-
公开(公告)号:US10552241B2
公开(公告)日:2020-02-04
申请号:US15189486
申请日:2016-06-22
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Anuradha Bhamidipaty , Jayan Nallacherry , Debasisha K. Padhi , Yaoping Ruan , Frederick Y.-F. Wu
Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
-
公开(公告)号:US11500705B2
公开(公告)日:2022-11-15
申请号:US16673398
申请日:2019-11-04
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Anuradha Bhamidipaty , Jayan Nallacherry , Debasisha K. Padhi , Yaoping Ruan , Frederick Y.-F. Wu
IPC: G06F11/00
Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
-
公开(公告)号:US20200293970A1
公开(公告)日:2020-09-17
申请号:US16299421
申请日:2019-03-12
Applicant: International Business Machines Corporation
Inventor: Jinho Hwang , Constantin M. Adam , Muhammed Fatih Bulut , Milton H. Hernandez
Abstract: Embodiments relate to an intelligent computer platform to utilize machine learning techniques to minimize compliance risk. Data, collected from a plurality of sources is subject to analysis and correlation to assess impact across data points. The assessment measures impact between at least two different compliance domains, facilitates understanding of cross-impact between compliance domains, and provides an estimation of compliance risk. A recommendation plan for one or more new compliance activities is created and dynamically subject to a machine learning reinforcement algorithm.
-
公开(公告)号:US20200265118A1
公开(公告)日:2020-08-20
申请号:US16278952
申请日:2019-02-19
Applicant: International Business Machines Corporation
Inventor: John Rofrano , Anup Kalia , Constantin M. Adam , Maja Vukovic
IPC: G06F17/28 , G06F16/242 , G06N5/04 , G06F8/30 , G06F8/60
Abstract: An intelligent computer platform to provide intent identification, mining and refinement, and dynamic application of the intent to pipeline. Natural language processing (NLP) is utilized with respect to the intent identification and refinement. A pipeline tool to support the function of the intent is identified, and a corresponding dynamic modification of a corresponding pipeline template takes place to integrate the tool into a stage of the corresponding template. Program code that aligns with the dynamic modification of the pipeline template is generated, thereby incorporating the searched intents into the functional aspect(s) represented in the pipeline.
-
公开(公告)号:US10361927B2
公开(公告)日:2019-07-23
申请号:US14503254
申请日:2014-09-30
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Shang Q. Guo , Rajeev Puri , Yaoping Ruan , Cashchakanith Venugopal , Frederick Y. Wu , Sai Zeng
Abstract: It is determined whether a user is authorized to carry out a management operation on a plurality of information technology assets in parallel, based on a role of the user and at least one characteristic of the management operation. A risk level of the management operation, and at least one characteristic of the plurality of information technology assets, are both determined. Based on the risk level and the at least one characteristic of the plurality of information technology assets, an execution pattern for the management operation is specified. In at least some cases, the management operation is carried out on the plurality of information technology assets in parallel, in accordance with the execution pattern.
-
公开(公告)号:US09940466B2
公开(公告)日:2018-04-10
申请号:US15371392
申请日:2016-12-07
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Nikolaos Anerousis , Vysakh K. Chandran , Milton H. Hernandez , Debasisha K. Padhi , Yaoping Ruan , Fabio M. Tanada , Frederick Y.-F. Wu , Sai Zeng
CPC classification number: G06F21/577 , G06F2221/034 , H04L41/0806 , H04L41/0866 , H04L41/22 , H04L41/28 , H04L67/30 , H04L67/42
Abstract: A computer-implemented agent process running on a first computer automatically intercepts a command issued from the first computer to execute on a target computer prior to invocation of the command on the target computer. A server profile built for an application running on the target computer that supports the command may be retrieved. At least based on the server profile a risk enforcement policy is dynamically constructed. Based on the risk enforcement policy, one or more computer-executable enforcement actions to perform prior to sending the command to the target computer for execution is determined. Based on executing of one or more of the computer-executable enforcement actions, the command may be transmitted to execute on the target computer or prevented from executing on the target computer.
-
公开(公告)号:US11038779B2
公开(公告)日:2021-06-15
申请号:US16529838
申请日:2019-08-02
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Shang Q. Guo , Brian L. Peterson , John J. Rofrano , Frederick Y. Wu , Sai Zeng
Abstract: A self-service experience for a change requester is provided. Authorized endpoint changes are identified along with corresponding change types. Resource attributes are identified and corresponding parameters of the resources are changed according to change window requirements. Where the changes comply with business policies, the changes are executed.
-
公开(公告)号:US10454676B2
公开(公告)日:2019-10-22
申请号:US14746051
申请日:2015-06-22
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Milton H. Hernandez , Vugranam C. Sreedhar , Prema Vivekanandan
Abstract: A method forms a key pair for a user. The key pair has a public key and a private key that is unique to the user and that is encrypted using a passphrase formed from an enterprise password of the user and an identification that uniquely identifies in the enterprise a device by which the user gains access. The method stores the private key in the user device and stores the public key in an enterprise server that is accessed by the user. The method provides the private key from the user device to a client, such as a SSH client, in conjunction with the password and the identification, decrypts the private key to obtain the decrypted password and the identification, and allows the user to access the enterprise server only if the decrypted password and the identification match the password and the identification provided with the private key.
-
公开(公告)号:US10447757B2
公开(公告)日:2019-10-15
申请号:US14831051
申请日:2015-08-20
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Shang Q. Guo , Brian L. Peterson , John J. Rofrano , Frederick Y. Wu , Sai Zeng
Abstract: A method is provided to eliminate many of the manual steps in a server change management process, creating a self-service experience for a change requester. The method may automatically retrieve the current state of a server; constrain the requested change to a valid, feasible specification; verify that the requested change is compliant with business policies; implement the changes automatically; and develop a knowledge base of automated change risk that is used to modify the change management business process by identifying safe changes that can be performed outside of change windows and/or during change freezes. The method can be applied to changes to physical servers, virtual servers, and servers in a cloud environment.
-
公开(公告)号:US20170371730A1
公开(公告)日:2017-12-28
申请号:US15189486
申请日:2016-06-22
Applicant: International Business Machines Corporation
Inventor: Constantin M. Adam , Anuradha Bhamidipaty , Jayan Nallacherry , Debasisha K. Padhi , Yaoping Ruan , Frederick Y.-F. Wu
CPC classification number: G06F11/004
Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
-
-
-
-
-
-
-
-
-