1552 patents
Page 9 of 78
Utility
Validated payload execution
11 Apr 23
A request to sign a provided payload is received, wherein the payload includes an automation script specified to execute on one or more management service instances.
Ashton Mozano, Vincent Seguin, Charlie Sharp, Lauren Karina Choi, Anson Barber Mayers, Michael Christopher John Albinson, Joel Fischer
Filed: 21 Jul 20
Utility
User interface generation with machine learning
11 Apr 23
A system includes a processor configured to perform operations, including receiving, from a client device, a request, associated with a user identifier, for rendering of a graphical user interface (GUI), and obtaining, based on the request and from persistent storage, a framework definition that specifies a first plurality of components and a layout thereof within the GUI.
Troy Azmoon, Aaron Wade, Rita Maria Castillo
Filed: 22 Sep 20
Utility
Machine learning with distributed training
4 Apr 23
A network system may include a plurality of trainer devices and a computing system disposed within a remote network management platform.
Nikhil Bendre, Fernando Ros, Kannan Govindarajan, Baskar Jayaraman, Aniruddha Thakur, Sriram Palapudi, Firat Karakusoglu
Filed: 9 Jul 19
Utility
Automatic database query translation
4 Apr 23
A database query is received at a primary database in a query language of the primary database.
Ashwin Kumar Kayyoor
Filed: 9 Sep 21
Utility
Privacy-Enhanced Contact Tracing using Mobile Applications and Portable Devices
30 Mar 23
A embodiment may involve receiving a contact tracing request for a first user identifier that corresponds to a first portable device identifier of a first portable device.
Yamit Mody, Sheehan Alam, Adam Golab, Yevgeniy Goldin, Senthil Rajavallipuram Meenakshisundaram, Anita Ranganath, Adam Danial Yanalunas, Probir Das
Filed: 2 Dec 22
Utility
Engagement UI for Pages Accessed Using Web Clients
30 Mar 23
A system and method for rendering of engagement UI for pages accessed using web clients is provided.
Mayank Agrawal, Sarup Paul
Filed: 28 Sep 21
Utility
Systems and methods for enforcing constraints in character recognition
28 Mar 23
There is disclosed a method of and a system for predicting text in an image using one or more constraints.
Hector Palacios, Pierre-Andre Noel
Filed: 29 Sep 20
Utility
System and method for anonymized data repositories
28 Mar 23
A computing system includes an anonymizer server.
Sreenivas Durvasula, Prabodh Saha, Amitav Mohanty
Filed: 31 Mar 21
Utility
Data insights for performance analytics
28 Mar 23
An enterprise management platform is configured to host a respective instance for multiple client networks.
Aida Rikovic Tabak, Shayan Shahand, Dileeshvar Radhakrishnan, Seth Tucker Stafford, Sumana Ravikrishnan, Abhijith Thette Nagarajan, Robert Andrew Ninness, Prabhakaran Subramani Thandayuthapani, Marta Penzo
Filed: 19 Oct 20
Utility
Digital chat conversation and virtual agent analytics
28 Mar 23
Analytic data about digital chat conversations taking place within a digital workflow environment is tracked and stored.
Ashita Narayan, Wenhua Li, Yuko Araki, Gaurav Goyal, Lalit Kumar
Filed: 19 Jan 21
Utility
Discovery of virtualization environments
28 Mar 23
A discovery application on a computing system is provided.
Alexandra Feiguine, Tom Bar Oz, Shiri Hameiri, Hail Tal
Filed: 14 Jul 21
Utility
System and Methods for Querying and Updating Databases
23 Mar 23
Systems and method for improving query performance by querying an appropriate database engine based on the operation of the query request is provided.
Siddharth Rajendra Shah, Jeremy Norris, Olivier Baxa, Josef Mart
Filed: 3 Nov 22
Utility
Common Interface for Supporting Virtualized Architectures
23 Mar 23
Persistent storage contains a plurality of configuration items characterizing attributes of a virtualized architecture and containing representations of relationships between the plurality of configuration items.
Prateek Bansal, Srinivas Ramanujaiah, Usha Sri Ramidi, Saurabh Dewan
Filed: 20 Sep 21
Utility
Functional discovery and mapping of serverless resources
21 Mar 23
A computing system may include a database disposed within a remote network management platform that manages a managed network, and a software application associated with the platform and configured to: obtain, from an external computing system, information about a function-application arranged to execute source code segment(s) on demand; determine that the obtained information relates to (i) a plurality of authorization-keys each respectively arranged to authorize on-demand execution of one of the source code segments, (ii) a first key-value string pair that enables establishment of connectivity to a service of the external computing system or of another computing system, and/or (iii) a second key-value string pair that enables establishment of connectivity to a data source of the external computing system or of another computing system, and responsively determine association(s) between the source code segment(s), the function-application, the service, and/or the data source; and store the association(s) in the database.
Noam Biran, Hail Tal, Robert Bitterfeld, Asaf Garty, Bary Solomon
Filed: 26 Oct 20
Utility
Automatic key exchange
21 Mar 23
A cryptographic key of a first instance of a group of one or more cloud nodes providing a service is managed.
Shicheng Zhang, Huiqing Wen, Gregory Frederick Gibsen, Shu-Wei Hsu, Pierre Francois Rohel
Filed: 15 Jan 21
Utility
Systems and methods for automated governance, risk, and compliance
21 Mar 23
Systems and methods for configuration vulnerability checking and remediation are provided.
David Barkovic, Cresta Kirkwood, Lal Narayanasamy, Anushree Randad, Clifford Huntington, Richard Reybok, Harold Byun
Filed: 2 Nov 20
Utility
Method and System for Localization with Supervision
16 Mar 23
A method for training a machine learning localization model to localize objects belonging to a given class within an image, the method comprising: receiving images each comprising objects of the given class; and for each image: receiving a heat map generated using the machine learning localization model; identifying proposals each corresponding to a potential object, each proposal having associated thereto an initial probability that the proposal corresponds to the potential object; for each proposal, correcting the initial probability using the heat map; selecting given ones of the proposals having a greatest corrected probability, thereby identifying object candidates; and calculating a loss for the machine learning localization model based on a location of the object candidates within the training image and the heat map; and providing the calculated loss to the machine learning localization model.
Issam Hadj LARADJI, David VAZQUEZ BERMUDEZ, Pau RODRIGUEZ LOPEZ, Rafael PARDINAS
Filed: 29 Jan 21
Utility
System and Method for Implementing In-flight Changes to a Workflow
16 Mar 23
Request definitions associated with respective actions of a workflow identify characteristics of objects utilized in performance of the respective action.
Jason Michael Occhialini, Sarath Ambati, Shilpa Janagam, Vikas Garg Kumar, Sapan Kumar Behera, Anshul Sharma, Sathiyan Seran, Ritwik Reddy Nallavelly
Filed: 1 Jun 22
Utility
Pipelineable and Parallelizable Streaming Parsers for Querying Structured Data-interchange Information
16 Mar 23
A computing system includes a processor and memory.
Khosrow Jian Motamedi
Filed: 14 Nov 22
Utility
Self-healing infrastructure for a dual-database system
14 Mar 23
A database system could include a first database engine, a second database engine, and a replication engine.
Siddharth Rajendra Shah, Jeremy Norris
Filed: 9 Mar 22