668 patents
Utility
Code Execution and Data Processing Pipeline
18 Jan 24
A method performed by one or more processors comprises displaying code, receiving user selection of a portion of code, determining one or more settable data items, generating a template, displaying the template, receiving a user input value for the settable data items by the template, and executing the code with each of the settable data items set to the received user input value.
Eliot Ball, Matthew Jenny, Nicholas Gates, Erin Price-Wright, Kamran Khan, Gregory Manis, Emeline Wu
Filed: 28 Jul 23
Utility
Systems and Methods for Managing Incentives
18 Jan 24
An incentive management system can receive one or more data items associated with a member of an organization; categorize said one or more data items; and store, according to the categorization, the one or more data items in at least one of a plurality of data sets.
Ashkhen Martirosyan, Andrew St. Pierre, Emily Greene, Frances Batton, Madeline Parker, Tinlok Pang
Filed: 24 Feb 23
Utility
System Architecture for Cohorting Sensor Data
11 Jan 24
A method of cohorting data sets can include accessing a plurality of data sets each associated with a different target item and a plurality of test items and receiving from a user a selection of a plurality of the data sets.
Myles Gurule, Amin Mannaa, Nabeel Qureshi, Arjun Prakash, Andrew Girvin, Matthew Owens
Filed: 22 Aug 23
Utility
Entity Search Engine Powered by Copy-detection
11 Jan 24
Systems and methods for identifying associations between a code snippet query and stored computer code stored.
Gokcan Ozakdag, Mihir Pandya
Filed: 25 Sep 23
Utility
Providing External Access to a Processing Platform
11 Jan 24
An apparatus, and a method, performed by one or more processors are disclosed.
Audrey Kuan, Andrew Kaier, Eric Lee, Jasjit Grewal, Mark Elliot, Nitish Kulkarni, Robert Fink, Samuel Rogerson, Thomas Pearson, Thomas Powell, Lawrence Manning, Corey Garvey
Filed: 25 Sep 23
Utility
Systems and Methods for Lineage-aware Data Retention
11 Jan 24
Systems and methods for lineage-aware data retention are provided.
Arnav Jagasia, Ashley Meuser, Mihir Patil, Pieris Christofi, Sam Stoll
Filed: 6 Jul 23
Utility
Data Structure Based on Event Compaction and Read-offsets
11 Jan 24
Disclosed herein is a data structure which includes a sequence of events, each event associated with a sequence number indicating a temporal position of an event within the sequence of events; one or more read-offsets, each read-offset associated with a consumer, wherein each read-offset indicates a sequence number up to which a consumer has read events within the sequence of events; and at least one snapshot which represents events with sequence numbers smaller than the smallest read-offset in a compacted form.
Robert Fink, James Baker, Mark Elliot
Filed: 25 Sep 23
Utility
Systems and Methods for Geohash-based Image Scoring and Labeling
11 Jan 24
Systems and methods for image scoring are disclosed.
Christian Sidak
Filed: 7 Jul 23
Utility
Supervisory Control and Data Acquisition
4 Jan 24
Aspects of the present disclosure relate to computer system security.
Nomi Becker, Isaac Smitley
Filed: 18 Sep 23
Utility
Systems and Methods for Coordinating the Deployment of Components to Defined User Groups
4 Jan 24
Systems and methods are provided for coordinating the deployment of frontend assets to defined user groups.
William HICKMAN, Mark ELLIOT
Filed: 18 Sep 23
Utility
Monitoring and Alerting Mechanisms
4 Jan 24
Computing systems methods, and non-transitory storage media are provided for receiving a monitoring request.
Aditya CHATURVEDI, Austin CZARNECKI, Alexander MARTINO, Benjamin DUFFIELD, Gokcan OZAKDAG, Natacha GABBAMONTE
Filed: 8 Dec 22
Utility
System Architecture for Enabling Efficient Inter-application Communications
28 Dec 23
A system architecture can be used to facilitate communication among applications that are native and/or non-native to an application environment.
Peter Wilczynski, Christopher Hammett, Lloyd Ho, Sharon Hao
Filed: 11 Sep 23
Utility
Predictive Modelling
28 Dec 23
Systems, methods, and non-transitory computer-readable media can be configured to perform receiving a notification of a maintenance event associated with a resource.
Ezra SPIRO, Andre Frederico Cavalheiro MENCK, Peter MAAG, Thomas POWELL
Filed: 11 Sep 23
Utility
Pipeline Management Tool
28 Dec 23
Systems, methods, and non-transitory computer readable media are provided for managing pipelines of operations on data.
Salar AL KHAFAJI, Sebastiaan VISSER
Filed: 11 Sep 23
Utility
Secure High Scale Cryptographic Computation Through Delegated Key Access
28 Dec 23
An apparatus, computer-implemented method and computer program are disclosed for performing a cryptographic operation in a high-trust (HT) environment.
Hugo Dobbelaere, Mihir Patil, Morten Telling, Robert Kruszewski, Yeong Wei Wee
Filed: 22 Jun 22
Utility
Remote Diagnosis of Energy or Resource-consuming Devices Based on Usage Data
21 Dec 23
Systems and methods are provided to retrieve or analyze usage data collected from a device or a facility where the device, optionally with devices are located, and identify useful features for making a diagnosis of the device.
Dylan DANIELS, Ulas ZIYAN
Filed: 29 Aug 23
Utility
Synchronising Datasets Updates
21 Dec 23
An apparatus, computer-implemented method and computer program are disclosed for synchronising dataset updates.
Jamie Sookprasong
Filed: 17 Jun 22
Utility
Systems and Methods for Creating and Managing a Data Integration Workspace
21 Dec 23
Systems and methods are provided for creating and managing a data integration workspace.
Matthew MACLEAN, Adam BOROCHOFF, Joseph RAFIDI, Matthew JENNY, Parvathy MENON, Ryan ROWE
Filed: 29 Aug 23
Utility
Enforcing Granular Access Control Policy
14 Dec 23
An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
Peter Wilczynski, Arseny Bogomolov, Alexander Mark, Teofana Hadzhiganeva, Kevin Ng, Nathaniel Klein, Sharon Hao
Filed: 28 Aug 23
Utility
Entity Data Attribution Using Disparate Data Sets
7 Dec 23
Systems and methods for using disparate data sets to attribute data to an entity are disclosed.
Jean-Baptiste Michel, Alan Hampton, Ananya Shukla, I.K Ashok Sivakumar
Filed: 22 Aug 23