TECHNIQUES FOR BOOTSTRAPPING ACROSS SECURE AIR GAPS WITH STATIC SIDECAR
Granted: December 7, 2023
Application Number:
20230393858
Techniques are disclosed for bootstrapping a secure data center using a cross domain system with a static sidecar node. The cross domain system can be implemented at the secure data center to provide one-way ingress and egress channels for network traffic to the target data center. The cross domain system is connected to a host data center and can receive configuration data from the host data center to configure the static sidecar node. The static sidecar node can receive bootstrapping…
TECHNIQUES FOR SELECTIVE CONTAINER ACCESS TO CLOUD SERVICES BASED ON HOSTING NODE
Granted: November 30, 2023
Application Number:
20230388302
A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is…
LARGE SCALE FORECASTING WITH EXPLANATION INFORMATION FOR TIME SERIES DATASETS
Granted: November 30, 2023
Application Number:
20230385663
A time series forecasting system is disclosed that obtains a time series forecast request requesting a forecast for a particular time point. The forecast request identifies a primary time series dataset for generating the requested forecast and a set of features related to the primary time series dataset. The system provides the primary time series dataset and the set of features to a model to be used for generating the forecast. The model computes a feature importance score for one or…
SYSTEM AND METHODS FOR ASYNCHRONOUS LOG PROCESSING AND ENRICHING
Granted: November 30, 2023
Application Number:
20230385267
The present disclosure relates to systems and methods that enhance log data processing by asynchronously processing log data for detecting log messages that include errors and enriching the log messages with annotations that identify the errors. More particularly, log data that includes log records can be received. The log data can be asynchronously processed to validate a configuration of each log record and to validate data included in each log record. An attribute of a particular log…
SYSTEM AND METHODS FOR ASYNCHRONOUS LOG PROCESSING AND ENRICHING
Granted: November 30, 2023
Application Number:
20230385253
Log data that includes a plurality of log records is asynchronously processed to validate a configuration of each log record and data included in each log record. It is determined that one or more attributes of a particular subset of log records of the plurality of log records corresponds to one or more errors. Using the particular subset, one or more enriched log records are generated by augmenting each log record of the particular subset of log records with error information that…
TECHNIQUES FOR CONSISTENT MULTI-TENANT BEHAVIOR IN MICROSERVICES BASED APPLICATIONS
Granted: November 30, 2023
Application Number:
20230385124
Techniques are disclosed for using a multi-tenant framework for microservices in a microservices-based application to handle tenant-specific circuit breaking. The microservices-based application can include at least one microservice that incorporates the multi-tenant framework. The multi-tenant framework includes software components configured to provide multi-tenant functionality for the microservice. A first microservice may receive an indication associated with a tenant that a second…
PREDICTIVE RECYCLING OF COMPUTER SYSTEMS IN A CLOUD ENVIRONMENT
Granted: November 30, 2023
Application Number:
20230385048
Example embodiments facilitate prioritizing the recycling of computing resources, e.g., server-side computing systems and accompanying resources (e.g., non-volatile memory, accompanying firmware, data, etc.) leased by customers in a cloud-based computing environment, whereby computing resources (e.g., non-volatile memory) to be forensically analyzed/inspected, sanitized, and/or updated are prioritized for recycling based on estimates of when the computing resources are most likely to…
Cross-Platform Resource Optimization
Granted: November 23, 2023
Application Number:
20230376994
Techniques for determining recommended allocations of resources among different platforms that sell a common type of inventory. Determining the allocations can include obtaining parameters of a campaign from a client. Determining the allocations can include combining current campaign parameters and scoring with historical campaign performance data to create recommendations for dividing resources among different media platforms.
HONEYPOTS FOR INFRASTRUCTURE-AS-A-SERVICE SECURITY
Granted: November 23, 2023
Application Number:
20230379362
Techniques for using honeypots to lure attackers and gather data about attackers and attack patterns on Infrastructure-as-a-Service (IaaS) instances. The gathered data may then be analyzed and used to proactively prevent such attacks.
TECHNIQUES FOR USING SIGNED NONCES TO SECURE CLOUD SHELLS
Granted: November 23, 2023
Application Number:
20230379161
Techniques for using signed nonces to secure cloud shells are provided. The techniques include receiving, by a session manager service, a request to connect a user device to a secure connection to a secure shell instance. The session manager service may authorize the user device to access the secure shell instance and may configure the secure shell instance, being described by a shell identifier of the secure shell instance. The techniques also include generating, by the session manager…
Artificial Intelligence Based Upsell Model
Granted: November 23, 2023
Application Number:
20230376861
Embodiments upsell a hotel room selection by providing a first plurality of hotel room choices, each first plurality of hotel room choices comprising a first type of hotel room and a corresponding first price. Embodiments receive a first selection of one of the first plurality of hotel room choices. In response to the first selection, embodiments provide a second plurality of hotel room choices, the second plurality of hotel room choices comprising a subset of the first types of hotel…
TRAINING DATA GENERATION TO FACILITATE FINE-TUNING EMBEDDING MODELS
Granted: November 23, 2023
Application Number:
20230376700
Techniques are provided for generating training data to facilitate fine-tuning embedding models. Training data including anchor utterances is obtained. Positive utterances and negative utterances are generated from the anchor utterances. Tuples including the anchor utterances, the positive utterances, and the negative utterances are formed. Embeddings for the tuples are generated and a pre-trained embedding model is fine-tuned based on the embeddings. The fine-tuned model can be deployed…
TECHNIQUES FOR OUT-OF-DOMAIN (OOD) DETECTION
Granted: November 23, 2023
Application Number:
20230376696
The present disclosure relates to techniques for identifying out-of-domain utterances. One particular technique includes receiving an utterance and a target domain of a chatbot, generating a sentence embedding for the utterance, obtaining an embedding representation for each cluster of in-domain utterances associated with the target domain, predicting, using a metric learning model, a first probability that the utterance belongs to the target domain based on a similarity or difference…
DETECTION OF DECEPTION WITHIN TEXT USING COMMUNICATIVE DISCOURSE TREES
Granted: November 23, 2023
Application Number:
20230376693
Systems, devices, and methods of the present invention detect deceptive or fake content in text. In an example, a computer system generates, from text a discourse tree that represents rhetorical relationships between fragments of the text. The computer system generates a communicative discourse tree from the discourse tree. The computer system identifies a number of non-trivial rhetorical relations associated with the nonterminal nodes in the communicated discourse tree and, for each…
CONSISTENT FILE SYSTEM SEMANTICS WITH CLOUD OBJECT STORAGE
Granted: November 23, 2023
Application Number:
20230376460
Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner…
SINGLE HOP APPROACH FOR DISTRIBUTED BLOCK STORAGE VIA A NETWORK VIRTUALIZATION DEVICE
Granted: November 23, 2023
Application Number:
20230376333
A network virtualization device receives a storage request from a compute instance executed by a host machine separate from the network virtualization device, the storage request comprising data to be stored. Responsive to receiving the storage request, the network virtualization device divides the data to be stored into a set of one or more data stripes. For a first data stripe in the set of data stripes, the network virtualization device determines, from a plurality of extent servers,…
LIVE UPGRADE OPTIMIZATIONS TO REDUCE DOWNTIME
Granted: November 23, 2023
Application Number:
20230376301
Techniques disclosed herein include receiving a request to perform an upgrade. The upgrade can comprise changes to firmware or software of the network interface card. Input/Output (I/O) traffic can be monitored on one or more paths between the network interface card and a storage device. The paths can have a path capacity comprising a bandwidth of Input/Output traffic. The spare Input/Output traffic capacity can be calculated based at least in part on the Input/Output traffic and the…
DOMAIN SPECIFIC INLINING FOR INTERPRETERS
Granted: November 23, 2023
Application Number:
20230376290
Domain specific inlining for interpreters includes obtaining an interpreter source code including compiler directives. A host compilation is performed on the interpreter source code to obtain a compiled interpreter. Performing host compilation includes inlining code blocks based on the plurality of compiler directives. The compiled interpreter is outputted.
PERSISTENT MEMORY BASED CACHING FOR INTELLIGENT NETWORK INTERFACE CARDS
Granted: November 23, 2023
Application Number:
20230376210
The disclosed systems, methods, and computer readable media relate to managing persistent memory within a smart network interface card (smartNIC) of a cloud-computing environment, or at storage device of the host instance on which the smartNIC operates and to which the smartNIC has access. The smartNIC may be configured with various modes that enable passthrough of input/output operations to or from non-volatile remote storage (e.g., a block storage data plane volume) or storage of at…
EFFICIENT NETWORK GRAPH DECOMPOSITION USING UNCONSTRAINED RESOURCE NODES
Granted: November 16, 2023
Application Number:
20230368106
A network may be organized to provide components. Components may be generated by combining other components (sub-components) together, and components may be provided by resources in the network. This network may be represented by a graph of nodes representing components and resources. In order to efficiently analyze this graph to generate a network plan, the graph may be subdivided into independent sub-graphs. Individual resources may be shared by individual sub-graphs and considered…