Patent classifications
G06F11/00
UTILIZING MODELS TO INTEGRATE DATA FROM MULTIPLE SECURITY SYSTEMS AND IDENTIFY A SECURITY RISK SCORE FOR AN ASSET
A device may receive security data identifying assets of an entity, security issues associated with the assets, and objectives associated with the assets and may utilize a data model to generate, based on the security data, asset related data identifying mapped sets of security data. The device may process a first portion of the asset related data, with a first model, to calculate an asset risk likelihood score for an asset of the assets and may process a second portion of the asset related data, with a second model, to calculate an asset criticality score for the asset. The device may process a third portion of the asset related data, with a third model, to calculate an asset control effectiveness score for the asset and may combine the scores to generate a security risk score for the asset. The device may provide the security risk score for display.
TOOL FOR BUSINESS RESILIENCE TO DISASTER
Methods, systems, and computer programs are presented for estimating downtime and recovery time after a disaster. One method includes an operation for calculating component fragility functions for components of a facility that are vulnerable to damage after a disaster. Further, the method includes calculating component recovery functions for the components of the facility. The component recovery functions indicate a probability of recovery after a disaster over time. The method further includes operations for calculating a facility fragility function and a facility recovery function based on the component fragility functions and the component recovery functions, and for determining a downtime for the facility for a given intensity associated with the disaster. Further, the method includes an operation for causing presentation of the downtime for the facility on a user interface (UI).
TEST SYSTEM FOR DATA STORAGE SYSTEM PERFORMANCE TESTING
Performance testing a data storage system includes recording operating parameters and performance data as the data storage system executes performance tests over a test period, the performance data including one or more measures of a performance characteristic (e.g., latency) across a range of I/O operation rates or I/O data rates for each of the performance tests. Subsets of recorded operating parameters and performance data are selected and applied to a machine learning model to train and use the model, and the model provides a model output indicative for each performance test of a level of validity of the corresponding performance data. Based on the model output indicating at least a predetermined level of validity for a given performance test, the performance data for the performance test are incorporated into a record of validated performance data for the data storage system, usable for benchmarking, regression analysis, hardware qualification, etc.
Systems and methods for performing a technical recovery in a cloud environment
A computer-implemented method for testing failover may include: determining one or more cross-regional dependencies and traffic flow of an application in a first region of a cloud environment, wherein the one or more cross-regional dependencies include a dependency of the application in the first region of the cloud environment to one or more applications in at least one other region of the cloud environment; determining a risk score associated with performing failover of the application to a second region of the cloud environment at least based on the determined one or more cross-regional dependencies and traffic flow of the application; comparing the determined risk score with a predetermined risk score; in response to determining that the determined risk score is lower than the predetermined risk score, performing failover of the application to the second region of the cloud environment; isolating the second region of the cloud environment from the first region of the cloud environment for a predetermined period of time; and monitoring operation of the application in the second region of the cloud environment during the predetermined period of time.
Electronic system for dynamic analysis and detection of transformed transient data in a distributed system network
Embodiments of the invention are directed to systems, methods, and computer program products for dynamic analysis and detection of transformed transient data in a distributed system network. The system is structured for validating, determining and evaluating temporal data transformations associated with technology resource components across iterations of technology applications for maintaining backward compatibility. The system comprises an execution module structured for executing technology resource components in a plurality of testing technology environments concurrently. The system further comprises an analysis module structured for evaluating iterations of a first technology resource component by comparing the transformed first testing output with the transformed second testing output to determine modifications to the first iteration of the first technology resource component in the second iteration of the first technology resource component that succeeds the first iteration.
Immersive web-based simulator for digital assistant-based applications
Immersive web-based simulator for digital assistant-based applications is provided. A system can provide, for display in a web browser, an inner iframe configured to load, in a secure, access restricted computing environment, an application configured to integrate with a digital assistant. The application can be provided by a third-party developer device. The system can provide, for display in a web browser, an outer iframe configured with a two-way communication protocol to communicate with the inner iframe. The system can provide a state machine to identify a current state of the application loaded in the inner frame, and load a next state of the application responsive to a control input.
Automatic data-screening framework and preprocessing pipeline to support ML-based prognostic surveillance
The disclosed embodiments relate to a system that automatically selects a prognostic-surveillance technique to analyze a set of time-series signals. During operation, the system receives the set of time-series signals obtained from sensors in a monitored system. Next, the system determines whether the set of time-series signals is univariate or multivariate. When the set of time-series signals is multivariate, the system determines if there exist cross-correlations among signals in the set of time-series signals. If so, the system performs subsequent prognostic-surveillance operations by analyzing the cross-correlations. Otherwise, if the set of time-series signals is univariate, the system performs subsequent prognostic-surveillance operations by analyzing serial correlations for the univariate time-series signal.
Information security system and method for anomaly and security threat detection
A system for detecting security threats in a computing device receives a first set of signals from components of the computing device. The first set of signals includes intercommunication electrical signals between the components of the computing device and electromagnetic radiation signals propagated from the components of the computing device. The system extracts baseline features from the first set of signals. The baseline features represent a unique electrical signature of the computing device. The system extracts test features from a second set of signals received from the component of the system. The system determines whether there is a deviation between the test features and baseline features. If the system detects the deviation, the system determines that the computing device is associated with a particular anomaly that makes the computing device vulnerable to unauthorized access.
Monitoring and switchover of shared spectrum allocation manager in a wireless network
According to one configuration, a system includes provisioning hardware and a wireless station that supports communications with one or more communication devices. The wireless station receives a first notification from the provisioning system. The first notification indicating that the wireless station is assigned to a first allocation management resource. The first allocation management resource operable to allocate wireless resources for use by the wireless station to support wireless communications. The wireless station communicates with the first allocation management resource to receive allocation information indicating the wireless resources allocated for use by the wireless station. In response to receiving a second notification that the wireless station has been reassigned to a second allocation management resource, the wireless station communicates with the second allocation management resource instead of the first allocation management resource to receive the allocation information.
Using erasure coding in a single region to reduce the likelihood of losing objects maintained in cloud object storage
Techniques for using erasure coding in a single region to reduce the likelihood of losing objects in a cloud object storage platform are provided. In one set of embodiments, a computer system can upload a plurality of data objects to a region of a cloud object storage platform, where the plurality of data objects including modifications to a data set. The computer system can further compute a parity object based on the plurality of data objects, where the parity object encodes parity information for the plurality of data objects. The computer system can then upload the parity object to the same region where the plurality of data objects was uploaded.