Kay S. Anderson - Washington DC, US Joseph P. Bigus - Rochester MN, US Eric Bouillet - Jersey City NJ, US Parijat Dube - Yorktown Heights NY, US Zhen Liu - Tarrytown NY, US Dimitrios Pendarakis - Westport CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G06F 11/00
US Classification:
702186, 702187, 702188, 702189
Abstract:
A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system.
Method Of Managing And Mitigating Security Risks Through Planning
Kay S. Anderson - Washington DC, US Mark D. Feblowitz - Winchester MA, US Genady Grabarnik - Scarsdale NY, US Shai Halevi - Elmsford NY, US Nagui Halim - Yorktown Heights NY, US Trent R. Jaeger - Port Matilda PA, US Paul Ashley Karger - Chappaqua NY, US Zhen Liu - Tarrytown NY, US Ronald Perez - Mount Kisco NY, US Anton V. Riabov - Ossining NY, US Pankaj Rohatgi - New Rochelle NY, US Angela Marie Schuett - Columbia MD, US Michael Steiner - New York NY, US Grant M. Wagner - Columbia MD, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/00
US Classification:
726 22, 713165
Abstract:
An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
Optimizing A Storage System To Support Short Data Lifetimes
Kay Schwendimann Anderson - Washington DC, US Frederick Douglis - Basking Ridge NJ, US Nagui Halim - Yorktown Heights NY, US John Davis Palmer - San Jose CA, US Elizabeth Suzanne Richards - Columbia MD, US David Tao - Glen Burnie MD, US William Harold Tetzlaff - Emeryville CA, US John Michael Tracey - Scarsdale NY, US Joel Leonard Wolf - Katonah NY, US
Assignee:
International Business Machines Corporation - Armonk NY
A system and method for optimizing a storage system to support short data object lifetimes and highly utilized storage space are provided. With the system and method, data objects are clustered based on when they are anticipated to be deleted. When an application stores data, the application provides an indicator of the expected lifetime of the data, which may be a retention value, a relative priority of the data object, or the like. Data objects having similar expected lifetimes are clustered together in common data structures so that clusters of objects may be deleted efficiently in a single operation. Expected lifetimes may be changed by applications automatically. The system automatically determines how to handle these changes in expected lifetime using one or more of copying the data object, reclassifying the container in which the data object is held, and ignoring the change in expected lifetime for a time to investigate further changes in expected lifetime of other data objects.
Method Of Managing And Mitigating Security Risks Through Planning
Kay S. Anderson - Washington DC, US Mark D. Feblowitz - Winchester MA, US Genady Grabarnik - Scarsdale NY, US Shai Halevi - Elmsford NY, US Nagui Halim - Yorktown Heights NY, US Trent R. Jaeger - Port Matilda PA, US Paul Ashley Karger - Chappaqua NY, US Zhen Liu - Tarrytown NY, US Ronald Perez - Mount Kisco NY, US Anton V. Riabov - Ossining NY, US Pankaj Rohatgi - New Rochelle NY, US Angela Marie Schuett - Columbia MD, US Michael Steiner - New York NY, US Grant M. Wagner - Columbia MD, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/00
US Classification:
726 22, 713165
Abstract:
An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
System And Method For Security Planning With Soft Security Constraints
Kay Schwendimann Anderson - Washington DC, US Trenton Ray Jaeger - Port Matilda PA, US Zhen Liu - Tarrytown NY, US Anton Viktorovich Riabov - Ossining NY, US Pankaj Rohatgi - New Rochelle NY, US Angela Schuett Reninger - Columbia MD, US Grant Wagner - Columbia MD, US
Assignee:
International Business Machines Corporation - Armonk NY
A method for security planning with soft security constraints, include: receiving security-related requirements of a workflow to be developed using system inputs and processing components; and generating at least one proposed workflow according to the security-related requirements, wherein the at least one proposed workflow satisfies soft constraints.
Mitigating And Managing Privacy Risks Using Planning
Kay S. Anderson - Washington DC, US Alexandre V. Evfimievski - San Jose CA, US Mark D. Feblowitz - Winchester MA, US Genady Grabarnik - Scarsdale NY, US Nagui Halim - Yorktown Heights NY, US Zhen Liu - Tarrytown NY, US Ralf Rantzau - San Jose CA, US Anton V. Riabov - Ossining NY, US Angela Schuett - Columbia MD, US Ramakrishnan Srikant - San Jose CA, US Grant Wagner - Columbia MD, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
726 26, 709223, 705 1
Abstract:
System and methods are provided for managing and mitigating privacy risks in a system having a network of processing elements. According to one method, there is receive a request for at least one output product from the system. The request includes a set of privacy parameters. At least one set of workflow generating strategies are created that results in the output product having a privacy risk value below a predefined threshold. At least one of the workflow generating strategies is deployed for automatically producing the at least one output product.
Stream Processing Workflow Composition Using Automatic Planning
Kay S. Anderson - Washington DC, US Joseph Phillip Bigus - Rochester MN, US Mark David Feblowitz - Winchester MA, US Genady Ya. Grabarnik - Scarsdale NY, US Nagui Halim - Yorktown Heights NY, US Zhen Liu - Tarrytown NY, US Anton V. Riabov - Ossining NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709238, 709226, 718104
Abstract:
An automatic planning system is provided for stream processing workflow composition. End users provide requests to the automatic planning system. The requests are goal-based problems to be solved by the automatic planning system, which then generates plan graphs to form stream processing applications. A scheduler deploys and schedules the stream processing applications for execution within an operating environment. The operating environment then returns the results to the end users.
Kay S. Anderson - Washington DC, US Joseph P. Bigus - Rochester MN, US Eric Bouillet - Jersey City NJ, US Parijat Dube - Yorktown Heights NY, US Zhen Liu - Tarrytown NY, US Dimitrios Pendarakis - Westport CT, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G06F 11/00
US Classification:
702186, 702122, 702187, 702188, 370252
Abstract:
A system, method, and computer program product for benchmarking a stream processing system are disclosed. The method comprises generating a plurality of correlated test streams. A semantically related data set is embedded within each of the test streams in the plurality of correlated test streams. The plurality of correlated test streams is provided to at least one stream processing system. A summary is generated for each of the semantically related embedded data sets. A common identifier, which is transparent to the system being tested, is embedded within each stream in the plurality of correlated test streams. The common identifier is extracted from the output data set generated by the stream processing system. At least one of the stored copies of the summaries and the common identifier are compared to an output data set including a set of zero or more correlation results generated by the stream processing system.
Jan 2014 to 2000 Administrative AssistantWordpress (Only in the District; Only in Beijing; Only in Korea 87)
Dec 2009 to 2000 BloggerTrio OOO Washington, DC Aug 2013 to May 2014 Social Media ManagerOKPanda New York, NY Oct 2013 to Oct 2013 Web Content Entry SpecialistEnglish First
Jun 2012 to Jun 2013 ESL InstructorTime Out Beijing
Mar 2013 to May 2013 Editorial AssistantHanley Wood and World & I Online Washington, DC Oct 2011 to Mar 2012 Author, ResearcherEnglish Program in Korea/Korean Dual Language Program Gwangju, South Korea/Gimhae, South Korea Aug 2009 to Aug 2011 ESL InstructorOffice of Admission Ithaca, NY Sep 2006 to May 2009 Student Assistant
Education:
ITHACA COLLEGE Ithaca, NY 2005 to 2009 Bachelor of Arts in Writing
Skills:
Editorial: Writing, Research, Editing: AP Style Clerical: Answer Calls; Data Entry, Filing, Sort Mail, Scanning Microsoft Office: Word, Excel, Outlook Social Media: Facebook, Twitter, Google+, LinkedIn, YouTube
Dr. Anderson graduated from the University of Nebraska College of Medicine in 1991. She works in Lincoln, NE and specializes in Pediatrics. Dr. Anderson is affiliated with Bryan Medical Center and CHI Health St Elizabeth Medical Center.
San Francisco, CAEducation Programs Manager at San Francisco Sympho... Past: Consultant at Educational Excellence, Principal 6-12 at Oakland School for the Arts... I am passionate about educational excellence and the creation of new instructional designs .
Survivors keeping Doug close to their hearts include his mother, Kay Anderson of Branson, Mo.; a brother and his wife, Jeff and Sandy Anderson and their ...
(more) By Kait Rayner "Police cars and helicopters, just something we just don't see over here very often," said Kay Anderson. Kay and Larry Anderson came ...
... all at home in Boone; paternal grandmothers, Denise Robinson and Jan Droste, both of Boone; maternal grandparents Brian and Mary Kay Anderson of Boone. ...
... Kay Anderson, Ann Wolff, Nancy Langness, Kathy Stark, Connie deCler, Julia Kipka, Julie Lennox, Roxanne Wightman, Maddy Macindoe, Margaret Carasik. ...