2188 patents
Page 41 of 110
Utility
Direct Memory Control Operations on Memory Data Structures
18 Aug 22
Systems and methods for direct memory control operations on memory data structures.
Ulrich Drepper
Filed: 16 Feb 21
Utility
Configurable Monitoring and Alerting System
18 Aug 22
A system, include a memory and a processor where the processor is in communication with the memory.
Boaz Shuster, Oded Ramraz
Filed: 16 Feb 21
Utility
m4v2xb3v9mfqdgqcmwfn noejzefox149kyfdafucsjnme3hr0quq822q2te
18 Aug 22
Systems and methods for determining if a controller that can service a custom resource (CR) exists are disclosed.
Markus Thoemmes
Filed: 6 May 22
Utility
u4rbywikguxh1xlnumh1o8fsk3em1kkdu2r8w3sojio1fn9b
16 Aug 22
Quantum entanglement protection is disclosed.
Leigh Griffin, Stephen Coady
Filed: 12 May 20
Utility
q2uvkqle70wlasuax6yn0b z1ldq2n6nvz
16 Aug 22
Implementations for verifying validity of a literate programming document are described.
William Benton, Sophie Watson
Filed: 26 Aug 19
Utility
8gxkqvtdb9evrf07oqom988p7f2w8z1hbqwkwonka
16 Aug 22
Ahead-of-time (AOT) and just-in-time (JIT) compilation can be combined to improve application deployment.
Nicola Ferraro, Luca Burgazzoli
Filed: 12 Oct 20
Utility
7m76b98grbwp2jce2ja63j8cxcy7jm2cxt84rge6zjvcomnf2hng702rx
16 Aug 22
Methods and systems for storing and injecting bytecode are provided.
Huamin Chen, Michael Bursell
Filed: 16 Jan 20
Utility
2ihrqszhvjvuyfuopt4b88lmixa3ltdims
16 Aug 22
A method includes appending contextual information and identification information of the computing inventory data to time series data of computing metrics data to generate a relationship indication.
John Joseph Mazzitelli, Jay Shaughnessy
Filed: 16 Jun 21
Utility
wb0y4lw94sg1fybxpeeq6ahmsi
16 Aug 22
Stateful workloads executing on temporarily available resources of a cloud computing system can be managed.
Yehoshua Salomon, Orit Wasserman
Filed: 21 Dec 20
Utility
2smy46kticug0iernvqfbofp0cddp1w03ymvqg39kr b4y
11 Aug 22
Software components can be automatically integrated into a control framework in a distributed computing environment.
Michael Gerard Ryan
Filed: 9 Feb 21
Utility
d8ty0n146acnrnzrumqxath
11 Aug 22
Migration rules for a migration engine can be automatically generated using an automated pipeline.
Marco Rizzi, Paolo Antinori
Filed: 9 Feb 21
Utility
yfafrnu0523t51p56chaxjan3rkeiv1kjc4lo2wgfdxkq90jbtsb
11 Aug 22
A method includes receiving a request for content associated with a content platform and in response to receiving the request, retrieving the requested content from the content platform.
Og Benso Maciel
Filed: 9 Feb 21
Utility
qewp50m7ala7xx56hysvuyox3pd7w9vd27orecr m7pybs6cpr3tzmvwcq5s
11 Aug 22
Decision tables can be automatically validated on a computer according to some examples.
Luca Molteni, Matteo Mortari
Filed: 9 Feb 21
Utility
exqm0a ncee6lu8oy51fn7ab6m66tc5t1oq822pg
11 Aug 22
Systems and methods are described for providing context for software deployment using augmented reality.
Adam Scerra, Alexander Braverman Masis, Kedar Vijay Kulkarni
Filed: 9 Feb 21
Utility
u07to5 1mfsor8zi4w5nkc532subzyav4zxnc8yuo6xbgxf
11 Aug 22
Systems and methods for remote management of software on private networks are generally described.
Matt Albert Woodson
Filed: 5 Feb 21
Utility
fyqrw3j7mo9e1a8fy9xj54odxx5rtz7exrdpcx5xsrlq1olz
9 Aug 22
A system and method of emulating virtual processor identifiers includes a nested hypervisor requesting a virtual processor identifier, which identifies a virtual processor, the request triggering an exit to a host hypervisor.
Bandan Das, Karen Lee Noel
Filed: 27 Feb 17
Utility
0a3ri9ae80gy9vpvb4ha3vvfxl dm8a309cc49kiz4e
9 Aug 22
A method includes receiving a first request to execute a first instance of a function and generating a runtime container to execute the first instance of the function.
Markus Thoemmes
Filed: 22 Jul 20
Utility
272l14m4o133qh8ulv8m7 vdvmww7mp
9 Aug 22
A display device includes a display comprising a plurality of pixels.
Paul Fletcher Robinson, Thomas John Jenkinson
Filed: 26 Aug 20
Utility
frgyh6mj3lmfqwa7mzzyns
9 Aug 22
The technology disclosed herein provides a proof-of-work key wrapping system that uses key fragments to cryptographically control access to data.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
Filed: 19 Aug 19
Utility
o0g9se35 ab4ou7qbr26f677wsxh624wof9s6tdljswc
9 Aug 22
A host computer system is queried for network configuration data associated with network components within the host computer system.
Ji{hacek over (r)}í Benc
Filed: 9 Sep 19