-
公开(公告)号:US20200014609A1
公开(公告)日:2020-01-09
申请号:US16029197
申请日:2018-07-06
Applicant: International Business Machines Corporation
Inventor: Hugh Edward HOCKETT , Lin Sun , Aaron James Quirk
Abstract: Embodiments provide optimized deployment of workloads. A first workload to be deployed in at least one data center of a plurality of data centers is received. A first plurality of candidate data centers is selected from the plurality of data centers, and the first workload is deployed to each of the first plurality of candidate data centers. A first performance metric is collected from each respective data center of the first plurality of candidate data centers based on execution of the first workload deployed at the respective data centers, and a first optimal data center from the first plurality of candidate data centers is identified based on the first performance metrics. The first workload is removed from each of the first plurality of candidate data centers, other than the identified first optimal data center.
-
公开(公告)号:US10432634B2
公开(公告)日:2019-10-01
申请号:US15862420
申请日:2018-01-04
Applicant: International Business Machines Corporation
Inventor: Lisa Seacat DeLuca , Dana Price , Aaron James Quirk , Shelbee Smith-Eigenbrode
Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message. Select client devices otherwise meeting the target criteria may also be excluded from receiving a notification message.
-
公开(公告)号:US20190207941A1
公开(公告)日:2019-07-04
申请号:US15862420
申请日:2018-01-04
Applicant: International Business Machines Corporation
Inventor: Lisa Seacat DeLuca , Dana Price , Aaron James Quirk , Shelbee Smith-Eigenbrode
CPC classification number: H04L63/10 , H04H20/93 , H04L29/06 , H04L29/08072
Abstract: Methods and systems for use in constraining access to network resources based on notification and compliance requirements. In various examples, an access point or similar device receives and stores notification information (e.g., from a network administrator device) for provision to targeted client devices in a notification message. The access point also receives target criteria for use in identifying target client devices that are accessing or attempting to access network resources via the access point. In some embodiments, access to network resources by a targeted client device is constrained pending completion of a compliance condition requirement associated with a notification message. Various levels of access to network resources may be applied to non-compliant target client devices. Following completion of compliance condition, a target client device is exempted from further receipt of the notification message. Select client devices otherwise meeting the target criteria may also be excluded from receiving a notification message.
-
14.
公开(公告)号:US09985787B2
公开(公告)日:2018-05-29
申请号:US14829359
申请日:2015-08-18
Applicant: International Business Machines Corporation
Inventor: Aaron James Quirk , Ching-Yun Chao , Dennis DeLanoy Lingerfelt , William Daniel Whitt
IPC: G06F21/32 , H04L9/32 , G06F3/0488 , G06K9/00
CPC classification number: H04L9/3231 , G06F3/0488 , G06F21/32 , G06F2203/04104 , G06K9/00 , G06K9/00013 , G06K9/00067 , G06K9/00087 , G06K9/00355
Abstract: A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use. On a next interaction, the state machine transitions to full authentication requiring robust authentication to continue operating in a normal mode.
-
-
-