Abstract:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
Abstract:
A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. Responsive to receiving a request to verify the identity of the user, one or more transaction based sources associated with the user are scanned for a set of transactions conducted by the user within a first predetermined time frame of a current time. A subset of transactions from the set of transactions are randomly selected as the basis for forming a set of questions to be used to verify the identity of the user. The set of questions are generated such that the user is required to identify one or more details about the subset of transactions in order to verify the user's identity. Responsive to the user correctly answering the one or more details about the subset of transactions, the user is authenticated.
Abstract:
One or more processors fractionate a computer application into disparate components, and assign two or more of the disparate components to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. The processor(s) create a virtual machine that controls access to a particular requisite resource by a particular disparate component, and install the virtual machine within at least one of the different communication pathways to control access to the particular requisite resource by the particular disparate component. The processor(s) transmit a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways, and adjust a quantity of virtual machines between the computer application and the particular requisite resource according to a threat level for the particular disparate component.
Abstract:
A mechanism is provided for verifying an identity of a user using dynamically generated questions based on transactions conducted by the user. One or more transaction based sources associated with the user are scanned for a set of transactions conducted by the user. A subset of transactions from the set of transactions are randomly selected as the basis for forming a set of questions to be used to verify the identity of the user. The set of questions are generated such that the user is required to identify one or more details about the subset of transactions in order to verify the user's identity. Responsive to the user correctly answering the one or more details about each of the subset of transactions vocally and voice analysis of the answers to the set of questions failing to indicate any discrepancy, the user is authenticated.
Abstract:
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.
Abstract:
A computer-implemented method, system, and/or computer program product controls access to computer resources used by a computer application. One or more processors fractionate a computer application into disparate components. Two or more of the disparate components are assigned to different communication pathways, where the different communication pathways lead to requisite resources needed to execute the disparate components. One or more processors create and install a virtual machine within at least one of the different communication pathways, such that the virtual machine controls access to a particular requisite resource by a particular disparate component. One or more processors then issue a resource retrieval instruction to retrieve the particular requisite resource via the virtual machine and at least one of the different communication pathways.
Abstract:
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.
Abstract:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.
Abstract:
A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel.
Abstract:
A Lab On a Chip (LOC) has a Sample Preparation Module (SPM) coupled to a sample inlet, a microchannel coupled to the SPM, and an optic module optically proximate to the microchannel. The optic module holds multiple lenses, each of which has a different effective focal length, such that all fields of focus within the microchannel are covered as objects suspended within the liquid sample pass through the microchannel.