2467 patents
Page 11 of 124
Utility
Fast shutdown of large scale-up processes
8 Aug 23
A system for shutting down a process of a database is provided.
Daniel Booss, Robert Kettler
Filed: 10 Aug 22
Utility
Backup and recovery for distributed database with scalable transaction manager
8 Aug 23
A method may include performing, at multiple data partitions, a point-in-time recovery to a specified time by applying transactions that have committed at each data partition up to the specified time.
Ivan Schreter
Filed: 27 May 21
Utility
ongfdb9jf2g9r9y4102y9vgsmym4isci1wofcucmsqg46m9yv5
8 Aug 23
Disclosed herein are various embodiments for a system for the automatic creation of database objects.
Vinutha Yediyur VaradarajaIyengar
Filed: 23 Aug 21
Utility
c670jftu3dke s6yzeb4g5d6of
8 Aug 23
Methods and systems are disclosed for remote code execution between computing environments having various dissimilarities.
PankajKumar Agrawal, Hemant Mangal, Mohit V Gadkari
Filed: 18 Mar 21
Utility
edtsda87x8zpkjzvrva4bn4db88goh8dy7n81ejn59fzu6a627qg1zwfb
8 Aug 23
Disclosed herein are various embodiments for blockchain service based application generator.
Vivek Vishal
Filed: 3 Nov 20
Utility
2pfhc6pnwvlowlszrtbq7dmxjs78zp3r4r2net1xoi0hl
8 Aug 23
An identifier of a data source specifying data is determined from a schema.
Jörg Schwan
Filed: 13 Sep 19
Utility
mtm 0clbne07svwwztdjl1s9v0n1v
8 Aug 23
Some embodiments provide a program that queries a database for a subset of a plurality of records in the database.
Ran Bittmann, Lev Sigal
Filed: 7 Apr 20
Utility
zwvwbpoexphl79tkgoehvi70hs2
8 Aug 23
Systems and methods are provided for accessing master data comprising a plurality of representative data records, where each representative data record represents a cluster of similar data records, and each similar data record has a confidence score indicating a confidence level that the similar data record corresponds to the cluster, and comparing a new data record to each representative data record of the plurality of representative data records using a machine learning model to generate a distance score.
Mengyuan Tao, Vishal Narender Punjabi, David Herman
Filed: 2 Jul 20
Utility
fxx3h4n6914ypvuuafxdcv4c3e6t4z87dojq0id48zhvjg8n 433
8 Aug 23
A language determination model may be applied to select a first machine learning model or a second machine learning model to analyze the input text.
Tobias Weller
Filed: 7 Jul 20
Utility
c6mznb38troqziwqu1kmdvve dpf9aty485f7ji134lgprt6ox26m
1 Aug 23
Methods, systems, and computer-readable storage media for receiving, by an anomalous operation detection service, current signal data representing a driving current applied to a device over a time period, processing, by an anomalous operation detection service, the current signal data through a deep neural network (DNN) module, a frequency spectrum analysis (FSA) module, and a time series classifier (TSC) module to provide a set of indications, each indication in the set of indications indicating one of normal operation of the device and anomalous operation of the device, processing, by an anomalous operation detection service, the set of indications through a voting gate to provide an output indication, the output indication indicating one of normal operation of the device and anomalous operation of the device, and selectively transmitting one or more of an alert and a message based on the output indication.
Jie He, Jianwei Chen, Xuemin Wang
Filed: 11 Aug 21
Utility
czt22j3cc5ekvey7 69ekgegcanee0v1ft3m9edktcp5q1y
1 Aug 23
The present disclosure involves systems, software, and computer implemented methods for executing integration scenario regression tests in customer landscapes.
VishnuPrasath Dhayanithi
Filed: 29 Sep 21
Utility
8sbrx7quwinazs9dc866xq718ogbf4m4oqf1l4f3k3ftcdezvea4ba
1 Aug 23
A system includes storage of data into a target memory location allocated to a target leaf node of a tree-based index structure, the target leaf node being a child node of a parent node of the tree-based index structure, where the tree-based index structure comprises one or more other leaf nodes which are child nodes of the parent node, and each of the target leaf node and the one or more other leaf nodes is associated with a plurality of allocated memory locations, incremental identification of all unused allocated memory locations between a first allocated memory location of a left-most one of the target leaf node and the one or more other leaf nodes and a last used allocated memory location of a right-most one of the target leaf node and the one or more other leaf nodes, and movement of data stored in the target leaf node and the one or more other leaf nodes into the identified unused allocated memory locations.
Thomas Legler
Filed: 23 Sep 21
Utility
rnaircq6y2hlbjjgj4kce
1 Aug 23
Methods, systems, and computer-readable storage media for receiving, by a conversation-based search system (CSS) of an analytics system, verbal input from a user, providing, by the CSS, text input based on the verbal input, processing, by the CSS, the text input to determine a set of contexts, each context in the set of context representing one or more operations of an enterprise, determining, by the CSS, one or more insights based on the set of contexts, each insight representative of a performance of the enterprise, and displaying, by the analytics system, a story comprising one or more visualizations, each visualization depicting at least one insight.
James Michael Amulu, Ranganathan Natarajan
Filed: 24 Dec 19
Utility
ywxtst0ae w1jwe27j14f88nijnrurqm6ln0
1 Aug 23
The present disclosure involves systems, software, and computer implemented methods for aligned purpose disassociation in a multi-system landscape.
Benny Rolle, Matthias Vogel, Carsten Pluder, Ufuoma Ighoroje, Carlo Fuerst, Iwona Luther
Filed: 26 Feb 21
Utility
tti8887979ovgxj1v27ea0r40a1lwurwc8hp4wqebvyr2n39quvx6lpuu
1 Aug 23
Disclosed herein are system, method, and computer program product embodiments for replicating data from table in a source database to a target database.
Alexander Becker, Sebastian Haase
Filed: 14 Dec 20
Utility
dpda20u2npmi3dx72wtq45qp6i9it0sf1jg1pm2qzf57jfk yxfgapd
1 Aug 23
Embodiments provide automated security scanning of incoming images for use in creating containers such as a Virtual Machines.
Andreas Meier, Thomas Grimmeisen
Filed: 20 Aug 21
Utility
7lbu6b2otr1k70e9aat7r0ewbde984al049zj9fhm
1 Aug 23
A method, a system, and a computer program product for generating and/or configuring a computing instance.
Siddhartha Bhattacharya, Amanda Hope Bailey, Jon Fullerton
Filed: 29 Nov 21
Utility
n8l0jd3hszvwjkc2z46bdw4uewtera 67
1 Aug 23
The present disclosure pertains to validation of runtime objects for a software deployment using a certificate.
Christian Martick
Filed: 4 Apr 22
Utility
upv30e 8jd6rxmlf2lxaagq4oya7qzpzp9
1 Aug 23
Techniques and solutions are described for detecting malicious database activity, such as SQL injection attempts.
Udo Klein
Filed: 13 May 21
Utility
67htmmhymdkoe9hap232hq gsbahtl7zu06008zj0vfjy
25 Jul 23
Techniques for testing a networked system using simulated abnormal node failure are disclosed.
Subhodeep Ganguly, Nagendra Reddy Devireddy
Filed: 29 Jun 21