ACCESSING REPRESENTATIONAL STATE TRANSFER APPLICATION PROGRAMMING INTERFACES USING SIMPLE MAIL TRANSFER PROTOCOL
Granted: February 1, 2024
Application Number:
20240039999
A Representational State Transfer (REST)-Simple Message Transfer Protocol (SMTP) protocol gateway (RSPG) is disclosed that includes capabilities for accessing and processing REST Application Programming Interfaces (APIs) using SMTP. The RSPG receives a first email message, extracts information from the received first email message and constructs a REST API call based on the extracted information. The RSPG invokes the REST API call against a REST endpoint and receives a response generated…
PROCESS SECURITY CAPABILITY REQUIREMENTS IDENTIFICATION
Granted: February 1, 2024
Application Number:
20240039963
A framework for determining capabilities for execution of a system call a container and/or process within a computing system. For example, techniques for determining capabilities prerequisite for execution of a system call and determining whether the system call has been assigned the capabilities prerequisite for execution of the system call.
DOCUMENT BASED MONITORING
Granted: February 1, 2024
Application Number:
20240037071
Techniques may include receiving an asynchronous event message at an inbound adapter of a document-based monitoring system. In addition, the techniques may include accessing a document containing a hierarchical log of event entries. The techniques may include adding an event entry to the hierarchical log based at least in part on the asynchronous event message, and where the event entry may include information identifying the asynchronous event message. Moreover, the techniques may…
METHOD AND SYSTEM TO IMPLEMENT DIRECTORY READS FOR A DATABASE FILE SYSTEM
Granted: February 1, 2024
Application Number:
20240037074
Disclosed is an improved approach to access the contents of database file system. The contents of the database file system can be acquired and stored in a directory buffer. A parallel tree structure is used to retrieve directory contents quickly and in a consistent fashion.
ABILITY TO ADD NON-DIRECT ANCESTOR COLUMNS IN CHILD SPREADSHEETS
Granted: February 1, 2024
Application Number:
20240037325
Example embodiments facilitate augmenting a client-side worksheet of a spreadsheet with context information retrieved from non-direct ancestor worksheets of the client-side worksheet. A spreadsheet plug-in enables retrieval of the context information from a server system, e.g., cloud-based database, via one or more web services. In a specific embodiment, the context information represents one or more data dimensions, e.g., worksheet columns, retrieved via the server system form one or…
MANAGEMENT OF A FOCUSED INFORMATION SHARING DIALOGUE BASED ON DISCOURSE TREES
Granted: February 1, 2024
Application Number:
20240037340
Disclosed techniques relate to managing a dialogue between a user device and an autonomous agent. For instance, a computing device creates a discourse tree from a body of text that includes fragments. The discourse tree includes a root node, nonterminal nodes, and terminal nodes. Each nonterminal node represents a rhetorical relationship between two of the fragments and each terminal node is associated with one of the fragments. The computing device determines a main topic of the body of…
PSEUDO LABELLING FOR KEY-VALUE EXTRACTION FROM DOCUMENTS
Granted: February 1, 2024
Application Number:
20240037973
A computing device may access visually rich documents comprising an image and metadata. A graph, based on the image or metadata, can be generated for a visually rich document. The graph's nodes can correspond to words from the visually rich document. Features for nodes can be determined by the device. The device may generate model labeled graphs by assigning a pseudo-label to nodes using a pretrained model. The device may generate a plurality of graph labeled graphs by assigning a…
HIGHLY-AVAILABLE HOST NETWORKING WITH ACTIVE-ACTIVE OR ACTIVE-BACKUP TRAFFIC LOAD-BALANCING
Granted: February 1, 2024
Application Number:
20240039847
Systems and methods for highly-available host networking with active-active or active-backup traffic load-balancing are disclosed herein. The method can include selecting a compute instance from an overlay network residing on a substrate network, identifying a plurality of Network Virtualization Devices (“NVD”) for association with the compute instance, creating a loopback interface on each of the NVDs, each of which loopback interfaces can include a shared IP address that can be in…
INTEGRATION OF ANONYMIZED, MEMBER-DRIVEN CLOUD-BASED GROUPS AND CONTENT DELIVERY SERVICES THAT COLLECT INDIVIDUAL INFORMATION ABOUT CONTENT INTERACTIONS WITHOUT COMPROMISING IDENTITIES OF GROUP MEMBERS
Granted: January 25, 2024
Application Number:
20240031373
Techniques are described through which groups of individuals and/or other entities may interface with a data cloud blockchain network and/or cloud-based platform to collectively share data in a secure, controlled manner. Decentralized groups that are connected to the data cloud network may be registered and listed in a searchable directory. Entities that are interested in accessing data associated with a group may browse the directory, execute smart contracts within a blockchain, and…
LAYER-2 NETWORKING SPAN PORT IN A VIRTUALIZED CLOUD ENVIRONMENT
Granted: January 25, 2024
Application Number:
20240031282
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Span port information applicable to the L2 port is sent to a network virtualization device that hosts…
METHODS AND SYSTEMS FOR AUGMENTATION AND FEATURE CACHE
Granted: January 25, 2024
Application Number:
20240028963
An augmentation and feature caching subsystem is described for training AI/ML models. In one particular aspect, a method is provided that includes receiving data comprising training examples, one or more augmentation configuration hyperparameters and one or more feature extraction configuration hyperparameters; generating a first key based on one of the training examples and the one or more augmentation configuration hyperparameters; searching a first key-value storage based on the first…
TECHNIQUES FOR MANAGING EDGE DEVICE PROVISIONING
Granted: January 25, 2024
Application Number:
20240028414
Techniques discussed herein relate to managing aspects of provisioning cloud-computing edge devices. In some embodiments, a user request specifying one or more resources to be provisioned at a cloud-computing edge device may be received by a cloud-computing device operated by a cloud-computing provider. An ephemeral credential may be generated for the edge device and used to determine whether access control policies exist that enable the edge device to access the resource(s). If the…
INTEGRATION OF ANONYMIZED, MEMBER-DRIVEN CLOUD-BASED GROUPS AND CONTENT DELIVERY SERVICES THAT COLLECT INDIVIDUAL INFORMATION ABOUT CONTENT INTERACTIONS WITHOUT COMPROMISING IDENTITIES OF GROUP MEMBERS
Granted: January 25, 2024
Application Number:
20240031373
Techniques are described through which groups of individuals and/or other entities may interface with a data cloud blockchain network and/or cloud-based platform to collectively share data in a secure, controlled manner. Decentralized groups that are connected to the data cloud network may be registered and listed in a searchable directory. Entities that are interested in accessing data associated with a group may browse the directory, execute smart contracts within a blockchain, and…
LAYER-2 NETWORKING SPAN PORT IN A VIRTUALIZED CLOUD ENVIRONMENT
Granted: January 25, 2024
Application Number:
20240031282
Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Span port information applicable to the L2 port is sent to a network virtualization device that hosts…
METHODS AND SYSTEMS FOR AUGMENTATION AND FEATURE CACHE
Granted: January 25, 2024
Application Number:
20240028963
An augmentation and feature caching subsystem is described for training AI/ML models. In one particular aspect, a method is provided that includes receiving data comprising training examples, one or more augmentation configuration hyperparameters and one or more feature extraction configuration hyperparameters; generating a first key based on one of the training examples and the one or more augmentation configuration hyperparameters; searching a first key-value storage based on the first…
TECHNIQUES FOR MANAGING EDGE DEVICE PROVISIONING
Granted: January 25, 2024
Application Number:
20240028414
Techniques discussed herein relate to managing aspects of provisioning cloud-computing edge devices. In some embodiments, a user request specifying one or more resources to be provisioned at a cloud-computing edge device may be received by a cloud-computing device operated by a cloud-computing provider. An ephemeral credential may be generated for the edge device and used to determine whether access control policies exist that enable the edge device to access the resource(s). If the…
TECHNIQUES FOR MANAGING DRIFT IN A DEPLOYMENT ORCHESTRATOR
Granted: January 18, 2024
Application Number:
20240020175
Techniques for implementing an infrastructure orchestration service are described. A configuration file for a deployment to a first execution target and a second execution target can be received. A first safety plan can be generated for the first execution target that comprises a first list of resources and operations associated with deployment at the first execution target. Approval of the first safety plan can be received. A second safety plan can be generated for the second execution…
SYSTEM FOR TUNING A JAVA VIRTUAL MACHINE
Granted: January 18, 2024
Application Number:
20240020188
Techniques are described for tuning a Java Virtual Machine (JVM) in an automated manner. The automated tuning may be performed to improve a JVM's performance including to prevent it from failing. An auto-tuning system is described that can auto-detect one or more anomalous conditions for a JVM, and in response, take one or more corrective actions to auto-tune the JVM to avoid or reduce/mitigate any adverse impacts of the detected anomalous conditions. A corrective action taken for a JVM…
TECHNIQUES FOR MANAGING DRIFT IN A DEPLOYMENT ORCHESTRATOR
Granted: January 18, 2024
Application Number:
20240020175
Techniques for implementing an infrastructure orchestration service are described. A configuration file for a deployment to a first execution target and a second execution target can be received. A first safety plan can be generated for the first execution target that comprises a first list of resources and operations associated with deployment at the first execution target. Approval of the first safety plan can be received. A second safety plan can be generated for the second execution…
SYSTEM FOR TUNING A JAVA VIRTUAL MACHINE
Granted: January 18, 2024
Application Number:
20240020188
Techniques are described for tuning a Java Virtual Machine (JVM) in an automated manner. The automated tuning may be performed to improve a JVM's performance including to prevent it from failing. An auto-tuning system is described that can auto-detect one or more anomalous conditions for a JVM, and in response, take one or more corrective actions to auto-tune the JVM to avoid or reduce/mitigate any adverse impacts of the detected anomalous conditions. A corrective action taken for a JVM…