-
公开(公告)号:US20240330096A1
公开(公告)日:2024-10-03
申请号:US18128370
申请日:2023-03-30
Applicant: International Business Machines Corporation
Inventor: Saurabh Jha , Larisa Shwartz , Robert Filepp , Frank Bagehorn , Jesus Maria Rios Aliaga
CPC classification number: G06F11/079 , G06F11/3089
Abstract: Mechanisms are provided that detect an anomaly in performance of a hybrid application based on a specification of required performance and collected passive monitoring data, and that generate a causal generative model based on relationships between hybrid application components and computing system architecture components extracted from the passive monitoring data. Root cause identification (RCI) logic is executed on the causal generative model to identify a set of candidate root causes of the detected anomaly. One or more probes are identified for active monitoring data collection targeting the identified set of candidate root causes, which are then executed to collect probe data. Reinforcement learning is performed of the RCI logic to update the RCI logic based on the probe data. The set of candidate root causes is updated based on the reinforcement learning.
-
公开(公告)号:US20190075081A1
公开(公告)日:2019-03-07
申请号:US15694355
申请日:2017-09-01
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Richard Jay Cohen , Robert Filepp , Milton H. Hernandez , Brian Peterson , Maja Vukovic , Sai Zeng , Guan Qun Zhang , Bhavna Agrawal
IPC: H04L29/06
Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
-
公开(公告)号:US12032702B2
公开(公告)日:2024-07-09
申请号:US17078563
申请日:2020-10-23
Applicant: International Business Machines Corporation
Inventor: Muhammed Fatih Bulut , Milton H. Hernandez , Robert Filepp , Sai Zeng , Steven Ocepek , Srinivas Babu Tummalapenta , Daniel S. Riley
IPC: G06F21/57 , G06N20/00 , G06Q10/0635 , G06Q10/0637 , G06Q10/0639 , G06Q10/10 , G06Q40/02 , G06Q40/04
CPC classification number: G06F21/577 , G06N20/00 , G06F2221/034 , G06Q10/0635 , G06Q10/0637 , G06Q10/06393 , G06Q10/10 , G06Q40/02 , G06Q40/04
Abstract: Systems and techniques that facilitate automated health-check risk assessment of computing assets are provided that can generate a baseline health-check risk score that corresponds to non-compliance of a computing asset with a stipulated control, and can adjust the baseline health-check risk score based on a weakness factor of the stipulated control, an environmental factor of the computing asset, a criticality factor of the computing asset, and a maturity factor of the computing asset.
-
公开(公告)号:US20220129560A1
公开(公告)日:2022-04-28
申请号:US17078563
申请日:2020-10-23
Applicant: International Business Machines Corporation
Inventor: Muhammed Fatih Bulut , Milton H. Hernandez , Robert Filepp , Sai Zeng , Steven Ocepek , Srinivas Babu Tummalapenta , Daniel S. Riley
Abstract: Systems and techniques that facilitate automated health-check risk assessment of computing assets are provided. In various embodiments, a system can comprise a baseline component that can generate a baseline health-check risk score that corresponds to non-compliance of a computing asset with a stipulated control. In various aspects, the system can further comprise an adjustment component that can adjust the baseline health-check risk score based on a weakness factor of the stipulated control. In some cases, the weakness factor can be based on a magnitude by which a state of the computing asset deviates from the stipulated control. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on an environmental factor of the computing asset. In various cases, the environmental factor can be based on security mechanisms or security protocols associated with the computing asset. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on a criticality factor. In some instances, the critical factor can be based on a level of importance of the computing asset. In various embodiments, the adjustment component can further adjust the baseline health-check risk score based on a maturity factor. In some aspects, the maturity factor can be based on a difference between the stipulated control and a recommended control.
-
公开(公告)号:US20190075082A1
公开(公告)日:2019-03-07
申请号:US15841915
申请日:2017-12-14
Applicant: International Business Machines Corporation
Inventor: Constantin Mircea Adam , Richard Jay Cohen , Robert Filepp , Milton H. Hernandez , Brian Peterson , Maja Vukovic , Sai Zeng , Guan Qun Zhang , Bhayna Agrawal
IPC: H04L29/06
Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.
-
公开(公告)号:US09450985B2
公开(公告)日:2016-09-20
申请号:US14450422
申请日:2014-08-04
Applicant: International Business Machines Corporation
Inventor: Trieu C. Chieu , Robert Filepp , Brian L. Peterson , Ratnasagar M. Ramaratnam
Abstract: Systems and methods for computer automated validation of server configurations are provided. A method for validation of a target environment, comprises assembling a validation script from a plurality of script fragments, inserting the assembled validation script into the target environment, executing the validation script in the target environment, gathering results of the executing, and reporting the results to at least one user.
Abstract translation: 提供了服务器配置的计算机自动验证的系统和方法。 一种用于验证目标环境的方法,包括从多个脚本片段组装验证脚本,将组装的验证脚本插入到目标环境中,在目标环境中执行验证脚本,收集执行结果并报告结果 至少一个用户。
-
公开(公告)号:US20160036858A1
公开(公告)日:2016-02-04
申请号:US14450422
申请日:2014-08-04
Applicant: International Business Machines Corporation
Inventor: Trieu C. Chieu , Robert Filepp , Brian L. Peterson , Ratnasagar M. Ramaratnam
IPC: H04L29/06
Abstract: Systems and methods for computer automated validation of server configurations are provided. A method for validation of a target environment, comprises assembling a validation script from a plurality of script fragments, inserting the assembled validation script into the target environment, executing the validation script in the target environment, gathering results of the executing, and reporting the results to at least one user.
Abstract translation: 提供了服务器配置的计算机自动验证的系统和方法。 一种用于验证目标环境的方法,包括从多个脚本片段组装验证脚本,将组装的验证脚本插入到目标环境中,在目标环境中执行验证脚本,收集执行结果并报告结果 至少一个用户。
-
公开(公告)号:US20240320687A1
公开(公告)日:2024-09-26
申请号:US18189681
申请日:2023-03-24
Applicant: International Business Machines Corporation
Inventor: Abdulhamid Adebowale Adebayo , Braulio Gabriel Dumba , Alexei Karve , Robert Filepp , Andrew John Anderson
IPC: G06Q30/018
CPC classification number: G06Q30/018
Abstract: A computer implemented method determines a compliance of an application. A number of processor units determines compliance scores resulting from compliance checks performed at each layer in layers in an edge computing network for components for the application running in the layers. The compliance checks performed at each layer are determined using a compliance profile identifying a set of the compliance checks for each component in the application. The number of processor units transmit the compliance scores determined in each layer in the layers upward to a top layer in the layers. The number of processor units aggregate compliance scores received from the components in a lower layer for transmission upward in the layers to the top layer as aggregated compliance scores. The number of processor units determine the compliance for the application using an overall aggregate score determined at the top layer.
-
公开(公告)号:US20240201264A1
公开(公告)日:2024-06-20
申请号:US18081682
申请日:2022-12-14
Applicant: International Business Machines Corporation
Inventor: Robert Filepp , Abdulhamid Adebowale Adebayo , William Anderson , Neil Delima
IPC: G01R31/367 , G01R31/382 , H01M10/42
CPC classification number: G01R31/367 , G01R31/382 , H01M10/4207 , H01M10/4285
Abstract: A method for unifying battery-status observability across a plurality of heterogeneous devices includes identifying a plurality of heterogeneous devices where each device includes a battery to power the device. The method monitors battery status of each device of the heterogeneous devices. The method may also access crowdsourced data to determine battery life associated with at least one device of the heterogeneous devices. Using the battery status and potentially the crowdsourced data, the method predicts the remaining battery life for each device of the heterogeneous devices. The method presents the remaining battery life of each of the heterogeneous devices on a unified dashboard. In certain embodiments, a user may be alerted in the event the remaining battery life of a device of the heterogeneous devices falls below a selected threshold. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US10540662B2
公开(公告)日:2020-01-21
申请号:US14500213
申请日:2014-09-29
Applicant: International Business Machines Corporation
Inventor: Douglas M. Barlett , Yixin Diao , Harish Dindigal , Robert Filepp , Bo Forsberg , Lakshminarayanan Renganarayana , Xiaolan Zhang
IPC: G06Q30/00
Abstract: A method of checking file system compliance including receiving a plurality of compliance rules corresponding to a file system of a production system, collecting, by a collector, file system meta data from the file system, analyzing, by an analyzer, the file system meta data using the plurality of compliance rules to determine at least one compliance deviation of the file system, and throttling the collector and the analyzer independently of one-another, wherein the collector and the analyzer are configured according to a model of performance for the production system and a schedule for the collection and analyzing.
-
-
-
-
-
-
-
-
-