-
公开(公告)号:US10083022B2
公开(公告)日:2018-09-25
申请号:US14842100
申请日:2015-09-01
Applicant: International Business Machines Corporation
Inventor: Yuto Fukui , Daisuke Hayashi , Tomohiro Shioya
CPC classification number: G06F8/65 , G06F9/45558 , G06F2009/45562 , G06F2009/45591
Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.
-
公开(公告)号:US09529607B2
公开(公告)日:2016-12-27
申请号:US14195467
申请日:2014-03-03
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Mihoko Hasegawa , Hideaki Fujii , Daisuke Hayashi , Ari Morishita , Yohei Noda , Hirokazu Yasumuro
CPC classification number: G06F9/445 , G06F17/30595
Abstract: An apparatus generates an ordered list of managed targets. A list generating hardware unit generates a list of managed targets. A list displaying hardware unit displays, on a display device, the list of managed targets. The list generating hardware unit further acquires, from a predetermined storage device, history information relating to a session for each managed target from the list of managed targets, where the history information includes information for identifying a session executor who executed the session at a session time. The list generating hardware unit is further configured to determine, using acquired history information related to the session for each managed target from the list of managed targets, an order of the managed targets in the list of managed targets according to rules that are set based on a content of managed information for each managed target.
Abstract translation: 设备生成管理目标的有序列表。 列表生成硬件单元生成管理目标的列表。 显示硬件单元的列表在显示设备上显示受管目标的列表。 列表生成硬件单元还从预定的存储装置从管理对象的列表中获取与每个被管理目标有关的历史信息的历史信息,其中历史信息包括用于识别在会话时间执行会话的会话执行者的信息 。 列表生成硬件单元还被配置为根据管理目标列表中的每个被管理目标的与该会话相关的获取的历史信息,根据基于 每个受管目标的托管信息内容。
-
公开(公告)号:US10140115B2
公开(公告)日:2018-11-27
申请号:US15947931
申请日:2018-04-09
Applicant: International Business Machines Corporation
Inventor: Yuto Fukui , Daisuke Hayashi , Tomohiro Shioya
Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.
-
公开(公告)号:US20180232225A1
公开(公告)日:2018-08-16
申请号:US15947931
申请日:2018-04-09
Applicant: International Business Machines Corporation
Inventor: Yuto Fukui , Daisuke Hayashi , Tomohiro Shioya
CPC classification number: G06F8/65 , G06F9/45558 , G06F2009/45562 , G06F2009/45591
Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.
-
公开(公告)号:US10769308B2
公开(公告)日:2020-09-08
申请号:US16155071
申请日:2018-10-09
Applicant: International Business Machines Corporation
Inventor: Daisuke Hayashi , Sayaka Tamai , Keisuke Nitta , Fumihiko Terui
IPC: G06F17/20 , G06F21/62 , G06F40/157
Abstract: A first character string in a logic, wherein the logic is a rule which analyzes input text and extracts additional information used for the text analysis, used for the text analysis with a second character string which is different form the first character string is replaced using a mapping between the first character string and the second character string. The first character string being a character or a combination of characters in a logic. A first character string is searched for in a target document for the text analysis and the first character string, if found, is replaced with the second character string, using the mapping. The logic is sent after the replacement to a server computer. The target document after the replacement is sent to the server computer. A text analysis result for the target document after the replacement is received form the server computer.
-
公开(公告)号:US10394547B2
公开(公告)日:2019-08-27
申请号:US15947923
申请日:2018-04-09
Applicant: International Business Machines Corporation
Inventor: Yuto Fukui , Daisuke Hayashi , Tomohiro Shioya
Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.
-
公开(公告)号:US10387567B2
公开(公告)日:2019-08-20
申请号:US14333413
申请日:2014-07-16
Applicant: International Business Machines Corporation
Inventor: Taku Aratsu , Daisuke Hayashi , Tomohiro Shimizu
Abstract: Provided are techniques in which a document accompanying a service is acquired, a natural language analysis is performed on the acquired document, a determination is made from the results of the natural language analysis whether an item defined in the access control policy is found in the acquired document and, when the item defined in the access control policy is found in the acquired document, the access control policy is referenced and access to the service controlled accordingly.
-
公开(公告)号:US10061937B1
公开(公告)日:2018-08-28
申请号:US15635589
申请日:2017-06-28
Applicant: International Business Machines Corporation
Inventor: Daisuke Hayashi , Keisuke Nitta , Sayaka Tamai , Fumihiko Terui
CPC classification number: G06F21/6245 , G06F17/2735 , G06F17/2795 , G06F21/6227 , G06Q10/107 , H04L63/0245 , H04L63/029
Abstract: An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential information registered in a dictionary that contains registered confidential information and substitute words corresponding to the registered confidential information. The approach includes retrieving, from the dictionary, substitute words corresponding to each identified registered confidential information and identifying, in the text generated by the user, potentially confidential words based on a text analysis of the text generated by the user. The approach includes sending to the first computer, a proposed protected text including the text generated by the user with each of the identified registered confidential information marked along with each of the retrieved substitute words to replace the identified confidential information, and each of the potentially confidential words marked along with each of one or more generated words to replace the potentially confidential words.
-
公开(公告)号:US10032046B1
公开(公告)日:2018-07-24
申请号:US15826858
申请日:2017-11-30
Applicant: International Business Machines Corporation
Inventor: Daisuke Hayashi , Keisuke Nitta , Sayaka Tamai , Fumihiko Terui
Abstract: An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential information registered in a dictionary that contains registered confidential information and substitute words corresponding to the registered confidential information. The approach includes retrieving, from the dictionary, substitute words corresponding to each identified registered confidential information and identifying, in the text generated by the user, potentially confidential words based on a text analysis of the text generated by the user. The approach includes sending to the first computer, a proposed protected text including the text generated by the user with each of the identified registered confidential information marked along with each of the retrieved substitute words to replace the identified confidential information, and each of the potentially confidential words marked along with each of one or more generated words to replace the potentially confidential words.
-
公开(公告)号:US20170124037A1
公开(公告)日:2017-05-04
申请号:US14931353
申请日:2015-11-03
Applicant: International Business Machines Corporation
Inventor: Daisuke Hayashi , Sayaka Tamai , Keisuke Nitta , Fumihiko Terui
CPC classification number: G06F21/6254 , G06F17/2276
Abstract: A first character string in a logic used for the text analysis with a second character string which is different form the first character string is replaced using a mapping between the first character string and the second character string. The first character string being a character or a combination of characters in a logic. A first character string is searched for in a target document for the text analysis and the first character string, if found, is replaced with the second character string, using the mapping. The logic is sent after the replacement to a server computer. The target document after the replacement is sent to the server computer. A text analysis result for the target document after the replacement is received form the server computer.
-
-
-
-
-
-
-
-
-