-
公开(公告)号:US20220114150A1
公开(公告)日:2022-04-14
申请号:US17065555
申请日:2020-10-08
Applicant: KYNDRYL, INC.
Inventor: Kumar Saurabh , Gururajan Sundaramurthy , Susheel Gooly
Abstract: Computer-implemented methods, systems and computer program products leveraging blockchain networks to securely store a tamper-proof ledger comprising an audit trail describing the completion or missed data migration tasks, based on a timeline of an end-to-end data migration task schedule. Each of the event logs and alerts from the data migration source, data migration target, and/or migration tools, including network device logs, operating system logs, user-access logs, alerts, migration tool output etc. associated with the end-to-end migration tasks is made a part of the audit trail and stored to the ledger of the blockchain. All event logs, alert or other digital assets recorded to blocks of the blockchain can be timestamped, hashed and distributed across all nodes of the blockchain network and verified as valid by each of the peer nodes. As blocks updating the audit trail are added to the blockchain, the entries cannot be modified or tampered with.
-
公开(公告)号:US11546354B2
公开(公告)日:2023-01-03
申请号:US16695778
申请日:2019-11-26
Applicant: KYNDRYL, INC.
Inventor: Jack Louis Cherkas , Clea Zolotow , Kim Poh Wong , Susheel Gooly , Jørgen Egbert Floes , Jeanette Louise Livings , Tedrick N. Northway
Abstract: A method includes: determining, by a computer device, affinities between components in a networked computer system; determining, by the computer device, a risk level of each of the components; determining, by the computer device, a risk level of the networked computer system; detecting, by the computer device, a threat in the networked computer system; determining, by the computer device, an action based on the threat, the risk level of ones of the components affected by the threat, and the risk level of the system; and reconfiguring, by the computer device, the networked computer system based on the determined action.
-
公开(公告)号:US12093684B2
公开(公告)日:2024-09-17
申请号:US17821288
申请日:2022-08-22
Applicant: KYNDRYL, INC.
Inventor: Clea Zolotow , Susheel Gooly , Rudolph C. Baron, Jr. , Kim Poh Wong , Marci D. Formato , Tedrick N. Northway
CPC classification number: G06F8/70 , G06F8/20 , G06F11/3612 , G06N20/00
Abstract: Application transition and transformation is provided by observing and analyzing execution of a monolithic application to provide properties of the data communication of the monolithic application, identifying, by an artificial intelligence engine, atomic application element(s) having logical functional block(s) that function independent of other atomic application element, determining, by the artificial intelligence engine, candidate atomic application element(s) for migrating out of the monolithic application and refactoring, based on automated testing and validation, refactoring at least one candidate atomic application element into a respective at least one refactored element, where the refactoring selects a platform technology for the refactored element and implements functionality of the candidate atomic application element as the refactored element of the selected platform technology, and providing the at least one refactored element to system(s) for execution thereon.
-
公开(公告)号:US11449478B2
公开(公告)日:2022-09-20
申请号:US17065555
申请日:2020-10-08
Applicant: KYNDRYL, INC.
Inventor: Kumar Saurabh , Gururajan Sundaramurthy , Susheel Gooly
Abstract: Computer-implemented methods, systems and computer program products leveraging blockchain networks to securely store a tamper-proof ledger comprising an audit trail describing the completion or missed data migration tasks, based on a timeline of an end-to-end data migration task schedule. Each of the event logs and alerts from the data migration source, data migration target, and/or migration tools, including network device logs, operating system logs, user-access logs, alerts, migration tool output etc. associated with the end-to-end migration tasks is made a part of the audit trail and stored to the ledger of the blockchain. All event logs, alert or other digital assets recorded to blocks of the blockchain can be timestamped, hashed and distributed across all nodes of the blockchain network and verified as valid by each of the peer nodes. As blocks updating the audit trail are added to the blockchain, the entries cannot be modified or tampered with.
-
-
-