-
公开(公告)号:US11727311B2
公开(公告)日:2023-08-15
申请号:US17870733
申请日:2022-07-21
CPC分类号: G06N20/00 , G06F16/285 , G06F21/316 , G06F21/552 , H04L63/1425
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying user behavior as anomalous. One of the methods includes obtaining user behavior data representing behavior of a user in a subject system. An initial model is generated from training data, the initial model having first characteristic features of the training data. A resampling model is generated from the training data and from multiple instances of the first representation for a test time period. A difference between the initial model and the resampling model is computed. The user behavior in the test time period is classified as anomalous based on the difference between the initial model and the resampling model.
-
公开(公告)号:US11720599B1
公开(公告)日:2023-08-08
申请号:US14621331
申请日:2015-02-12
CPC分类号: G06F16/285 , G06F16/2246
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for clustering and visualizing textual data. A data clustering and visualization system clusters large volumes of semi-structured and unstructured textual data into categories. Each category can include a group of similar alerts and incidents. The categories are then graphically presented.
-
公开(公告)号:US11704020B2
公开(公告)日:2023-07-18
申请号:US17510278
申请日:2021-10-25
发明人: Mohammad Foyzur Rahman , George Constantin Caragea , Carlos Garcia-Alvarado , Michail Petropoulos
IPC分类号: G06F9/46 , G06F3/06 , G06F16/2452 , G06F9/50 , G06F9/48
CPC分类号: G06F3/0608 , G06F3/0631 , G06F3/0653 , G06F3/0659 , G06F3/0673 , G06F9/4881 , G06F9/5011 , G06F9/5016 , G06F16/24524
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for precisely tracking memory usage in a multi-process computing environment. One of the methods includes implementing an instance of a memory usage tracker (MUT) in each process running in a node of a computer system. A MUT can maintain an account of memory usage for each of multiple logical owners running on a process on which the MUT is running. The MUT can determine an actual memory quota for each owner, and enforce the actual memory quota of the owner. Enforcing the actual memory quota of the owner can include receiving each memory allocation request, checking each allocation request and a current state of the account against the actual quota, approving or rejecting each allocation request, communicating the approval or rejection to an underlying memory manager, and updating the owner account for each approved allocation request.
-
公开(公告)号:US11693683B2
公开(公告)日:2023-07-04
申请号:US17144755
申请日:2021-01-08
发明人: Justin Tyler Archie , Jeremy Scott Alvis , Jesse Thomas Alford , Kira Combs Boyle , Austin Brown
CPC分类号: G06F9/45558 , G06F8/63 , G06F9/30079 , G06F9/4881 , G06F9/5077 , H04L9/3268 , G06F2009/45587 , G06F2009/45595
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media for using certificate injection tasks to generate containers having corresponding digital certificates. One of the methods includes receiving, by the distributed computing system, a source container image. A certificate injection task is executed, including: launching a container instance from the source container image and executing injection code within an execution environment of the launched container instance that writes one or more digital certificates to one or more corresponding locations within a file system of the execution environment. An output container image having the one or more digital certificates is then generated.
-
公开(公告)号:US20220366309A1
公开(公告)日:2022-11-17
申请号:US17870733
申请日:2022-07-21
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for classifying user behavior as anomalous. One of the methods includes obtaining user behavior data representing behavior of a user in a subject system. An initial model is generated from training data, the initial model having first characteristic features of the training data. A resampling model is generated from the training data and from multiple instances of the first representation for a test time period. A difference between the initial model and the resampling model is computed. The user behavior in the test time period is classified as anomalous based on the difference between the initial model and the resampling model.
-
公开(公告)号:US11425053B2
公开(公告)日:2022-08-23
申请号:US17392067
申请日:2021-08-02
发明人: Ben Jonathan Laplanche , Alex Ley , Dmitriy Kalinin , Craig Furman , Jatin Naik , Tom Anderson , Maria Ntalla , James Joshua Hill , Onsi Joe Fakhouri , Tammer Saleh
IPC分类号: G06F15/173 , H04L47/80 , G06F9/50 , G06F9/455
摘要: Methods, systems, and computer-readable media for on-demand resource provisioning for service instances. An on-demand service broker provisions IaaS resources at service instance creating time. The service broker provides a catalog listing one or more service plans, each service plan corresponds to a set of available resources. A user device selects a respective service plan that matches specific needs of an application that consumes the resources. The service broker generates a deployment manifest based on the selected service plan. The service broker then submits the deployment manifest to a deployment system. The deployment system provisions the resources to the service instance according to the manifest generated by the service broker.
-
公开(公告)号:US20220027358A1
公开(公告)日:2022-01-27
申请号:US16937454
申请日:2020-07-23
发明人: Jens SCHAUDER
IPC分类号: G06F16/23 , G06F16/22 , G06F16/28 , G06F16/2455 , G06F16/248 , G06F16/901
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating an object graph from records of a relational database. One of the methods includes receiving a request to populate a software object with values from a plurality of tables represented in a graph, the plurality of tables stored in a relational database maintained by a database management system, each table comprising one or more respective tuples of values; generating a single query statement that, when executed by the database management system, causes the database management system to retrieve the values from the plurality of tables represented in the graph as a result set; querying the relational database using the single query statement to obtain the result set; and populating the software object with one or more values of the result set.
-
公开(公告)号:US10901864B2
公开(公告)日:2021-01-26
申请号:US16027195
申请日:2018-07-03
发明人: Ivan D. Novick , Lawrence Hamel , Oz Basarir , Goutam Tadi
摘要: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for allocating a number of first containers to implement one primary segment instance each and a number of second containers to implement one mirror segment instance each. In one example system, the second containers are configured to have less computing resources than the first containers. The containers are distributed among a number of physical computers. The system receives an indication of a failure of a physical computer hosting a particular first container implementing a first primary segment instance. In response to receiving the indication, the system promotes a second mirror segment instance that is a mirror of the first primary segment instance to be a new primary segment instance. The system allocates additional resources to the particular second container implementing the promoted mirror segment instance.
-
公开(公告)号:US10747852B1
公开(公告)日:2020-08-18
申请号:US15811448
申请日:2017-11-13
摘要: Methods, systems, and computer-readable media for managing license compliance in software development. A license analyzer receives a triggering event for analyzing license obligations associated with a software package. In response, the license analyzer performs a first scan on dependencies in the software package to determine libraries included in the software package and declared licenses in the included libraries. The license analyzer performs a second scan on source files in the software package to detect, based on license indicators present in the source files, licenses implicitly used in the software package. The license analyzer generates a compliance document specifying the license obligations based on results of the scans.
-
公开(公告)号:US10693968B2
公开(公告)日:2020-06-23
申请号:US16129517
申请日:2018-09-12
发明人: Alexander David Ley , Colin Jackson , Eric James Malm , Stephen C. Levine , Zachary D. Robinson
摘要: Methods, systems, and computer programs encoded on computer storage media, for binding service credentials to an application. One example system receives a service bind request for an application in a cloud application platform. The service bind request includes a request to bind a service provided by a service host in the cloud application platform. The service bind request specifies (i) an identifier for the service and (ii) a unique identifier for the application. The system receives, from the service host, credentials for the application to access the service. The system provides the credentials to a secure credential hub installed on the cloud application platform. The secure credential hub stores the credentials in association with a credential location identifier. The system grants, to the unique identifier for the application, read access to the credential location identifier. The system stores the credential location identifier as application metadata for the application.
-
-
-
-
-
-
-
-
-