摘要:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
摘要:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
摘要:
A keyed delay is used in the processing of streaming data to decrease the processing performed and the output provided. A first event, within a particular window, having a particular key starts a delay condition. Arriving events with the same key replace the previous arrival for that key until the delay condition is satisfied. In response thereto, the latest event with that key is output.
摘要:
A keyed delay is used in the processing of streaming data to decrease the processing performed and the output provided. A first event, within a particular window, having a particular key starts a delay condition. Arriving events with the same key replace the previous arrival for that key until the delay condition is satisfied. In response thereto, the latest event with that key is output.
摘要:
A keyed join is used in the processing of streaming data to streamline processing to provide higher throughput and decreased use of resources. The most recent event for each unique replacement key value(s) is maintained substituting older events with the same key. An incoming event is joined with the data received from one or more other data sources, and the correlations are output.
摘要:
Techniques are provided for ranking-based information processing. Method steps can include integrating information from at least one source (a plurality of heterogeneous sources can also be handled), to obtain integrated information; mapping the integrated information to at least one application; ranking the integrated information based on the mapping and on ranking criteria from a knowledge base; and processing the integrated information, based on the ranking, to obtain processed integrated information. Optionally, the processing step includes formatting the processed integrated information for a plurality of applications.
摘要:
A method comprising, defining a supplier scoring tree by, receiving a function of a supplier performance, defining a first node to include the function of the supplier performance, receiving a first value associated with a metric of the supplier performance, defining a second node to receive the first value associated with a metric of the supplier performance, and connecting the first node to the second node with a link, outputting the defined supplier scoring tree to a display, and displaying the defined supplier scoring tree to a user for analysis of supplier performance by the user.
摘要:
The invention provides a system adapted to enable contextual collaboration within a computer network. The invention provides a collaboration manager that supports manipulation of collaboration spaces. The collaboration spaces contain one or more collaboration elements that have potentially different collaboration modalities. The context manager maintains resources and resource interrelationships within contexts. The resources can include collaboration elements, processes, tasks, business objects, users, and/or roles. A view generator selects a set of the resources to be displayed to a user of the computer network. The invention also includes an interface adapted to allow applications to specify commands to manipulate collaboration spaces, commands to maintain resources and resource interrelationships within contexts, and queries for context-sensitive views.
摘要:
Techniques are provided for ranking-based information processing. Method steps can include integrating information from at least one source (a plurality of heterogeneous sources can also be handled), to obtain integrated information; mapping the integrated information to at least one application; ranking the integrated information based on the mapping and on ranking criteria from a knowledge base; and processing the integrated information, based on the ranking, to obtain processed integrated information. Optionally, the processing step includes formatting the processed integrated information for a plurality of applications.
摘要:
A system for automatically generating a style sheet includes a parser for generating a document type graph in accordance with an input structure, a graphical user interface tool for interactively mapping the document type graph to form a display template in accordance with user requirements and a script generator for generating and storing the style sheet in accordance with the graphical user interface and the design template.