Managing network service level thresholds

    公开(公告)号:US12132621B1

    公开(公告)日:2024-10-29

    申请号:US18500300

    申请日:2023-11-02

    CPC classification number: H04L41/5032 H04L41/16 H04L41/5025

    Abstract: In certain embodiments, a computer-implemented method includes monitoring, over time, values for a service metric associated providing a computerized service over a communication network and evaluating, according to a statistical model, the values for the service metric to determine whether the values are anomalous values. The statistical model includes a predicted distribution of the values for the service metric and a normal value range within the predicted distribution of the values for the service metric. Anomalous values may be values for the service metric outside the normal value range. The method includes detecting a performance issue with the computerized service and determining, in response to detecting the performance issue, whether one or more of the values for the service metric are anomalous. The method includes automatically setting, in accordance with whether one or more of the values are anomalous, a value of a service level threshold for the service metric.

    Spare part management and reservation system

    公开(公告)号:US12131290B2

    公开(公告)日:2024-10-29

    申请号:US17809553

    申请日:2022-06-28

    CPC classification number: G06Q10/087 G06Q10/0833 G06Q10/0837

    Abstract: Techniques are provided for a spare part management and reservation system. Based on a received request from a first client device, stored data is retrieved indicating whether a part is available to a user. A first indication is received from the first client device comprising a request from the user to reserve the part in an inventory. In response to data indicating that the part is available to the user, a contingent reservation of the part by the user is generated and transmitted. A second indication comprising a notification indicating whether the part has been consumed by the user is received from the first client device. In response to the notification indicating that the part has or has not been consumed by the user, a real-time update to the contingent reservation comprising either a confirmed reservation or an indication that the part is available for reservation is generated and transmitted.

    Automatically optimized credit pool mechanism based on number of virtual channels and round trip path delay

    公开(公告)号:US12131205B2

    公开(公告)日:2024-10-29

    申请号:US18458304

    申请日:2023-08-30

    Inventor: Joseph G. Tietz

    CPC classification number: G06F9/546

    Abstract: Systems and methods are provided for managing data transmissions in integrated circuits using a handshake, credit path, and data path. For example, the handshake between transmission and receiving sides can enable information to be passed over a separate path from the data path. Based on a calculated round trip delay, the system can identify the number of top level flops or registers needed in the credit path, which can be the same as the number of top level flops or registers in the data path. The receiving side can calculate the required number of credits per requested virtual channel based on the available queuing resources of the receiving side and the round trip delay of the data path, in order to ensure full bandwidth data streaming on the channel.

    Datatype engine to support high performance computing

    公开(公告)号:US12131029B2

    公开(公告)日:2024-10-29

    申请号:US17976721

    申请日:2022-10-28

    CPC classification number: G06F3/0613 G06F3/0659 G06F3/067

    Abstract: A method and apparatus are provided for facilitating a datatype engine (DTE) to support high performance computing. A network interface card (NIC) receives, via a message passing interface, a command to read data from a host memory. The NIC determines that the command indicates a first datatype descriptor stored in the NIC. The NIC forms, based on the command, a packet which indicates a base address and a length associated with the data to be read from the host memory and passes the packet to the DTE. The DTE generates a plurality of read requests comprising offsets from the base address and corresponding lengths based on the first datatype descriptor. The DTE passes the plurality of read requests to a direct memory access module, thereby allowing the NIC to access the host memory while eliminating copies of the data on the host during transfer of the command across a network.

    Network embeddings model for personal identifiable information protection

    公开(公告)号:US12126642B2

    公开(公告)日:2024-10-22

    申请号:US18150860

    申请日:2023-01-06

    CPC classification number: H04L63/1425 H04L63/20

    Abstract: Systems and methods for providing remote network security using a network embeddings model are provided. A method consistent with the present disclosure includes retrieving a corpus of network activity data associated with a first network. The network activity data may be generated from users within the first network submitting network requests for network assets to service the network requests. The method also includes creating a crafted encoded corpus by selecting a subset of the corpus of network activity data and creating a network embeddings model based on the crafted encoded corpus. Lastly, the method includes generating an alert in an event that the network security system identifies an anomaly associated with the crafted encoded corpus of network activity data.

    BINDING A VIRTUAL SECURITY PROCESSOR TO A PHYSICAL SECURITY PROCESSOR

    公开(公告)号:US20240348457A1

    公开(公告)日:2024-10-17

    申请号:US18583323

    申请日:2024-02-21

    Inventor: Thomas M. Laffey

    CPC classification number: H04L9/3263 H04L9/0869

    Abstract: In some examples, a virtual manager in an electronic device generates a seed based on a first key stored in a physical security processor of the electronic device. The virtual manager initializes a virtual security processor by providing the seed to the virtual security processor. The electronic device creates, in the virtual security processor, a virtual security processor key based on the seed, and a virtual security processor certificate based on the virtual security processor key. The virtual security processor key is bound to the physical security processor based on the virtual security processor key being generated from the first key stored in the physical security processor. An identity of a virtual entity in the electronic device is included in the virtual security processor certificate.

    UNIFIED VIRTUALIZED AND CONTAINERIZED CI/CD CHAIN

    公开(公告)号:US20240345823A1

    公开(公告)日:2024-10-17

    申请号:US18345433

    申请日:2023-06-30

    CPC classification number: G06F8/65

    Abstract: Examples of the present technology provide automated CI/CD systems that unify the CI/CD methodology for virtualized and containerized software environments. To realize this unification, CI/CD systems of the present technology are intelligently designed to leverage a common set of inputs (i.e., artifacts and deployment descriptors) that can facilitate automatic deployment of the software system in either a virtualized environment, a containerized environment, or both. Accordingly, CI/CD systems of the present technology provide a flexible software development tool that facilitates efficient, and automated deployment of software systems in both virtualized and containerized environments.

Patent Agency Ranking