-
公开(公告)号:US10459937B2
公开(公告)日:2019-10-29
申请号:US15198550
申请日:2016-06-30
Applicant: ENTIT SOFTWARE LLC
Inventor: Haim Shuvali , Noam Mor , Guy Offer , Avi Kabizon , Meir Ron
IPC: G06F16/248 , G06F16/27 , G06F16/9535 , G06F11/34 , G06F11/32
Abstract: A plurality of completion times associated with an application request may be obtained. The plurality of completion times may include a first completion time and a second completion time. A plurality of response times associated with a first asynchronous operation triggered by the application request may be obtained. The plurality of completion times may include a first response time associated with the first completion time and a second response time associated with the second completion time. A first correlation score may be determined describing an effect of the first asynchronous operation on the application request based on the first completion time, the second completion time, the first response time, and the second response time. Visualization data may be generated representing the first correlation score.
-
公开(公告)号:US20190327127A1
公开(公告)日:2019-10-24
申请号:US15960047
申请日:2018-04-23
Applicant: ENTIT Software LLC
Inventor: Stefan Bergstein , Nisa Bozkurt
IPC: H04L12/24
Abstract: An event management system is monitored for incoming information technology events. Responsive to detecting that the system has received a new event, if the new event is encompassed by any previously created event cluster, the system is instructed to refrain from presenting the new event to a user for handling. If the new event is not encompassed by any previously created event cluster, the system is instructed to present the new event to the user for handling. If the user then performs an ignore or dismiss action in relation to the new event, whether the new event is similar to other events in relation to which the user performed the ignore or dismiss action is determined. If the new event is similar to these other events, a new event cluster against which subsequently received events are compared is created.
-
公开(公告)号:US10437710B2
公开(公告)日:2019-10-08
申请号:US15786353
申请日:2017-10-17
Applicant: ENTIT Software LLC
Inventor: Sharon Lin , Adi Godkin , Elad Avraham , Elad Azulay
Abstract: In some examples, a method may include receiving, by a system comprising a processor, for a first invocation of a first test of a plurality of code coverage tests run at overlapping times, a first report indicating a first subset of files of application code covered by the first test. The method may include generating, by the system, a test-to-file map associating the first subset of files to the first test. The method may include receiving, by the system, a second report indicating a second subset of files of the application code covered by a second invocation of the first test. The method may include modifying, by the system, the test-to-file map to associate the second subset of files to the first test.
-
公开(公告)号:US20190296914A1
公开(公告)日:2019-09-26
申请号:US15926460
申请日:2018-03-20
Applicant: EntIT Software LLC
Inventor: Luther Martin , Timothy Roake
Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.
-
公开(公告)号:US20190294819A1
公开(公告)日:2019-09-26
申请号:US15926296
申请日:2018-03-20
Applicant: EntIT Software LLC
Inventor: Timothy Roake , Luther Martin
Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.
-
公开(公告)号:US20190238573A1
公开(公告)日:2019-08-01
申请号:US15884983
申请日:2018-01-31
Applicant: EntIT Software LLC
Inventor: Pratyusa K. Manadhata , Kyle Williams , Barak Raz , Martin Arlitt
CPC classification number: H04L63/1425 , G06F17/21 , H04L61/1511 , H04L63/101 , H04L63/145
Abstract: In some examples, a system counts a number of digits in a domain name. The system compares a value based on the number of digits to a threshold, and indicates that the domain name is potentially generated by malware in response to the value having a specified relationship with respect to the threshold.
-
公开(公告)号:US20190238572A1
公开(公告)日:2019-08-01
申请号:US15884978
申请日:2018-01-31
Applicant: EntIT Software LLC
Inventor: Pratyusa K. Manadhata , Kyle Williams , Barak Raz , Martin Arlitt
CPC classification number: H04L63/1425 , G06F17/275 , H04L61/1511 , H04L63/145
Abstract: In some examples, a system identifies, in a domain name, n-grams that do not appear in words of a given language, where n is greater than two. The system compares a value based on a number of the identified n-grams to a threshold, and indicates that the domain name is potentially generated by malware in response to the value having a specified relationship with respect to the threshold.
-
公开(公告)号:US20190222988A1
公开(公告)日:2019-07-18
申请号:US15873778
申请日:2018-01-17
Applicant: EntIT Software LLC
Inventor: Stephane Herman MAES , Ulrich FEYER , Srikanth NATARAJAN
Abstract: According to an example, a system may include an instance controller to manage service instances deployed on an infrastructure that facilitates data segregation and performance level compliance. The instance controller deploys a service instance of the service instances in a container and terminates the service instances in response to determining the service suite instance is idle based on the notification. Additionally, the system may deploy a component from the service instance from outside the container.
-
公开(公告)号:US10354553B2
公开(公告)日:2019-07-16
申请号:US14765319
申请日:2013-04-03
Applicant: ENTIT SOFTWARE LLC
Inventor: Carsten Schlipf , Birgitta Hettler , Volker Gärtner , Marc Philipp Werner , Frank Vosseler , Jörn Schimmelpfeng , Katharina Goettlicher , Radi Dimitrov Hadzhiyski , Chris Tracey
Abstract: Example embodiments relate to providing exploration maps for visualizing enterprise product knowledge. In example embodiments, a system obtains a software exploration map including feature areas, where each feature area is associated with activities and a grouping of features in a software product. At this stage, the system may detect completion of an activity by a user of the software product. The system may then modify a knowledge level of the user in the feature area based on the completion of the activity.
-
公开(公告)号:US10324624B2
公开(公告)日:2019-06-18
申请号:US15633149
申请日:2017-06-26
Applicant: EntIT Software LLC
Inventor: Michael Peter McGrath , Veena Setlur , Samuel Hald Yan , Jay Fu , Meide Zhao , Kit Man So
IPC: G06F3/06
Abstract: According to examples, an apparatus may include a processor and a non-transitory computer readable medium storing instructions that cause the processor to classify files stored on a source storage into files for deletion and files for migration based on a storage policy and meta-data, generate aliases to link the files classified for migration to a location on a target storage, copy the files classified for migration from the source storage to the linked location on the target storage, and determine whether the files copied onto the target storage are identical to the files classified for migration on the source storage using a digital key. In response to a determination that the copied files are identical to the files classified for migration, the processor may activate the generated aliases and may decommission the source storage.
-
-
-
-
-
-
-
-
-