Abstract:
According to embodiments of the present invention, one or more computer processors display unstructured data. One or more computer processors display a first chart that graphically represents at least a portion of the unstructured data. In response to the first chart failing to satisfy a user-defined criteria, one or more computer processors modifies the first chart to generate a second chart that graphically represents at least a portion of the unstructured data in a user-defined manner. In certain embodiments, the unstructured data includes information that does not have a pre-defined data model and/or is not organized in a pre-defined manner.
Abstract:
An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.
Abstract:
An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment. Metadata of the application is analyzed and compared to metadata of previously deployed applications. Using the comparison, a set of architectures used in conjunction with previously deployed application(s) with similar platform and middleware requirements are presented to a user. The user can select an architecture for deploying the application. The application is continuously monitored after deployment, and alternative architectures to improve the application can be presented to the user, if desired.
Abstract:
Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like.
Abstract:
An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.
Abstract:
An approach is provided for managing a message being transferred from a mobile device. A sensitivity level of data in the message payload is determined prior to sending the message to a wireless access point (WAP) en route to a destination device. If the payload data has a first sensitivity level, the mobile device sends the message to a first secure WAP having encryption at a threshold strength at a network layer and utilizes a protocol having encryption at an application layer. If the data has a second sensitivity level, the mobile device (a) sends the message to the first secure WAP without utilizing the protocol or (b) sends the message to a second, less secure WAP having encryption at a lesser strength and utilizes the protocol. If the data has a third sensitivity level, the mobile device sends the message to the second WAP without utilizing the protocol.
Abstract:
A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).
Abstract:
An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.
Abstract:
An approach for assessing a service offering selected by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, a network environment containing the service offering is monitored for a software configuration activity performed by the user. This software configuration activity is analyzed to identify the software application that is being configured. A set of provider-managed service offerings can be searched for any provider-managed service offering that contains an offered application corresponding to that of the software application. This managed service offering can be included in an alternative suggestion for the service offering.
Abstract:
A trust-based approach for authorizing computing resources in a networked computing environment is provided. Specifically, in a typical embodiment, a candidate computing resource (e.g., a virtual machine) will submit a request to join a network computing environment (“environment”). Based on the request, a message will be communicated to previously authorized/joined computing resources to poll/solicit their votes as to whether the candidate computing resource should be trusted/authorized in the environment. Based on the responses submitted by the polled computing resources, the candidate computing resource may be authorized or denied membership in the environment. If authorized, a permission level may be set (e.g., as recommended by the polled computing resources).