Abstract:
A method securely manages smart card transactions. A processing entity receives a smart card identifier from a smart card, where the smart card is a virtual card on a mobile computing device that comprises a processor, where the smart card identifier is a transaction-specific identifier for a transaction. A protected application is received at the mobile computing device, where a received protected application initially cannot be utilized by an operating system for execution by the processor. A security object is received at the mobile computing device, where the security object is used to convert the received protected application into an executable application that can be utilized by the operating system for execution by the processor. The processor executes the executable application to act as the virtual card, where the virtual card provides a functionality of a predefined physical electronic card.
Abstract:
A sensor system comprises: an energy storage device electrically coupled to an intermittent energy release device that causes the energy storage device to release stored energy intermittently; a sensor electrically coupled to the energy storage device, where the sensor detects physical events occurring at a physical device and is intermittently powered by electrical energy received from the energy storage device; a synaptic neural network core electrically coupled to the sensor, where the synaptic neural network core converts sensor readings into an object that describes the physical events occurring at the physical device; a transponder electrically coupled to the synaptic neural network core; and a storage buffer within the transponder, where the storage buffer stores the object for transmission from the transponder to a monitoring system, where the intermittent energy release device provides power to the sensor in response to the transponder transmitting the object to the monitoring system.
Abstract:
Methods and a system are provided that, in turn, are for providing security between a user device and a computer related device. A method includes providing a distributed registry service that specifies a plurality of services available to support communications between the user device and the computer related device. The method further includes at least one of dynamically constructing and altering one or more multi-node transient processing pathways between the user device and the computer related device based on respective selected ones of the plurality of services. For at least one node in each of the one or more transient processing pathways, an address thereof and a time period the at least one node is active and capable of being used is set or changed, based on at least one of an application programming interface type and a data request type implicated by a received packet.
Abstract:
A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to how many parsed synthetic context-based objects are pulled into the particular context-based conformed dimensional data gravity well.
Abstract:
A computer-implemented method, system, and/or computer program product protects access to resources through use of a secure processor. A resource server receives an encrypted request from a requesting computer for access to a requested resource within the resource server. The requested resource is physically within an isolation area in the resource server that is initially communicatively protected from a network that connects the requesting computer to the resource server. The resource server establishes a communication session between a first secure processor in the resource server and a second processor in the requesting computer to provide secure communication between the requesting computer and the requested resource.
Abstract:
A processor-implemented method, system, and/or computer program product manages nodes in a graph database. Graph nodes in a graph database are organized into graph node clusters. A cluster edge, which describes a relationship between two of the graph node clusters, is generated to logically associate those two graph node clusters with one another.
Abstract:
A system comprises a hashing logic, which executes instructions to convert raw data into a first logical address and payload data, where the first logical address describes metadata about the payload data. A hardware translation unit executes instructions to translate the first logical address into a first physical address on a storage device. A hardware load/storage unit stores the first logical address and the payload data at the first physical address on the storage device. A content addressable store is associated with a reference to the logical addressed data in this location addressable high dimensional store, where the content addressable store is searched for the desired content word using at least one temporal attribute to retrieve the corresponding references with low latency. A hardware exclusive OR (XOR) unit compares two logical address vectors to derive a Hamming distance between the two logical address vectors.
Abstract:
A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document, which contains multiple instances of the non-contextual data object, according to a profile of a particular user. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with a data store in a data structure that contains heterogeneous data stores having different formats. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores from the particular user.
Abstract:
A processor-implemented method, system, and/or computer program product identifies a cause of a level of success in multiple projects from a set of past projects. Multiple artifacts describe conditions associated with each project from a set of past projects, where a cause for a level of success in the past projects is initially unknown. Logic identifies a set of common artifacts in multiple projects from the set of past projects, where the set of common artifacts describes common conditions that are common to all of the multiple projects. Additional logic identifies a level of success experienced by each of the multiple projects. In response to a particular set of projects having a same level of success, common conditions identified by the set of common artifacts are identified as the cause for the same level of success experienced by all of the projects in the particular set of projects.
Abstract:
An invention for comparing utility and warranty of services in an information (IT) stack is provided. Embodiments of this invention are directed to comparing utility and warranty of services in an information technology (IT) stack comprising a plurality of layers, at least one of the plurality of layers having a set of services. In these embodiments, a utility and warranty tool provides this capability. Specifically, the utility and warranty tool comprises a determination component configured to determine, at each layer of the IT stack, a required utility and warranty (RUW) value for each of the set of services, wherein the RUW value represents a desired solution for implementing a business process; and determine, at each layer of the IT stack, an available utility and warranty (AUW) value for each of the set of services, wherein the AUW value is a measure of an ability of each of the set of services to satisfy the RUW at each layer of the IT stack. The utility and warranty tool further comprises a comparison component configured to compare the RUW value against the AUW value at each layer of the IT stack to determine whether each of the set of services satisfies the desired solution for implementing the business process.