-
公开(公告)号:US10747581B2
公开(公告)日:2020-08-18
申请号:US15433631
申请日:2017-02-15
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBrearty , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
-
公开(公告)号:US20160285825A1
公开(公告)日:2016-09-29
申请号:US14737334
申请日:2015-06-11
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBrearty , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
IPC: H04L29/06 , H04L12/931 , G06F9/455
CPC classification number: H04L63/0245 , G06F9/45558 , G06F2009/4557 , G06F2009/45579 , G06F2009/45595 , H04L49/70 , H04L63/0227 , H04L63/0236 , H04L63/0263 , H04L63/10 , H04L63/1425
Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information. The method may include sending the network packet to the HIPS based on determining that the plurality of connection information does not match the plurality of trusted connection information.
Abstract translation: 根据一个示例性实施例,提供了一种用于虚拟环境内的虚拟组件与主机入侵防御系统(HIPS)之间的负载平衡的方法。 该方法可以包括从HIPS接收可信连接表,其中可信连接表包含多个可信连接信息。 该方法还可以包括从虚拟交换机接收网络分组,其中网络分组具有多个连接信息。 该方法然后可以包括确定多个连接信息是否与多个可信连接信息匹配。 该方法还可以包括:基于确定多个连接信息与多个可信连接信息匹配,将网络分组发送到目的地。 该方法可以包括:基于确定多个连接信息与多个可信连接信息不匹配来向HIPS发送网络分组。
-
公开(公告)号:US09319364B2
公开(公告)日:2016-04-19
申请号:US14080605
申请日:2013-11-14
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Shawn P. Mullen , Jessica C. Murillo , Gerald F. McBrearty , Johnny M. Shieh
Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
-
公开(公告)号:US09167069B2
公开(公告)日:2015-10-20
申请号:US14067617
申请日:2013-10-30
Applicant: International Business Machines Corporation
Inventor: Shawn P. Mullen , Jessica C Murillo , Johnny M. Shieh
CPC classification number: H04M1/72519 , H04M1/72572 , H04M19/04 , H04W4/021 , H04W68/005
Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
Abstract translation: 本发明的实施例涉及响应于在限定区域中的移动设备的到达和离开的通知的管理。 优先列表在定义区域中的移动设备之间共享。 一旦检测到,移动设备将其各自选择的通知添加到优先列表中。 进入定义区域的移动设备接收优先列表,并且响应于在优先级列表上检测到共享的选择的通知,该区域中的一个移动设备将其选择的通知改变为备选通知。 进入定义区域的第二移动设备同样将接收优先级列表,并且响应于列表上共享的所选通知将其选择的通知改变为第二备选通知。 在设备离开该区域时,该列表将再次被更新,并且从该列表中删除该设备专用的所有通知。
-
公开(公告)号:US20140267337A1
公开(公告)日:2014-09-18
申请号:US14027233
申请日:2013-09-15
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBreartry , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
IPC: G06T1/60
CPC classification number: H04N21/4331 , H04N21/23418 , H04N21/44004 , H04N21/44016 , H04N21/6547 , H04N21/812
Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.
-
公开(公告)号:US10528917B2
公开(公告)日:2020-01-07
申请号:US15251822
申请日:2016-08-30
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBrearty , Shawn P. Mullen , Jessica Murillo , Johnny M. Shieh
IPC: G06F15/16 , G06Q10/10 , G06F16/13 , G06F3/0481 , G06F3/0482 , G06F3/0484 , G06F3/0486 , H04L12/58
Abstract: A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient.
-
公开(公告)号:US09697378B2
公开(公告)日:2017-07-04
申请号:US14106225
申请日:2013-12-13
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
CPC classification number: G06F21/6227 , G06F2221/2107 , H04L9/0894 , H04L67/10 , H04L2463/062
Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.
-
公开(公告)号:US20150372961A1
公开(公告)日:2015-12-24
申请号:US14309169
申请日:2014-06-19
Applicant: International Business Machines Corporation
Inventor: Maggie H. Phung , Johnny M. Shieh , Chin Ngai Sze , Zhennan Wang
IPC: H04L12/58 , G06F3/0481
CPC classification number: H04L51/24 , G06Q10/107 , H04L51/28
Abstract: A method for generating a notification about a recipient of a message. The recipient of the message is identified while the message is being composed. Whether information is present about the recipient for use in composing the message is determined. The notification is presented to the sender based on the information identified about the recipient while the message is being composed when the information about the recipient is present for the message.
Abstract translation: 一种用于生成关于消息的接收者的通知的方法。 消息的接收者在组成消息时被识别。 是否确定关于收件人的信息是否用于撰写信息。 当针对消息存在关于接收者的信息时,基于关于接收者的信息在发送消息被发送时,向发送者发送通知。
-
9.
公开(公告)号:US20150319145A1
公开(公告)日:2015-11-05
申请号:US14799631
申请日:2015-07-15
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBrearty , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
CPC classification number: H04L63/1466 , H04L43/10 , H04L63/0428 , H04L63/1475 , H04L63/1483
Abstract: Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spooling LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to Whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending as heartbeat that is designed to fail unless the heartbeat is received by as spooling device.
Abstract translation: 提供了使虚拟输入/输出服务器(VIOS)能够使用目标LPAR建立加密安全信号以检测冒牌者或假脱机LPAR的技术。 安全信号或“心跳”可以配置为Internet密钥交换/互联网协议安全(IKE / IPSec)封装数据包(ESP)连接或隧道。 在隧道内,VIOS对每个目标LPAR进行ping,如果心跳中断,VIOS就确定隧道是否断开,相应的LPAR是否关闭,还是发生媒体访问控制(MAC)欺骗附件。 通过发送设置为失败的心跳来进行确定,除非作为假脱机设备接收心跳。
-
公开(公告)号:US10019696B2
公开(公告)日:2018-07-10
申请号:US14608339
申请日:2015-01-29
Applicant: International Business Machines Corporation
Inventor: Susann M. Keohane , Gerald F. McBrearty , Shawn P. Mullen , Jessica C. Murillo , Johnny M. Shieh
CPC classification number: G06Q20/1235 , G06F21/10 , G06F21/31 , G06F21/6209 , H04L63/10 , H04L67/06 , H04L67/32 , H04L2463/101
Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
-
-
-
-
-
-
-
-
-