1123 patents
Page 7 of 57
Utility
Copy-on-write for Virtual Machines with Encrypted Storage
21 Sep 23
Technology for enabling a hypervisor to perform copy on write features on encrypted storage of a virtual machine.
Michael Tsirkin
Filed: 23 May 23
Utility
Synchronizing Variable Values Between an Application Shell and Micro-frontends of a Web Application
21 Sep 23
Variable values can be synchronized between an application shell and micro-frontends by using a synchronization system described herein.
Tiago Bento Fernandes, Eder Ignatowicz, Alexandre Porcelli Bakos
Filed: 18 Mar 22
Utility
p3e4nhcsdo84p1es4sv8mdhhelj9dck5p8okg2s0k
21 Sep 23
An example method may include identifying one or more source code lines from which an intermediate code line of an intermediate code module is generated, wherein each respective source code line is associated with a respective source code module name and further associated with a respective line number in the respective source code module, generating one or more source mappings, where each source mapping corresponds to a respective source code line and associates a line number of the intermediate code line with a respective source code module name of the respective source code line and further with a respective line number of the respective source code line, and storing, in a data store, the one or more source mappings in association with a name of the intermediate code module.
David Sariel, Arie Bregman
Filed: 18 Mar 22
Utility
egl4ghe1aod6zr8oq07kh re482p4kyee2jq10ic5j4f22mq4er
21 Sep 23
Processing logic may generate metadata in view of monitoring a response of each of a plurality of components of an application to past maintenance tasks, wherein the metadata comprises an expected downtime of a first of the plurality of components of the application and a second expected downtime of a second of the plurality of components of the application in response to the expected downtime of the first of the plurality of components.
Brian Gallagher, Cathal O'Connor
Filed: 15 Mar 22
Utility
kxreu9be3ufcpfkm5ci7vryks0jbk1rwpaxcsu258v9auwjt0s
14 Sep 23
Deduplication operations can be managed based on a likelihood of duplicability.
Gabriel Zvi BenHanokh, Orit Wasserman
Filed: 17 May 23
Utility
a6cli54c6xih3 wmomxge1nhnjlx8ugynypo2vony3rmbozp8
14 Sep 23
Generating validated quantum function invocations is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 27 Jan 22
Utility
551hegbe5gworuhy7h3sp99d3f
14 Sep 23
Embodiments of the present disclosure provide techniques for peer to peer sharing of files in a mobile environment.
Pierre-Yves Chibon, Leigh Griffin
Filed: 14 Mar 22
Utility
teos1bhqf3h7 w9mepkatmddb32
14 Sep 23
Systems and methods providing mesh network reconfiguration for service reinforcement.
Leigh Griffin, Pierre-Yves Chibon
Filed: 9 Mar 22
Utility
c2382ynmiehbcjfpz89s0hd8epnmvj25v
7 Sep 23
A first plurality of programming instructions written in a first quantum programming language is accessed.
Leigh Griffin, Stephen Coady
Filed: 3 Mar 22
Utility
iakxm7xc861u6yqdes9sg
7 Sep 23
A system includes a memory, a processor in communication with the memory, and a first TEE instance.
Michael Tsirkin
Filed: 3 Apr 23
Utility
n701yhb3fi62g3gtfq0lwy5xtef9ht48m6h7cc 5s3tquj6c
7 Sep 23
Managing access to quantum services in quantum computing devices is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 2 Mar 22
Utility
vrkqrp85kefbkl 3jfz440enuri
7 Sep 23
Offline debugging of quantum services using service definition layers is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 2 Mar 22
Utility
8yd8wi1hv79l nnqbf7vu2
7 Sep 23
Systems and methods are described for passing event messages between components of a computing cluster.
Matthias Wessendorf, Pierangelo Di Pilato, Ahmed Abdalla Ibrahim Abdelrehim, Ali Ok
Filed: 28 Apr 23
Utility
zzh4fmhwvktk1ygms6nvv2ho005rgofhtnpn3rc74hhc36kcbjhna
31 Aug 23
Events associated with a virtual machine can be used to adjust an amount of resource objects that may be allocated from a resource pool for the virtual machine.
Andrea Cosentino, Paolo Antinori
Filed: 25 Feb 22
Utility
w47n643ug8l8i7xv4 depp1x
31 Aug 23
Methods, systems, and computer program products provide a hybrid data scan pipeline or detector that reduces (as compared to conventional storage operations) response latency and increases scanning accuracy of encryption attacks such as ransomware attacks.
Huamin Chen, Yuval Lifshitz
Filed: 25 Feb 22
Utility
vyye0uq23bpb6j9ttr21xvnppucydschntm7l2
31 Aug 23
A first data object is received for storing in an object repository of a storage platform.
Yuval Lifshitz, Huamin Chen
Filed: 25 Feb 22
Utility
omb82nfp5c0u zq0tbqgby
31 Aug 23
Debugging executing quantum services using service definition layers is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 25 Feb 22
Utility
7wbf5pa2rv3aoyh3p4nf8wnp94kdd4pmmt7xz3fc6viv7wj6m5mmh17m1l
31 Aug 23
A method includes determining that access permissions associated with a service of a computing system have been revoked, identifying one or more access policy sets including access policy rules associated with the service, removing the access policy rules associated with the service from the one or more access policy sets, and marking one or more decision execution paths of a policy decision point associated with the service with a feature flag.
Leigh Griffin, Cathal O'Connor
Filed: 25 Feb 22
Utility
4bjnu85tjjgsqfrh4xw3 s0x9phf8nnaaj84nydavha68ihud7z
17 Aug 23
An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted.
Andrea Cosentino, Paolo Antinori
Filed: 15 Feb 22
Utility
ox4ozoanhucf246k60uwe
17 Aug 23
A method of managing updates in a mesh network includes determining that an update is available for a first computing node of a mesh network and identifying one or more characteristics of the first computing node of the mesh network.
Leigh Griffin, Pierre-Yves Chibon
Filed: 11 Feb 22