1123 patents
Page 11 of 57
Utility
Rfid Broadcast Authenticated Activation
4 May 23
A radio frequency identification (RFID) broadcast signal is received.
Leigh Griffin, Pierre-Yves Chibon
Filed: 28 Oct 21
Utility
Evaluating System Recovery Using Emulated Production Systems
4 May 23
The technology disclosed herein can be used to evaluate system recovery using emulated production systems.
Pradeep Kumar Surisetty, Sai Sindhur Malleni, Naga Ravi Chaitanya Elluri
Filed: 28 Oct 21
Utility
awzlylgjesvs2f5wei 79
4 May 23
Space efficient distributed storage systems are disclosed.
Gobinda Das
Filed: 22 Dec 22
Utility
m62pqzlg8wyl49wq xlksmhau2hoknr8iur88a0dgd0
4 May 23
Systems and methods for managing access to a block device.
Avraham Talmor, Ilan Gersht, Arie Bregman
Filed: 28 Oct 21
Utility
x7coz74on2j8 26icgs4
4 May 23
A computing infrastructure diagram is identified.
Arie Bregman, Avraham Talmor, Ilan Gersht
Filed: 4 Nov 21
Utility
nf45upssl15nbyt8oefrnfbx
4 May 23
A method includes updating a cloud networking environment from a first network mechanism driver to a second network mechanism driver and identifying a configuration of one or more resources of the cloud networking environment associated with the first network mechanism driver.
Eran Kuris, Arie Bregman
Filed: 28 Oct 21
Utility
hv6s22xs8eo mqzrctf3ob2v31dovz9a3xjmh5fgjaeid6o5k5439uplnpd
4 May 23
A method includes receiving data uploaded to a storage system from a client device and in response to receiving the data, instantiating a serverless function for anonymizing the data uploaded to the storage system.
Huamin Chen, Michael Hingston McLaughlin Bursell, Yuval Lifshitz
Filed: 28 Oct 21
Utility
ipz1q8k9tcqmd1fqe sgz32kx4291e0
4 May 23
Systems and methods for cloud-based keyless entry are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 5 May 22
Utility
wc0rxir4 noej74fdxonpo2cdr0ax98bhdb8g296atukip9gcu8oqnce
4 May 23
For each continuous integration and continuous delivery/deployment (CI/CD) pipeline of a plurality of CI/CD pipelines created for a project, a data structure reflecting an execution configuration of the respective CI/CD pipeline is created.
Arie Bregman, Steve Mattar
Filed: 29 Oct 21
Utility
7fo2jzi9jftacrpic 2zc5z9fttrrui8b65a2y4ead1uox6
4 May 23
Deployment code that identifies a desired deployment of a computer application onto a computing system comprising one or more compute instances is accessed.
Stefan Bunciak, Miroslav Jaros
Filed: 28 Oct 21
Utility
3rm3wrlh1 rok2dq2xuyt
4 May 23
An example method includes receiving, via a text input component of a containerized cluster user interface, text that includes an operation name that identifies a containerized cluster operation, wherein the text further includes a textual parameter name and a textual parameter value.
Ran Elimelech
Filed: 28 Oct 21
Utility
uxxqzfat kqkf58itjgwhm0j004df721oiwgb5
4 May 23
Systems and methods for enabling binary execution by a virtual device.
Jesper Brouer, Michael Tsirkin
Filed: 28 Oct 21
Utility
m1y7196tlwys2ua29ui2a838eod5dqlzx4 5w7kf
4 May 23
Processing logic may obtain a resource of a platform fora containerized application.
Cathal O'Connor, Brian Gallagher
Filed: 4 Nov 21
Utility
2mkysy8u2a73rnco5bto5zyywxhimio0kvytcqd69icic7bgdkc4d
4 May 23
Systems and methods for cloud-based keyless entry are generally described.
Andrea Cosentino, Paolo Antinori
Filed: 28 Oct 21
Utility
itcs7gdnmu1n8kbr7fjard 7190f
4 May 23
Performing qubit manipulation using push notifications is disclosed herein.
Stephen Coady, Leigh Griffin
Filed: 28 Oct 21
Utility
firzu8ngl9d5rvrnjs3ucawi
27 Apr 23
A snapshot storage proxy receives a request from an object storage interface component to access a snapshot volume, wherein the request is formatted to interact with object storage data, and wherein the snapshot volume is stored as non-object storage data; translates the request from the object storage interface into a snapshot volume request, wherein the snapshot volume request is formatted to interact with non-object storage data; and accesses the snapshot volume in view of the translated snapshot volume request.
Yaniv Kaul
Filed: 26 Oct 21
Utility
m2078yhchxhovl1euwi1j t7vnt
27 Apr 23
Fragmented data on a storage device may be additionally stored in a cache.
Orit Wasserman, Yehoshua Salomon, Gabriel Zvi BenHanokh
Filed: 27 Oct 21
Utility
nw0g77xo0xraetc6px5kp7qg4tjhkv7ycq
27 Apr 23
The removal of software operators can be managed according to some aspects described herein.
Arie Bregman, Steve Mattar
Filed: 27 Oct 21
Utility
vxtygh73fz3gx7 vqwppwjpnu3oekyp
27 Apr 23
A set of deployment applications that are configured to deploy a plurality of resources that compose a containerized application onto at least one cluster of a plurality of different clusters is identified.
Valentina Birsan, Joshua Packer, Master T. Piyasirisilp, Feng Xiang
Filed: 15 Oct 21
Utility
fgvzs15xzw70p5ys2qpih 5f2j3hpyv7lky8icks8zee5xwq4gbl
27 Apr 23
Implementations for scheduling a sub-idle thread priority class are described.
Michael Tsirkin
Filed: 23 Dec 22