- NEW YORK NY, US Andrew S. Kronstadt - Pensacola FL, US Marci Devorah Formato - Clintondale NY, US Jennifer L. Szkatulski - Detroit MI, US Bernhard Julius Klingenberg - Grover Beach CA, US
International Classification:
G06F 11/34 G06N 3/04 G06F 9/50
Abstract:
A system, method, and computer program product for implementing configuration solution service management is provided. The method includes ingesting from managed hardware and software service components associated with a first entity, data and associated metadata associated with establishing baseline analysis code. The data and associated metadata are analyzed via execution of code associated with a recurrent neural network and long short-term memory configured to determine if a current managed hardware or software solution service design is associated with client requirements and industry trends. Recommendations, statistical analysis, predictions, a proposed new client profile, and sizing attributes of the additional managed hardware and software service components are generated. In response, additional managed hardware and software service components are configured with respect to operationally functionality for the first entity.
- ARMONK NY, US Christopher C. Bode - Cary NC, US Marci Devoarh Formato - Clintondale NY, US Andrew S. Kronstadt - Pensacola FL, US
International Classification:
H04L 29/06
Abstract:
A method, system, and program product for controlling power associated with connectivity between devices is provided. The method includes scheduling a copy function associated with copying data from a production hardware device to a secure hardware device at a specified time period. A first hardware connection between the production hardware device and a production network associated with the production hardware device is disabled during the specified time period and a second hardware connection between the production hardware device and the secure hardware device is enabled. A subsequent copy function is enabled for copying the data from the production hardware device to the secure hardware device. The second hardware connection between the production hardware device and the secure hardware device is disabled after the copy function has completed. In response, the first hardware connection between the production hardware device and the production network is enabled.
A method for dynamically modifying quality-of-service tags for multiple data flows is disclosed. In one embodiment, such a method determines current bandwidth utilization for each of multiple data flows passing through a network, and determines acceptable bandwidth utilization for each of the multiple data flows. The method receives external information that, based on one or more rules, is used to adjust quality of service priorities for one or more of the data flows. Based on the external information, the method dynamically adjusts quality-of-service tags for data packets associated with the data flows, such that current bandwidth utilization is altered for at least one data flow of the multiple data flows without violating acceptable bandwidth utilization for each of the multiple data flows. A corresponding system and computer program product are also disclosed.
- Armonk NY, US Gavin Charles O'Reilly - Kilcoole, IE Clea Anne Zolotow - Key West FL, US Marci Devorah Formato - Clintondale NY, US Jack Louis Cherkas - London, GB
International Classification:
G06F 11/14 G06N 20/00
Abstract:
A method, system and computer program product for data backup based on a workload behavior includes a first computer identifying, using machine learning tools, data associated with frequently accessed files on the first computer by a workload being processed by a second computer. The first computer processes the identified data associated with the frequently accessed files to generate a list of frequently accessed files by the workload, and compares the list of frequently accessed files to backup policy rules active on the first computer. Based on the comparison, the first computer identifies a mismatch between the list of frequently accessed files and the backup policy rules, and specifies a new backup rule to update the backup policy rules for each identified mismatch between the list of frequently accessed files and the backup policy rules.
- Armonk NY, US Marci Devorah Formato - Clintondale NY, US Nathan B. Best - Apex NC, US
International Classification:
G06F 11/14 G06F 16/188 G06F 16/11 G06F 16/14
Abstract:
Cross backup application diskless data migration is provided. Legacy data backups eligible for migration are identified in a legacy backup environment. Application specific information regarding the legacy data backups eligible for migration is received. The application specific information is filtered to indicate only legacy backup data that must be migrated representing a type of migration desired. The application specific information corresponding to the legacy backup data that must be migrated is presented as a virtual filesystem mounted within an operating system such that the application specific information is seen as live local data. A backup of the virtual filesystem mounted within the operating system is performed.
- ARMONK NY, US Naina Singh - Cary NC, US Marci Devorah Formato - Clintondale NY, US
International Classification:
G06F 21/62
Abstract:
A content-lifecycle management system (CLMS) intercepts a request to perform an action upon a data object in a domain of a multi-domain computing environment during a certain phase of the object's lifecycle. The CLMS retrieves data and rules from a cross-domain distributed ledger that is accessible throughout the multi-domain environment. The retrieved information includes content-lifecycle management policies that control which actors can perform certain types of actions upon specific data objects during various lifecycle phases. The ledger also describes and classifies actors, dependency relationships between storage and infrastructure components of the environment, and the results of past requests. If the CLMS, using the ledger information, determines that performing the requested action would neither disrupt access to the data object nor be prohibited by the policies, the CLMS directs an appropriate content-management technology to perform the action, updates the ledger, and reports any rejected requests to other lifecycle-management components.
Cognitive Microcode Simulation, Planning, And Risk Assessment
- Armonk NY, US Mihai Criveti - Blanchardstown, IE Andrew P. Barnes - Greystones, IE Gavin C. O'Reilly - Kilcoole, IE Marci D. Formato - Clintondale NY, US Jørgen E. Floes - Stenløse, DK Tedrick N. Northway - High Springs FL, US
International Classification:
G06F 8/65 G06F 16/21
Abstract:
A method includes creating a digital twin that represents a computing infrastructure, the digital twin representing all microcode versions present in components in the computing infrastructure. The method further includes creating a database of a plurality of upgrades including at least one microcode version update and a corresponding criticality of each of the plurality of updates and emulating a first deployment of a first set of one or more of the plurality of updates with the digital twin.
Join Now & View the Full Marc Formato Profile. Register for FREE at MyLife to find Marc ... Marci Formato Margaret Formato Margaret Formato Margaret Formato