524 patents
Page 10 of 27
Utility
Malware management using I/O correlation coefficients
18 Jan 22
A malware attack is detected in a computing system by monitoring file I/O and coordinated network I/O traffic and referencing criteria including a correlation coefficient calculated relative to the I/O.
Manoj Dahal
Filed: 10 Dec 19
Utility
Error detection in text string within displayed layout
18 Jan 22
The color of a character of a text string within a layout is changed, and the layout is displayed.
Yi-Qun Ren, Kai Hu, Le Peng
Filed: 8 May 20
Utility
Topology based management with stage and version policies
18 Jan 22
In one implementation, a method for topology based management with stage and version policies can include associating a topology of an application under development, determining a number of policies, wherein the number of policies include stage and version policies that define a number of available infrastructures for a given stage and version of the application, associating the number of policies to a number of nodes of the topology, and provisioning the topology with the associated number of policies.
Stephane H. Maes
Filed: 30 Sep 14
Utility
Directed Graph for Application Under Test
13 Jan 22
A directed graph for an application under test (AUT) hosted at a hosting computing device is generated based on test flows.
Zhenbin Lin, Qian-Ru Zhai, Ye Jiang, Meng-Jie Chen, Douglas Grover
Filed: 8 Jul 20
Utility
Transforming data associated with a file based on file system attributes
4 Jan 22
A technique includes intercepting, by a computer, an input/output (I/O) request that is directed to a file; and in response to the interception of the I/O request, accessing, by the computer, file system attributes that are associated with the file and are stored separately from the file.
Sushil Nair, Kevin McLeod
Filed: 6 Aug 19
Utility
Reporting behavior anomalies
4 Jan 22
A technique includes determining relations among a plurality of entities that are associated with a computer system; and selectively grouping behavior anomalies that are exhibited by the plurality of entities into collections based at least in part on the determined relations among the entities.
Tomasz Jaroslaw Bania, William G. Horne, Pratyusa K. Manadhata, Tomas Sander
Filed: 20 Feb 17
Utility
Cluster model to predict build failure
14 Dec 21
Techniques to create and use cluster models to predict build failures are provided.
Elad Benedict, Einat Atedgi, Ohad Assulin, Boaz Shor
Filed: 27 Apr 17
Utility
Determinations of Whether Events Are Anomalous
2 Dec 21
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to cluster a set of data points into a hierarchy of a plurality of clusters, in which each level of the hierarchy includes a different number of the plurality of clusters.
Arshad JAVEED
Filed: 26 May 20
Utility
Application-aware virtual machine backup
30 Nov 21
A method relates to backing up a VM.
Veeresh Mallappa Anami, Sunil Turakani
Filed: 7 Nov 18
Utility
Displaying real-time security events
30 Nov 21
A system and method for displaying a number of real-time security events comprises a number of client devices and an administrator device communicatively coupled to the client devices.
Anurag Singla, Adam Brody
Filed: 28 Jan 13
Utility
Training a security scan classifier to learn an issue preference of a human auditor
30 Nov 21
A technique includes receiving data representing an output of a security scan of an application and an audit of the security scan by a human auditor.
Michael Jason Schmitt, Guy Wiener, Emil Kiner, Tomer Priel
Filed: 12 Aug 15
Utility
Scanning information technology (IT) components for compliance
30 Nov 21
Examples disclosed herein relate to scanning an IT component for compliance.
Sachin Johar
Filed: 5 May 17
Utility
Enhanced intelligence for a security information sharing platform
23 Nov 21
Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform.
Tamir Mitelman, Meytal Maor, Ofer Bachner, Amir Kibbar
Filed: 7 Sep 16
Utility
Automated remediation of information technology events
23 Nov 21
A computing device includes a processor and a medium storing instructions.
Frank Nitsch, Stefan Bergstein
Filed: 21 Dec 18
Utility
Identifying representative entities in clusters for it management
16 Nov 21
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to extract, from network traffic data, a connectivity matrix that identifies connectivity data between entities and group the entities into a plurality of clusters based on the extracted connectivity matrix.
Manish Marwah, Martin Arlitt
Filed: 16 Jul 20
Utility
Page Navigation with Tree Menu
11 Nov 21
A computing device includes a processor and a machine-readable storage medium storing instructions.
Li ZHANG, Bing ZHANG, Da-Long SUN, Rong-Feng CHEN
Filed: 5 Oct 18
Utility
Error Detection In Text String Within Displayed Layout
11 Nov 21
The color of a character of a text string within a layout is changed, and the layout is displayed.
Yi-Qun Ren, Kai Hu, Le Peng
Filed: 8 May 20
Utility
Asymmetric-man-in-the-middle Capture Based Application Sharing Protocol Traffic Recordation
11 Nov 21
In some examples, with respect to asymmetric-man-in-the-middle capture based application sharing protocol traffic recordation, a dynamic-link library that alters application programming interface calls with respect to communication between an application sharing protocol client and an application sharing protocol server may be injected into the application sharing protocol client.
Yang LUO, Jian ZHANG, Qian-Ru ZHAI, Zhenbin LIN
Filed: 11 Oct 18
Utility
Intent and Context-aware Dialogue Based Virtual Assistance
11 Nov 21
In some examples, with respect to intent and context-aware dialogue based virtual assistance, an intent of an inquiry may be determined using an intent classification model.
Jin WANG, Hao HUANG, Ting-Kun LI, Nai-Long WEN, Zhen CUI, David BARON
Filed: 28 Sep 18
Utility
Automated Testing of Program Code Under Development
4 Nov 21
Automated test failures that result from automated testing of program code under development are windows to include just the automated test failures occurring for a first time and that are due to automated test code defects or program code defects.
Sigal Ishay, Ilan Shufer, Sharon Lin
Filed: 1 May 20