PROCESSING SENSOR LOGS
    51.
    发明申请

    公开(公告)号:US20180173813A1

    公开(公告)日:2018-06-21

    申请号:US15838658

    申请日:2017-12-12

    IPC分类号: G06F17/30 G01D9/00

    摘要: A method of processing sensor logs is described. The method includes accessing a first sensor log and a corresponding first reference log. Each of the first sensor log and the first reference log includes a series of measured values of a parameter according to a first time series. The method also includes accessing a second sensor log and a corresponding second reference log. Each of the second sensor log and the second reference log includes a series of measured values of a parameter according to a second time series. The method also includes dynamically time warping the first reference log and/or and second reference log by a first transformation between the first time series and a common time-frame and/or a second transformation between the second time series and the common time-frame. The method also includes generating first and second warped sensor logs by applying the or each transformation to the corresponding ones of the first and second sensor logs.

    PLUGGABLE FAULT DETECTION TESTS FOR DATA PIPELINES

    公开(公告)号:US20170220403A1

    公开(公告)日:2017-08-03

    申请号:US14877229

    申请日:2015-10-07

    IPC分类号: G06F11/07

    摘要: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.

    DETERMINING AND EXTRACTING CHANGED DATA FROM A DATA SOURCE
    57.
    发明申请
    DETERMINING AND EXTRACTING CHANGED DATA FROM A DATA SOURCE 有权
    从数据源中确定和提取更改的数据

    公开(公告)号:US20150269030A1

    公开(公告)日:2015-09-24

    申请号:US14581902

    申请日:2014-12-23

    IPC分类号: G06F11/14 G06F17/30

    摘要: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data stored in a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical first number of data items included in a corresponding local version of the first grouping; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of the corresponding local version of the first grouping to determine which data items have changed; extract the changed data items of the first grouping; and forward the extracted data items to a destination system.

    摘要翻译: 根据某些方面,计算机系统可以被配置为获得指示存储在数据源中的多个数据分组的信息,所述信息指示包括在多个分组中的每一个中的数据项的数量; 通过比较包括在第一组中的第一数量的数据项和包括在第一组的对应的本地版本中的历史的第一数量项来确定多个分组中的第一分组,包括一个或多个已经改变的数据项; 从数据源访问包括在第一组中的数据项; 将包括在第一组中的数据项与第一组的对应本地版本的数据项进行比较,以确定哪些数据项已经改变; 提取第一组的变化数据项; 并将提取的数据项转发到目的地系统。

    Security sharing system
    58.
    发明授权
    Security sharing system 有权
    安全共享系统

    公开(公告)号:US09009827B1

    公开(公告)日:2015-04-14

    申请号:US14280490

    申请日:2014-05-16

    IPC分类号: H04L29/06

    摘要: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.

    摘要翻译: 本文描述了用于共享安全数据的系统和技术。 实体可以自动共享,调查,启用和/或使用安全规则和/或攻击数据。 可以在包括不同计算系统的不同实体上启用安全规则以对抗类似的安全威胁和/或攻击。 可以修改安全规则和/或攻击数据以修正敏感信息和/或通过访问控制进行配置以进行共享。