EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE ON TRAFFIC FROM CUSTOMER NETWORK
Granted: January 2, 2025
Application Number:
20250007956
Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The target service can…
TECHNIQUES FOR ROTATING NETWORK ADDRESSES IN PREFAB REGIONS
Granted: January 2, 2025
Application Number:
20250007879
Techniques are disclosed for rotating network addresses following the installation of a prefab region network at a destination site. A manager service executing within a distributed computing system can allocate a rotation network address pool to a root allocator service that may be configured to provide network addresses from network address pools to dependent nodes within the distributed computing system, with each dependent node associated with a corresponding first network address of…
EGRESS TRAFFIC POLICY DEFINITION AND ENFORCEMENT AT TARGET SERVICE
Granted: January 2, 2025
Application Number:
20250007845
Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The customer can define the…
EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE
Granted: January 2, 2025
Application Number:
20250007843
Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network, or by a multi-tenancy service on behalf of the customer. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network) or by the multi-tenancy service. The…
EGRESS TRAFFIC POLICY ENFORCEMENT AT TARGET SERVICE ON TRAFFIC FROM SERVICE TENANCY
Granted: January 2, 2025
Application Number:
20250007832
Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer tenancy, where the traffic is generated by a multi-tenancy service. The traffic can be destined to the target service. The traffic can be tagged by the multi-tenancy service with information indicating that the traffic is egressing therefrom on behalf of the customer tenancy. The customer tenancy can be associated with the egress policy. The target service can…
ANOMALY DETECTION IN DOCUMENTS WITH VISUAL CUES
Granted: January 2, 2025
Application Number:
20250005953
Techniques are disclosed for understanding the visual structure and patterns of documents and detecting anomalies in data of the documents based on the understanding of the visual structure and patterns of the documents. In one aspect, a computer-implemented method is provided that includes accessing a set of documents, converting the set of documents to a set of images in a binary format, generating a common feature template based on the set of images, comparing each image from the set…
Measuring Perceptibility Of Content In A Virtual Universe
Granted: January 2, 2025
Application Number:
20250005730
Techniques for determining perceptibility of content displayed within virtual universes are disclosed. Operations include calculating a cube map of a scene in the virtual universe at a location with a view of a target object. Using the cube map, first and second visibility scores are computed for the target object. A perceptibility score for the target object is determined by combining the first and second visibility scores. Computing the visibility scores includes generating an image…
SMOOTHING UNIVARIATE SIGNAL EDGES WITH STABLE AND UNSTABLE SUBSEQUENCE DETECTION AND GEOMETRIC EXTRAPOLATION
Granted: December 26, 2024
Application Number:
20240430139
Techniques for smoothing a signal are disclosed. The system partitions the portion of the data sequence into a stable subsequence and an unstable subsequence of data points. The system applies a rate of change exhibited by the stable subsequence to the unstable subsequence to create a smoothed, more stable subsequence.
USAGE BASED RESOURCE UTILIZATION OF TRAINING POOL FOR CHATBOTS
Granted: December 26, 2024
Application Number:
20240428604
A training request including an identifier that is indicative of a type of a machine learning (ML) model that is to be trained is received. A plurality of workers are maintained in a training pool, and a plurality of jobs are maintained in a queue of training jobs. Each worker is configured to train a particular type of ML model. Upon the training request being validated, a training job is created for the request and submitted to the queue of training jobs. For each type of ML model, a…
PRIVATE LINK BASED ACCESS WITH PORT MAPPING FOR SERVICE DEPLOYED IN A SEPARATE CLOUD
Granted: December 19, 2024
Application Number:
20240422215
Some embodiments are directed to an improved approach to implement deployments where a client can get application-level redirects to different servers, where the service is running in a different cloud environment. Dynamic port mapping may be performed at runtime. Routes may be added to IP tables to implement redirects from a first cloud to a second cloud.
ROUTING HIGH VOLUME PACKET STREAMS IN A VIRTUAL NETWORK
Granted: December 19, 2024
Application Number:
20240422095
A computing device may receive a first packet addressed to a destination node. The device may check a packet counter to determine if the counter exceeds a threshold, the counter recording a number of packets addressed to the destination node that have been received during a first time period. The device may in response to the packet counter exceeding the threshold: send, by the computing device, a query to an intermediate node; generate, by the device, a query flag in response to sending…
PREDICTING MISSING ENTITY IDENTITIES IN IMAGE-TYPE DOCUMENTS
Granted: December 19, 2024
Application Number:
20240420497
Techniques for predicting a missing value in an image-type document are disclosed. A system predicts the identity of a supplier associated with an image-type document in which the supplier's identity may not be extracted by text recognition. When a system determines that the supplier identity cannot be identified using a text recognition application, the system generates a set of machine learning model input features from features extracted from the image-type document to predict the…
MULTI-FEATURE BALANCING FOR NATURAL LANGUAGE PROCESSORS
Granted: December 19, 2024
Application Number:
20240419910
A method includes receiving an indication of a first coverage value corresponding to a desired overlap between a dataset of natural language phrases and a training dataset for training a machine learning model; determining a second coverage value corresponding to a measured overlap between the dataset of natural language phrases and the training dataset; determining a coverage delta value based on a comparison between the first coverage value and the second coverage value; modifying,…
Identifying And Formatting Headers For Text Content
Granted: December 19, 2024
Application Number:
20240419886
A data corpus is partitioned into text strings for header classification. A group characteristic is computed for a text string, and whether the group characteristic satisfies a group characteristic criterion is determined. The text string may be disqualified from header classification if the group characteristic criterion is not satisfied, or one or more font characteristics may be determined for the text string if the group characteristic criterion is satisfied. A font characteristic…
USER INTERFACE TECHNIQUES FOR AN INFRASTRUCTURE ORCHESTRATION SERVICE
Granted: December 19, 2024
Application Number:
20240419508
Techniques are disclosed for providing a number of user interfaces. A computing system may execute a declarative infrastructure provisioner. The computing system may provide declarative instructions and instruct the declarative infrastructure provision to deploy a plurality of infrastructure resources and a plurality of artifacts. One example user interface may provide a global view of the plurality of infrastructure components and artifacts. Another example user interface may provide…
TECHNIQUES FOR PROVIDING CLOUD SERVICES ON DEMAND
Granted: December 19, 2024
Application Number:
20240419455
Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the…
MULTIPLE TOP-OF-RACK (TOR) SWITCHES CONNECTED TO A NETWORK VIRTUALIZATION DEVICE
Granted: December 12, 2024
Application Number:
20240411584
A method for providing a dedicated region cloud at customer is provided. A first physical port of a network virtualization device (NVD) included in a datacenter is communicatively coupled to a first top-of-rack (TOR) switch and a second TOR switch. A second physical port of the NVD is communicatively coupled with a network interface card (NIC) associated with a host machine. The second physical port provided a first logical port and a second logical port for communications between the…
MULTI-TIER DEPLOYMENT ARCHITECTURE FOR DISTRIBUTED EDGE DEVICES
Granted: December 12, 2024
Application Number:
20240414049
Techniques discussed herein relate to implementing a distributed computing cluster (the “cluster”) including a plurality of edge devices (e.g., devices individually configured to selectively execute within an isolated computing environment). Each of the edge devices of the cluster may be configured with a respective control plane computing component. A subset of the edge devices may be selected to operate in a distributed control plane of the computing cluster. Any suitable…
GRAPHQL FILTER DESIGN FOR A GRAPHQL APPLICATION PROGRAMING INTERFACE (API) SCHEMA
Granted: December 12, 2024
Application Number:
20240411759
A technique for creating a GraphQL Application Programing Interface (API) schema is disclosed. The technique includes generating a filter input object for an object defined in a GraphQL API schema. The filter input object provides the ability for a GraphQL API user (i.e., an API developer or an end user) to perform filtering operations in a query operation on schema objects defined in a GraphQL API schema. The filter input object comprises a set of object attributes and a set of custom…
TRACING USING CONFIGURABLE REFLECTION CHAINING
Granted: December 12, 2024
Application Number:
20240411664
Techniques for using user configurable reflection operations to access layered information are disclosed. A user may identify a method and type to be monitored in an application in a configuration file that is uploaded to the APM agent. The APM agent parses the configuration file to determine the method and type to be monitored and to identify any trace method. The APM agent may configure an execution environment to invoke a trace method upon the invocation of a target method. The trace…