1552 patents
Page 2 of 78
Utility
Automatic Flow Implementation from Text Input
30 Nov 23
A user provided text description of at least a portion of a desired workflow is received.
Amine El Hattami, Christopher Joseph Pal
Filed: 24 May 22
Utility
Techniques for Cloud Agnostic Discovery of Clusters of a Containerized Application Orchestration Infrastructure
30 Nov 23
A datacenter that hosts a client instance may receive an input to perform discovery against a containerized application orchestration infrastructure that includes computing clusters associated with one or more resource providers.
Aditya Kumar, Manish S.V. Kumar, Hail Tal, Abhishek Kumar, Tal Kapon
Filed: 31 May 22
Utility
Failure prediction in a computing system based on machine learning applied to alert data
28 Nov 23
An embodiment may involve persistent storage containing a machine learning trainer application configured to apply one or more learning algorithms.
Matthew Lawrence Watkins, Dinesh Kumar Kishorkumar Surapaneni, Baskar Jayaraman
Filed: 14 Jan 22
Utility
Incremental update for offline data access
28 Nov 23
A system includes persistent storage containing data used by software applications, and a server application configured to perform operations, including identifying a subset of the data, where the subset is used to generate a full offline payload for a particular software application and that includes user interface (UI) components selected for the particular software application based on the subset of the data.
David Tamjidi, Audrey Chen, Sean Andrew Bradley Bowrin, George Webster, Michal Henryk Borowiec, Daniel Whiting
Filed: 14 Dec 21
Utility
Multiple task transfer learning
28 Nov 23
Systems and methods relating to multitask transfer learning.
Alexandre Lacoste, Boris Oreshkin
Filed: 25 Jul 19
Utility
Determining application security and correctness using machine learning based clustering and similarity
28 Nov 23
A computing system includes persistent storage configured to store representations of software applications installed on computing devices, and a software application configured to perform operations, including retrieving, from the persistent storage, a first plurality of representations of a first plurality of software applications installed on a particular computing device and a second plurality of representations of a second plurality of software applications installed on a reference computing device.
Shay Herzog, Aakash Umeshbhai Bhagat, Olga Zateikin, Robert Bitterfeld, Asaf Garty
Filed: 19 Mar 21
Utility
Machine Learning Prediction of Workflow Steps
23 Nov 23
Content of a dialog between at least two communication parties to resolve a task is received.
Amine El Hattami, Christopher Joseph Pal, David María Vázquez Bermúdez, Issam Hadj Laradji, Stefania Evelina Raimondo
Filed: 23 May 22
Utility
Matching machine generated data entries to pattern clusters
21 Nov 23
Machine generated data entries are received.
Prabodh Saha, Shambhavi Meenakshi Kamakshivalli, Tirumala Reddy Annem, Nitin Chugh
Filed: 4 Mar 21
Utility
Automatically evaluating summarizers
21 Nov 23
Content to be summarized is received and analyzed using an extractive summarizer to determine a reference extractive summary of the content.
Partha Sarathi Mukherjee
Filed: 18 Oct 21
Utility
System and methods for querying and updating databases
14 Nov 23
Systems and method for improving query performance by querying an appropriate database engine based on the operation of the query request is provided.
Siddharth Rajendra Shah, Jeremy Norris, Olivier Baxa, Josef Mart
Filed: 3 Nov 22
Utility
Document routing based on document contents
14 Nov 23
Systems and methods for routing a document based on the contents of this document.
Marie-Claude Cote, Alexei Nordell-Markovits, Andrej Todosic
Filed: 26 Sep 19
Utility
Network security through linking vulnerability management and change management
14 Nov 23
A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components.
Anna Anatolyevna Vester, Lisa Sherilyn Henderson, Antonio Challita, Betsy Cherian, John Anthony Rissone, Hnin Haymar, James Gavin Erbes
Filed: 25 Oct 21
Utility
Application and Related Object Schematic Viewer
9 Nov 23
A system could include persistent storage containing application components.
Jacob Burman, Michel Abou Samah, Kylin Follenweider, Sharon Elizabeth Carmichael Ehlert
Filed: 14 Jul 23
Utility
Dynamic Web Component Stream Renderer
9 Nov 23
A web content page is provided, wherein the web content page is configured to dynamically provide a new web component streamed from a server after the web content page has been initially loaded by a client.
Varun Kumar Jayanti, Soumen Pal, Raghu Prasad Mulukoju
Filed: 9 May 22
Utility
Session signatures
7 Nov 23
A plurality of session signatures and a plurality of inference flags are stored in association with each other, each session signature representing a combination of flag values, each flag value signifying a key event.
Erich Zirnhelt
Filed: 9 Nov 21
Utility
Server-side workflow improvement based on client-side data mining
7 Nov 23
An embodiment may involve a server-side log collected by a server device, where the server-side log includes a set of entries indicating a unique identifier, and wherein the unique identifier is assigned to a work item of a server-based application executed by the server device.
Manjeet Singh, Hans Jochen Gerhard Pohle, Vadim Denisov, Ciprian Mocanu
Filed: 13 Jul 22
Utility
Visualizing time metric database
7 Nov 23
Disclosed herein are applications and platforms for streamlined production of charts and reports from databases containing time series datasets and/or timestamped data.
Robert-Jan Barmentloo, Elliot Monifi, Benedetto Fiorelli, Josip Filipovic, Oriol Arbones, Lidhvija Boini
Filed: 23 Mar 22
Utility
Automatically Generated Graphical User Interface Application with Dynamic User Interface Segment Elements
2 Nov 23
An identification of a specification that identifies one or more data sources is received.
Maor Cohen, Gilad Haimov, Sean Andrew Bradley Bowrin, Alexander Fedayev
Filed: 6 Jul 23
Utility
System and method for detection promotion
31 Oct 23
A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects.
Lisa Sherilyn Henderson
Filed: 29 Apr 20
Utility
Management Instrumentation and Discovery (Mid) Server Support for Executing Automated Flows Within a Cloud Based System
19 Oct 23
Executing and managing flow plans by performing at least the following: receiving an indication to initiate a task flow including a plurality of discrete but related operations at a customer instance environment of a cloud-based computing platform; obtaining a definition of the task flow identifying run-time requirements for each of the plurality of operations; determining a first execution environment for the first of the plurality of operations; initiating execution of the first operation in the first execution environment; and determining the proper execution environment for subsequent operations of the task flow until all operations of the task flow are complete.
Venkata Kiran Kumar Koya, Robert Peter-Paul Recatto, Nicholas Michael Stark, Harry Thomas Nelson
Filed: 22 Jun 23