2270 patents
Page 2 of 114
Utility
Fabric availability and synchronization
9 Jan 24
Aspects of the present disclosure include implementing fabric availability and synchronization (FAS) agents within a fabric network.
Ajoy C. Siddabathuni, Bjorn Dag Johnsen, Raghunath Shenbagam
Filed: 12 Jan 21
Utility
Instant notification of load balance and resource scheduling based on resource capacities and event recognition
9 Jan 24
Systems, computer-implemented methods, and computer-readable media for facilitating resource balancing based on resource capacities and resource assignments are disclosed.
Roger Garcia, Mitsumasa Sam Hanamoto, Neil H. Bui, Quang Hang, Jun Ma
Filed: 18 Aug 22
Utility
Systems and methods for a metadata driven integration of chatbot systems into back-end application services
9 Jan 24
The present disclosure generally relates to systems and methods for efficiently and dynamically integrating a chatbot into an application service.
Jeevan Selvan Job John, Mudit Gupta, Aswin Jose
Filed: 24 Feb 23
Utility
Multi-tenant identity cloud service with on-premise authentication integration
9 Jan 24
Embodiments are directed to a multi-tenant cloud system.
Isabella Hio-Wai Lao, Gary Cole, Sudarsan Sridhar, Gregg Wilson
Filed: 3 Mar 20
Utility
System and method for dynamic auto-scaling based on roles
9 Jan 24
In accordance with an embodiment, a system and method for dynamic auto-scaling based on roles is provided.
Thomas Hansen, Ravi Malhotra, Jyotisman Nag
Filed: 19 Nov 21
Utility
Methods, systems, and computer readable media for network function discovery using preferred-locality information
9 Jan 24
Methods, systems, and computer readable media for network function (NF) discovery using preferred-locality information are disclosed.
Amarnath Jayaramachar, Jay Rajput, Virendra Singh
Filed: 28 Sep 21
Utility
Detecting security vulnerabilities in queries via an information flow graph
2 Jan 24
A method for detecting a security vulnerability in code may include obtaining (i) a permitted information flow graph for a permitted query and (ii) a target information flow graph for a target query in the code, determining, by traversing the permitted information flow graph, a permitted information flow including permitted disclosed columns, permitted accessed columns, and a permitted predicate, determining, by traversing the target information flow graph, a target information flow including target disclosed columns, target accessed columns, and a target predicate, comparing the permitted information flow and the target information flow to obtain a comparison result, and determining, based on the comparison result, that the target query includes the security vulnerability.
Kostyantyn Vorobyov, Padmanabhan Krishnan
Filed: 30 Nov 21
Utility
Predictive system remediation
2 Jan 24
Techniques for predictive system remediation are disclosed.
Eric Sutton, Dustin Garvey, Sampanna Shahaji Salunke, Uri Shaft
Filed: 28 Mar 22
Utility
Concurrent memory recycling for collection of servers
2 Jan 24
The present memory restoration system enables a collection of computing systems to prepare inactive rewritable memory for reserve and future replacement of other memory while the other memory is active and available for access by a user of the computing system.
Tyler Vrooman, Graham Schwinn, Greg Edvenson
Filed: 27 Jan 23
Utility
Clone-aware approach for space and time efficient replication
2 Jan 24
In an embodiment, a computer stores source files and source clone files in a source filesystem.
Teng Wang, Diane Lebel, David Akers, Frederick S. Glover
Filed: 15 Oct 21
Utility
Combined row and columnar storage for in-memory databases for OLTP and analytics workloads
2 Jan 24
Columns of a table are stored in either row-major format or column-major format in an in-memory DBMS.
Tirthankar Lahiri, Martin A. Reames, Kirk Edson, Neelam Goyal, Kao Makino, Anindya Patthak, Dina Thomas, Subhradyuti Sarkar, Chi-Kim Hoang, Qingchun Jiang
Filed: 27 Feb 19
Utility
Tuning external invocations utilizing weight-based parameter resampling
2 Jan 24
Techniques are disclosed for tuning external invocations utilizing weight-based parameter resampling.
Debajyoti Roy
Filed: 21 Nov 22
Utility
Custom columns for static logical models
2 Jan 24
Systems, methods, and other embodiments associated with dynamic inclusion of custom columns into a logical model are described.
Michael Sassin
Filed: 27 Jun 22
Utility
Maximizing the operational range for training parameters while selecting training vectors for a machine-learning model
2 Jan 24
A system is provided for training an inferential model based on selected training vectors.
Guang C. Wang, Kenny C. Gross, Zexi Chen
Filed: 5 Nov 20
Utility
Cloud based cross domain system—CDSaaS
2 Jan 24
In some aspects, a computing device of the virtual cloud network may select one or more filters from a plurality of filters for a data pipeline, the plurality of filters comprising at least one of: a malware filter; a content filter; a signature filter; a content analyzer; a machine learning filter; or an artificial intelligence filter.
Eden Grail Adogla, Thomas Werner Kuehnel
Filed: 23 Nov 21
Utility
Methods, systems, and computer readable media for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) using NF repository function (NRF)
2 Jan 24
A method for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) includes, at an NF repository function (NRF) including at least one processor, receiving a message concerning a 5GC network function.
Jay Rajput, Amarnath Jayaramachar, Virendra Singh
Filed: 24 Nov 21
Utility
Edge attestation for authorization of a computing node in a cloud infrastructure system
2 Jan 24
The present embodiments relate to edge attestation of a host node to access a cloud infrastructure environment.
Brian Spencer Payne
Filed: 10 Nov 21
Utility
Enhanced processing of user profiles using data structures specialized for graphical processing units (GPUs)
2 Jan 24
Disclosed are techniques for processing user profiles using data structures that are specialized for processing by a GPU.
David Lawrence Rager, Andrew Edward Brownsword, Guy Lewis Steele, Jr.
Filed: 2 Jun 22
Utility
Methods, systems, and computer readable media for communicating delegated network function (NF) discovery results between service communication proxies (SCPs) and using the delegated NF discovery results for alternate routing
2 Jan 24
A method for communicating delegated NF discovery results between SCPs and using the delegated NF discovery results for alternate SBI service request routing includes receiving, at a first SCP and from a consumer NF instance, an SBI service request.
Ankit Srivastava, Sridhar Karuturi, Virendra Singh
Filed: 5 Jan 22
Utility
Memory device forensics and preparation
2 Jan 24
Example embodiments employ a selective memory swapping system for selectively placing non-volatile memory devices of a computer system offline, e.g., for background updating, and online, for use by a computer system, whereby the background updating process includes a mechanism for performing forensics analysis and updating of offline memory devices while an alternate memory device is usable by a user of the first computer system.
Tyler Vrooman, Greg Edvenson, Matthew King, Kumud Nepal
Filed: 6 Mar 23