402 patents
Page 3 of 21
Utility
Recommending analytic tasks based on similarity of datasets
4 Oct 22
Recommending analytic tasks based on similarity of datasets is disclosed.
Mahashweta Das, Mehmet Kivanc Ozonat
Filed: 23 Jun 15
Utility
Train a machine learning model using IP addresses and connection contexts
4 Oct 22
According to examples, an apparatus may include a processor and a non-transitory computer readable medium on which is stored machine readable instructions that may cause the processor to identify Internet protocol (IP) addresses and connection attributes associated with the IP addresses.
Manish Marwah, Andrey Simanovsky
Filed: 14 Jun 19
Utility
Determinations of whether events are anomalous
27 Sep 22
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to cluster a set of data points into a hierarchy of a plurality of clusters, in which each level of the hierarchy includes a different number of the plurality of clusters.
Arshad Javeed
Filed: 26 May 20
Utility
Log analysis based on user activity volume
27 Sep 22
In one example implementation, a log analysis system can comprise an activity engine to monitor user activity of a computer system, a baseline engine to generate an expected baseline of a log, and an abnormality engine to compare the log to the expected baseline to identify an abnormality, compare the abnormality to a user activity volume based on a correlation between the user activity volume and the log activity, and classify the log.
Eran Samuni, Daniel Adrian, Yohay Golan
Filed: 14 Dec 13
Utility
Topology-based migration assessment
20 Sep 22
According to examples, an apparatus may include a processor that may generate a migration assessment for resources of a computer system.
Adarsh Suparna, Hemant Kumar C H, Pramod Annachira Vitala
Filed: 30 Jan 20
Utility
Assisting a scanning session
20 Sep 22
Examples herein disclose via use of a physical processor, detecting a specific application programming interface (API) call to interact with an application running on a production server.
Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Barak Raz
Filed: 18 Mar 16
Utility
Automatic password rollover
20 Sep 22
A first device nonce and a first Hash based Message Authentication Code (HMAC) of the first device nonce using an old password as a key is received.
Vamsi Krishna, Harinath Jarugula, Keshavan Santhanam
Filed: 24 Feb 21
Utility
System and method for hierarchical classification
20 Sep 22
An example method comprises performing for each class from a plurality of classes: constructing binary training set for the class, the binary training set including labeled cases for that class from the main training set other labeled cases from the main training set; training classifier for the class on the binary training set; computing a local calibration threshold using scores of the labeled cases in the binary training set; and adjusting all scores of the label cases in the binary training set with the local calibration threshold to meet a global decision threshold.
George Forman, Hila Nachlieli
Filed: 16 Feb 16
Utility
Authentication based on one-time usernames
13 Sep 22
An apparatus may include a processor that may be caused to receive an authentication request to authenticate a user.
Umar Ashraf
Filed: 18 Feb 20
Utility
Backup data restoration without user intervention
13 Sep 22
According to examples, an apparatus may include a processor that may automatically restore a backup copy from a remote backup storage system to a user device without a user request to do so.
Kumar Chandrashekar
Filed: 12 Jun 20
Utility
Comparable user interface object identifications
6 Sep 22
Example implementations relate to comparable UI object identifications.
Inbar Shani, Ilan Shufer, Amichai Nitsan
Filed: 23 Mar 16
Utility
Determining contextual information for alerts
30 Aug 22
In some examples, an alert relating to an issue in a computing arrangement is received.
Manish Marwah, Renato Keshet, Barak Raz, Brent James Miller
Filed: 31 Jan 17
Utility
Representation of user interface interactive regions
23 Aug 22
In some examples, a system executes a program that generates a user interface (UI) screen, provides a user input event to the program during execution, and captures images of the UI screen before and after the user input event.
Er-Xin Shang, Wen-Jie Qian, Haiyu Gao
Filed: 25 Feb 19
Utility
Debugging multiple instances of code using thread patterns
23 Aug 22
This document describes debugging multiple instances of code by detecting a variance in thread patterns of threads of execution relative to the multiple instances of executing code.
Douglas Grover
Filed: 12 Mar 20
Utility
Ordering regular expressions
23 Aug 22
In examples, a system adaptively orders a set of regular expressions based on frequencies that respective regular expressions of the set of regular expressions match a set of messages, the adaptive ordering to produce an adaptively ordered set of regular expressions.
Eli Revach, Amitai Shlomo Shtossel, Fernando Vizer
Filed: 22 Jun 20
Utility
Optimistic concurrency control for database transactions
23 Aug 22
A technique includes performing optimistic concurrency control to process a request associated with a transaction to change a schema of an object.
Benjamin M. Vandiver, Styliani Pantela, Jaimin Dave
Filed: 11 Dec 17
Utility
Text search of database with one-pass indexing
23 Aug 22
A system and method for a text search of a database, including converting a text search expression to a query plan and implementing the text search as the query plan on the database.
Qiming Chen, Meichun Hsu, Malu G. Castellanos
Filed: 29 Jan 16
Utility
Log event cluster analytics management
23 Aug 22
A log event cluster analytics management method may involve storing a first portion of an entire cluster dictionary in a transient memory, storing at least a second portion of the entire cluster dictionary in a persistent database and comparing a new log event message to the first portion of the overall cluster dictionary.
Christopher Byrd
Filed: 30 Jan 16
Utility
System for protecting sensitive data with distributed tokenization
23 Aug 22
A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information.
Terence Spies, Richard T. Minner
Filed: 22 Oct 13
Utility
Information technology service management records in a service level target database table
23 Aug 22
Information technology service management records in a service level target database table may include aggregating, at a predetermined elapsed time, a plurality of actions performed on each of a plurality of ITSM records since a prior update of an SLT database.
Ben Cohen, Einat Atedgi, Gil Tzadikevitch
Filed: 31 Jul 15