2270 patents
Page 2 of 114
Utility
Fabric availability and synchronization
9 Jan 24
Aspects of the present disclosure include implementing fabric availability and synchronization (FAS) agents within a fabric network.
Ajoy C. Siddabathuni, Bjorn Dag Johnsen, Raghunath Shenbagam
Filed: 12 Jan 21
Utility
Instant notification of load balance and resource scheduling based on resource capacities and event recognition
9 Jan 24
Systems, computer-implemented methods, and computer-readable media for facilitating resource balancing based on resource capacities and resource assignments are disclosed.
Roger Garcia, Mitsumasa Sam Hanamoto, Neil H. Bui, Quang Hang, Jun Ma
Filed: 18 Aug 22
Utility
ak6e6h73yagkpo49pi h3mab
9 Jan 24
The present disclosure generally relates to systems and methods for efficiently and dynamically integrating a chatbot into an application service.
Jeevan Selvan Job John, Mudit Gupta, Aswin Jose
Filed: 24 Feb 23
Utility
e5efgjbf9pa7z11flnhohds7w48wkgnuwgyeut
9 Jan 24
Embodiments are directed to a multi-tenant cloud system.
Isabella Hio-Wai Lao, Gary Cole, Sudarsan Sridhar, Gregg Wilson
Filed: 3 Mar 20
Utility
0v2u23x73xpny174177keduidqev20dtmke2gts wa8dpsmuuy9ujaq6lv10
9 Jan 24
In accordance with an embodiment, a system and method for dynamic auto-scaling based on roles is provided.
Thomas Hansen, Ravi Malhotra, Jyotisman Nag
Filed: 19 Nov 21
Utility
61s7dlhba3d1 9ksrtwgihzdsnswgfuzd
9 Jan 24
Methods, systems, and computer readable media for network function (NF) discovery using preferred-locality information are disclosed.
Amarnath Jayaramachar, Jay Rajput, Virendra Singh
Filed: 28 Sep 21
Utility
i9ogrt czm65fse0qdzrhlpl8sfnv6ss7i4o8gxup
2 Jan 24
A method for detecting a security vulnerability in code may include obtaining (i) a permitted information flow graph for a permitted query and (ii) a target information flow graph for a target query in the code, determining, by traversing the permitted information flow graph, a permitted information flow including permitted disclosed columns, permitted accessed columns, and a permitted predicate, determining, by traversing the target information flow graph, a target information flow including target disclosed columns, target accessed columns, and a target predicate, comparing the permitted information flow and the target information flow to obtain a comparison result, and determining, based on the comparison result, that the target query includes the security vulnerability.
Kostyantyn Vorobyov, Padmanabhan Krishnan
Filed: 30 Nov 21
Utility
ylysclxy ypasci01p0dr9du1n3f4g2hni79zls9vii
2 Jan 24
Techniques for predictive system remediation are disclosed.
Eric Sutton, Dustin Garvey, Sampanna Shahaji Salunke, Uri Shaft
Filed: 28 Mar 22
Utility
yrogy tslr9ea17yudh7dw2rjjnjwvi9cykj1yf3qya
2 Jan 24
The present memory restoration system enables a collection of computing systems to prepare inactive rewritable memory for reserve and future replacement of other memory while the other memory is active and available for access by a user of the computing system.
Tyler Vrooman, Graham Schwinn, Greg Edvenson
Filed: 27 Jan 23
Utility
2zyj56y09o5sg62ztvodl6osmbppkmit0u7swn591bvfvf9
2 Jan 24
In an embodiment, a computer stores source files and source clone files in a source filesystem.
Teng Wang, Diane Lebel, David Akers, Frederick S. Glover
Filed: 15 Oct 21
Utility
hzrdjok9d10gj4vrgb0yblug35rt21 jjcxlibcaya7vs5cnsf
2 Jan 24
Columns of a table are stored in either row-major format or column-major format in an in-memory DBMS.
Tirthankar Lahiri, Martin A. Reames, Kirk Edson, Neelam Goyal, Kao Makino, Anindya Patthak, Dina Thomas, Subhradyuti Sarkar, Chi-Kim Hoang, Qingchun Jiang
Filed: 27 Feb 19
Utility
i68xhr4sxvj0zxgwo4dkwo790kwl65t92f
2 Jan 24
Techniques are disclosed for tuning external invocations utilizing weight-based parameter resampling.
Debajyoti Roy
Filed: 21 Nov 22
Utility
uxrvwyn6ue36aukdkml 9o
2 Jan 24
Systems, methods, and other embodiments associated with dynamic inclusion of custom columns into a logical model are described.
Michael Sassin
Filed: 27 Jun 22
Utility
wluagwg1r2ubrjd57axxey5xc6js0tb3qfy0p6jopv11d2t3ksrxegz3h2u
2 Jan 24
A system is provided for training an inferential model based on selected training vectors.
Guang C. Wang, Kenny C. Gross, Zexi Chen
Filed: 5 Nov 20
Utility
lxtbgfzp 036d0ugg7as740sd2s
2 Jan 24
In some aspects, a computing device of the virtual cloud network may select one or more filters from a plurality of filters for a data pipeline, the plurality of filters comprising at least one of: a malware filter; a content filter; a signature filter; a content analyzer; a machine learning filter; or an artificial intelligence filter.
Eden Grail Adogla, Thomas Werner Kuehnel
Filed: 23 Nov 21
Utility
l4pt e1e4hf7emf0dluamc6sg9vgpru7upwpfvvspiu6kvxshv4aepqv
2 Jan 24
A method for automatic domain name system (DNS) configuration for 5G core (5GC) network functions (NFs) includes, at an NF repository function (NRF) including at least one processor, receiving a message concerning a 5GC network function.
Jay Rajput, Amarnath Jayaramachar, Virendra Singh
Filed: 24 Nov 21
Utility
nc86iwg3phv6smnvvi7vv85r7ot
2 Jan 24
The present embodiments relate to edge attestation of a host node to access a cloud infrastructure environment.
Brian Spencer Payne
Filed: 10 Nov 21
Utility
uf1gyxk8kgo3npx9a2canoibuh iaqm4w8osmdgc1k2pxfd7s7vpq5loco
2 Jan 24
Disclosed are techniques for processing user profiles using data structures that are specialized for processing by a GPU.
David Lawrence Rager, Andrew Edward Brownsword, Guy Lewis Steele, Jr.
Filed: 2 Jun 22
Utility
6bnpblckkyu5vuumneo8hodpsxy9ao0rwe3zc94hqk75qi6njedfg
2 Jan 24
A method for communicating delegated NF discovery results between SCPs and using the delegated NF discovery results for alternate SBI service request routing includes receiving, at a first SCP and from a consumer NF instance, an SBI service request.
Ankit Srivastava, Sridhar Karuturi, Virendra Singh
Filed: 5 Jan 22
Utility
m9by jldh8505vqgdr6ydxxtb58yz5
2 Jan 24
Example embodiments employ a selective memory swapping system for selectively placing non-volatile memory devices of a computer system offline, e.g., for background updating, and online, for use by a computer system, whereby the background updating process includes a mechanism for performing forensics analysis and updating of offline memory devices while an alternate memory device is usable by a user of the first computer system.
Tyler Vrooman, Greg Edvenson, Matthew King, Kumud Nepal
Filed: 6 Mar 23