2188 patents
Page 17 of 110
Utility
Tagging Packages In an Application Ecosystem
20 Jul 23
Embodiments of the present disclosure relate to systems and methods for creating logical groups of packages by tagging individual packages with a tag associated with metadata corresponding to packages that are part of the group.
Pierre-Yves Chibon, Leigh Griffin
Filed: 19 Jan 22
Utility
Per-host Delta-difference Generation In Update Management Systems
20 Jul 23
Embodiments of the present disclosure relate to systems and methods for generating delta-difference on an on-demand basis.
Pierre-Yves Chibon, Leigh Griffin
Filed: 20 Jan 22
Utility
Quantum Computer System Scheduling and Parameterization Based on Error Correction History
20 Jul 23
In one example described herein a system can receive, by a scheduler of a server, a request to execute a quantum algorithm.
Stephen Coady, Leigh Griffin
Filed: 18 Jan 22
Utility
Mayday-relay Mechanism In a Mesh Network
20 Jul 23
A system and method of relaying distress calls in a mesh network of nodes.
Leigh Griffin, Pierre-Yves Chibon
Filed: 20 Jan 22
Utility
Network transparency on virtual machines using socket impersonation
18 Jul 23
A system includes a hypervisor, a virtual machine (VM), and a host system.
Sergio Lopez Pascual
Filed: 19 Jun 20
Utility
Methods and system for auditing batch jobs using blockchain
18 Jul 23
Systems and methods for auditing batch jobs with blockchain transactions are provided.
Bilgin Ismet Ibryam
Filed: 18 Mar 19
Utility
Signature verification using blockchain
18 Jul 23
A package management system to initiate a transaction in a blockchain system.
Bruno Ciscato, Dominic Hart
Filed: 13 Sep 21
Utility
Managing cloud acquisitions using distributed ledgers
18 Jul 23
Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.
Cathal O'Connor, Brian Gallagher
Filed: 4 Feb 22
Utility
Sidecar-based Integration Capabilities for Containerized Applications
13 Jul 23
Methods and systems for improved integration functions for applications are provided.
Bilgin Ismet Ibryam
Filed: 30 Jan 23
Utility
Enabling Communication Between Virtual Machines and Virtual Devices by Hypervisor-controlled Firmware
13 Jul 23
Systems and methods for encryption support for virtual machines.
Michael Tsirkin
Filed: 13 Mar 23
Utility
Secure Virtual Machine and Peripheral Device Communication
13 Jul 23
A method includes exposing a public cryptographic key associated with a peripheral device of a computing system to a guest running on the computing system.
Michael Tsirkin
Filed: 13 Mar 23
Utility
Dynamic Data Batching for Graph-based Structures
13 Jul 23
A data query for data is received that is associated with a first data node managed by a first executable service and a second data node managed by a second executable service.
Manyanda Chitimbo, Wojciech Julian Trocki
Filed: 10 Jan 22
Utility
Managing Standard Operating Procedures Using Distributed Ledger Networks
13 Jul 23
Systems and methods of the disclosure include: receiving, by a node of a distributed ledger network, first transaction data, wherein the first transaction data comprises an alert derived from a state of a computer system; storing the first transaction data in a first block of the distributed ledger network; receiving, by the node, second transaction data, wherein the second transaction data comprises an identifier of a remedial action performed on the computer system in response to the alert and a result of performing the remedial action; and storing the second transaction data in a block of the distributed ledger network, wherein the block is provided by one of: the first block or a second block.
Brian Gallagher, Cathal O'Connor
Filed: 10 Jan 22
Utility
Automated Deployment of Control Nodes at Remote Locations
13 Jul 23
A control node can be automatically deployed at a remote location according to some examples described herein.
Arie Bregman, Steve Mattar
Filed: 12 Jan 22
Utility
Self-organizing Network Configuration
13 Jul 23
A status communication is received that is associated with a mesh network comprising a plurality of interconnected node devices.
Pierre-Yves Chibon, Leigh Griffin
Filed: 10 Jan 22
Utility
Selective Validation of a Portion of a Server Response to a Client Request
13 Jul 23
A portion of a server response to a client request can be selectively validated according to some examples described herein.
Josejulio Martinez Magana
Filed: 11 Jan 22
Utility
Hypercall acceleration for nested virtual machines
11 Jul 23
Systems and methods for accelerating hypercalls for nested virtual machines.
Michael Tsirkin, Karen Noel
Filed: 4 May 20
Utility
Aggregated health monitoring of a cluster during test automation
11 Jul 23
A system includes a cluster of nodes, memory, and a processor, where the cluster includes an application programming interface (API) server and one or more components.
Naga Ravi Chaitanya Elluri
Filed: 25 Nov 20
Utility
Application programming interface compatibility
11 Jul 23
A system, comprising a memory and a processor, where the processor is in communication with the memory, is configured to receive a request to determine a compatibility of a first version of an application programming interface (API) with a second version of the API.
Andrew D. Mackenzie, Eric Wittmann
Filed: 8 Mar 21
Utility
Management of building of software packages using a trusted execution environment
11 Jul 23
Systems and methods providing a processing device to receive, by a software build process executing in a trusted execution environment (TEE) of a first computer system, software source code from a second computer system.
Axel Simon, Michael Hingston McLaughlin Bursell
Filed: 5 Mar 21