2270 patents
Page 24 of 114
Utility
Methods, systems, and computer readable media for protecting against mass network function (NF) deregistration attacks
25 Apr 23
A method for protecting against mass NF deregistration attacks can be performed at an NRF or SCP.
Jay Rajput, Virendra Singh, Amarnath Jayaramachar
Filed: 7 May 21
Utility
Conflict resolution design for importing template package in sites cloud service
18 Apr 23
A computer-implemented method can include receiving an indication of a template package to be imported in a sites cloud service and further determining whether there is a potential conflict in connection with the template package to be imported in the sites cloud service.
Sivakumar Balagopalan, Ken Ching Yi Young, Vamsikrishna Konchada, Matt E. Miller
Filed: 28 Jul 17
Utility
Systems and methods for tuning a storage system
18 Apr 23
Implementations described and claimed herein provide systems and methods for tuning and sizing one or more storage appliances in a storage system with respect to an application load and for optimizing a storage system based on a configuration of a client network and/or a storage appliance in a storage network.
Michael J. Baranowsky
Filed: 5 Aug 22
Utility
OSN/PCS collaboration mechanism integration
18 Apr 23
An example method facilitates collaborative participation in a process-based software application.
Juan Allo Ron, Rajesh Tiwari, Viswanathan Umapathy
Filed: 1 May 17
Utility
Vectorized queues for shortest-path graph searches
18 Apr 23
Techniques are described for a vectorized queue, which implements a vectorized ‘contains’ function that determines whether a value is in the queue.
Benjamin Schlegel, Martin Sevenich, Pit Fender, Matthias Brantner, Hassan Chafi
Filed: 27 Feb 20
Utility
Method and system for implementing system monitoring and performance prediction
18 Apr 23
Described is an improved approach to implement an offline learning approach for machine learning that employs a window-based technique for predicting values within the window, and where outliers are identified and discarded from consideration.
Zahra Khatami, Avneesh Pant
Filed: 30 Jun 20
Utility
Techniques for automated service monitoring and remediation in a distributed computing system
18 Apr 23
Techniques are disclosed to provide automated remediation of services within a distributed computing system.
Scott Alan Deboy, David Fernando Saes, Naveen Pilli
Filed: 23 Dec 21
Utility
Methods and systems for fast allocation of fragmented caches
18 Apr 23
Aspects of the present disclosure include methods and system for fast allocation of memory from fragmented memory.
Roch Bourbonnais
Filed: 27 May 22
Utility
Efficient worker utilization
18 Apr 23
Techniques are disclosed for efficient utilization worker threads in a workflow-as-a-service (WFaaS) environment.
Tanvir Singh Mundra, Christopher Richard Newcombe, Nathaniel Martin Glass
Filed: 24 Mar 22
Utility
Method and system for creating, retrieving, and editing web service attachments in spreadsheets
11 Apr 23
A computer-implemented method interfaces with a remote attachment from a spreadsheet program on a client device.
Kelsey Von Tish, Edmund Alex Davis
Filed: 17 Nov 21
Utility
Techniques for building a knowledge graph in limited knowledge domains
11 Apr 23
Techniques disclosed herein relate generally to constructing a customized knowledge graph.
Gautam Singaraju, Prithviraj Venkata Ammanabrolu
Filed: 15 Aug 19
Utility
Recreating an OLTP table and reapplying database transactions for real-time analytics
11 Apr 23
Techniques for processing data streaming from one or more event sources in order to recreate a database table with database transactions for real-time analytics.
Sandeep Bishnoi, Prabhu Thukkaram, Iuliia Shmeleva, Dmitrii Markovskii, Vitaly Vitalievich Bychkov, Gyorgy Geiszter
Filed: 23 Apr 21
Utility
Using machine learning to train and generate an insight engine for determining a predicted sales insight
11 Apr 23
An insight engine that takes into account a wide variety of information from a wide variety of sources for predicting a sales insight is generated.
Behnam Mehmanpazir, Jeffrey Michael Mccarthy, Christina Stavrinou Kite, Enda Hu
Filed: 2 Dec 19
Utility
Partitioned mid-tier cache based on user type
11 Apr 23
A server includes a data cache for storing data objects requested by users logged in under different user roles.
Yuvaraj Chandrasekaran, Mihir Kumar Das, Pushpander Singh, Lawrence Lindsey
Filed: 1 Jun 20
Utility
Composing human-readable explanations for user navigational recommendations
11 Apr 23
Techniques for generating human-readable explanations (also referred to herein as “reasons”) for navigational recommendations are disclosed.
Amir Hossein Rezaeian, Alberto Polleri
Filed: 3 May 21
Utility
Techniques for adaptive pipelining composition for machine learning (ML)
11 Apr 23
The present disclosure relates to systems and methods for an adaptive pipelining composition service that can identify and incorporate one or more new models into the machine learning application.
Alberto Polleri, Larissa Cristina Dos Santos Romualdo Suzuki, Sergio Aldea Lopez, Marc Michiel Bron, Dan David Golding, Alexander Ioannides, Maria del Rosario Mestre, Hugo Alexandre Pereira Monteiro, Oleg Gennadievich Shevelev, Xiaoxue Zhao, Matthew Charles Rowe
Filed: 4 Jun 20
Utility
Machine learning for automatic extraction and workflow assignment of action items
11 Apr 23
Systems, methods, and other embodiments associated with automatic smart extraction and workflow assignment of action items are described.
Balajose Goli, Elvis L. Dsouza, Rameshkumar Garikipati, Padmakumar A. Nambiar, Hemendra Pal
Filed: 26 Aug 20
Utility
Method and system for tracking application activity data from remote devices and generating a corrective action data structure for the remote devices
11 Apr 23
Systems, methods, and other embodiments associated with generating a corrective action data structure for a set of remote devices based upon corrective actions are described.
Suryaveer Singh Lodha, William Blaby
Filed: 7 Dec 17
Utility
Techniques for simultaneously accessing multiple isolated systems while maintaining security boundaries
11 Apr 23
Techniques are described for using a single application to interact with multiple separate realms simultaneously while maintaining data security boundaries.
Danne Lauren Stayskal, Vladimir Cabildo, Jorge Enrique Reyes Salas, Alaa Shaker
Filed: 13 Oct 20
Utility
Methods, systems, and computer readable media for generating and using single-use OAuth 2.0 access tokens for securing specific service-based architecture (SBA) interfaces
11 Apr 23
A method for obtaining and using a single-use OAuth 2.0 access token for securing specific service-based architecture (SBA) interfaces includes generating, by a consumer network function (NF) an access token request.
Jay Rajput, Virendra Singh, John Nirmal Mohan Raj
Filed: 5 May 21