| 11533296 |
Testing and remediating compliance controls |
Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson +3 more |
2022-12-20 |
| 11526770 |
Latent computing property preference discovery and computing environment migration plan recommendation |
Jinho Hwang, John Rofrano, Anup Kalia, Ya Bin Dang, Jie Ma +1 more |
2022-12-13 |
| 11522819 |
Maintaining tribal knowledge for accelerated compliance control deployment |
Constantin Mircea Adam, Muhammed Fatih Bulut, Richard B. Hull, Anup Kalia, Jin Xiao |
2022-12-06 |
| 11520783 |
Automated validity evaluation for dynamic amendment |
Chen Lin, John Rofrano, Anup Kalia, Jinho Hwang, Jie Ma +2 more |
2022-12-06 |
| 11501165 |
Contrastive neural network training in an active learning environment |
Chen Lin, Hongtan Sun, John Rofrano |
2022-11-15 |
| 11502995 |
Testing and remediating compliance controls |
Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson +3 more |
2022-11-15 |
| 11500914 |
Query recommendation to locate an application programming interface |
Anup Kalia, Jin Xiao, Yu Deng |
2022-11-15 |
| 11487603 |
Cognitive service request construction |
Anup Kalia, Jinho Hwang, Frederick Y. Wu |
2022-11-01 |
| 11487604 |
Cognitive service request construction |
Anup Kalia, Jinho Hwang, Frederick Y. Wu |
2022-11-01 |
| 11455522 |
Detecting personal danger using a deep learning system |
Steven A. Cordes, Michael S. Gordon, Nigel Hinds |
2022-09-27 |
| 11429565 |
Terms of service platform using blockchain |
David W. Kaguma, Clifford A. Pickover, Komminist Weldemariam |
2022-08-30 |
| 11416243 |
Microservice decomposition strategy of monolithic applications |
Jinho Hwang, Anup Kalia, Jin Xiao, Malik Jackson, John Rofrano +1 more |
2022-08-16 |
| 11405264 |
Predictive analytics and device tracking to facilitate minimization of alert events |
Michael Bar-Joshua, Itzhack Goldberg, Roxana Monge Nunez |
2022-08-02 |
| 11360877 |
Forming microservices from monolithic applications |
Chen Lin, Anup Kalia, Jin Xiao, John Rofrano, Saurabh Sinha +1 more |
2022-06-14 |
| 11288360 |
Preventing untrusted script execution |
Constantin Mircea Adam, Richard Jay Cohen, Jeffrey Edward Lammers, Cheng Yi Lee, Brian Peterson +1 more |
2022-03-29 |
| 11282005 |
Selecting a plurality of individuals and AI agents to accomplish a task |
James R. Kozloski, Clifford A. Pickover |
2022-03-22 |
| 11244012 |
Compliance by clustering assets according to deviations |
Constantin Mircea Adam, Muhammed Fatih Bulut, Milton H. Hernandez |
2022-02-08 |
| 11221855 |
Transformation of an enterprise application into a cloud native application |
Jin Xiao, Anup Kalia, Jinho Hwang, John Rofrano |
2022-01-11 |
| 11222296 |
Cognitive user interface for technical issue detection by process behavior analysis for information technology service workloads |
Hongtan Sun, Karin Murthy, Raghav Batta, Soumitra Sarkar |
2022-01-11 |
| 11221908 |
Discovery of an inexplicit link between a change and an incident in a computing environment |
Raghav Batta, George E. Stark, Alexandre Francisco Da Silva, Jinho Hwang, Michael Elton Nidd +1 more |
2022-01-11 |
| 11221846 |
Automated transformation of applications to a target computing environment |
Anup Kalia, Jin Xiao, Jinho Hwang, John Rofrano |
2022-01-11 |