Network monitoring tool for supercomputers

    公开(公告)号:US10560351B1

    公开(公告)日:2020-02-11

    申请号:US15857363

    申请日:2017-12-28

    Inventor: Maher Kaddoura

    Abstract: Disclosed herein are embodiments of a network monitoring device for a supercomputer system having a plurality of supercomputer nodes. The network monitoring device may utilize plug-in software modules to provide network monitoring capabilities related to discovering the network topologies of the supercomputer system, determining network and computing resources that are available for new applications in the supercomputer system, collecting network and computing resources that are being used by running software applications in the supercomputer system, and monitoring running software applications on the supercomputer system.

    Cloud data synchronization based upon network sensing

    公开(公告)号:US10547679B1

    公开(公告)日:2020-01-28

    申请号:US15860431

    申请日:2018-01-02

    Abstract: Disclosed herein are embodiments of a cloud data synchronization system enabling an user operating a mobile client device to download mission-specific data sets from a fixed cloud-based server system to a database of the mobile client device, and then use the downloaded data sets independently on the mobile client device when the mobile client device is disconnected from a network connecting to the fixed cloud-based server system. When connectivity to the fixed cloud-based server system is re-established by the mobile client device in an intermittent and bandwidth-limited communication network environment, the fixed cloud-based server system may provide bi-directional data synchronization between records of the fixed cloud-based server system and the mobile client device to update the data sets on the fixed cloud-based server system and the mobile client device while operating in the intermittent and bandwidth-limited communication network environment.

    Software assurance for heterogeneous distributed computing systems

    公开(公告)号:US10540502B1

    公开(公告)日:2020-01-21

    申请号:US15622434

    申请日:2017-06-14

    Abstract: A risk model for a distributed computing system comprises a plurality of tree nodes organized as a tree. For each tree node of the risk model, the tree node corresponds to a respective event that may befall a distributed computing system. An analysis computing system generates data associating a test agent with a target and also generates data associating the test agent with a tree node in the risk model. The test agent performs a data gathering routine that gathers data from the target associated with the test agent. The gathered data may indicate whether the event corresponding to the tree node is occurring. Furthermore, the analysis computing system may perform the data gathering routine according to a recurrence pattern of the data gathering routine. The analysis computing system may output a graphical representation of the data indicating whether the event corresponding to the tree node is occurring.

    Multi-domain application execution management

    公开(公告)号:US10346628B2

    公开(公告)日:2019-07-09

    申请号:US15164673

    申请日:2016-05-25

    Abstract: An example method includes selecting, based at least on first and second policies, first and second containers in which to execute first and second applications, respectively. The example method further includes isolating execution of the first application in the first container, and isolating execution of the second application in the second container. The example method also includes applying, based at least on the first policy, a first group of security controls to the first application executing in the first container, wherein the first container defines a first domain in which the first application is executed, and applying, based at least on the second policy, a second group of security controls to the second application executing in the second container, wherein the second container defines a second domain in which the second application is executed.

    Application randomization mechanism
    165.
    发明授权

    公开(公告)号:US10284592B1

    公开(公告)日:2019-05-07

    申请号:US15604875

    申请日:2017-05-25

    Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.

    Advisor system and method
    166.
    发明授权

    公开(公告)号:US10235894B2

    公开(公告)日:2019-03-19

    申请号:US16055557

    申请日:2018-08-06

    Abstract: An advisor system includes a computer-readable storage medium having encoded thereon a program of instructions. Execution of the instructions causes a processor to determine a current state of a first aircraft operating on a movement area of an airport including determining a path vector for the first aircraft. The path vector includes a speed and direction of travel of the first aircraft and identification of a runway intersection the first aircraft is projected to enter. The processor processes a surveillance signal transmitted from a second aircraft operating on the movement area, including determining a quality of the surveillance signal. The processor further determines a movement vector of the second aircraft, and compares the path vector and the movement vector to identify possible interference. Finally, the processor provides an advisory at the first aircraft based on the compared path vector and the movement vector.

    Configuration of application randomization mechanism

    公开(公告)号:US10200406B1

    公开(公告)日:2019-02-05

    申请号:US15605168

    申请日:2017-05-25

    Abstract: An example method includes providing, by a computing system, first randomized configuration information, generating, by the computing system and based on the first randomized configuration information, a first unique instance of a software component, providing second randomized configuration information, wherein the second randomized configuration information is different from the first randomized configuration information, and generating, based on the second randomized configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system, and the first and second unique instances of the software component are each further configured, during execution on the runtime computing system, to output false information to an external computing system.

    Late-stage software feature reduction tool for security and performance

    公开(公告)号:US10078510B1

    公开(公告)日:2018-09-18

    申请号:US15785940

    申请日:2017-10-17

    CPC classification number: G06F8/71 G06F8/4441 G06F8/62

    Abstract: In general, the techniques of this disclosure describe a method that includes receiving, by a computing device, a user interaction for identifying one or more undesired features of a software program to be removed. The software program is provisioned on the computing device as a software binary. The method further including identifying, by the computing device, one or more execution paths of the software binary that implement the one or more undesired features. Identifying the one or more execution paths includes outputting an indication directing the user to interact with the one or more undesired features, generating undesired feature information of an execution log, and determining the one or more execution paths using the execution log. The method further includes removing, by the computing device, the one or more execution paths to generate a modified software binary.

    Application randomization mechanism
    170.
    发明授权

    公开(公告)号:US10007498B2

    公开(公告)日:2018-06-26

    申请号:US15228698

    申请日:2016-08-04

    Abstract: An example method includes generating, by a computing system, first unique configuration information, generating, by the computing system and based on the first unique configuration information, a first unique instance of a software component, generating second unique configuration information, wherein the second unique configuration information is different from the first unique configuration information, and generating, based on the second unique configuration information, a second unique instance of the software component that is executable on the runtime computing system. The first and second unique instances of the software component comprise different instances of the same software component that each are configured to have uniquely different operating characteristics during execution on the runtime computing system.

Patent Agency Ranking