Patent classifications
G06F15/16
Using a quantum processor unit to preprocess data
In a general aspect, input data for a computer process are preprocessed by a preprocessor unit that includes a quantum processor. In some aspects, a preprocessor unit obtains input data for a computer process that is configured to run on a computer processing unit. Randomized parameter values are computed for variable parameters of a quantum logic circuit based on the input data. A classical processor in the preprocessor unit computes the randomized parameter values from the input data and a set of random numbers. A quantum processor in the preprocessor unit produces quantum processor output data by executing the quantum logic circuit having the randomized parameter values assigned to the variable parameters. Preprocessed data generated based on the quantum processor output data are then provided as the input for the computer process configured to run on the computer processing unit.
Hard zoning of virtual local area networks in a fibre channel fabric
A network where FC and Ethernet storage traffic share the underlying network. The network extends FC SAN storage specific attributes to Ethernet storage devices. The network is preferably formed of FC switches, so each edge switch acts as an FCoE FCF, with internal communications done using FC. IP packets are encapsulated in FC packets for transport. Preferably, either each outward facing switch port can be configured as an Ethernet or FC port, so devices can be connected as desired. FCoE devices connected to the network are in particular virtual LANs (VLANs). The name server database is extended to include VLAN information for the device and the zoning database has automatic FCOE_VLAN zones added to provide a mechanism for enhanced soft and hard zoning. Zoning is performed with the conventional zoning restrictions enhanced by including the factor that any FCoE devices must be in the same VLAN.
Intra-footprint computing cluster bring-up
Methods, systems and computer program products for intra-footprint computing cluster bring-up within a virtual private cloud. A network connection is established between an initiating module and a virtual private cloud (VPC). An initiating module allocates resources of the virtual private cloud including a plurality of nodes that correspond to members of a to-be-configured computing cluster. A cluster management module having coded therein an intended computing cluster configuration is configured into at least one of the plurality of nodes. The members of the to-be-configured computing cluster interoperate from within the VPC to accomplish a set of computing cluster bring-up operations that configure the plurality of members into the intended computing cluster configuration. Execution of bring-up instructions of the management module serve to allocate networking IP addresses of the virtual private cloud. The allocated networking IP addresses of the virtual private cloud are assigned to networking interfaces of the plurality of nodes.
AUTOMATED EXTERNAL IP ADDRESS DISCOVERY OF SERVICES IN A PUBLIC CLOUD ENVIRONMENT
A system is disclosed for acquiring and managing data regarding external IP (EIP) addresses of services offered in a trusted public cloud environment. The system monitors an application program interface of a service executing in a trusted public cloud environment for occurrence of an event that is related to an EIP of the service. When an event is detected, the system extract EIP related data and metadata of the service, generates a message with the extracted EIP data, and posts the message to a central message queue. The system monitors the message queue for the presence of a new message. Upon detecting a new message, the system processes the message, extracts EIP related data. metadata, and identifies an action. A central database that stores EIP related information of services executing in the trusted public cloud environment is updated based on the identified action.
Spam detection
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
CLOUD-DELIVERED FIREWALL RULES FOR CONTROLLING COMMANDS SENT TO DEVICES BASED ON OPERATIONAL TOLERANCE LIMITS
Techniques for a network controller associated with a firewall service to determine a network policy based on operational tolerances associated with a device, and cause the network policy to be provisioned at the firewall service where control commands, such as, for example, supervisory control and data acquisition (SCADA) commands, may be allowed or denied transmission to the device based on the operational tolerance(s) associated with the device. In some examples, the network controller may be configured as a manufacturer usage description (MUD) controller configured to transmit a MUD uniform resource identifier (URI), emitted by the device, to a MUD file server associated with the manufacturer of the device. The MUD file may be enhanced to include the operational tolerances associated with the device and transmitted back to the MUD controller where it may be parsed to determine a corresponding network policy.
SYSTEM AND METHOD FOR ENABLING ONE OR MORE TRANSFER FEATURES ASSOCIATED WITH A REAL-TIME TRANSFER PROTOCOL
A server computer system, comprises a processor; a communications module coupled to the processor; and a memory coupled to the processor, the memory storing instructions that, when executed, configure the processor to receive, via the communications module and from a client device, a signal including a request to configure a transfer of data to a particular data record; determine that the particular data record is associated with a third party server; obtain a trust score associated with the particular data record; determine that the trust score satisfies trust criteria; and responsive to determining that the trust score satisfies trust criteria, enable one or more transfer features associated with a real-time transfer protocol.
Methods and systems for facilitating a collaborative work environment
The present disclosure describes techniques for facilitating a collaborative work environment. The techniques comprise creating at least one virtual room accessible by the plurality of users, wherein at least one subset of users are associated with the at least one virtual room, the at least one virtual room enables real-time communications among the at least one subset of users, and the at least one subset of users communicate with each other in the at least one virtual room through a first communication channel; receiving a request from a first user to communicate with at least a second user separately from the first communication channel; and establishing a first sub-communication channel between the first user and the at least a second user while the first communication channel remains accessible to the first user and the at least a second user.
Training and using machine learning models to place targeted messages in software applications
Certain aspects of the present disclosure provide techniques for placing targeted messages in communications within a software application using machine learning models. An example method generally includes retrieving, from a repository, a data set of targeted messages. For each respective targeted message in the data set of targeted messages, an effectiveness score for a party associated with the respective targeted message, a distance score between the party associated with the respective targeted message and a host party, and a match score between the party associated with the respective targeted message and the host party. Based on the effectiveness score, the distance score, and the match score for each respective targeted message in the data set of targeted messages, a message is selected to be included in one or more communications by the host party. The one or more communications including the selected message are generated and output for transmission.
Systems and methods for hybrid analog and digital processing of a computational problem using mean fields
A hybrid computing system for solving a computational problem includes a digital processor, a quantum processor having qubits and coupling devices that together define a working graph of the quantum processor, and at least one nontransitory processor-readable medium communicatively coupleable to the digital processor which stores at least one of processor-executable instructions or data. The digital processor receives a computational problem, and programs the quantum processor with a first set of bias fields and a first set of coupling strengths. The quantum processor generates samples as potential solutions to an approximation of the problem. The digital processor updates the approximation by determining a second set of bias fields based at least in part on the first set of bias fields and a first set of mean fields that are based at least in part on the first set of samples and coupling strengths of one or more virtual coupling devices.