1123 patents
Page 8 of 57
Utility
Blockchain-driven Dynamic Access Control
17 Aug 23
Embodiments of the present disclosure include a processing device that receives a proposed block for inclusion on a blockchain, the proposed block including a proposed update to an access control policy and an update condition for evaluating the proposed update, transmits an access request to be evaluated according to a modified version of the access control policy that incorporates the proposed update to generate access results, and transmits a determination for the inclusion of the proposed block on the blockchain in view of the access results.
Leigh Griffin, Aoife Moloney
Filed: 15 Feb 22
Utility
Using Wireless Charging to Redistribute Power Resources Within a Mesh Network
17 Aug 23
A system and method of using wireless charging to redistribute power resources within a mesh network.
Leigh Griffin, Pierre-Yves Chibon
Filed: 15 Feb 22
Utility
Pre-population of Persistent Storage Volumes
10 Aug 23
A method includes populating a physical storage volume associated with a second PVC from a data source identified by a first PVC and in response to populating the physical storage volume, associating the physical storage volume with the first PVC.
Adam Gerard Litke, Michael Howard Henriksen
Filed: 13 Apr 23
Utility
User Customizable Compiler Attributes for Code Checking
10 Aug 23
Disclosed herein is technology to use customized compiler attributes to check source code.
Ulrich Drepper
Filed: 7 Feb 22
Utility
User Customizable Compiler Attributes for Code Optimization
10 Aug 23
Disclosed herein is technology to use customized compiler attributes to enhance code optimizations.
Ulrich Drepper
Filed: 7 Feb 22
Utility
Coordinating Timer Access for Virtual Machines Using Peripheral Component Interface Cards
10 Aug 23
Peripheral component interface (PCI) cards can be used to coordinate timer access for virtual machines.
Michael Tsirkin, Amnon Ilan
Filed: 4 Feb 22
Utility
Quantum Isolation Zone Orchestration
10 Aug 23
Quantum isolation zone (QIZ) metadata is obtained for each of a plurality of different quantum isolation zones (QIZs) implemented on a quantum computing system.
Leigh Griffin, Stephen Coady
Filed: 27 Jan 22
Utility
Configuring Polling Times for Software Applications
10 Aug 23
Excessive polling that may result in wasted computing resources and unnecessary network traffic can be avoided using some techniques described herein.
Brian Gallagher, Cathal O'Connor
Filed: 4 Feb 22
Utility
Consensus Driven Mesh Organization
10 Aug 23
Processing logic may determine that a service is absent among a plurality of nodes within a zone of a mesh network.
Leigh Griffin, Pierre-Yves Chibon
Filed: 8 Feb 22
Utility
Managing Cloud Acquisitions Using Distributed Ledgers
10 Aug 23
Systems and methods of the disclosure include: receiving, by a cloud resource provisioning component via a cloud provisioning request application programming interface (API), a cloud resource request; storing the cloud resource request on a cryptographically-protected distributed ledger; receiving, from a first cloud provider, a first cloud resource offer responsive to the cloud resource request; and responsive to receiving, from a node of the cryptographically-protected distributed ledger, a notification of validation of the first cloud resource offer with respect to the cloud resource request, causing the first cloud provider to provision a cloud resource specified by the first cloud resource offer.
Cathal O’Connor, Brian Gallagher
Filed: 4 Feb 22
Utility
Service Download Optimization for Nanotech Mesh
10 Aug 23
A method includes determining characteristics of nodes of a mesh network and selecting one or more nodes of the mesh to receive a payload in view of the characteristics of the plurality of nodes of the mesh network.
Pierre-Yves Chibon, Leigh Griffin
Filed: 10 Feb 22
Utility
Secure Reliable Application Environments
3 Aug 23
A system includes an application instance or application environment instance and a first cloud service of a trusted cloud provider.
Michael Tsirkin
Filed: 17 Feb 23
Utility
Network Bound Encryption for Recovery of Trusted Execution Environments
3 Aug 23
The technology disclosed herein provides network bound encryption that enables a trusted execution environment to persistently store and access recovery data without persistently storing the decryption key.
Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum
Filed: 20 Mar 23
Utility
Network Management Using Trusted Execution Environments
3 Aug 23
The technology disclosed herein enables network consensus management using trusted execution environments.
Axel Simon
Filed: 10 Apr 23
Utility
Reducing the Size of Image Files Usable for Deploying Software In Computing Environments
3 Aug 23
The sizes of image files for deploying software in a computing environment can be reduced according to some examples described herein.
Cathal O'Connor, Brian Gallagher
Filed: 3 Feb 22
Utility
MIGRATING EXECUTING QUANTUM PROCESSES INTO QUANTUM ISOLATION ZONES (QIZs)
3 Aug 23
Migrating executing quantum processes into Quantum Isolation Zones (QIZs) is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 28 Jan 22
Utility
Federated Operator for Edge Computing Network
3 Aug 23
Systems and methods for inter-cluster deployment of compute services using federated operator components are generally described.
Huamin Chen
Filed: 10 Apr 23
Utility
MIGRATING CONTAINER-BASED QUANTUM PROCESSES TO QUANTUM ISOLATION ZONES (QIZs)
3 Aug 23
Migrating container-based quantum processes to quantum isolation zones (QIZs) is disclosed herein.
Leigh Griffin, Stephen Coady
Filed: 27 Jan 22
Utility
Optimizing a Quantum Request
3 Aug 23
The examples disclosed herein provide for optimizing a quantum request.
Leigh Griffin, Stephen Coady
Filed: 3 Feb 22
Utility
Classifying Quantum Errors
27 Jul 23
The examples disclosed herein provide classifying quantum errors.
Stephen Coady, Leigh Griffin
Filed: 27 Jan 22