Oracle Patent Applications

MESSAGE INFRASTRUCTURE PLATFORM TRANSITIONS BASED ON SUBSCRIPTION HEURISTICS

Granted: September 19, 2024
Application Number: 20240314183
Techniques for transitioning between message infrastructure platforms are disclosed. A platform manager transmits a data stream using a first message infrastructure platform. A platform monitor monitors transmission characteristics associated with the transmission of the data stream using the first message infrastructure platform. A platform selector selects a second message infrastructure platform based on the transmission characteristics. A platform transitioner transitions from…

RESTRICTED OPERATIONS DUE TO ATTACHMENT OF COMPUTE INSTANCES OWNED BY DIFFERENT TENANCIES

Granted: September 19, 2024
Application Number: 20240314133
Techniques are disclosed for restricting operations between two attached two compute instances. An infrastructure and a generalized method is described for attaching two or more cloud resources (e.g., two compute instances) in spite of the compute resources being provisioned by two different services from different cloud tenancies, and then modifying the allowed operations that can be performed due to the attachment.

DATA PLANE TECHNIQUES FOR SUBSTRATE MANAGED CONTAINERS

Granted: September 19, 2024
Application Number: 20240314088
Techniques discussed herein include providing a cloud computing environment in which applications are deployed by a deployment orchestrator using virtual-machine-based virtualization with a static pool of computing nodes (e.g., substrate nodes, overlay nodes) and container-based virtualization with a dynamic pool of computing nodes (e.g., nodes managed by a container orchestration platform). Components of a data plane may be used to deploy containers to micro-virtual machines. A…

BANDWIDTH CONTROL INSIDE A SHARED NETWORK INTERFACE CARD

Granted: September 19, 2024
Application Number: 20240314086
A smart network interface card (smartNIC) may receive first traffic for a first process configured with a first bandwidth limit. The smartNIC may receive second traffic for a second process configured with a second bandwidth limit, the second bandwidth limit corresponding to a larger value between a second transmit limit and a second receive limit associated with the second process. The smartNIC may queue the received traffic associated with the first process and the second process in a…

STATIC NETWORK FABRIC AT A PREFAB FACTORY

Granted: September 19, 2024
Application Number: 20240314038
Techniques are disclosed for a networking fabric in a data center for a prefab factory. The networking fabric can include a plurality of networking cables routed through the data center characterized by a static network fabric topology, with a set of networking cables of the plurality of networking cables configured to terminate at a location in the data center. A plurality of computing devices can be positioned at the location and configured to form a region network when communicatively…

TECHNIQUES FOR BUILDING CLOUD REGIONS AT A PREFAB FACTORY

Granted: September 19, 2024
Application Number: 20240314026
Techniques are disclosed for building a region at a prefab factory. A manager service can receive a build request. The manager service can generate, based on the build request, a physical build request for building physical resources within the prefab factory. The manager service can receive an indication that the physical resources corresponding to the physical build request have been built. In response, the manager service can implement a virtual bootstrap environment at a second data…

TECHNIQUES FOR A CABLE TERMINATION PROTECTION APPARATUS IN A PREFAB FACTORY

Granted: September 19, 2024
Application Number: 20240313460
A cable termination protection apparatus and methods of use in a prefab factory are disclosed. The cable termination protection apparatus can include a frame having ports arranged on a face of the frame. Each of the ports can be configured to accept a cable termination connector of a networking cable of a static network fabric in a prefab factory. A computing device can generate instructions usable to disconnect a networking cable from the cable termination protection apparatus and…

Graphical User Interface For Fungible Configurable Attributes For A Compute Instance

Granted: September 12, 2024
Application Number: 20240303101
Techniques for configuring and creating a compute instance are disclosed. A system displays, within a Graphical User Interface (GUI), first and second interface elements representing first and second configurable attributes of a compute instance. Each interface element comprises a first selectable component and a second selectable component. The system receives a first user input selecting the first selectable component corresponding to a system-selected configuration for the first…

SYSTEM AND TECHNIQUES FOR ENRICHING LOG RECORDS WITH FIELDS FROM OTHER LOG RECORDS IN STRUCTURED FORMAT

Granted: September 12, 2024
Application Number: 20240303273
Embodiments relate to extracting various portions of log messages. Syntax, order and/or level information that differentiates header and detail message is identified. This syntax, order and/or level information is used to automatically associate enhance each of one or more detail log entries with information that provides context. This approach can facilitate efficient transmission of detail-information log entries that reduces redundant information, while still supporting flexible…

DATA SEGMENTATION USING CLUSTERING

Granted: September 12, 2024
Application Number: 20240303256
Method includes obtaining sample records from dataset associated with user and including records associated with identifiers customers of user; executing first clustering using sample records, to obtain first set of clusters for first identifiers associated with sample records, first clustering using features associated with first identifiers; providing visualization of first set of clusters; determining whether user input for optimizing first set of clusters provided in visualization is…

System Selected Fungible Configurable Attributes For A Compute Instance

Granted: September 12, 2024
Application Number: 20240303088
Techniques for configuring and creating a compute instance are disclosed. A system may receive a request to launch a compute instance where the compute instance defined by a configurable attribute, The request comprises one or more user-specified criteria for the configurable attribute without including a specific value for the configurable attribute. The system determines a set of candidate values for the configurable attribute. The system selects the specific value for the configurable…

TECHNIQUES FOR SIMULTANEOUSLY ACCESSING MULTIPLE ISOLATED SYSTEMS WHILE MAINTAINING SECURITY BOUNDARIES

Granted: September 5, 2024
Application Number: 20240297872
Techniques are described for using a single application to interact with multiple separate realms simultaneously while maintaining data security boundaries. For example, a web browser may be used to access and interact with the multiple separate secure realms while maintaining data security boundaries between the systems. Multiple concurrent sessions may be established for a user between the web browser and multiple realms. Separate sets of security credentials (e.g., credentials used…

Secure Boot Partition For Cloud Compute Nodes

Granted: September 5, 2024
Application Number: 20240296230
The present embodiments relate to a secure boot partition for a cloud computing device of a cloud computing system. The computing device of the cloud computing system can transmit a first request for a pre-boot execution environment executable from a smart network interface card (SmartNIC). The computing device can receive the pre-boot environment executable from the SmartNIC and verify the pre-boot execution environment executable. The computing device can execute the pre-boot execution…

DETERMINING PHRASES FOR USE IN A MULTI-STEP AUTHENTICATION PROCESS

Granted: September 5, 2024
Application Number: 20240296211
The present disclosure provide a multiple factor authentication process using text pass codes. A process performs a first verification of a user using an authentication credential transmitted via a first communication channel. Based on successfully performing the first verification, the process performs a second verification using a textual phrase transmitted to the user via a different communication channel. The words included in the textual phrase can be selected to avoid ambiguous…

CLOUD ARCHITECTURE GENERATION, SIMULATION, AND OPTIMIZATION

Granted: September 5, 2024
Application Number: 20240296072
Techniques for generating, simulating, and optimizing one or more provider-specific cloud-based architectures from a provider-independent architecture definition are disclosed. An architecture generator maps provider-independent service definitions to provider-specific service components for one or more specific cloud service providers. An architecture simulator simulates execution of a set of operations on the provider-specific cloud-based architectures to determine one or more…

SYSTEM AND METHOD OF PROVIDING SYSTEM AVAILABILITY BY PREVENTING SOFTWARE CRASH DUE TO RECOVERY FAILURE

Granted: August 29, 2024
Application Number: 20240289238
Disclosed is an improved approach to handle recovery failures associated with fatal recovery processes. A software crash is prevented when a program has a failure that would typically crash the software, involving analyzing the failure in an operation, accumulating the failure information, clearing the failure (hence preventing the immediate crash), and not performing the desired operation until the root cause of the failure is fixed.

EFFICIENT FLOW MANAGEMENT UTILIZING CONTROL PACKETS

Granted: August 29, 2024
Application Number: 20240291907
Techniques are disclosed for utilizing control packets to manage flows. In one example, an accelerator determines that a cache entry is a candidate for removal, the accelerator being responsible for forwarding packets associated with a particular flow based at least in part on a flow state. The accelerator generates an instruction to remove a cache entry of the particular flow from a cache based at least in part on receiving the determination that the cache entry is the candidate for…

SEARCHABLE TABLE EXTRACTION

Granted: August 29, 2024
Application Number: 20240290123
Method includes extracting, from document image, tables as objects; outputting tables in an XML format; filtering tables based on keywords and a condition including one from among AND and OR, which includes: for each of tables, determining whether the table includes at least one from among a first keyword and a second keyword, for condition being AND, based on the table containing first keyword and second keyword, outputting the table, as filtered table, and, for condition being OR,…

SALES ORCHESTRATION USING ITERATIVE MACHINE LEARNING

Granted: August 29, 2024
Application Number: 20240289817
Techniques for sales orchestration using iterative machine learning are disclosed, including: obtaining, by a customer relationship management (CRM) system, opportunity-specific CRM data; generating, by the CRM system, one or more suggested sales actions applicable to the opportunity-specific CRM data, at least by applying a machine learning model to the opportunity-specific CRM data, wherein the machine learning model is configured to generate suggested sales actions based on CRM data;…

TECHNIQUES FOR OUT-OF-DOMAIN (OOD) DETECTION

Granted: August 29, 2024
Application Number: 20240289555
The present disclosure relates to techniques for identifying out-of-domain utterances. One particular technique includes receiving an utterance and a target domain of a chatbot, generating a sentence embedding for the utterance, obtaining an embedding representation for each cluster of in-domain utterances associated with the target domain, predicting, using a metric learning model, a first probability that the utterance belongs to the target domain based on a similarity or difference…