The second transceiver sends back to the first transceiver the first signal in the linear line. A first distance between the first transceiver and the second transceiver is determined by determining a total transmission time for a first wireless signal travelling from the first transceiver to the second transceiver and back to the first transceiver. A second signal, aligned with the first signal, is transmitted from the first transceiver into the cable. The second transceiver receives the second signal wirelessly from the cable. A second distance between the first transceiver and the second transceiver is determined by comparing a phase difference between the first signal received by the second transmitter and the second signal received by the second transmitter.
摘要:
Automatically configuring backup client systems and backup server systems in a backup environment includes the following steps: determining if a new backup client system is available in the backup environment; in case of an available new backup client system a backup configuration module performs the sub-steps of: determining data types the new backup client system has to backup; determining corresponding backup policies for the determined data types based on a backup policy table mapping data types with backup policies; selecting a backup server system for the determined data types based on a backup server table including connection details of available backup server systems; configuring the determined backup policies for the data types of the new backup client system on the selected backup server systems; and updating the backup server table with an identifier of the new backup client system and an identifier of the backup policy.
摘要:
Automatically configuring backup client systems and backup server systems in a backup environment includes the following steps: determining if a new backup client system is available in the backup environment; in case of an available new backup client system a backup configuration module performs the sub-steps of: determining data types the new backup client system has to backup; determining corresponding backup policies for the determined data types based on a backup policy table mapping data types with backup policies; selecting a backup server system for the determined data types based on a backup server table including connection details of available backup server systems; configuring the determined backup policies for the data types of the new backup client system on the selected backup server systems; and updating the backup server table with an identifier of the new backup client system and an identifier of the backup policy.
摘要:
A method includes receiving a first query by a computing device and assigning the first query to a plurality of cognitive engines, wherein each of the plurality of cognitive engines include different characteristics for processing data. The method also includes, responsive to receiving a response from each of the plurality of cognitive engines for the first query, comparing the received responses from the plurality of cognitive engines. The method also included responsive to determining a difference between a first response from a first cognitive engine and a second response from a second cognitive engine is above a predetermined threshold value, performing a response mediation process until the difference is below the predetermined threshold value. The method also includes selecting a first final response from the received responses for the first query and the second query and displaying the first final response to a user.
摘要:
Access in a knowledge graph, comprising nodes and edges connecting two or more nodes, is controlled by assigning each node to a non-intersecting zone. A first and second zone identifier, each indicative of a zone occupied by a node where an edge ends, are each stored. Determining an access graph comprising an access node for each zone, access edges representing edges between the zones, and a first list of the zones. Each entry in the first list relates to a zone and a second list of node identifiers, each indicative of a node occupying the zone. A first and second access control list, each related to a zone where an access edge ends and to which a access node in the access graph relates, are stored in each access edge.