2270 patents
Page 47 of 114
Utility
Hybrid cloud mirroring to facilitate performance, migration, and availability
23 Aug 22
Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface.
Mark Maybee, James Kremer, Pascal Ledru, Kenneth Dunlop
Filed: 25 Mar 20
Utility
Technique of efficiently, comprehensively and autonomously support native JSON datatype in RDBMS for both OLTP and OLAP
23 Aug 22
Herein is a self-tuning database management system (DBMS) storing JavaScript object notation (JSON) documents and operating a JSON datatype as native to the DBMS.
Zhen Hua Liu, Sriram Krishnamurthy, Beda C. Hammerschmidt, Douglas J. McMahon, Hui Joe Chang, Ying Lu, Joshua Spiegel, Srikrishnan Suresh, Vikas Arora, Geeta Arora, Sundeep Abraham, Hui Zhang, Alfonso Colunga Sosa
Filed: 17 Jun 20
Utility
dij5zcwotqk14jwb6x5f1o7nlibodcnz3nltjn3uxbg53lsh7krjs
23 Aug 22
A method of efficiently extracting large data sets from a database includes receiving a query to be executed on a first view of one or more data sources, where previous result sets resulting from previous queries are stored separately from the one or more data sources.
Adrian Graham Scott
Filed: 18 Oct 19
Utility
x1cru793xscc eswzx0eqsrl06w
23 Aug 22
Techniques are described herein for building a framework for declarative query compilation using both rule-based and cost-based approaches for database management.
Jian Wen, Sam Idicula, Nitin Kunal, Farhan Tauheed, Seema Sundara, Nipun Agarwal, Indu Bhagat
Filed: 25 Jun 18
Utility
6li80y7yr0drusa54auesarcorxfae8yxcdo6ac2ev3k9hs0pk2smftmsvn
23 Aug 22
Some embodiments locally cache search results received from a server in an object-agnostic data structure for the local execution of subsequent queries by a client application.
Kaarthik Balasubrahmanian, Donald Creig Humes, Hamid Bahadori, Sridhar Tadepalli
Filed: 28 May 20
Utility
4k4xkp0wzhukb3qzcaqz8selyc58
23 Aug 22
Techniques for managing real-time business event analysis and monitoring are provided.
Hoyong Park, Anand Srinivasan, Roger Bolsius, Eric Hsiao, Jeffrey Toillion, Vikram Shukla
Filed: 21 Jun 21
Utility
6424gap3zje2rgdfowqhli1g4lmminb7hs
23 Aug 22
A database manager is disclosed that retrieves database records having binary encoded data from a database and instantiating objects in an in-memory database.
Jack Randall Smiley, Byron Kevin McKenzie, Anurag Garg, Randy Lee Haben
Filed: 14 Aug 19
Utility
wxjdv6p8m1p83mmgsbj5flw6q4
23 Aug 22
One embodiment is a client API module for accessing an endpoint that includes a REST API corresponding to a server.
Nikhil Yograj Vaishnavi
Filed: 30 Oct 19
Utility
r8vyk1x5u4gmsc5wt95kfm7aaiyb16wnz14dx fs6xijx365r04tf
23 Aug 22
Techniques are described herein for estimating CPU, memory, and I/O utilization for a workload via out-of-band sensor readings using a machine learning model.
Onur Kocberber, Felix Schmidt, Craig Schelp, Andrew Brownsword, Nipun Agarwal
Filed: 10 Oct 18
Utility
lgetlha7g8uapsm84xoumffw5
23 Aug 22
Systems, methods, and other embodiments associated with generating a price schedule are described.
Aswin Kannan, Kiran Panchamgam, Su-Ming Wu
Filed: 23 Dec 19
Utility
mv77r40jppre9klhn3ux4 z5uywizu
23 Aug 22
Techniques for training and evaluating machine-learning models for providing student guidance are described herein.
John Edward Refila, Christopher Stanwood Thompson, Desiree Carvalho Dreszer, Nyeri Leah Osibin, Michael Rene Lauria, Alexander Winfield Thompson
Filed: 10 Sep 19
Utility
3se16lv092myrz35fgyb
23 Aug 22
A method of executing in-session encryption verification includes receiving a plurality of client data packets for transmission through a network; receiving one or more test data packets for verifying an encryption device; merging the client data packets and the one or more test packets into a data stream; selecting security parameters for each packet in the data stream based on a corresponding packet type; encrypting each packet in the data stream using the encryption device and the corresponding security parameters; and transmitting the data stream comprising encrypted packets through the network.
Kannan Raj, Jagwinder Singh Brar, Abhinava Sadasivarao, Radhakrishna Valiveti, Sharfuddin Syed, Loukas Paraschis
Filed: 20 Feb 20
Utility
lnwu1yvc1x78wjl487kh341tadmau8sin8qiady9 v49rkikuoz
23 Aug 22
A method for rules-based overload control for 5G services includes configuring, at an intermediate or a producer network function (NF), overload message handing rules, wherein at least some of the rules include destination network name (DNN), network subscription, network location, or a network slice identifying parameter or any parameter/attribute defined by 3GPP/vendor as rule selection criteria.
Rajiv Krishan, Rajdeep Yadav
Filed: 26 Jun 20
Utility
04xo7nj52kc37a55kndxw4yoputon3pjmy7vnufbyvnkmm9nvh35
16 Aug 22
Techniques for displaying a runtime-generated dashboard to a user are disclosed.
Allison Marie Wayne, Sherry Mead, Lancy Jude Silveira, Hillel Noah Cooperman, Kathleen Maguire Candland, Carmen Ximena D'Arlach
Filed: 8 Jul 20
Utility
8c1okiq5a107x3sqfh0al t1o2jvj2jl679gteizgood4a38cy7
16 Aug 22
Techniques for providing efficient space management in writable snapshots are disclosed.
Sridhar Valaguru
Filed: 14 Jan 21
Utility
0qnrounhzt33nh8 6fvvlwa9i38f5
16 Aug 22
In accordance with an embodiment, described herein is a system and method for managed server independence for deployment (MSI-D) of software applications and libraries, for use in a cloud computing, application server, or other environment.
Lawrence Feigen, Ryan Eberhard, Aseem Bajaj
Filed: 5 Jul 18
Utility
sq9y3td9qdcymawuuvvidrzfd2vk6wp85n8m4wroowdwo9unvtzr
16 Aug 22
Techniques are described herein for accurately measuring the reliability of storage systems.
Paria Rashidinejad, Navaneeth Jamadagni, Arun Raghavan, Craig Schelp, Charles Gordon
Filed: 13 May 20
Utility
dt7esft1hhx6e85n6ltkbwlvnua7cft3jtuz44jsm3e6n7qep
16 Aug 22
Example embodiments facilitate creation of efficient tree structures (and strategic modification of and manipulation of existing tree structures), such that the resulting tree structures enable rapid computing operations, including, but not limited to, rapid relational set operations (e.g., joining trees, comparing tree structures, determining structural similarities of trees, adding tree nodes, removing or replacing tree nodes, accessing tree data, updating tree data, and so on).
Evgueni Perkov
Filed: 3 Mar 20
Utility
8asj3c5kvmvwos5x897 gh5qbl
16 Aug 22
According to embodiments, a database server instance may generate group-by placement (GBP) states that define potential GBP transformations for a query in which some aggregate tables are included in the GBP view and other aggregate tables are not.
Krishna Kantikiran Pasupuleti
Filed: 25 Nov 20
Utility
cum4 k00qcvw4w7pc70ju1w
16 Aug 22
Embodiments minimize downtime involved in moving a PDB between CDBs by allowing read-write access to the PDB through most of the moving operation, and by transparently forwarding connection requests, for the PDB, from the source CDB to the destination CDB.
Jaebock Lee, Kumar Rajamani, Sanket Jain, Giridhar Ravipati
Filed: 5 Nov 20