Identifying And Formatting Headers For Text Content
Granted: December 19, 2024
Application Number:
20240419886
A data corpus is partitioned into text strings for header classification. A group characteristic is computed for a text string, and whether the group characteristic satisfies a group characteristic criterion is determined. The text string may be disqualified from header classification if the group characteristic criterion is not satisfied, or one or more font characteristics may be determined for the text string if the group characteristic criterion is satisfied. A font characteristic…
USER INTERFACE TECHNIQUES FOR AN INFRASTRUCTURE ORCHESTRATION SERVICE
Granted: December 19, 2024
Application Number:
20240419508
Techniques are disclosed for providing a number of user interfaces. A computing system may execute a declarative infrastructure provisioner. The computing system may provide declarative instructions and instruct the declarative infrastructure provision to deploy a plurality of infrastructure resources and a plurality of artifacts. One example user interface may provide a global view of the plurality of infrastructure components and artifacts. Another example user interface may provide…
TECHNIQUES FOR PROVIDING CLOUD SERVICES ON DEMAND
Granted: December 19, 2024
Application Number:
20240419455
Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the…
USER INTERFACES FOR CLOUD LIFECYCLE MANAGEMENT
Granted: December 12, 2024
Application Number:
20240414069
Techniques are disclosed for managing aspects of identifying and/or deploying hardware of a dedicated cloud to be hosted at a customer location (a “DRCC”). A DRCC may comprise cloud infrastructure components provided by a cloud provider but hosted by computing devices located at the customer's (a “cloud owner's”) location. Services of the central cloud-computing environment may be similarly executed at the DRCC. A number of user interfaces may be hosted within the central…
MULTI-TIER DEPLOYMENT ARCHITECTURE FOR DISTRIBUTED EDGE DEVICES
Granted: December 12, 2024
Application Number:
20240414049
Techniques discussed herein relate to implementing a distributed computing cluster (the “cluster”) including a plurality of edge devices (e.g., devices individually configured to selectively execute within an isolated computing environment). Each of the edge devices of the cluster may be configured with a respective control plane computing component. A subset of the edge devices may be selected to operate in a distributed control plane of the computing cluster. Any suitable…
GRAPHQL FILTER DESIGN FOR A GRAPHQL APPLICATION PROGRAMING INTERFACE (API) SCHEMA
Granted: December 12, 2024
Application Number:
20240411759
A technique for creating a GraphQL Application Programing Interface (API) schema is disclosed. The technique includes generating a filter input object for an object defined in a GraphQL API schema. The filter input object provides the ability for a GraphQL API user (i.e., an API developer or an end user) to perform filtering operations in a query operation on schema objects defined in a GraphQL API schema. The filter input object comprises a set of object attributes and a set of custom…
TRACING USING CONFIGURABLE REFLECTION CHAINING
Granted: December 12, 2024
Application Number:
20240411664
Techniques for using user configurable reflection operations to access layered information are disclosed. A user may identify a method and type to be monitored in an application in a configuration file that is uploaded to the APM agent. The APM agent parses the configuration file to determine the method and type to be monitored and to identify any trace method. The APM agent may configure an execution environment to invoke a trace method upon the invocation of a target method. The trace…
MULTIPLE TOP-OF-RACK (TOR) SWITCHES CONNECTED TO A NETWORK VIRTUALIZATION DEVICE
Granted: December 12, 2024
Application Number:
20240411584
A method for providing a dedicated region cloud at customer is provided. A first physical port of a network virtualization device (NVD) included in a datacenter is communicatively coupled to a first top-of-rack (TOR) switch and a second TOR switch. A second physical port of the NVD is communicatively coupled with a network interface card (NIC) associated with a host machine. The second physical port provided a first logical port and a second logical port for communications between the…
DATACENTER DETECTION AND AUTHENTICATION TECHNIQUES
Granted: December 5, 2024
Application Number:
20240404335
In some implementations, the techniques disclosed herein may include monitoring, by a robotic device, a physical space, the physical space having a portion of a datacenter. In addition, the techniques may include detecting, by the robotic device, a person within the physical space. The techniques may include attempting to authenticate the detected person by an authentication process that includes: prompting, by the robotic device, the detected person to authenticate themselves;…
Multi-Channel Conversation Processing
Granted: December 5, 2024
Application Number:
20240404513
Techniques for extracting data from conversations across different types of communication channels are disclosed. A system applies a set of rules to extract data from conversations based, at least in part, on a type of communication channel used for conducting the conversation. The system applies a machine learning model to recognize semantic content in conversations. The system divides conversations into conversation segments and classifies the conversation segments based on the…
Systems And Methods For Detecting Long Term Seasons
Granted: December 5, 2024
Application Number:
20240403719
Techniques for machine-learning of long-term seasonal patterns are disclosed. In some embodiments, a network service receives a set of time-series data that tracks metric values of at least one computing resource over time. Responsive to receiving the time-series data, the network service detects a subset of metric values that are outliers and associated with a plurality of timestamps. The network service maps the plurality of timestamps to one or more encodings of at least one encoding…
VARIANT INCONSISTENCY ATTACK (VIA) AS A SIMPLE AND EFFECTIVE ADVERSARIAL ATTACK METHOD
Granted: December 5, 2024
Application Number:
20240403447
The present disclosure relates to techniques for using variant inconsistency attack (VIA) as a simple and effective adversarial attack method to create useful adversarial examples for adversarial training of machine-learning models. In one particular aspect, a method is provided that includes obtaining a set of input examples for attacking a machine-learning model (the set of examples do not have corresponding labels), modifying an example from the set of examples in a utility preserving…
APPLICATION PERFORMANCE MONITORING FOR MONOLITHIC APPLICATIONS AND DISTRIBUTED SYSTEMS
Granted: December 5, 2024
Application Number:
20240403197
A computing device may access a target code for implementing an application. The device may identify addresses for one or more functions or one or more variables associated with the target code. The device may generate an interval tree comprising a root node and one or more function nodes. The device may in response to the target code invoking a function or variable: generate an intercept function configured to intercept communication between the target code and a call address for the at…
PROGRAM EXECUTION USING INTERPROCEDURAL ESCAPE ANALYSIS WITH INLINING
Granted: December 5, 2024
Application Number:
20240403011
Improving program execution using interprocedural escape analysis with inlining includes expanding a call graph of a target program to obtain an expanded call graph, performing, using the expanded call graph, an interprocedural escape analysis (IEA) to generate a materialization map, and calculating an inlining benefit value for a callee using the materialization map. Improving program execution further includes inlining, using the expanded call graph and in the target program, the…
PARTIAL EVALUATION OF SINGLE EXECUTION METHODS
Granted: December 5, 2024
Application Number:
20240403009
Systems and methods implement partial evaluation of single execution methods. A native image is built from a build image compiled from source code. At image build time, a single execution method of the build image is executed to update an image heap of the native image. The single execution method is executed with a single execution for a native instance. The image heap is stored to the native image built from the build image.
Dynamic User Interface Mode Selection Based On Physical Activity Detection
Granted: November 28, 2024
Application Number:
20240393884
Techniques for improving the convenience of activating different computing applications on a mobile computing device are disclosed. Sensors associated with a mobile computing device (e.g., accelerometers, gyroscopes, light sensors, microphones, image capture sensors) may receive inputs of various physical conditions to which the mobile computing device is being subjected. Based on one or more of these inputs, the mobile computing device may automatically select a content presentation…
ATTACHMENT AND DETACHMENT OF COMPUTE INSTANCES OWNED BY DIFFERENT TENANCIES
Granted: November 28, 2024
Application Number:
20240394627
Techniques are disclosed for creating an attachment between two compute instances. An infrastructure and a generalized method is described for attaching two or more cloud resources (e.g., two compute instances) in spite of the compute resources being provisioned by two different services from different cloud tenancies. An automated process is described that is executed for wiring the compute instances. The automated process can be generally applied to attach any two compute instances…
DATASOURCE INTROSPECTION USER INTERFACE FOR GRAPHQL API SCHEMA AND RESOLVER GENERATION
Granted: November 28, 2024
Application Number:
20240394248
A technique is disclosed for creating a GraphQL Application Programing Interface (API) schema by introspecting various different types of backend datasources. The technique includes receiving a selection of a datasource type to create a GraphQL API schema and introspecting the selected datasource type to determine a set of individual elements associated with the selected datasource type. The technique involves outputting the set of individual elements associated with the selected…
INCREMENTAL BLOCK VOLUME RESTORE FOR OPTIMIZED BACKUP EXPORT
Granted: November 28, 2024
Application Number:
20240394153
Techniques are described that include receiving, by a computing system, a request to create a restored block volume using a first manifest, the first manifest comprising: (i) a block identifier for a block and (ii) a first block sequence number corresponding to the block identifier and associated with a first snapshot, and (iii) a manifest identifier. The techniques further include receiving, by the computing system, the request to create the restored block volume using a second…
DETECTING PEAK ACTIVITY OF COMPUTING RESOURCES
Granted: November 28, 2024
Application Number:
20240394112
Systems that analyze the performance of a computing resource based on a usage information timeline are disclosed. A system detects peak activity periods occurring in the usage information of the computer resource and scores the individual peak activity periods. Based on the respective scores, the system identifies an anchor period from the peak activity periods. Using the anchor period, the system aggregates the peak activity periods around the anchor period. The aggregating include…