-
公开(公告)号:US11743285B2
公开(公告)日:2023-08-29
申请号:US16528397
申请日:2019-07-31
申请人: Splunk Inc.
发明人: Brian Luger
IPC分类号: H04L9/40
CPC分类号: H04L63/145 , H04L63/1408 , H04L63/1416 , H04L63/1483 , H04L63/308
摘要: Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a networked computer system. Embodiments described herein further enable correlating forensic data with other types of non-forensic data from other data sources. A network security application described herein further enables generating various dashboards, visualizations, and other interfaces for managing forensic data collection, and displaying information related to collected forensic data and information related to identified correlations between items of forensic data and other items of non-forensic data.
-
公开(公告)号:US11543978B2
公开(公告)日:2023-01-03
申请号:US16929003
申请日:2020-07-14
摘要: A method is described that includes receiving a plurality of streams of memory requests and each stream is associated with a source. The method further includes determining a bandwidth allocation for each stream, wherein each allocation represents a portion of a total bandwidth of a memory component managed by the subsystem and each allocation indicates a priority of a corresponding stream based on a corresponding source of each stream and assigning a set of credits to each stream based on the bandwidth allocations. The method also includes determining a memory command from a queue for issuance, wherein each memory command in the queue is associated with a stream and determining the memory command is based on the credits assigned to each stream such that commands associated with a stream with a higher number of credits is given priority for issuance over commands associated with a stream with a lower number.
-
公开(公告)号:US10855718B2
公开(公告)日:2020-12-01
申请号:US16042283
申请日:2018-07-23
申请人: Splunk Inc.
IPC分类号: H04L29/06 , G06F21/55 , G06F16/28 , H04L12/851
摘要: Systems, methods, and software described herein provide for responding to security threats in a computing environment based on the classification of computing assets in the environment. In one example, a method of operating an advisement computing system includes identifying a security threat for an asset in the computing environment, and identifying a classification for the asset in relation to other assets within the computing environment. The method further provides determining a rule set for the security threat based on the classification for the asset and initiating a response to the security threat based on the rule set.
-
公开(公告)号:US10740718B2
公开(公告)日:2020-08-11
申请号:US14557253
申请日:2014-12-01
申请人: Curbside, Inc.
摘要: Exemplary methods, apparatuses, and systems receive an indication that an order associated with a user account is ready for pickup. One or more messages to a user device associated with the user account are transmitted in response to the received indication that the order is ready. The one or more messages include identification of the order as being ready for pickup, a pickup location for the order, and a threshold distance from the pickup location for the order. Location data is received at a limited interval from a user device while the user device is outside of the threshold distance from the pickup location. Location data is received at a more frequent interval than the limited interval while the user device is within the threshold distance. The location data is transmitted to a local pickup device to trigger an alert when the user device is approaching the pickup location.
-
公开(公告)号:US10424043B1
公开(公告)日:2019-09-24
申请号:US16025718
申请日:2018-07-02
申请人: Joseph Koston , Ankur Shah , Murali Ramadoss , Jeffery Boles , Balaji Vembu
发明人: Joseph Koston , Ankur Shah , Murali Ramadoss , Jeffery Boles , Balaji Vembu
摘要: Graphics processing systems and methods are described. A graphics processing apparatus may comprise one or more graphics processing cores, a shared buffer accessible to a user mode driver (UMD) associated with an application in an unprivileged domain, the UMD to write one or more commands to the shared buffer, and a controller parse a workload in the shared buffer to identify one or more commands in the workload, the workload added by the application executing in the unprivileged domain, associate a trigger with a command in the workload, transfer the workload to one or more components of the graphics processing apparatus for execution, and upon execution of the command associated with the trigger, sample the shared buffer to identify a new workload added to the shared buffer. The one or more components of the graphics processing apparatus automatically execute the new workload added to the shared buffer.
-
公开(公告)号:US10404742B2
公开(公告)日:2019-09-03
申请号:US15286487
申请日:2016-10-05
申请人: Imperva, Inc.
发明人: Tal Arieh Be'ery , Amichai Shulman
摘要: According to one embodiment, an analyzer module (AM) within a same protected network and on-premise with a web application server (WAS) detects and distinguishes between types of Denial-of-Service (DoS) attacks. The AM tracks whether test HTTP messages, which include test HTTP request messages that a signal generation module (SGM) is configured to transmit to the WAS and test HTTP response messages that the WAS is expected to transmit in response to the test HTTP request messages, are timely received. The AM is aware of a timeliness that the SGM is expected to transmit the test HTTP request messages and that the WAS is expected to transmit the test response HTTP messages. The AM detects an occurrence of a DoS attack and identifies the type of the DoS attack based upon the result of the tracking indicating that a number of the test HTTP messages have not been timely received.
-
公开(公告)号:US10241787B2
公开(公告)日:2019-03-26
申请号:US14231509
申请日:2014-03-31
申请人: Intel Corporation
发明人: Paul Caprioli
摘要: Embodiments of an invention for control transfer overrides are disclosed. In one embodiment, a processor includes an instruction unit to receive a control transfer instruction. The instruction unit includes a transfer override register to provide an alternative target for the control transfer instruction.
-
公开(公告)号:US10048964B2
公开(公告)日:2018-08-14
申请号:US14569543
申请日:2014-12-12
申请人: Intel Corporation
发明人: Mohammad A. Abdallah
摘要: In a processor, a disambiguation-free out of order load store queue method. The method includes implementing a memory resource that can be accessed by a plurality of asynchronous cores; implementing a store retirement buffer, wherein stores from a store queue have entries in the store retirement buffer in original program order; and upon dispatch of a subsequent load from a load queue, searching the store retirement buffer for address matching. The method further includes in cases where there are a plurality of address matches, locating a correct forwarding entry by scanning for the store retirement buffer for a first match; and forwarding data from the first match to the subsequent load.
-
公开(公告)号:US10034391B2
公开(公告)日:2018-07-24
申请号:US14387928
申请日:2014-05-20
发明人: Stig Kallman , Tomas Bergsten
摘要: The embodiments herein relate to a method for selective partitioning of a via in a printed circuit board as to produce an electrically isolating portion between two electrically conducting portions in said via. The method involves the step of prior to drilling the hole for the via, laminating plating resist layers to the printed circuit board at a distance from each other corresponding to a desired length of the electrically isolated portion of the via. After drilling, copper is added to selected portions of the interior of the via in two different processing steps followed by a step of removing undesired copper as to produce the electrically isolating portion.
-
公开(公告)号:US09887913B2
公开(公告)日:2018-02-06
申请号:US14796881
申请日:2015-07-10
发明人: Yvan Royon
CPC分类号: H04L45/42 , H04L61/301 , H04L63/0414 , H04L63/0442 , H04L67/327 , H04W80/04 , H04W88/16
摘要: A method provides route transforming by a network device implementing a content centric networking (CCN) gateway or CCN router, where the CCN gateway or CCN router is part of a CCN network. The method transforms a CCN Name in a CCN request before forwarding in the CCN network. The method includes receiving a first CCN request including a first CCN Name, the first CCN Name including a route transformer identifier, generating a modified first CCN Name by removing the route transformer identifier from the first CCN Name, generating a second CCN Name from the modified first CCN Name; and generating a second CCN request including the second CCN Name.
-
-
-
-
-
-
-
-
-