-
公开(公告)号:US20190082004A1
公开(公告)日:2019-03-14
申请号:US15899179
申请日:2018-02-19
Applicant: Cisco Technology, Inc.
Inventor: Peter Bosch , Jeffrey Napper , Alessandro Duminuco , Michael Francis O'Gorman , Sean Chandler , Roman Sorokin , David Delano Ward , Baton Daullxhi , Florin Stelian Balus
Abstract: The present disclosure involves systems and methods for (a) model distributed applications for multi-cloud deployments, (b) derive, by way of policy, executable orchestrator descriptors, (c) model underlying (cloud) services (private, public, server-less and virtual-private) as distributed applications themselves, (d) dynamically create such cloud services if these are unavailable for the distributed application, (e) manage those resources equivalent to the way distributed applications are managed; and (f) present how these techniques are stackable. As applications may be built on top of cloud services, which themselves can be built on top of other cloud services (e.g., virtual private clouds on public cloud, etc.) even cloud services themselves may be considered applications in their own right, thus supporting putting cloud services on top of other cloud services.
-
公开(公告)号:US20220004643A1
公开(公告)日:2022-01-06
申请号:US16919199
申请日:2020-07-02
Applicant: Cisco Technology, Inc.
Inventor: Andy Sloane , Ashutosh Kulshreshtha , Hiral Shashikant Patel , Vimal Jeyakumar , Navindra Yadav , Florin Stelian Balus
IPC: G06F21/57 , G06F16/35 , G06F16/953 , G06F16/2457 , G06N20/00 , G06N5/04
Abstract: Systems, methods, and computer-readable for identifying known vulnerabilities in a software product include determining a set of one or more processed words based on applying text classification to one or more names associated with a product, where the text classification is based on analyzing a database of names associated with a database of products Similarity scores are determined between the set of one or more processed words and names associated with one or more known vulnerabilities maintained in a database of known vulnerabilities in products. Equivalence mapping is performed between the one or more names associated with the product and the one or more known vulnerabilities, based on the similarity scores. Known vulnerabilities in the product are identified based on the equivalence mapping.
-
公开(公告)号:US11146620B2
公开(公告)日:2021-10-12
申请号:US15899179
申请日:2018-02-19
Applicant: Cisco Technology, Inc.
Inventor: Peter Bosch , Jeffrey Napper , Alessandro Duminuco , Michael Francis O'Gorman , Sean Chandler , Roman Sorokin , David Delano Ward , Baton Daullxhi , Florin Stelian Balus
Abstract: The present disclosure involves systems and methods for (a) model distributed applications for multi-cloud deployments, (b) derive, by way of policy, executable orchestrator descriptors, (c) model underlying (cloud) services (private, public, server-less and virtual-private) as distributed applications themselves, (d) dynamically create such cloud services if these are unavailable for the distributed application, (e) manage those resources equivalent to the way distributed applications are managed; and (f) present how these techniques are stackable. As applications may be built on top of cloud services, which themselves can be built on top of other cloud services (e.g., virtual private clouds on public cloud, etc.) even cloud services themselves may be considered applications in their own right, thus supporting putting cloud services on top of other cloud services.
-
-