TOUCH ANALYTICS-DRIVEN BUYING PATTERN DETECTION SYSTEM FOR BEHAVIORAL CAUSAL ANALYSIS

    公开(公告)号:US20240303712A1

    公开(公告)日:2024-09-12

    申请号:US18117972

    申请日:2023-03-06

    Applicant: Kyndryl, Inc.

    CPC classification number: G06Q30/0629

    Abstract: A computer-implemented method, in accordance with one embodiment, includes collecting touch data from one or more touch sensors coupled to a first product, the one or more touch sensors being configured to indicate when a human touches the one or more touch sensors and/or first product. Product vector information about the first product is received. Classification on the touch data and product vector information is performed using a hierarchical multilabel classification system for assigning the touch data to predefined patterns for each level of a classifier used by the hierarchical multilabel classification system. Features of a second product, e.g., a touch vector and a touch pattern, are transformed into a second feature vector. A featurewise difference detection is performed on the feature vectors to calculate a difference in distribution for features of the products to generate and output a caption indicative of the differences between the products.

    AUTONOMOUS COGNITIVE INSPECTION
    4.
    发明公开

    公开(公告)号:US20230368521A1

    公开(公告)日:2023-11-16

    申请号:US17662947

    申请日:2022-05-11

    Applicant: Kyndryl, Inc.

    CPC classification number: G06V20/17 B64C39/024 B64D47/08 B64C2201/123

    Abstract: A method, computer program product, and system include a processor(s) obtaining an instruction to perform an inspection of a given type at a geographic site. The processor(s) deploys a robotic drone to the geographic site, wherein based on the deployment, the robotic drone performs a contextual analysis on the geographic site to identify a use case and to collect locational data. The processor(s) obtains the locational data. Based on the locational data, the given type of the inspection, and the use case, the processor(s) generates an inspection plan comprising tasks. The processor(s) identifies robotic drone(s) to complete the tasks and distributes the tasks. The robotic drone( )automatically self-optimize/s to complete the tasks. The processor(s) obtain the collected data from the self-optimized identified one or more robotic drones. The processor(s) analyze the collected data to identify issue(s) at geographic site.

    Dynamically assigning storage objects to compartment constructs of a storage system to reduce application risk

    公开(公告)号:US12056353B2

    公开(公告)日:2024-08-06

    申请号:US18093267

    申请日:2023-01-04

    Applicant: Kyndryl, Inc.

    CPC classification number: G06F3/0604 G06F3/0614 G06F3/0644 G06F3/067

    Abstract: A computer-implemented method, according to one embodiment, includes logically partitioning a storage system into a plurality of compartment constructs, and mapping hosts in communication with the storage system to the compartment constructs, thereby enabling interoperability among the hosts and the compartment constructs. The interoperability of the hosts and the compartment constructs is analyzed, and the interoperability is based on storage software and/or firmware versions being run by the hosts. The method further includes defining, based on the analysis, risk profiles for applications run on the hosts, and determining, based on the risk profiles, recommendations for assignment and mapping of the hosts with the compartment constructs. Ownership of storage objects is assigned to the compartment constructs based on the recommendations. Each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.

    DYNAMICALLY ASSIGNING STORAGE OBJECTS TO COMPARTMENT CONSTRUCTS OF A STORAGE SYSTEM TO REDUCE APPLICATION RISK

    公开(公告)号:US20240220102A1

    公开(公告)日:2024-07-04

    申请号:US18093267

    申请日:2023-01-04

    Applicant: Kyndryl, Inc.

    CPC classification number: G06F3/0604 G06F3/0614 G06F3/0644 G06F3/067

    Abstract: A computer-implemented method, according to one embodiment, includes logically partitioning a storage system into a plurality of compartment constructs, and mapping hosts in communication with the storage system to the compartment constructs, thereby enabling interoperability among the hosts and the compartment constructs. The interoperability of the hosts and the compartment constructs is analyzed, and the interoperability is based on storage software and/or firmware versions being run by the hosts. The method further includes defining, based on the analysis, risk profiles for applications run on the hosts, and determining, based on the risk profiles, recommendations for assignment and mapping of the hosts with the compartment constructs. Ownership of storage objects is assigned to the compartment constructs based on the recommendations. Each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.

    DIGITAL TWIN SIMULATION OF EQUILIBRIUM STATE

    公开(公告)号:US20230062028A1

    公开(公告)日:2023-03-02

    申请号:US17412649

    申请日:2021-08-26

    Applicant: KYNDRYL, INC.

    Abstract: A processor may receive object data associated with a position and an orientation of a first object in an environment from IoT sensors. The processor may generate a digital twin simulation of the first object. In some embodiments, the digital twin simulation may include data associated with the relative positions and orientations of one or more other objects to the first object. The processor may calculate forces acting on the first object. The processor may identify whether the first object is in a state of instability.

    Optimizing device-to-device communication protocol selection in an edge computing environment

    公开(公告)号:US11553038B1

    公开(公告)日:2023-01-10

    申请号:US17508045

    申请日:2021-10-22

    Applicant: KYNDRYL, INC.

    Abstract: A method for optimizing device-to-device communication protocol selection in an edge computing environment is provided. The method includes: receiving a request for a service from a user device, wherein the computing system is one of plural edge computing devices in an edge computing environment; determining computational tasks performed in providing the service; selecting, using a machine learning model, a set of the edge computing devices to perform the computational tasks and communication protocols for the set of the edge computing devices to use while performing the computational tasks, wherein the machine learning model is configured to select the set of the edge computing devices and the communication protocols based on minimizing a time to perform the computational tasks; and sending instructions to perform the computational tasks, thereby causing the set of the edge computing devices to perform the service in response to the request from the user device.

    COMPUTER BACKUP GENERATOR USING BACKUP TRIGGERS

    公开(公告)号:US20220374315A1

    公开(公告)日:2022-11-24

    申请号:US17323265

    申请日:2021-05-18

    Applicant: KYNDRYL, INC.

    Abstract: Provided is a method for generating a data backup strategy for a computer system. The method comprises receiving an event related to a change in a computer system. The method further comprises applying regression techniques on historical data related to previous events for the computer system to determine a failure prediction score for the computer system. The method further comprises calculating a set of backup parameters for performing a backup of data of the computer system. The method further comprises generating a score for the backup using the set of backup parameters. The method further comprises determining a backup strategy for the computer system based on the score.

    SELF-SOVEREIGN DATA ACCESS VIA BOT-CHAIN

    公开(公告)号:US20220191026A1

    公开(公告)日:2022-06-16

    申请号:US17118069

    申请日:2020-12-10

    Applicant: KYNDRYL, INC.

    Abstract: An approach for securely accessing self-sovereign data via a bot-chain ledger may be provided. A bot may request access to a piece distributed data at a bot-chain client. A bot registry service may validate the requesting bot is registered with the bot-ledgering client. The bot-ledgering client may generate a token for the requesting bot and provide the identity of a data bot with permission to access the piece of distributed data. A data bot may request to read the piece of distributed data at the bot-ledgering client. The bot-ledgering client may verify the data bot is registered with the bot-chain. The bot-ledgering client may generate an access token and send it to the data bot.

Patent Agency Ranking