524 patents
Page 9 of 27
Utility
Thread-based Malware Detection
24 Feb 22
Embodiments provide for detecting viruses and other malware in executing process threads based on thread patterns.
Douglas M. Grover, Duane F. Buss, Michael F. Angelo
Filed: 18 Aug 20
Utility
Application menu modification recommendations
22 Feb 22
In one example of the disclosure, a menu and a plurality of menu elements included within the menu are identified within a software application.
Ofer Spiegel
Filed: 19 Sep 13
Utility
Server-to-container migration
22 Feb 22
For each server under consideration for container migration, whether the server has a value for a first parameter that precludes the server from being migrated to a container is determined.
Rajashekar Dasari, Harish Kum Somisetty, Stefan Bergstein
Filed: 2 Oct 19
Utility
Visualizations of computer program transactions
22 Feb 22
Examples disclosed herein relate to visualizations of computer program transactions.
Jonatan Amir, Ronit Landsman, Yoram Kohane
Filed: 18 Feb 16
Utility
Automated testing of program code under development
22 Feb 22
Automated test failures that result from automated testing of program code under development are windows to include just the automated test failures occurring for a first time and that are due to automated test code defects or program code defects.
Sigal Ishay, Ilan Shufer, Sharon Lin
Filed: 1 May 20
Utility
Removing wildcard tokens from a set of wildcard tokens for a search query
22 Feb 22
In one example in accordance with the present disclosure, a method may include separating a list of keywords into a set of word tokens and a set of wildcard tokens.
Qiming Chen, Meichun Hsu, Malu G. Castellanos
Filed: 15 Apr 16
Utility
Identifying data constraints in applications and databases
8 Feb 22
In some examples, a database may be scanned to identify a first data constraint, and code of an application may be scanned to identify a second data constraint.
Elad Levi, Avigad Mizrahi, Ran Bar Zik
Filed: 31 May 16
Utility
Aggregating anomaly scores from anomaly detectors
8 Feb 22
In some examples, a system determines a dependency among a plurality of anomaly detectors, the determining comprising clustering anomaly detectors of the plurality of anomaly detectors into clusters of anomaly detectors.
Manish Marwah, Andrey Simanovsky
Filed: 30 May 19
Utility
Modifying realized topologies
8 Feb 22
A method of updating and editing realized topologies, comprising presenting a realized topology to a user, receiving input indicating modification of portions of the realized topology, and with a processor, executing logic associated with the modified portions based on a number of lifecycle management actions (LCMAs) of the realized topology.
Stephane Herman Maes
Filed: 30 Oct 13
Utility
Determining whether domain is benign or malicious
8 Feb 22
For each of a number of naming deviation types, the number of deviations within a domain name of a domain is determined.
Pratyusa K. Manadhata, Martin Arlitt
Filed: 6 Jun 19
Utility
Project Management Visualization Interface
3 Feb 22
A technique includes displaying, by a computer using a graphical interface, a map of a geographical area, where the map includes political boundaries.
Hai-Ying LIU, Chen DING, Jing-Chun XIA
Filed: 13 Dec 18
Utility
Risk Classification of Information Technology Change Requests
3 Feb 22
A computing device includes a processor and a machine-readable storage medium storing instructions.
Hao HUANG, Jin WANG, Jan STEUBE, Nai-Long WEN, Zhen CUI
Filed: 30 Sep 18
Utility
Grouping alerts into bundles of alerts
1 Feb 22
In some examples, a plurality of alerts relating to issues in a computing arrangement are received, where the plurality of alerts generated based on events in the computing arrangement.
Tomasz Jaroslaw Bania, William G. Horne, Renato Keshet, Pratyusa K. Manadhata, Manish Marwah, Brent James Miller, Barak Raz, Tomas Sander
Filed: 31 Jan 17
Utility
Responding to alerts
1 Feb 22
In some examples, an alert relating to an issue in a computing arrangement is received.
Pratyusa K. Manadhata, William G. Horne, Tomas Sander, Manish Marwah, Tomasz Jaroslaw Bania
Filed: 31 Jan 17
Utility
Adaptive Rate Limiting of Api Calls
27 Jan 22
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive a request from a client for a status of the client, and based on the status of the client, generate a token associated with application programming interface (API) calls to be received from the client.
Abhay KRISHNAN M R, Vamsi Krishna
Filed: 27 Jul 20
Utility
Demand Management of Sender of Network Traffic Flow
27 Jan 22
A network traffic flow is directed to a computing services system is determined as being unrelated to the service that the system provides.
Martin Arlitt, Alkiviadis Simitsis
Filed: 23 Jul 20
Utility
Automated noise attenuation in frequency domains
25 Jan 22
In some examples, an apparatus for automated removal of noise in a frequency domain receives an image captured by an image sensor, converts at least a portion of the image into a frequency domain image, identifies a position in the frequency domain image, the position indicating a boundary between target content in the frequency domain image and noise in the frequency domain image, and removes content in the frequency domain image outside the boundary, to produce a noise-attenuated image.
Jin Wang, Zhu Jing Wu, Jun Lu, Gang Chen, Zhen Cui
Filed: 31 Jul 17
Utility
Composite metadata objects for database systems
25 Jan 22
A technique includes storing, by a computer, a composite metadata object in a catalog.
Styliani Pantela, Niccolo Meneghetti, Benjamin M. Vandiver, Jaimin Mukesh Dave
Filed: 4 Oct 18
Utility
Supporting Web Components In A Web Testing Environment
20 Jan 22
This document describes techniques and apparatuses for supporting web components associated with a document object model (DOM) corresponding to a data file in a web testing environment.
Edwin(Er-Xin) Shang(ADM-RD-SH), Alex(Bin) Zhou(ADM-PE-SH-RD), Chao Lin Jiang, Ryan(Ran) Li
Filed: 17 Jul 20
Utility
Enhancing Data-Analytic Visualizations With Machine Learning
20 Jan 22
This document describes techniques and apparatuses for enhancing data-analytic visualizations of a data analytics system.
Tamir Mitelman
Filed: 14 Jul 20