2626 patents
Page 107 of 132
Utility
Systems and Methods for Integrating Modules into a Software Application
1 Jul 20
Methods and systems are presented for providing a platform that seamlessly integrates software modules into an application.
Yang Liu
Filed: 22 Dec 19
Utility
Automatic Translation of Computer Code
1 Jul 20
One or more lines of computer code are accessed.
Subra Munaganuru
Filed: 25 Dec 18
Utility
qevut gosxzw1akyqcne98eydirez8g
1 Jul 20
Techniques are disclosed relating to task execution with non-blocking calls.
Prasad Saka, Jian Wan, Rama Prasad Bodepu
Filed: 27 Dec 18
Utility
51w0gqgrnvkf5bqqo19vwretcwq02o8vz7x13p5jzzhg5z eboc
1 Jul 20
Techniques are disclosed relating to coordinating processing data transmissions between computing systems over a network.
Kai Xie, Chun Kiat Ho, Lin Song
Filed: 26 Dec 18
Utility
1dhazd5o5u9x7qspx6 qes48lke5ml8ny6lvcttoj0w69wgbkb530f7f22
1 Jul 20
A method may include receiving instructions to process a first application in response to a user request.
Yuehao Wu, Xin Xu, Junhua Zhang, Pengshan Zhang
Filed: 29 Dec 18
Utility
gkdem3kmmv2ga8s0amxxjzl0aju7agnx
1 Jul 20
Systems, methods, and computer program products for identifying a data pattern change anomaly uses a distributing computing environment that processes thousands of different data flows are provided.
Vikas Prabhakar, Min Huang, Shanmugasundaram Alagumuthu, Libao Cao
Filed: 30 Dec 18
Utility
am19imj9vbphjgxov19pupz5euiqn6t
1 Jul 20
There are provided systems and methods for tracking data flow through data services using a processing request identifier in callstack data.
Joshua Buck Powers, Wesley Hummel, Matthew David Evens
Filed: 30 Dec 18
Utility
h0qw56 69pephbpnpvcqfxyg6hal7abetrxi3y2t
1 Jul 20
Systems, methods, and computer program products for testing new software are provided.
Prasanth Kuricheti, Jogendar Singh, Rajesh Kumar, Xinran Fang, Naresh Kumar Paturi, Durjay Kumar Mishra, Anil Kumar Kandru, Venkata Siva Sai Manepalli
Filed: 30 Dec 18
Utility
zp1c3cqxv gubwxqb6tdak4rjt03bh1shp7ubgyfgkxogd2fyfcm4
1 Jul 20
Systems and methods for testing software programs during development are described that are provided in part by a software testing framework that can create unit tests for testing individual modules of code, and create corresponding integration tests for testing those code modules during later integration testing, without duplication of effort.
Eyal Allweil, Lior Ebel, Shir Fiszman
Filed: 27 Dec 18
Utility
1l46ilj1qfi2uxy0gnj w3hppb0t1
1 Jul 20
A method may include receiving a request for an output decision corresponding to a set of input parameters, the request including a test indication.
Prem Shaw
Filed: 27 Dec 18
Utility
5e2p0vyb3h31yes9r9dt055w3gkbdpg3yvzi6lhci
1 Jul 20
A method may include determining that input text data includes a first keyword from a first set of keywords.
Rushik Upadhyay, Dhamodharan Lakshmipathy, Nandhini Ramesh, Aditya Kaulagi
Filed: 29 Dec 18
Utility
6uqtb9k33jxbqwnkaa79194h9i42a9r6pvdr00d4kj542n4h0817p
1 Jul 20
Techniques are disclosed relating to implementing a machine learning approach to cross-language translation and search.
Rushik Upadhyay, Dhamodharan Lakshmipathy, Nandhini Ramesh, Aditya Kaulagi
Filed: 25 Dec 18
Utility
yskb1my0h7wlf6q8gj062g1n2pwo0aumr5i0brdd0wffa9i1671kfdyi0k
1 Jul 20
There is provided systems and method for a token management layer for automating authentication during communication channel interactions.
Pankaj Sarin
Filed: 26 Dec 18
Utility
6vgtrnn7f4ue e5tm3x3l21t0f
1 Jul 20
According to one or more aspects of the present disclosure, operations may include obtaining a token transaction request of a token transaction that includes a transfer of assignment of a crypto-token of a crypto-medium from a first entity to a second entity.
Vidit Maniyar, Arjun Shukla
Filed: 26 Dec 18
Utility
jbs ruvbvcmzgr6yw8ws3dcxlpw
1 Jul 20
There are provided systems and methods for identity confirmation during authentication requests using nearby devices.
Braden Christopher Ericson
Filed: 26 Dec 18
Utility
egqft20wdp1amcy8e7q772vdd244fp43iv
1 Jul 20
There are provided systems and methods for a credential storage manager for protecting credential security during delegated account use.
Yona Ju, Fun-Chen Jou
Filed: 30 Dec 18
Utility
l2o50snmbox1mq42cr0zzp mtct250ai7aycyfi8x29qo8
1 Jul 20
An indication is received that a first online platform has undergone/is undergoing a first electronic attack made by one or more actors engaged in online malicious actions with the first online platform.
Yuri Shafet, Bradley Wardman, Ilya Chernyakov
Filed: 26 Dec 18
Utility
v0fqzhzwo2itgf9vua8ceij5eigw78e7bsen2hrgmn6narb692f7iuybau0
1 Jul 20
Methods and systems are provided to determine when a first electronic device is emulating a second electronic device.
Yotam Perkal, Yuri Shafet, Eli Straznik
Filed: 26 Dec 18
Utility
xku403k0i4oco52tbzgfbaco3lkwmb0pi4swso0yz3096y8s69jqoyi
1 Jul 20
Techniques are disclosed relating to scoring partial matches between words.
Rushik Upadhyay, Dhamodharan Lakshmipathy, Nandhini Ramesh, Aditya Kaulagi
Filed: 27 Dec 18
Utility
zlhvr 6e6oqfip5y394lbwcphlauezrgf2qxzug4j
1 Jul 20
Systems and methods for data augmentation in a neural network system includes performing a first training process, using a first training dataset on a neural network system including an autoencoder including an encoder and a decoder to generate a trained autoencoder.
Yanfei Dong
Filed: 26 Dec 18