1123 patents
Page 25 of 57
Utility
Anonymization of Basic Service Set Identifiers for Wireless Access Points
9 Jun 22
Various techniques and systems are described herein for anonymization of basic service set identifiers (BSSIDs) for wireless access points (WAPs).
Daniel Williams
Filed: 4 Dec 20
Utility
Reducing Wear on Zoned Storage Devices for Storing Digital Data
2 Jun 22
Wear on a zoned storage device can be reduced in some examples.
Uri Lublin, Gabriel Zvi BenHanokh
Filed: 30 Nov 20
Utility
tg5ps499d7otvdnvw6p2g9s6i
2 Jun 22
A system includes a guest memory having guest physical pages (“GPPs”) that includes loan pages having a fixed quantity, a host memory, a processor in communication with the memory, and a virtual machine monitor (“VMM”).
David Hildenbrand
Filed: 30 Nov 20
Utility
25mgjcikzxpgjxe9y5yltfsk2q8l7r0wcy5s1tt1l29cpk0obw57l2qtt
2 Jun 22
Systems and methods for supporting efficient out of order request completion.
Michael Tsirkin
Filed: 30 Nov 20
Utility
wsn5 ei09b9o31ijgpfnp1g93icf57ep
2 Jun 22
Scalable visualization of a containerized application in a multiple-cluster environment is disclosed.
Valentina Birsan, Feng Xiang, Jaclyn P. Wakin, Laura Rodriguez, Joshua Packer
Filed: 30 Nov 20
Utility
ch7v5nlo8phbvh atsbfs7uzz29s
2 Jun 22
The technology disclosed herein enables presenting, via a user interface, one or more builds, wherein each build comprises one or more first software build operations, and at least one first software build operation is currently executing, presenting, via the user interface, one or more computing jobs, wherein each job comprises one or more second software build operations, receiving, via the user interface, an input associating a job selected from the one or more jobs with a build selected from the one of the builds, and responsive to receiving the input, scheduling, execution of the second software build operations to occur in response to a completion of execution of the first software build operations.
Arie Bregman, Ilan Gersht
Filed: 30 Nov 20
Utility
w1iwdbuiz7b4cljbpqekc3vtez4f
2 Jun 22
Client-based search query autocomplete is disclosed.
James E. Scarborough, John Pratt
Filed: 30 Nov 20
Utility
030mkd480 viffwys110
2 Jun 22
A method includes configuring one or more permissions for a first page of memory including a first section of a plurality of sections of an executable program code to enable execution of the first section.
Peter Jones, Adam Jackson
Filed: 14 Feb 22
Utility
ycvherq3spn0ddda1pl3gkg9x9411ut676dtu6bi3e1099a9bza kxkp
2 Jun 22
Systems and methods for detecting and handling attacks on processes executing within a trusted execution environment (TEE) are disclosed.
Michael Hingston McLaughlin Bursell, Nathaniel P. McCallum
Filed: 30 Nov 20
Utility
8vfql4f13y7l958u2rcd63k37oc4t
2 Jun 22
A method includes detecting a change in control of a peripheral device from a first security domain to a second security domain of a computer system and in response to detecting the change in control of the peripheral device, reading a current firmware version of the peripheral device and determining whether the current firmware version of the peripheral device is trusted by the computer system.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
9kc242ufcs1cbqiu 9dfh2im5tuhwalzms6inztghxt0a0l
2 Jun 22
Systems and methods for verifying firmware before it is loaded to a memory device are presented herein.
Michael Tsirkin, Amnon Ilan
Filed: 30 Nov 20
Utility
4m8s2v9i n5q6ssdqbx6dg34httu5xqd6x6qxwp2lyimjsaamgra2
2 Jun 22
Disclosed are systems and methods for generating security policies for containers.
Lukas Vrabec, Petr Lautrbach
Filed: 18 Feb 22
Utility
0vv7td6m1g3yj3qiu6lzkoatyohp6gh5esvn10
2 Jun 22
The technology disclosed herein enables efficient launching of trusted execution environments.
Michael Hingston McLaughlin Bursell, Michael Tsirkin, Nathaniel McCallum
Filed: 30 Nov 20
Utility
oqkky6mjyxxxrtszn1uhuc
2 Jun 22
A method includes receiving a request from an operator pattern service to perform an operation on a computing environment and determining whether the operator pattern service has permission to perform the operation on the computing environment.
Aiden Keating, Dimitra Stefania Zuccarelli, Ciaran Roche
Filed: 30 Nov 20
Utility
9rx4mkvown3mrc7kxk98fej1ip5ijgk758ku6 b04o2mi9y4
26 May 22
Generating mock services based on log entries is disclosed herein.
Ido Ovadia, Boaz Shuster
Filed: 25 Nov 20
Utility
vepwnz0hpv2gfbytpg6no9m0e4gq7apffh7h7ffu6bnbz
26 May 22
Performing usage-based software library decomposition is disclosed herein.
William C. Benton, Erik J. Erlandson
Filed: 23 Nov 20
Utility
qeyp c7h3vg9495lkvpuzydsxjcb393qduodp
26 May 22
Software-update risks can be mitigated for end users by implementing some examples described herein.
Alexander Braverman Masis
Filed: 24 Nov 20
Utility
011wbzsb0emjwsqux1dnzbt3khfjvfe8tsmtp4v5czeuezb8zziv86
26 May 22
The technology disclosed herein enables a computing device to identify a proposed change associated with a source code file that comprises changed content, identify a review comment associated with the proposed change, wherein the review comment is further associated with reviewed content of the source code file, present, via a user interface, a notification indicating that the proposed change has been reviewed, receive, via the user interface, a request to present the review comment, and, responsive to receiving the request to present the review comment, present, via the user interface, the review comment in association with the reviewed content.
Avraham Talmor, Arie Bregman, Ilan Gersht
Filed: 25 Nov 20
Utility
ctjvb8z1jp9wii5ngvorhu316viwowsdpk3sor9jnd
26 May 22
A system includes a cluster of nodes, memory, and a processor, where the cluster includes an application programming interface (API) server and one or more components.
Naga Ravi Chaitanya Elluri
Filed: 25 Nov 20
Utility
m5hjxatsqemjx5 wb9ppz0be1ph54rgxfg
26 May 22
Data can be prefetched from a data storage system.
Gabriel Zvi BenHanokh, Uri Lublin
Filed: 20 Nov 20