1123 patents
Page 4 of 57
Utility
Shim Layer for Intercepting Calls Between an Upper Layer and a Lower Layer of a Container Image
16 Nov 23
A shim layer can be incorporated into a container image for intercepting calls between an upper layer and a lower layer of the container image according to some aspects described herein.
Cathal O'Connor, Brian Gallagher
Filed: 13 May 22
Utility
Automatically Switching Between Quantum Services and Classical Services Based on Detected Events
16 Nov 23
One example described herein include a system that can detect an event associated with executing a software operation using a quantum service of a quantum computing system.
Leigh Griffin, Stephen Coady
Filed: 12 May 22
Utility
r57cxb7rewz2r7bxt4dubod687d4aw3v
16 Nov 23
A system includes a cluster of nodes, memory, and a processor, where the cluster includes an application programming interface (API) server and one or more components.
Naga Ravi Chaitanya Elluri
Filed: 10 Jul 23
Utility
mgoq39h2e5wyahqn13ji 2cbwpo7lf4xaoaptv1m31zxod0
9 Nov 23
A visual database system can represent multidimensional data.
Sanja Bonic
Filed: 4 May 22
Utility
omrthx w0w9yrw2v909wv0owlqo51j176ltvix36ia
9 Nov 23
Described is a system and method that includes executing, by a processing device, a data risk mitigation service (DRMS), to monitor, for each node of a plurality of nodes in a mesh network, at least one of metadata indicating a health state of a node or a call for help from the node.
Leigh Griffin, Pierre-Yves Chibon
Filed: 4 May 22
Utility
xhg30ynxjhipiiy1zo13lxzi etps
9 Nov 23
Test scenarios can be generated for decision models on a computer according to some examples.
Alexandre Porcelli Bakos, Eder Ignatowicz, Paulo Rego
Filed: 4 May 22
Utility
a3h9mcuuzqhodgygmnykpbu505tvteyx4ueus5jy07y57gayhw9m
9 Nov 23
A packet is received by a hypervisor from a first container, the packet to be provided to a second container, the packet including a header including a first network address associated with the second container.
Michael Tsirkin, Francisco Javier Martinez Canillas, Alberto Carlos Ruiz Ruiz
Filed: 13 Jul 23
Utility
vkbopwt6xlaffgxh8cm3t32gdqiybvp3utdschh2en98lejjobdrfsed19bw
2 Nov 23
Access requests for policy-based access control systems can be managed according to some examples.
Leigh Griffin, Pierre-Yves Chibon
Filed: 28 Apr 22
Utility
fd2jo5hour4z6mxb8y06l9abq2m810 3e5p46whqqw
2 Nov 23
A system can receive a request for establishing a communication channel between a first node executing a first operating system and a second node executing a second operating system, the second operating system being different from the first operating system.
Leigh Griffin, Pierre-Yves Chibon
Filed: 28 Apr 22
Utility
cyzpb1bv0jtr97ludbqn8h2nvchbtacvr8tk5esvdx
2 Nov 23
A method includes determining whether a code update for the service is available at a central repository of the computing environment and, in response to determining that the code update is available, retrieving the code update from the central repository.
Huamin Chen, Roland Ludwig Huss
Filed: 26 Jun 23
Utility
q9vki60oopseeu6054wg cv1r8hmco7
2 Nov 23
During a boot process of a computing device, a boot loader loads a kernel and an initial RAM disk image from a persistent storage device into RAM.
Eric Curtin, Leigh Griffin
Filed: 29 Apr 22
Utility
4ug38t4irrmvbyrccyv45xthk3w 39mli0rb6cd10i1
2 Nov 23
The technology disclosed herein enhances a fault-based communication channel between a virtual machine and a hypervisor.
Michael Tsirkin
Filed: 3 Jul 23
Utility
tz809cisgkw6miivzewy 5ap35n3i6o8wbmcgxs
2 Nov 23
A sparse files aware rolling checksum is provided by passing, in sequence, each byte of an archival file to a hash function; and in response to: detecting that a sequence of bytes from the archival file produce outputs from the hash function of zero, wherein a number of bytes in the sequence of bytes satisfies a chunk-end threshold, and determining that the sequence of bytes is located in a hole in the archival file of a greater number of bytes than the chunk-end threshold: designating a hole-chunk of the archival file that includes metadata for a location and a length of the hole in the archival file.
Giuseppe Scrivano
Filed: 28 Apr 22
Utility
igmp3 62u2v1ur0h3appkhbutwcctg3fy93lvq5bkp72kdns94wgq9k8
2 Nov 23
Biases on quantum bits can be dynamically adjusted based on events.
LEIGH GRIFFIN, Stephen Coady
Filed: 27 Apr 22
Utility
2bu92bp7jdsvyp95m bd
2 Nov 23
Performing Just-In-Time (JIT) error correction optimization for quantum services using quantum simulators is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 29 Apr 22
Utility
afy977f6pgwlfpyvn9ld6k4y kaffumjfgf1a
26 Oct 23
Embodiments of the present disclosure include a processing device that, responsive to detecting an unavailability of a first node device of a plurality of node devices of a network, activates a proxy device to correspond to the first node device, detects a consensus operation among the plurality of node devices, wherein the consensus operation comprises a plurality of vote transmissions within the network, and controls the proxy device to provide a proxy vote transmission as part of the consensus operation.
Leigh Griffin, Pierre-Yves Chibon
Filed: 22 Apr 22
Utility
ducczylpgnopzgawlzdqwwnf4 7p33xey8hbldexim
26 Oct 23
Disclosed are systems and methods for scanning a client codebase for vulnerabilities without exposing the client information.
Brian Gallagher, Cathal O'Connor
Filed: 25 Apr 22
Utility
3480j3ayvn3p60prpnkdrzc4r089vyvu0ljnwfv vq
26 Oct 23
A seed, a computing resource characteristic, and a computing resource permitted condition corresponding to the computing resource characteristic are received.
Pierre-Yves Chibon, Leigh Griffin
Filed: 20 Apr 22
Utility
44xqh0nr3oni8ci5ied9ap8i8l55rulxlwgo5g4to
26 Oct 23
Embodiments of the present disclosure provide a hybrid approach to performing a lazy pull of a container image.
Giuseppe Scrivano
Filed: 28 Jun 23
Utility
cgcasnh3emc1v 7pogmitgyikm2jgwnp76duawoawsgmiwg
26 Oct 23
Processing logic may obtain a version of software that is running on a client.
William Trevor King, Douglas Richard Hellmann, Scott C. Dodson, Benjamin Michael Parees, Lalatendu Shishusankar Mohanty, Vadim Pavlovich Rutkovsky
Filed: 22 Apr 22