Abstract:
An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables.
Abstract:
Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment.
Abstract:
Embodiments include method, systems and computer program products for searching a social network for media content. Aspects include receiving a query for media content related to a topic from a user, identifying a plurality of content items associated with the topic and determining a quality score for each of the plurality of content items. Aspects also include providing a subset of the plurality of content items to the user, wherein the subset is selected based on the quality score and updating the quality score of one or more content items in the subset based on a behavior of the user in viewing the subset of the plurality of content items.
Abstract:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
Abstract:
Embodiments include method, systems and computer program products for searching a social network for media content. Aspects include receiving a query for media content related to a topic from a user, identifying a plurality of content items associated with the topic and determining a quality score for each of the plurality of content items. Aspects also include providing a subset of the plurality of content items to the user, wherein the subset is selected based on the quality score and updating the quality score of one or more content items in the subset based on a behavior of the user in viewing the subset of the plurality of content items.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
User trustworthiness may be introduced in implicit feedback based supervised machine learning systems. A set of training data examples may be scored based on the trustworthiness of users associated respectively with the training data examples. The training data examples may be sampled into a plurality of training data sets based on a weighted bootstrap sampling technique, where each weight is a probability proportional to trustworthiness score associated with an example. A machine learning algorithm takes the plurality of the training data sets as input and generates a plurality of trained models. Outputs from the plurality of trained models may be ensembled by computing a weighted average of the outputs of the plurality of trained models.
Abstract:
A method for enabling resiliency for cloud computing systems is described. The method includes modifying a topology graph of a network architecture by mapping processes flows onto the topology graph. A resiliency graph is created based on the modified topology graph. The method includes modifying the resiliency graph by translating at least one SLA into the resiliency graph. Overlaps and dependencies in the modified resiliency graph are identified. Apparatus and computer readable instructions are also described.
Abstract:
Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.
Abstract:
A method, computer system, and a computer program for data selection is provided. The present invention may include generating a first model associated with a dataset. The present invention may further include determining a first model performance level associated with the first model based on a plurality of dataset metric values of the dataset. The present invention may further include a plurality of data subsets of a dataset based on the first model performance level failing to exceed a performance threshold and calculating a plurality of subset metric values associated with the plurality of data subsets. The present invention may further include generating a second model associated with at least one data subset based on the plurality of subset metric values and determining an optimization associated with the first model based on a second model performance level associated with the second model exceeding the performance threshold.