Embodiments input a plurality of data and a weightage reallocation to a dynamic ranking priority system, calculate a plurality of sentiment scores and a plurality of penalty scores based on the plurality of data, eliminate a sentiment score of the plurality of sentiment scores in response to a corresponding penalty score of the plurality of penalty scores being greater than a predetermined threshold, dynamically re-rank a plurality of tickets with a same priority using a machine learning (ML) model based on a type of the plurality of data which is most similar to historical data, dynamically change a pre-allocated weightage using a learn on the job (LOTJ) model based on a ticket resolution to perform based on the plurality of data, and adjust the weight reallocation based on the dynamically changed pre-allocated weightage.
In an aspect of the disclosure, a method includes: obtaining, by a computing device, a user request to access at least one system resource; obtaining, by the computing device, a digital certificate of the user requesting access to the at least one system resource; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to an authorization service; and sending the authorization to the authorization service to deny or permit the user access to the at least one system resource based on the validation result.
In an aspect of the disclosure, there is a computer-implemented method including: obtaining, by a computing device, a request from an endpoint device to access at least one system resource; obtaining, by the computing device, a digital certificate from a shared digital wallet; obtaining, by the computing device, a validation result associated with the digital certificate from a blockchain ledger network; determining, by the computing device, whether the validation result authorizes access to the at least one system resource by the endpoint device; and sending authorization to the endpoint to deny or permit the endpoint device access to the at least one system resource based on the validation result.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A computer-implemented method, including: receiving, by a computing device, an information technology (IT) operations request; collecting, by the computing device, information associated with the IT operation request from a knowledge bank; determining, by the computing device, a resolution resource for completing the IT operation request; and assigning, by the computing device, the resolution resource based on the information from the knowledge bank and IT operation request.
Embodiments relate to enhancing a virtual storage mechanism to optimize fetch performance of named objects in enterprise systems. A technique includes receiving from a requester a request to retrieve an object and determining that the object is available for retrieval in a virtual data space, where a machine learning model is configured to cause the object to be placed in the virtual data space, the machine learning model being trained on fetch data for objects. The technique includes retrieving the object from the virtual data space instead of a storage system and providing the object to the requester for execution.
G06F 12/123 - Replacement control using replacement algorithms with age lists, e.g. queue, most recently used [MRU] list or least recently used [LRU] list
This disclosure presents an approach for identifying obfuscation patterns within system log files to enhance cybersecurity. The method involves two key stages: first, detecting tampering in a primary set of log entries; and second, monitoring a secondary set of log files for the presence of these tampering patterns. By comparing the identified obfuscation patterns in the primary log entries with those detected in the secondary set, the system can effectively identify potential system intrusions. This innovative approach provides an advanced and proactive means of bolstering system security by uncovering and responding to malicious activities that attempt to obscure their tracks within log files, ultimately enhancing the defense against cyber threats.
An approach is provided that displays avatars locating in a first virtual area to a first set of users with each user controlling one of the avatars. A request is received from one of the users to escape a situation. In response to the request, the system clones the user's first avatar thus creating a second avatar. The second avatar is visible to the user; however it is invisible to one or more of the set of users. The user controls the second avatar and the first avatar is automatically controlled using artificial intelligence (AI), with the user no longer controlling the first avatar.
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
A computer-implemented method including: obtaining, by a computing device, a plurality of risk events; mapping, by the computing device, treatment actions to each of the plurality of the risk events; determining, by the computing device, an impact of the treatment actions on each of the plurality of the risk events; determining, by the computing device, a probability of implementation of the treatment actions; calculating, by the computing device, how the treatment actions affect other risk factors based on the determining steps; and providing, by the computing device, a recommendation of optimal risk mitigation based on how the first treatment actions affect the other risk events.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
9.
MACHINE LEARNING MODEL FOR GENERATING CODE SNIPPETS AND TEMPLATES
Embodiments relate to a machine learning model for generating code snippets and templates. A team feature set for a team is provided to a machine learning model, the team including at least two members. The machine learning model determines a recommendation for the team, the recommendation being related to computer execution to perform a task. In response to determining the recommendation for the team, the recommendation is rendered to the team.
An approach is disclosed that determines that a change is needed to a remote system that is managed by a change management system that manages changes to many remote systems. A change management time window when the change is scheduled to be performed at the selected remote system is identified and a monitoring request is sent to the remote system. The monitoring request causes the remote system to run a monitoring process. The change management system receives an activity notification that was identified by the monitoring process. In response to the activity notification matching the change needed, the change scheduled at the selected remote system is canceled by the change management system.
Embodiments relate to preventing deep fake voicemail scams. In response to receiving a voice message, an intent of the voice message is determined. The intent is determined to relate to a persuasion technique. A warning is provided about the voice message.
A computer-implemented method includes presenting one or more categories of movement patterns. The computer-implemented method includes recording a movement pattern of a user, where the movement pattern is associated with the one or more categories of movement patterns. The computer-implemented method includes authenticating the recorded movement pattern is correct. The computer-implemented method includes associating the authenticated recorded movement pattern with at least one of a device, application, and web-based service.
An approach is disclosed that creates a network graph that identifies computing resources as nodes. Each of the computing resources is weighted based upon the corresponding resource's attributes and usage. The approach connects a first set of nodes as directly connected and a second set of nodes as indirectly connected. Node longevity values are calculated for each node in the network graph with each of the node longevity values corresponding to one of the nodes in the network graph. The calculations are based on the direct and indirect connections between each of the nodes. The computing resources are managed based on the corresponding node longevity values.
Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.
Embodiments relate to early detection of information technology (IT) failures in a computing system. A technique is executed by one or more processors and includes receiving multiple IT records including past and recent historical data, extracting first and second time series sections from the past and recent historical data, respectively, training a failure detection model to correlate metric patterns in the first time series sections with at least one of other metric patterns and previous IT failures and, in response to the training, using the failure detection model to predict at least one of upcoming metric patterns and upcoming IT failures from metric patterns in the second time series sections.
One or more embodiments relate to protecting data stored by a non-volatile memory of a memory device installed in a computing device. A technique includes in response to a power-up of the memory device, incrementing a memory power cycle count, and receiving a host power cycle count indicating a number of power-ups of the computing device. The technique includes, if the memory power cycle count is not equal to the host power cycle count, applying a security reaction to the memory, the security reaction being adapted for preventing a readout of the data.
G06F 21/75 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation, e.g. to counteract reverse engineering
G06F 21/55 - Detecting local intrusion or implementing counter-measures
17.
PROTECTING A NON-VOLATILE SOLID-STATE MEMORY FROM AN UNAUTHORIZED ACCESS
An approach is provided for protecting data stored by a non-volatile solid-state memory from an unauthorized access. In response to a trigger event indicating an increased probability of the unauthorized access, the memory is destroyed by directing through the memory an electric current exceeding a rated current of the memory, and testing an operability of the memory, where the destruction is completed when the test indicates lacking operability of the memory.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
18.
ABSTRACTIVE SUMMARIZATION OF INFORMATION TECHNOLOGY ISSUES USING A METHOD OF GENERATING COMPARATIVES
Embodiments relate to providing automated text summarization techniques for capturing and conveying information technology (IT) records with numerical data. A technique is executed by one or more processors and includes receiving an IT record comprising text and numerical data, normalizing the numerical data into normalized numerical data, transforming the normalized numerical data into comparative and superlative adjectival terms and rewriting the text to include the comparative and superlative adjectival terms for output as a rewritten IT record.
A computer-implemented method, including: receiving, by a computing device, a data pipeline job request; generating, by the computing device, a complexity score for the data pipeline job request; determining, by the computing device, a predicted execution time for the data pipeline job request; generating, by the computing device, a priority score for the data pipeline job request based on the predicted execution time and the generated complexity score; and comparing, by the computing device, the priority score for the data pipeline job request to another priority score to determine a schedule for the data pipeline job request.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer programming; software as a service (SaaS) services
featuring software for data management; software as a
service (SaaS) services featuring software for cloud
computing; software as a service (SaaS) services featuring
software for artificial intelligence; software as a service
(SaaS) services featuring software for cognitive computing;
Software as a Service (SaaS) services featuring software for
blockchain technology; software as a service (SaaS) services
featuring software for quantum computing and quantum
programming; software as a service (SaaS) services featuring
software for constructing, analyzing and running quantum
programs and quantum algorithms; software as a service
(SaaS) services featuring software for developing and
testing quantum algorithms; computer programming and
computer consulting services for artificial intelligence;
computer programming and computer consulting services for
cognitive computing; computer programming and computer
consulting services for information management; computer
programming and computer consulting services for data
management; computer programming and computer consulting
services for cloud computing; computer programming and
computer advisory services for blockchain technology;
computer programming and computer consulting services for
quantum computing; computer programming and computer
consulting services for software as a service (SaaS);
design, installation, updating and maintenance of software;
computer software and hardware design for third parties and
consultation services in the field of computers; computer
services, namely, design, creation and maintenance of
websites for third parties; computer systems analysis,
database and network integration, computer programming for
third parties, all for use in commercial interactions over
global computer networks; technical support services,
namely, troubleshooting of computer program and software
problems; design of systems for interconnection of computers
and software, namely, electronic connection of computers and
software to each other; computer software and hardware
testing services (quality and technical controls); technical
project studies in the field of computer hardware and
software; consultancy services in the field of computer
hardware, namely consultancy regarding computing research
and development; computer advice and assistance concerning
Internet use; rental of computers and software; scientific
and industrial research, namely research and development of
new products, biological research, bacteriological research,
chemical research, cosmetic research, mechanical research,
geological research, technical research, pharmaceutical
research, scientific research for medical purposes;
information technology services; computer system integration
services; consulting services in the field of design,
selection, implementation and use of computer hardware and
software systems for third parties; technical support
services, namely, diagnosing computer hardware and computer
software problems; computer system design services for third
parties; design of systems for interconnection of computers
and computer programs, namely, integration of computer
systems and computer networks; computer program and computer
hardware testing services, namely testing of software,
computers and servers to ensure proper functioning thereof;
cloud computing services, namely, network-integrated
computer hardware and software services for dynamic
provisioning, virtualization and consumption metering of
computer resources; providing virtual computer systems and
virtual computer environments through cloud computing;
design and development of software for cloud storage of
data; cloud computing hosting provider services; electronic
data storage and data recovery services; data security
service.
21.
SYSTEM TO FACILITATE WIRELESS CHARGING OF ELECTRONIC DEVICE(S)
Control system for facilitating wireless charging of an electronic device is provided, which identifies presence of multiple electronic devices within an environment, with the multiple electronic devices including a self-propelled power relay device with wireless charging capability. Control system processing determines that an electronic device of the multiple electronic devices requires wireless charging, and based on the determining, deploys the self-propelled power relay device to move to an area of the environment within a charging range of the electronic device to facilitate wireless charging of the electronic device via the self-propelled power relay device.
H02J 50/50 - Circuit arrangements or systems for wireless supply or distribution of electric power using additional energy repeaters between transmitting devices and receiving devices
H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment
41 - Education, entertainment, sporting and cultural services
Goods & Services
Business consulting services for companies in the field of
selection, implementation, administration and use of
computer hardware and software systems; business consulting
services for companies in the field of selection,
implementation, administration and use of computer hardware
and software systems in the fields of enterprise software,
technology and infrastructure, cybersecurity, resiliency,
data analytics, digital transformation, and artificial
intelligence; co-creation services in the nature of business
assistance services, namely, assisting customers in the
selection, implementation, administration and use of
computer hardware and software systems; co-creation services
in the nature of business assistance services, namely,
assisting customers in the selection, implementation,
administration and use of computer hardware and software
systems in the fields of enterprise software, technology and
infrastructure, cybersecurity, resiliency, data analytics,
digital transformation, and artificial intelligence;
arranging and conducting trade show exhibitions in the field
of computers, information technology and electronic business
transactions; arranging and conducting trade show
exhibitions in the field of computers, information
technology and electronic business transactions via a global
computer network; arranging and conducting trade show
exhibitions in the fields of enterprise software, technology
and infrastructure, cybersecurity, resiliency, data
analytics, digital transformation, and artificial
intelligence; analysis of market statistic and data studies;
analyzing and compiling business data; arranging and
conducting of customer co-creation sessions (business
consultancy) in the field of computer products and services;
arranging and conducting of online customer co-creation
sessions (business consultancy) in a virtual environment;
arranging and conducting of online customer co-creation
sessions (business consultancy) in the field of information
technology (IT) and computer products and services in a
virtual environment; none of these services providing a
health insurance system compulsory or supplementary, or
providing products or services for accessing health care, or
providing products or services for the identification of
persons accessing a health care system or a health care
insurance system. Educational services, namely, conferences, exhibitions,
symposiums, presentations, technical demonstrations and
training seminars, all in the field of information
technology and computer products and services; Arranging and
conducting of conferences; arranging and conducting of
exhibitions; arranging and conducting of workshops;
arranging and conducting of seminars; arranging and
conducting of conferences and seminars in the field of
information technology and computer products and services;
arranging and conducting of software user training;
arranging and conducting of computer hardware user training;
arranging and conducting of information technology courses;
training in computer operations and information technology;
arranging and conducting of customer co-creation sessions in
the field of information technology (IT) training; arranging
and conducting of customer co-creation sessions [training]
in the field of computer products and services; educational
services, namely, conferences, exhibitions, symposiums,
presentations, technical demonstrations and training
seminars taking place online in a virtual environment, all
in the field of information technology and computer products
and services; arranging and conducting of online conferences
in a virtual environment; arranging and conducting of online
exhibitions in a virtual environment; arranging and
conducting of online workshops in a virtual environment;
arranging and conducting of online seminars in a virtual
environment; arranging and conducting of online conferences
and seminars in the field of information technology and
computer products and services in a virtual environment;
arranging and conducting of online software user training in
a virtual environment; arranging and conducting of online
computer hardware user training in a virtual environment;
arranging and conducting of online information technology
courses in a virtual environment; online training in
computer operations and information technology in a virtual
environment; arranging and conducting of online customer
co-creation sessions [training] in a virtual environment;
arranging and conducting of online customer co-creation
sessions [training] in the field of information technology
[IT] and computer products and services in a virtual
environment; none of these services providing a health
insurance system compulsory or supplementary, or providing
products or services for accessing health care or providing
products or services for the identification of persons
accessing a health care system or a health care insurance
system.
Embodiments relate to removing interactions from a virtual environment thereby executing the right to be forgotten in the virtual environment. In response to receiving a request to remove interactions from a virtual environment, a search is performed in the virtual environment for cryptographic keys embedded with a user identification corresponding to the request. The cryptographic keys embedded with the user identification are deleted in the virtual environment, where the interactions have been signed with the cryptographic keys embedded with the user identification in the virtual environment. In response to deleting the cryptographic keys embedded with the user identification in the virtual environment, there is a modification to a presentation of the interactions in the virtual environment.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
24.
PREVENTING ACCESS OF REMOVED USERS TO MESSAGES SHARED IN A GROUP CHAT
Embodiments relate to preventing access of removed users to messages shared in a group chat with an end-to-end encryption. An aspect includes, responsive to creation of a group having members for communicating using encryption keys, receiving a request to remove a given member of the members from the group, the given member being associated with a computer system, at least one message of the group being accessible to the given member. An aspect includes identifying the encryption keys associated with the given member and causing a deletion on the computer system of the encryption keys associated with the given member in response to the request. An aspect includes confirming the deletion of the encryption keys on the computer system associated with the given member. The deletion of the encryption keys on the computer system prevents access of the computer system to at least one message of the group.
An approach is disclosed that receives a user activity from a user that is using a datastore visualization display. The display displays a first visualization pertaining to one or more datastores with the datastore visualization display provided at least in part by a context driven lateral artificial intelligence (CDLAI) engine. The received user activity is provided as input to the CDLAI to generate a second visualization that is displayed to the user at the datastore visualization display that is displayed to the user. Artificial intelligence (AI) models that are used by the CDLAI are then trained based on the received user activity. The training results in updates to the visualizations.
Embodiments relate to automatically preventing scams in real time in an interactive communication environment. A machine learning model determines that at least one communication from a first user to a second user in an interactive communication environment includes a potential threat, the interactive communication environment providing real time communications between the first user of a first computer system to the second user of a second computer system. The potential threat of the at least one communication is determined to above a threshold. An overlay is displayed to the second user on the second computer system in which the overlay displays metadata about the first user and informs the second user to avoid providing any sensitive information in the interactive communication environment.
Embodiments relate to preventing fraud on smart devices. In response to receiving a communication, a correlation of the communication to a security threat is determined, and device data of a device is obtained. A determination is made that a combination of the correlation and the device data meets a predefined threshold for the security threat. An alert is audibly output on the device, the audio alert being a warning of the security threat presented by the communication.
A system includes a container cluster including plural hosts that communicate with one another via a network. Each of the plural hosts includes a computing node that includes an operating system and a container runtime configured to run containers. Each of the plural hosts stores a respective member list that defines capabilities of the plural hosts in the container cluster. Each of the plural hosts is configured to identify another one of the plural hosts for running a container based on comparing tags of the container to the capabilities of the plural hosts defined in the respective member list. Each respective one of the plural hosts is configured to perform the identifying the another one of the plural hosts for running the container in response to determining the respective one of the plural hosts is resource-constrained from running the container.
Some embodiments of the present disclosure are directed to systems, computer-readable media, and computer-implemented methods for multi-node failure processing in computer networks. In particular, some embodiments are directed to generating and displaying an impact area graph for a respective node from a plurality of nodes in a network, wherein the impact area graph depicts the relative predicted impact to each other node in the network from a failure of the respective node. Other embodiments may be disclosed or claimed.
H04L 43/026 - Capturing of monitoring data using flow identification
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
09 - Scientific and electric apparatus and instruments
21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
25 - Clothing; footwear; headgear
35 - Advertising and business services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computers; quantum computers; computer hardware and
software; computer hardware and software for information
technology analysis and for data management; computer
hardware and software for applications development; computer
hardware and software for cloud computing; computer hardware
and software for cognitive computing; computer hardware and
software for artificial intelligence; computer hardware and
software for blockchain technology; computer hardware and
software for cognitive computing and quantum programming;
computer hardware, namely, magnetic tape units (data
processing equipment), magnetic tapes, printed circuits,
integrated circuits, computer keyboards, compact disks
(audio-video), optical disks, computing couplers, floppy
discs, magnetic data media; computer hardware, namely, video
screens, scanners, printers, computer interfaces (data
processing equipment), readers (data processing equipment),
software (recorded programs), microprocessors, modems,
computers, computer memories, computer peripheral devices;
adapters for computers; components for computers; data
processing apparatus for the management of data and
information; semiconductors; machine-readable electronic
data media; magnetic disks; floppy disk drives; tape
recorders; calculating machines; facsimile machines; video
recorders; video cassettes; computer chips; printed circuit
boards; computer hardware, namely, computer communications
servers; bags adapted for holding laptops; computer
interface boards; cables for computers and components for
cables for computers; computer fax modem cards; computer
accessories, namely, computer screen filters, mouse pads,
radio pagers, computer game joysticks; electric converters,
namely, digital-to-analog converters, analog-to-digital
converters and step voltage switches; computer mice;
integrated circuit cards [smart cards]; adapters for
integrated circuit cards [smart cards]; readers for
integrated circuit cards [smart cards]; microcomputers;
uninterruptible electrical power sources; projectors; remote
controls for computers; surge protectors and uninterruptible
electrical power supplies; point-of-sale computer terminals;
computer servers; data storage devices, namely, high-speed
storage subsystems for the storage and backup of electronic
data either locally or via a telecommunications network;
recorded and downloadable computer programs and software;
video game software; computer operating system software and
programs; computer software used to access a global computer
network; computer software used in database management;
computer software used in locating, retrieving and receiving
text, electronic documents, graphics and audiovisual
information on internal company computer networks and on
local and wide-area computer networks; software used for
developing software and creating websites and user manuals
in electronic format sold with those goods; computer
software for use in controlling the operation and running of
computer systems, programs and networks; computer software
for use in connecting disparate computer networks and
systems, computer servers and storage devices; computer
software for linking together computers and for enabling
their linkage to a globally accessible network; computer
software for managing computer hardware, software and
processes that exist within an information technology
environment; computer systems combining hardware and
software for use in managing and analyzing data and digital
instruction manuals sold with those goods; cloud computing
system, namely network integrating computer hardware and
software for dynamic provisioning, virtualization and
consumption metering of computer resources; software
recorded or downloadable from cloud computing, for deploying
and managing virtual machines to a cloud computing platform;
computer systems, namely, computer hardware and computer
software for developing and integrating artificial
intelligence, namely, machine learning, deep learning, and
natural language processing, which are capable of
collecting, organizing and analyzing data; computer systems,
namely, computer hardware and computer software for
integrating automatic natural language processing,
computational linguistics, information retrieval, and
machine learning, which are capable of understanding general
human queries and formulating responses; computer systems
for developing, building and operating blockchain
applications; computer hardware and computer software for
developing and testing quantum algorithms; documentation and
instruction manuals recorded on machine-readable electronic
media and concerning computers or computer programs;
downloadable electronic publications; electronic
publications recorded on computer media, namely, user
manuals, guide books, brochures, information sheets, written
presentations and educational material, in the fields of
computing, computer networks, computer storage, computer
operating systems, information technologies, database
management, cloud computing, artificial intelligence,
blockchain technology and quantum computing. Glasses [receptacles]; cups; beer mugs; plastic water
bottles sold empty; insulated containers and bottles for
food and beverages; glasses, namely goblets; back
scratchers; shoe horns; non-electric portable coolers;
serving bowls of crystal; vases; coasters (tableware) and
coasters of leather; coasters, other than of paper or
textile materials. Clothing; clothing, namely, tops for babies, children,
adults, women, and men; clothing, namely tee-shirts, shirts,
button-down shirts, sweatshirts, pullovers, jackets, aprons,
vests, bottoms [clothing]; headwear articles [headwear,
clothing]; headwear, namely hats, baseball caps and hats,
caps. stocking caps; shoes. Advertising; sales promotion for others; advisory services
for commercial management and management; business
information; distribution of prospectuses; distribution of
samples; arranging newspaper subscriptions for third
parties; accounting; document reproduction; centralized data
processing management; organization of exhibitions for
commercial or advertising purposes; advisory and commercial
business management services and business advisory services;
business development services; analysis of market study
statistics and data; data processing services; data
processing services in the field of artificial intelligence;
data processing services in the field of cognitive
computing; data processing services in the field of cloud
computing; data processing services in the field of
blockchain technology; data processing services in the field
of information management; data processing services in the
field of quantum computing and quantum programming;
organizing and conducting trade shows in the field of
computers, computer services, information technology,
artificial intelligence, cloud computing, blockchain
technology, quantum computing, database management,
telecommunications and electronic commercial transactions
via a global computer network; business advisory services in
the field of artificial intelligence; business advisory
services in the field of computer systems which integrate
natural language processing, computational linguistics,
information retrieval, machine learning, which are capable
of understanding general human queries and formulating
responses; business advisory services for cloud computing;
business advisory services for blockchain technology;
business advisory services in the field of quantum
computing, quantum programming and for developing and
testing quantum algorithms; business advisory services for
information technology; compiling and analyzing business
data; systematization of information in computer databases. Construction services; computer hardware repair and
installation services; computer hardware maintenance;
installation and maintenance of computer hardware for
computer networks; technical support services, namely,
troubleshooting of computer hardware problems. Telecommunication services; services for the delivery of
messages by electronic means; communications by computer
terminals; transmission of emails; news and information
agencies; telecommunications and electronic messaging
services via a global data teleprocessing network;
computer-aided transmission of information;
telecommunication services for commercial interaction in the
field of global computer networks; providing multiple access
to goods and services via a global network and wireless
communication apparatus; electronic transmission of data and
documents via computer terminals; teleconferencing and Web
conferencing services; providing multiple-user access to
global computer information networks for transferring and
disseminating a wide range of information; providing online
forums for transmitting messages among computer users;
providing private and secure electronic communications in
real time, via a computer network. Education; entertainment; training; organizing and
conducting conferences, seminars and congresses; exhibition
services for cultural or educational purposes; production of
radio and television programs; sporting and cultural
activities; education services, namely, conducting classes,
seminars, conferences, online seminars (webinars) and
workshops in the fields of computers, computer services,
information technology, artificial intelligence, cloud
computing, blockchain technology, quantum computing,
database management, image and sound processing technology,
telecommunications and global computer networks; training in
the fields of computing, computer services, information
technology, artificial intelligence, cloud computing,
blockchain technology, quantum computing, database
management, image and sound processing technology,
telecommunications and global computer networks; conducting
entertainment exhibitions in the nature of information
technology demonstrations; entertainment services, namely,
making available online computer games; conducting
entertainment exhibitions, namely, real-time sporting
competitions via a global computer network; conducting
entertainment exhibitions, namely, providing demonstrations
on Internet sites concerning museum exhibitions, sporting
events, art gallery exhibitions, concerts and musical
recordings; editing of books and journals; show and film
production; facilitation of exhibitions for cultural or
educational purposes; booking of seats for shows. Computer programming; software as a service (SaaS) services
featuring software for data management; software as a
service (SaaS) services featuring software for cloud
computing; software as a service (SaaS) services featuring
software for artificial intelligence; software as a service
(SaaS) services featuring software for cognitive computing;
software as a service (SaaS) services featuring software for
blockchain technology; software as a service (SaaS) services
featuring software for quantum computing and quantum
programming; software as a service (SaaS) services featuring
software for constructing, analyzing and running quantum
programs and quantum algorithms; software as a service
(SaaS) services featuring software for developing and
testing quantum algorithms; computer programming services
and computer consultation services on artificial
intelligence; computer programming services and consultation
services on cognitive computing; computer programming
services and computer consultation services on information
management; computer programming services and computer
consultation services on data management; computer
programming services and advisory services on cloud
computing; computer programming services and advisory
services on blockchain technology; computer programming
services and computer consulttion services on quantum
computing; computer programming services and computer
advisory services on software as a service (SaaS); design,
installation, updating and maintenance of computer software;
designing software and hardware for third parties and
advisory services with respect to computers; computer
services, namely, creating and maintaining websites for
third parties; computer systems analysis, integration of
databases and networks, computer programming for third
parties, all for use in commercial interactions via global
computer networks; technical support services, namely,
troubleshooting in the field of computer programs and
software problems; designing computer hardware and software
interconnection systems, namely, electronic connection of
computers and software; computer hardware and software
testing services (quality and technical control); technical
project studies in the field of computer hardware and
software; consultation services in the field of computer
hardware, namely, consultation with respect to computer
research and development; advisory and support services
connected with the use of the Internet; rental of computers
and software; scientific and industrial research, namely,
research and development of new products, biological
research, bacteriological research, chemical research,
research in esthetics, mechanical research, geological
research, technical research, pharmaceutical research,
scientific research for medical use; information technology
consulting services; computer system integration services;
consultation services in the fields of design, selection,
implementation and use of computer hardware and software
systems for third parties; technical support services,
namely, troubleshooting in the nature of diagnosis of
computer hardware and software problems; computer system
design services for third parties; interconnecting computer
hardware and software, namely, integrating computer systems
and networks; services for testing software and hardware,
namely, testing software, computers and servers to ensure
the proper functioning thereof; cloud computing services,
namely, computer hardware and embedded software services for
dynamic provisioning, virtualization, and consumption
metering of computer resources; providing virtual computer
systems and virtual computer environments through cloud
computing; design and development of software for cloud
storage of data; cloud computing hosting provider services;
electronic data storage and retrieval services; data
security service; computer support provided by programmers;
design of computer hardware for computer networks.
Systems and methods provide dynamic adjustment of content displayed on image-enabled clothing articles to address obstructed visibility of the content. In embodiments a method includes determining, by a computing device, movement of at least a portion of an image-enabled clothing article based on real-time sensor data from sensors of the image-enabled clothing article; determining, by the computing device, that a view of at least a portion of image content displayed on the image-enabled clothing article is obstructed based on the determined movement, parameters of the image-enabled clothing article and image display information of the image-enabled clothing article; and generating, by the computing device, image instructions that cause the display of the image content on the image-enabled clothing article to move from a first area of the image-enabled clothing article to a second area of the image-enabled clothing article.
G09G 3/32 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels semiconductive, e.g. using light-emitting diodes [LED]
Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining target application container configuration data to identify one or more target container base image referenced in the target application container configuration: subjecting script data associated to the one or more target container base image to text based processing for evaluation of security risk associated to the one or more container base image, the script data obtained from at least one candidate hosting computing environment; and selecting a hosting computing environment from the at least one computing environment for hosting the target application container, the selecting in dependence on the text based processing.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
33.
ADVANCED DETERRENCE FOR BOTS IN AN INTERACTIVE COMMUNICATION ENVIRONMENT
Embodiments relate to providing an advanced deterrence system for bots in an interactive communication environment. In response to identifying that an automated program for a user terminal is accessing an interactive communication environment hosted by a host computer system, a selection of an assignment for the automated program is triggered, where the automated program is designed to replicate a human behavior in the interactive communication environment. In response to triggering the selection, a task is selected as the assignment for the automated program designed to replicate the human behavior, the task being selected from a plurality of tasks that are queued to be executed by the host computer system. The task is caused to be executed by the automated program on the user terminal, the task causing a consumption of user computer resources on the user terminal.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
Embodiments relate to providing self-learning automated information technology change risk prediction. A processor inputs a change request to a first machine learning model, the first machine learning model determining at least one word pair in the change request, the change request being a modification in an IT environment. The processor classifies the at least one word pair into a change category for the IT environment using a second machine learning model, the change category identifying a type of the modification to be executed in the IT environment. The processor determines a likelihood of causing a problem in the IT environment as a result of executing the modification. The processor automatically performs an action to prevent the modification of the change request in the IT environment.
A method for protecting individual data elements within an unstructured dataset includes identifying a data element within the unstructured dataset requiring access control, encrypting the data element within the unstructured dataset, storing a decryption key and access control information corresponding to the dataset at an access controller, and cryptographically binding the encrypted data element to metadata that identifies the access controller. The method may additionally include detecting an access attempt to the dataset, and determining whether the access attempt is acceptable according to the access control information. If the access attempt is acceptable, the method may further include allowing the access attempt. If the access attempt is not acceptable, the method may further include denying the access attempt.
Embodiments relate to dynamic creating a temporary isolated environment in an interactive communication environment for potential bots. In response to identifying that an avatar accessing the interactive communication environment is being controlled by a non-human entity, the avatar is dynamically placed in an isolated virtual environment. Permission of the avatar are disabled in the isolated virtual environment. An authentication inquiry is presented to the avatar identified as being controlled by the non-human entity. A location is transferred for the avatar identified as being controlled by the non-human entity, based on a user response to the authentication inquiry.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
42 - Scientific, technological and industrial services, research and design
Goods & Services
Provision of sales areas for buyers and sellers of products
and services in the field of information technology services
(commercial intermediation services); provision of online
sales areas for buyers and sellers of products and services
in the field of information technology (commercial
intermediation services). Information technology support services, namely, remote and
on-site infrastructure management services for the
monitoring, optimization, administration and management of
computer systems; computer system integration services;
integration of computer systems and networks; platforms as a
service (PaaS) comprising a software platform for
orchestrating the design, selection, implementation,
delivery, management and use of products and services in the
field of information technology; infrastructure as a service
(IaaS) featuring a software platform for orchestrating the
design, selection, implementation, delivery, management and
use of products and services in the field of information
technology; providing non-downloadable software of a
software platform for orchestrating the design, selection,
implementation, delivery, management and use of products and
services in the field of information technology.
Disclosed embodiments provide computer-implemented techniques for aggregating of data involving multiple domains in the format of a news bulletin or “newsletter” format. For various situations, this format can provide a quicker and more comprehensive understanding than is achievable with a visual dashboard. In disclosed embodiments, multiple domains are specified, where each domain can include a subject or category. One category is selected as a major domain. Other categories, referred to as satellite domains are also specified. A user provides scores that indicate the semantic importance of each satellite domain. A mathematical distance between each satellite domain and the major domain is computed based on the scores. Based on the mathematical distances, percentages of articles pertaining to each domain are computed, and used in assembling customized data that is output in a news bulletin format.
A method includes: detecting, by a computing device, connection of a universal serial bus device to a computer; determining, by the computing device, that the computer is in a locked mode; detecting, by the computer device, input to the computer within a predetermined time of detecting the connection; determining, by the computing device as a result of the computer being locked and detecting the input, that the input is a threat to the computer; creating, by the computing device, a temporary virtual environment; receiving, by the computing device, the input into the temporary virtual environment; processing, by the computing device, the input in the temporary virtual environment; and recording, by the computing device, information related to the input.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
41.
SOCIAL MEDIA REPRESENTATION AND COLLABORATION PLATFORM FOR ENTERPRISE IT
A system and associated methods that enable social media representation and collaboration platform of enterprise information technology (IT) components that enables human-to-human, human-to-machine and machine-to-machine communications to help easily understand the set of enterprise IT components, its configuration(s), its intra/inter relationship(s), better navigation and visibility across various related components, and augmenting system troubleshooting.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
G06F 16/9536 - Search customisation based on social or collaborative filtering
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
G06Q 10/20 - Administration of product repair or maintenance
G06V 10/40 - Extraction of image or video features
A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.
A computer-implemented method, according to one embodiment, includes mapping hosts in communication with a storage system to compartment constructs that are logical partitions of the storage system, analyzing interoperability of the hosts and the compartment constructs and defining, based on the analysis, risk profiles for applications run on the hosts. Ownership of storage objects to the compartment constructs is assigned based on the risk profiles, where each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.
A computer-implemented method, in accordance with one embodiment, includes collecting attributes of a subject. Cause-effect-decision relationships of the attributes of the subject are determined. Custom attributes are derived based on the cause-effect-decision relationships of the attributes of the subject. Custom attribute relationships and labels for the derived custom attributes of the subject are identified based on the cause-effect-decision relationships of the attributes of the subject, the custom attribute relationships including at least one belongs-to relationship and at least one decision relationship. A hierarchy of the custom attributes is generated using a finite state automaton. A hierarchical multi-label classifier is created (e.g., trained) based on the generated hierarchy. The classifier is used to generate class label decisions associated with labels of the classifier to objects of the subject. The decisions are output.
A computer-implemented method, according to one embodiment, includes gathering sharing policies associated with a first user sharing a live resource in a metaverse, and determining characteristics of a second user in the metaverse. The method further includes determining, based on the sharing policies and the characteristics of the second user, whether the second user is authorized to view the live resource shared by the first user. In response to a determination that the second user is not authorized to view the live resource, a first predetermined obfuscation condition is caused to be applied to the second user's view of the live resource for protecting the first user's privacy. Furthermore, in response to a determination that the second user is authorized to view the live resource, the second user is allowed to view the live resource.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes inputting, by a processor, records to a machine learning model, the records being associated with an information technology (IT) domain. The technique includes classifying, by the processor, the records with labels using the machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of the IT domain.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.
A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
50.
DETERMINATION AND APPLICATION OF CONFIDENCE SCORES TO MITIGATE FRAUDULENT ACCOUNTS
A computer-implemented method, according to one embodiment, includes receiving, from a user device, a request for determining a final confidence score for an account, and determining a plurality of confidence parameter scores using information associated with the account. A first of the confidence parameter scores is determined based on an analysis of a structure of the account, a second of the confidence parameter scores is determined based on a character analysis of at least the account, and a third of the confidence parameter scores is determined based on an exposure of the account. The method further includes using the determined confidence parameter scores to determine the final confidence score for the account. The determined final confidence score is applied to mitigate fraud.
Aspects of the present disclosure include: detecting, by a computing device, an avatar is chatting within a virtual environment; detecting, by the computing device, the avatar is idle for a predetermined amount of time; providing, by the computer device, a challenge to the idled avatar, determining, by the computer device, that the challenge has not been executed; and executing, by the computer device, a security action associated with the idled avatar.
Embodiments relate to providing explainable classifications with abstention using client agnostic machine learning models. A technique includes classifying, by a processor, a record with a label using a machine learning model, the machine learning model abstaining from classifying a given record in response to the given record being outside of a scope of an information technology (IT) domain. The processor generates an explanation of a decision by the machine learning model to classify the record with the label and displays the explanation in a human readable form.
A method of mitigating risks in a service level agreement (SLA), including: identifying relationships between an infrastructure and an application associated with the SLA; identifying changes to a technological environment of the SLA based on collected data associated with the SLA and the identified relationships, the collected data including the infrastructure and the application; establishing a baseline for a service level objective (SLO) of the SLA by analyzing the collected data of the infrastructure and the application; determining risk impact to the SLA based on an assessment of requirements to the SLO and the changes to the technological environment of the SLA; generating a solution option for the SLA by applying an explainable artificial intelligence (XAI) model based on processing the risk impact with the baseline in the XAI model; and updating the SLA based on the solution option.
H04L 41/5006 - Creating or negotiating SLA contracts, guarantees or penalties
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
54.
AI DRIVEN IMPACT ESTIMATION OF NEW PRODUCT FEATURES
A method for product release estimates a ROI of a new product feature of a product. The method identifies a product component which undergoes change with weightage responsive to epic details and non-functional requirements. The method classifies a component action to provide an action classification. The method calculates an effort to create the new feature responsive to the action and a complexity classification determined from at least the weightage. The method calculates an interval of effort to produce the new product feature responsive to the effort and similar epic matches relating to the new product feature. The method calculates an estimated public release time of the new feature responsive to the similar epic matches relating to the new feature. The method generates and follows a schedule responsive to the effort, the interval of effort, the estimated public release time, and the ROI to make the product having the new feature.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.
A computer-implemented method, in accordance with one embodiment, includes collecting data from a plurality of predefined functional areas in a particular geographical area in which a plurality of physical objects are located, at least some of the data relating to vandalism. Wrangling is performed on the data to correlate the data from the functional areas with respective ones of the physical objects. The wrangled data corresponding to each of the physical objects is transformed into features corresponding to a the functional areas. For each of the physical objects, the features are processed according to predefined rules for generating a rank for each of the functional areas. Dynamic weights are computed for at least some of the features to account for data drift by comparing historical data with latest data. The ranks and dynamic weights are transformed into a vandalism score for each of the physical objects, which is output.
An example operation may include one or more of storing a hash of a service set identifier (SSID) of a wireless network via an apparatus, receiving a probe request message transmitted from a network device, wherein the probe request message comprises a hash value, determining that the hash value within the probe request is a valid SSID based on the hash of the SSID of the wireless network stored in the storage device, and controlling the network interface to transmit a probe response with a plain text name of the SSID to the network device in response to the determination.
Methods, computer program products, and systems are presented. The Methods, computer program products, and systems can include, for example: examining hardware device transmitted data received through an I/O interface port of a computer system; determining in dependence on the examining whether the hardware device transmitted data received through the I/O interface port of the computer system satisfies a criterion; and in response to determining that the hardware device transmitted data received through the I/O interface port of the computer system satisfies the criterion, initiating a security process for protecting the computer system.
G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/81 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
The exemplary embodiments disclose a method, a computer system, and a computer program product for detecting malware. The exemplary embodiments may include aggregating known malware patterns by storing malware patterns and related malware categories of the malware patterns. The exemplary embodiments may additionally include training a first machine-learning system, comprising a generator portion and a discriminator portion, by using the known malware patterns and the related malware categories as training data. The exemplary embodiments may also include generating additional synthetic code patterns by feeding random code samples to the trained first machine-learning system. The exemplary embodiments may further include training a second machine-learning system by using benevolent code patterns and the generated additional synthetic code patterns as training data. The exemplary embodiments may include determining a statistical distribution of predicted malicious code patterns and related categories, and determining a quality value of the training of the second machine-learning system.
Embodiments relate to providing automatic curation of chats in virtual reality. A technique includes determining, using a machine learning model, that consecutive segmented messages combine to form a complete message, the consecutive segmented messages being from a virtual environment. The technique includes determining that the complete message violates a security rule and performing a security action that affects a display of the consecutive segmented messages forming the complete message.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
A computer-implemented method, according to one embodiment, includes causing a trained artificial intelligence (AI) model to derive data access privilege grants before data is stored in a predetermined database, and segmenting the data according to the data access privilege grants during storage of the data in the predetermined database. Metadata that defines the data access privilege grants is stored with the segments of data. The method further includes receiving, from a first user device, a query requesting data stored in the predetermined database. At least some of the metadata is read to identify a segment of the data associated with a data access privilege grant associated with the query. The method further includes allowing the first user device to access the identified segment of data for fulfilling the query.
Methods, computer program products, and systems can include obtaining a first computing environment specific application deployment software code instance associated to a first computing environment, the first computing environment specific application deployment software code instance for deployment of a certain application on the first computing environment; parsing the first computing environment specific application deployment software code instance, wherein the parsing includes determining attributes of the first computing environment specific application deployment software code instance and generating, using the determined attributes of the first computing environment specific application deployment software code instance, a computing environment agnostic semantic tree data structure that expresses a workflow pattern for deployment of the certain application; and composing, with use of the computing environment agnostic semantic tree data structure, a second computing environment specific application deployment software code instance associated to a second computing environment for deployment of the certain application on the second computing environment.
A computer-implemented method, in accordance with one aspect of the present invention, includes collecting data existing in a development system that relates to the code change request, in response to receiving a code change request to merge new code with existing code. Factors from the collected data are computed for assessing a risk of promoting the new code, the factors including at least: a developer information factor, a developer availability factor, and an environment health analysis factor. The factors are processed to compute a confidence score for the code change request. If the confidence score is in a first predefined range, the new code corresponding to the code change request is promoted for merging with the existing code, without human intervention. If the confidence score is in a second predefined range, an indication that human intervention is needed before promoting the code is output.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Disclosed embodiments provide bot detection in a virtual environment that is based on avatar motion. The motion of an avatar within a virtual environment such as a metaverse is tracked. The tracked motion is separated into multiple movement segments. The movement segments are compared to a collection of movement patterns in a movement pattern database that are indicative of bots. A similarity metric is determined between the tracked motion and the database of bot motions. In response to the similarity metric exceeding a predetermined threshold, a list of at least one mitigation action is obtained, and the at least one mitigation action in the list is executed, thereby mitigating the adverse effects of bots in a virtual digital environment.
A computer-implemented method, in accordance with one embodiment, includes collecting touch data from one or more touch sensors coupled to a first product, the one or more touch sensors being configured to indicate when a human touches the one or more touch sensors and/or first product. Product vector information about the first product is received. Classification on the touch data and product vector information is performed using a hierarchical multilabel classification system for assigning the touch data to predefined patterns for each level of a classifier used by the hierarchical multilabel classification system. Features of a second product, e.g., a touch vector and a touch pattern, are transformed into a second feature vector. A featurewise difference detection is performed on the feature vectors to calculate a difference in distribution for features of the products to generate and output a caption indicative of the differences between the products.
A computer-implemented method includes: generating, by the computing device, a plurality of data blocks for a received block size; sharing, by the computing device, a time based universally unique identifier (UUID) for a first data block of the data blocks and an incremental time interval between each data block of the data blocks; finding, by the computing device, a time based UUID which corresponds with the requested data block; and sending, by the computing device, the time based UUID to a cloud site, the time based UUID corresponding with the requested data block.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Aspects of the present disclosure relate generally to reminder systems and, more particularly, to a contextual item discovery and pattern inculcated reminder mechanism and methods of use. A computer-implemented method includes: determining, by a computing device, an event in which a user will participate; associating, by the computing device, one or more items with the event; determining a location of the one or more items associated with the event including that the user does not possess any combination of the one or more items; and providing an alert to the user that the any of the one or more items associated with the event is not in the possession of the user.
Systems and methods synchronize content of a virtual environment with a state of a physical environment. In aspects, a method includes obtaining sensor data from a network of remote sensors measuring a physical state of a location at a time; generating context specific parameter data based on the sensor data; obtaining context data from a remote virtual reality (VR) system, wherein the context data reflects a current state of virtual content in a virtual environment displayed by the remote VR system; selecting virtual content to be displayed in the virtual environment by the remote VR system based on the context specific parameter data, the context data, and rules; and sending the virtual content to the remote VR system to be displayed to a user, wherein the virtual content reflects a state of the physical location at the time.
A computer-implemented method includes: receiving, by a computing device, a data restore request; determining, by the computing device, at least one object in response to the data restore request; and querying, by the computing device, a client population to determine at least one client which has resources and network cardinality to assist the data restore request. The at least one client creates a distributed and crowd sourced cache of objects for the data restore request.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 43/0876 - Network utilisation, e.g. volume of load or congestion level
70.
RECRUITMENT AUGMENTATION WITH DIGITAL FOOTPRINT UTILIZATION
A method including: identify candidate pool resources by analyzing a job description; posting the job description at the candidate pool resources; identifying candidates from the candidate pool resources; determining a candidate score of each of the candidates based on an identified candidate information source; and selecting a set of the candidates based on the candidate score.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
71.
SYSTEM AND METHOD FOR HANDLING COMPRESSED CRITICAL FILES
A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.
In one general embodiment, a computer-implemented method includes collecting information relating at least to market trends and problem ticketing. The collected information is stored in a knowledge repository. At least some of the collected information is processed to compute weightage scores for requirements specified in a policy configuration. A list comprising at least some of the requirements and indications of the weightage scores corresponding thereto is generated and output.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 30/0202 - Market predictions or forecasting for commercial activities
A computer-implemented method, in accordance with one embodiment, includes receiving a taxonomy specifying entities of a business service and levels of said entities. Time series data about the entities is collected and stored. Impactor propagation paths between entities is identified. A territory of a health impact of each entity is also identified. A health score for each of the entities, considering impacts on a health of the entity by at least one other entity, is computed based on the data, the propagation paths, and the territories of the entities. At least one of the health scores is output.
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
Aspects of the present disclosure relate generally to machine inspection of part production and, more particularly, to systems and methods of automated Al inspection of customized part production. For example, a computer-implemented method includes receiving, by a processor, design information for a custom part; extracting, by the processor, feature information of the custom part from the design information; receiving, by the processor, images of the custom part in production from a recording in near real time; and verifying, by the processor, using machine learning that features in the images of the custom part in production are in compliance with the feature information of the custom part.
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
75.
ORCHESTRATION OF A PATTERN-BASED CONFIGURABLE PROCESS SEQUENCE
A computer-implemented method, according to one approach, includes causing a predetermined tracker component to create a template tracker file based on a pattern-based configurable process sequence and causing a predetermined logger component to create a log of the pattern-based configurable process sequence. A playbook is generated based on the pattern-based configurable process sequence. The method further includes storing the template tracker file, a file including the log, and the playbook in storage for enabling auditing of the pattern-based configurable process sequence. A computer program product, according to another approach, includes a computer readable storage medium having program instructions embodied therewith. The program instructions are executable by a computer to cause the computer to perform the foregoing method.
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
76.
AUTOMATED CUSTOMIZED MACHINE LEARNING MODEL VALIDATION FLOW
In one aspect, a computer-implemented method includes detecting, by one or more processing devices, custom goals of a specified machine learning application; determining, by the one or more processing devices, relative importance of a plurality of performance categories for the specified machine learning application, based on the custom goals of the specified machine learning application; generating, by the one or more processing devices, automated machine learning model tests based on the determined relative importance of the plurality of performance categories for the specified machine learning application; and performing, by the one or more processing devices, validation testing of the machine learning model based on the automated machine learning model tests.
A computer-implemented method includes: monitoring, by a computing device, a data set format of all files in a computing system to determine a list of data sets in a first format which are accessed greater than a predetermined number of times; gathering, by the computing device, the list of data sets in the first format within the computing system; and converting, by the computing device, the list of data sets in the first format within the computing system to a second format which is different from the first format.
A computer implemented system, method, and computer program product are disclosed for managing a machine learning model operation (MLOps) for cost forecasting models. The MLOps receives a request for a subscription machine learning (ML) model by a tenant having a corresponding tenant configuration profile and automatically selects a subscription ML model in a model registry based on the tenant configuration profile. The MLOps deploys the selected subscription ML model to the tenant and monitors usage by the tenant of the currently operating ML model at a pre-determined refresh frequency. The MLOps determines whether the currently operating ML model exceeds a pre-determined accuracy threshold, and automatically deploys a second subscription ML model from the model registry to the tenant in place of the currently operating ML model in response to the pre-determined accuracy threshold being exceeded.
The exemplary embodiments disclose a method, a computer program product, and a computer system for managing user commands. The exemplary embodiments may include a user giving one or more commands to one or more devices, collecting data of the one or more commands, extracting one or more features from the collected data, and determining which one or more of the commands should be executed on which one or more of the devices based on the extracted one or more features and one or more models.
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G10L 15/02 - Feature extraction for speech recognitionSelection of recognition unit
G10L 15/16 - Speech classification or search using artificial neural networks
G10L 15/30 - Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
A computer-implemented method for model building with explainability is provided. The method includes receiving, by a hardware processor, a first metric and a second metric of minimum model performance. The first metric relates to data modeling quality and the second metric relates to model to business rule correlations. The method further includes performing, by the hardware processor, auto Artificial Intelligence model generation responsive to training data and a combination of the first and the second metrics of minimum model performance to obtain a model that is trained and meets model prediction accuracy and model prediction explainability requirements represented by the combination of the first and the second metrics of minimum model performance.
An approach for restoring system functionality when a primary maintenance interface is unavailable is provided. In an embodiment, a computer maintenance application that is configured to use a Virtual Telecommunications Access Method (VTAM) interface to connect to a mainframe system is retrieved. A mainframe system is accessed with the computer maintenance application using the VTAM interface. During the access, a maintenance activity is performed on the mainframe system using the computer maintenance application.
Disclosed embodiments provide a computer-implemented method for cloud computing infrastructure cost forecasting. Resource profiles are computed for one or more cloud resources. A scheduled pattern detection process is performed for each of the one or more cloud resources to check for periodic behaviors. A similar consumer detection process is performed for each of the one or more cloud resources to identify other entities that have a similar cloud computing resource usage pattern, which can serve as supervised learning data for neural networks of disclosed embodiments. Data is input to a neural network, where the input data includes the resource profile, an operational maturity score, and/or one or more similar consumer patterns, in order to obtain a cost forecast from the neural network, based on the input data.
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
A computer-implemented method includes: advertising, by a computing device, at least one service including information from a learned knowledge base by a service provider vehicle within an autonomous vehicle ecosystem; connecting, by the computing device, the service provider vehicle to a service consumer vehicle within the autonomous vehicle ecosystem through a communication network; and sharing, by the computing device, the at least one service including the information from the learned knowledge base through a connection between the service provider vehicle and the service consumer vehicle using the communication network.
Hardware and software on a computing device is analyzed based on a regulatory profile for the computing device and regulatory compliance for an entity associated with the computing device. A determination is made whether at least one of the hardware and software on the computing device includes at least one regulatory non-compliance issue. In response to determining that at least one of the hardware and software on the computing device includes at least one regulatory non-compliance issue, one or more scripts are executed on the hardware and software on the computing device to cause the hardware and software to resolve the at least one regulatory non-compliance issue based on the regulatory profile for the computing device.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
A method is provided that includes configuring a cellular phone to function as a mobile debit card by installing an application for contactless interfacing with ATMs. The method supplements the application with a neural network (NN) based biometric verification process configured to reduce an incorrect user error value over time to increasingly harden the application to undesired intrusion. The NN based biometric verification process comprises: performing an initial face recognition; greeting the user with one of a plurality of questions in a specific language of the user and evaluating a pre-defined answer provided from the user in the specific language; and detecting, in an acoustic utterance having dialogue in support of an ATM session, a voice and a prosody style indicative of the user in combination with lip and face movements made by the user corresponding to and in synchronization with the acoustic utterance.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G10L 15/18 - Speech classification or search using natural language modelling
86.
Generation of data visualizations on a single visual representation
A computer-implemented method, in accordance with one embodiment, includes collecting data relating to development of a software product, the collected data including a plurality of different types of data relating to the development of the software product. A portion of the collected data is selected based on a characteristic of an intended user, the portion of the collected data including a plurality of the types of data. The selected portion of the collected data is transformed into data visualizations representing the data, the different types of the data having different data visualizations relative to one another. The data visualizations are output in a single visual representation for display to the intended user.
An approach within the embodiments of the present invention includes providing multi-tenancy support on a dynamic host configuration protocol (DHCP) protocol, and further includes receiving the dynamic host configuration protocol (DHCP) packet, inserting a tenant-specific option information within the DHCP packet, and transmitting the dynamic host configuration protocol (DHCP) packet with the tenant-specific option information.
A computer-implemented method, according to one embodiment, includes logically partitioning a storage system into a plurality of compartment constructs, and mapping hosts in communication with the storage system to the compartment constructs, thereby enabling interoperability among the hosts and the compartment constructs. The interoperability of the hosts and the compartment constructs is analyzed, and the interoperability is based on storage software and/or firmware versions being run by the hosts. The method further includes defining, based on the analysis, risk profiles for applications run on the hosts, and determining, based on the risk profiles, recommendations for assignment and mapping of the hosts with the compartment constructs. Ownership of storage objects is assigned to the compartment constructs based on the recommendations. Each of the storage objects define a logical partition of one of the hosts and a logical partition of a storage volume of the storage system.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Information technology services; information technology
management services; technical advice and research in the
fields of software, computer hardware and computer networks;
computer programming services; designing, developing,
deploying, implementing, analyzing, integrating and managing
computer software for third parties; installation,
modification, maintenance and repair of computer software;
customizing and configuring computer software and hardware;
advisory services with respect to networking; information
technology management services and operations for third
parties, namely, managing virtual infrastructures,
networking and storage services; hosting, management and
administration of computer software for third parties;
providing temporary use of non-downloadable computer
software for managing, testing and using multiple operating
systems; providing temporary use of non-downloadable
computer software for virtual computing infrastructure
management, networking and storage; providing temporary use
of non-downloadable computer software for creating and
maintaining scalable cloud computing applications; leasing
and rental of computer software; technical support services,
namely, troubleshooting computer software and hardware
problems; advisory services with respect to virtual
infrastructure.
21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
25 - Clothing; footwear; headgear
Goods & Services
Glasses; cups; beer mugs; plastic water bottles sold empty;
insulated containers and bottles for food and beverages;
glasses, namely goblets; back scratchers; shoe horns;
portable coolers; serving bowls of crystal; vases; coasters
and coasters of leather; coasters, other than of paper or
textile materials. Clothing; clothing, namely, tops for babies, children,
adults, women, and men; clothing, namely tee-shirts, shirts,
button-down shirts, sweatshirts, pullovers, jackets, aprons,
vests, bottoms [clothing]; head coverings [headwear,
clothing]; headwear, namely hats, baseball caps and hats,
caps. stocking caps; shoes.
Aspects of the present disclosure relate generally to the formation of project teams and, more particularly, to systems and method of forming synergistic teams. For example, a computer-implemented method includes receiving, by a processor, a project profile including project skills; searching, by the processor, employee profiles for employee skills matching the project skills; selecting, by the processor, at least one group of team candidates having employee profiles with employee skills collectively matching the project skills; determining, by the processor, a synergy score for the at least one group of team candidates; and saving, by the processor, the synergy score and the group of team candidates in persistent storage.
An example operation may include one or more of storing code that adheres to predefined coding standards of one or more programming languages within a data store, reading source code from a code file, comparing the source code to the code stored within the data store to determine one or more recommended code changes to the source code, and displaying the one or more recommended code changes via a user interface.
Embodiments include receiving input of a new message for a group of members having end-to-end encryption in which first keys encrypt and second keys decrypt the new message, determining that a subset of the members in the group is excluded from receiving the new message, and selectively encrypting the new message for the members of the group by encrypting the new message by first keys corresponding to ones of the members of the group while choosing not to encrypt the new message with first keys corresponding to the subset of the members. An aspect includes transmitting the new message encrypted by the first keys to the members, and in response to choosing not to encrypt the new message with first keys corresponding to the subset, causing a system message to be transmitted to the subset excluded from receiving the new message, the system message affecting a presentation to the subset.
A computer-implemented method for receiving, at a database, an analytics request associated with a selected data line from a database and reading a set of additional bytes from the database corresponding to the selected data line. The method may further include parsing and formatting the set of additional bytes read from the database to generate, at the database, an analytics reply to the analytics request, where each of a plurality of data lines in the database represents a search query and where the analytics data comprises a number of search query requests on a subject matter and a number of search query requests for private data.
A method for database cloning is provided. The method initiates an outage-free backup of a production database of a source database system using a point-in-time copy technology which copies both data and object structure. The method executes a cloning command to open a dialog panel menu receiving as input a subsystem name used to generate a set of database restore jobs. The method executes the set of database restore jobs to clone data into a transient area. The method uses a copy management service to activate replication of the data from the source database system created using the copy technology to a target database system. The method exports a file catalog associated with the source database system to the target database system. The method executes a script to rename files according to specifications of the target database system and the file catalog.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
96.
AUTOMATED INFORMATION TECHNOLOGY INFRASTRUCTURE MANAGEMENT
A method, computer program product, and system include a processor(s) that obtains extracts, from a data source, atomic actions. The processor(s) traverses the atomic actions to identify one or more recommended actions. The processor(s) maps the recommended actions to the atomic actions by associating at least one atomic action with an expected improvement level from the data source. The processor(s) generates at least one directed graph based on the mapping. The processor(s) utilizes the matrix to filter the recommended actions, into a best plan nomination.
A computer-implemented method, according to one embodiment, includes identifying, in a reference video of a production process of a product, a discrete and non-overlapping set of first tasks. The first tasks define at least a first sub-process. The method further includes analyzing a live video of the production process to identify frames of the live video that include second tasks that define a second sub-process, and analyzing the frames of the live video for determining whether a match exists between the first tasks and the second tasks. In response to a determination that the match does not exist, an alert that a deviation is present in the production process depicted in the live video is output.
A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
99.
Security policy selection based on calculated uncertainty and predicted resource consumption
A computer-implemented method according to one embodiment includes receiving a request to perform a security policy implementation analysis for a first deployment associated with a first client in an IT environment. IT information associated with the first deployment is collected. The method further includes applying trained machine learning models to analyze the IT information of the first client to compute a security policy for the first deployment. The security policy is computed based on a calculated uncertainty of effects that applying the security policy to the first deployment is capable of causing, and a predicted amount of resources of the first deployment that applying the security policy to the first deployment would consume. An indication of the security policy is output for display in a dashboard on a display of a user device of the first client.
Embodiments relate to virtualization of digital crown actions based on actions performed with an electronic pen. A technique includes communicatively coupling a smartwatch to an electronic pen, the smartwatch including a rotatable piece, where the rotatable piece controls a plurality of functionalities of the smartwatch. The technique includes receiving data from the electronic pen, and in response to receiving the data from the electronic pen, controlling at least one of the plurality of functionalities.
G06F 3/0354 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
G04G 21/08 - Touch switches specially adapted for time-pieces
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 3/0362 - Pointing devices displaced or positioned by the userAccessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
G06F 3/0346 - Pointing devices displaced or positioned by the userAccessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors