2270 patents
Page 45 of 114
Utility
Attested end-to-end encryption for transporting sensitive data
13 Sep 22
Techniques are disclosed for enabling attested end-to-end encryption for transporting sensitive data between devices.
Brian Spencer Payne, Saikat Chakrabarti, Pratibha Anjali Dohare, Rehan Loring Iftikhar
Filed: 19 Aug 20
Utility
System and method for preventing switch loops in layer-2 networks
13 Sep 22
Described herein are systems and methods for preventing switch loops in a layer 2 network.
Leonid Rozenboim
Filed: 6 May 20
Utility
Techniques for verifying network policies in container frameworks
13 Sep 22
Techniques are disclosed for network policy verification system that can obtain a set of connectivity paths of a containerized environment that individually indicate connections between pairs of containers.
Olgierd Stanislaw Pieczul, Subaru Arthur Ueno, Robert Graham Clark
Filed: 26 Feb 21
Utility
Techniques for network policies analysis in container frameworks
13 Sep 22
Techniques are disclosed for query processing system that can, when queried, generate a result related to one or more connectivity paths and/or one or more network security rules.
Olgierd Stanislaw Pieczul, Robert Graham Clark
Filed: 19 Jul 21
Utility
System and method for supporting use of forward and backward congestion notifications in a private fabric in a high performance computing environment
13 Sep 22
Systems and methods for using multiple CE (congestion experienced) flags in both FECN (forward explicit congestion notification) and BECN (backward explicit congestion notification) in a high performance computing environment.
Bjørn Dag Johnsen, Ajoy Siddabathuni, Avneesh Pant, Amarnath Jolad
Filed: 11 May 20
Utility
Ticket locks with enhanced waiting
13 Sep 22
A computer comprising one or more processors and memory may implement multiple threads that perform a lock operation using a data structure comprising an allocation field and a grant field.
David Dice, Alex Kogan
Filed: 16 Sep 19
Utility
Multiple cache framework for managing data for scenario planning
13 Sep 22
The embodiments disclosed herein relate to computing a transportation plan for transporting goods from one place to another across a number of shipments and that satisfy multiple shipment orders.
Sundararajan Arunapuram, Ramkumar Ramachandran, Sai Rajesh Mahabhashyam, Shallav Varma
Filed: 23 Jan 19
Utility
Supporting concurrent remove operations and add-to-front operations on a Least Recently Used (LRU) queue
13 Sep 22
A remove operation and an add-to-front operation may be currently performed with respect to nodes in an Least Recently Used (LRU) queue.
Yosef Lev, David Dice, Daniel McNaught Jordan
Filed: 23 Oct 20
Utility
File system hierarchies and functionality with cloud object storage
13 Sep 22
Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface.
James Kremer, Mark Maybee, Natalie Ross, Pascal Ledru, Victor Latushkin, Ankit Gureja, Kimberly Morneau, Jingfei Zhang, Gavin Gibson
Filed: 18 Mar 20
Utility
Systems and methods for tuning a storage system
13 Sep 22
Implementations described and claimed herein provide systems and methods for tuning and sizing one or more storage appliances in a storage system with respect to an application load and for optimizing a storage system based on a configuration of a client network and/or a storage appliance in a storage network.
Michael J. Baranowsky
Filed: 8 Aug 18
Utility
Function semantic based partition-wise SQL execution and partition pruning
13 Sep 22
An approach for implementing function semantic based partition-wise SQL execution and partition pruning in a data processing system is provided.
Srikanth Bellamkonda, Andrew Witkowski, Manish Pratap Singh, Madhuri Kandepi
Filed: 21 Sep 17
Utility
Techniques for accessing on-premise data sources from public cloud for designing data processing pipelines
13 Sep 22
A system for simulating a dataset based on sample statistics, and generating pipeline instructions for a database using the simulated dataset, is disclosed.
Debajyoti Roy
Filed: 30 Apr 20
Utility
Interactive data entry validation and problem correction in a table component in a spreadsheet driven by a web service
13 Sep 22
Implementations generally relate to a spreadsheet add-in that provides data entry validation.
Edmund A. Davis, Shaun Logan, Brian Rowles
Filed: 30 Jun 21
Utility
Editable table in a spreadsheet integrated with a web service
13 Sep 22
Implementations generally relate to an editable table in a spreadsheet integrated with a web service.
Edmund A. Davis, Brian Rowles, Shaun Logan, Kelsey Von Tish
Filed: 28 Jul 21
Utility
Datacenter level utilization prediction without operating system involvement
13 Sep 22
Embodiments use a hierarchy of machine learning models to predict datacenter behavior at multiple hardware levels of a datacenter without accessing operating system generated hardware utilization information.
Pravin Shinde, Felix Schmidt, Onur Kocberber
Filed: 29 Oct 18
Utility
Systems and methods for intelligently providing supporting information using machine-learning
13 Sep 22
Systems and methods for intelligently providing users with supporting information based on big-data analyses of a data set.
Li Li, Xiaoyu Peng, Kehua Pan
Filed: 12 Apr 17
Utility
Privacy preserving collaborative learning with domain adaptation
13 Sep 22
Herein are techniques for domain adaptation of a machine learning (ML) model.
Daniel Peterson, Pallika Haridas Kanani, Virendra J. Marathe
Filed: 25 Mar 20
Utility
System and method for use of a suffix tree to control blocking of blacklisted encrypted domains
6 Sep 22
In accordance with an embodiment, described herein are systems and methods for use of a suffix tree to control blocking of blacklisted encrypted domains.
Rishi Mutnuru
Filed: 19 Mar 20
Utility
Methods, systems, and computer readable media for providing network function discovery service enhancements
6 Sep 22
A method for providing network function (NF) discovery service enhancements includes receiving, by an NF repository function (NRF) from a consumer NF, a NF discovery request message that requests discovery of a network service hosted by producer NFs and includes at least one of a maximum payload size parameter and a profile count limit parameter and obtaining, by the NRF, NF profile objects corresponding to producer NFs that host the network service.
Kawal Sapra, Venkatesh Aravamudhan, Raghuvamshi vasudev Singh Thakur
Filed: 29 Jul 20
Utility
Prioritized non-active memory device update
6 Sep 22
Example embodiments facilitate prioritizing the recycling of computing resources, e.g., server-side computing systems and accompanying resources (e.g., non-volatile memory, accompanying firmware, data, etc.) leased by customers in a cloud-based computing environment, whereby computing resources (e.g., non-volatile memory) to be forensically analyzed/inspected, sanitized, and/or updated are prioritized for recycling based on estimates of when the computing resources are most likely to require recycling, e.g., via background sanitizing and updating.
Tyler Vrooman, Graham Schwinn, Greg Edvenson
Filed: 19 Oct 20