524 patents
Page 11 of 27
Utility
Topology based management of second day operations
26 Oct 21
In one implementation, a method for topology based management of second day operations can include identifying a cloud service operating on a second system, discovering, via a first system, an existing realized topology of the second system as an inferred realized topology for the first system, wherein the existing realized topology is provisioned by the second system, defining a management process to be performed within the cloud service, via the first system, upon the instantiation of the inferred realized topology by the first system, and executing the management process utilizing the first system.
Stephane H. Maes
Filed: 30 Sep 14
Utility
Anomaly detection based on higher-order anomaly score
19 Oct 21
First-order anomaly scores are received from related anomaly detectors.
Manish Marwah, Martin Arlitt, Maria Pospelova, Stephan Jou
Filed: 24 Jul 20
Utility
Structured data archival with reduced downtime
19 Oct 21
Structured data archival with reduced downtime is disclosed.
Danny Oberoi, Jaspreet Singh, Ibha Gandhi
Filed: 8 Apr 16
Utility
Encoding abelian variety-based ciphertext with metadata
12 Oct 21
A technique includes encrypting plaintext to provide a set of projective coordinates that represents a point of an abelian variety curve and represents ciphertext.
Luther Martin, Timothy Roake, Cheryl He
Filed: 31 Oct 17
Utility
Statistical property preserving pseudonymization
5 Oct 21
A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values.
Timothy Roake, Luther Martin
Filed: 20 Mar 18
Utility
Fulfilling a request based on catalog aggregation and orchestrated execution of an end-to-end process
21 Sep 21
Catalogs that describe respective offerings for fulfillment by respective applications, are aggregated to form an aggregate catalog.
Stephane Herman Maes, Lars Rossen, Woong Joseph Kim, Keith Kuchler, Jan Vana, Ankit Ashok Desai, Christopher William Johnson, Michael Yang, Roy Ritthaler
Filed: 8 Dec 14
Utility
Formatting semi-structured data in a database
21 Sep 21
In some examples, formatting semi-structured data in a database includes obtaining semi-structured data in a column store database, assigning the semi-structured data to a semi-structured column with a key and value format, and formatting the semi-structured data with an optimal search format.
Benjamin M. Vandiver, Adam Benjamin Seering, Matthew Steven Fuller
Filed: 7 Feb 13
Utility
Debugging Multiple Instances of Code Using Thread Patterns
16 Sep 21
This document describes debugging multiple instances of code by detecting a variance in thread patterns of threads of execution relative to the multiple instances of executing code.
Douglas Grover
Filed: 12 Mar 20
Utility
Determining potential test actions
14 Sep 21
Example implementations relate to determining potential test actions.
Inbar Shani, Amichai Nitsan, Yaron Burg
Filed: 28 May 15
Utility
Time-limited dynamic testing pipelines
14 Sep 21
According to examples, an apparatus may include a processor that may generate automated and dynamic fail-fast testing pipelines that are efficiently executed to quickly identify tests for which changes to components such as an application will likely fail.
Kishore Jagannath, Namitha R Prabhu
Filed: 6 Nov 19
Utility
Natural language translation-based orchestration workflow generation
14 Sep 21
A technique includes receiving, by a computer, data representing a task to be automated in association with a computing environment.
Stephane Herman Maes, Karan Singh Chhina, Guillaume Dubuc
Filed: 18 Dec 18
Utility
Encryption methods based on plaintext length
14 Sep 21
Examples discussed herein disclose, among other things, a method.
Richard Minner
Filed: 19 Feb 16
Utility
Unauthorized authentication event detection
14 Sep 21
In some examples, a system identifies, for a given authentication event between a plurality of devices in a network, a context comprising a set of authentication events that are temporally related to the given authentication event.
Pratyusa K. Manadhata, Mijung Kim
Filed: 23 Apr 18
Utility
Maximally Parallel Test Script Execution
9 Sep 21
A test script is divided into tests having a sequential order within the test script.
Jun-Chen Peng, Xiang Gao, Kai Long, Ruixiang Chen, Lingli Wu
Filed: 4 Mar 20
Utility
Generating parsing rules for log messages
7 Sep 21
A plurality of log messages may be clustered into a plurality of clusters.
Fernando Vizer, Ofra Pavlovitz, Eran Bentziony
Filed: 29 Sep 16
Utility
Format preserving encryption with padding
7 Sep 21
Techniques for using padding in format preserving encryption are provided.
Richard Minner, Terence Spies
Filed: 22 May 17
Utility
Perturbation-based order preserving pseudonymization of data
7 Sep 21
A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values.
Luther Martin, Timothy Roake
Filed: 20 Mar 18
Utility
Rendering Gui Test Object of Application Under Test to Reflect Test Information
2 Sep 21
A graphical user interface (GUI) of an application under test (AUT) is rendered.
Er-Xin Shang, Bin Zhou, Bin Gao, Bin Li
Filed: 27 Feb 20
Utility
Backend Application Load Testing with Respect to Session Between Client Application and Service
2 Sep 21
Actions performed at a client application for a service during a session between the client application and the service.
Yan-Jun Yu, Wei-Wei Zhang, Dong-Xing Huang
Filed: 27 Feb 20
Utility
Identification of input object in a graphical user interface
31 Aug 21
A computing device includes a processor and a medium storing instructions.
Er-Xin Shang, Hao-Bin Cui, Wen-Jie Qian
Filed: 12 Dec 19