G06F2209/542

Managing asynchronous operations in cloud computing environments

A processor may execute an asynchronous operation of the program code, hibernate a process related to the asynchronous operation, and free-up related cloud runtime platform excluding the related system memory. Additionally, the processor may execute the asynchronous operation during the hibernation of the process, intercept an initiated completion function to the process after a completion of the asynchronous operation, inject at least one of additional program code and data into the completion function, un-hibernating the process and reallocate freed-up cloud runtime platform related resources of the process, and execute the completion function returning result data of the asynchronous operation and the at least one of additional program code and data to the process.

System and method for light data file duplication prevention

A system for preventing duplication of a computer source file to a destination file includes a user application accessed by a user of a computer. An agent application hosted by the computer registers for a notification of a user interface action with an operating system (OS) of the computer. The agent receives notice from the OS of the user interface action and determines if the user interface action is indicative of a data file duplication operation of a source file to a destination file location The Agent compares a property of the source file and a property of the destination file location to a blocking criteria, and blocks the user interface action from reaching the application.

SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR ANALYZING INTERCEPTED TELEMETRY EVENTS
20230281095 · 2023-09-07 ·

Systems, methods, and computer-readable media for intercepting telemetry events obtained during operation of an application and analyzing the telemetry events are provided. The telemetry events are intercepted at the library level by interposing on application calls to a native library. The telemetry events are collected and transmitted to a platform that analyzes the collected events and presents information based on the analysis.

Automated assistant architecture for preserving privacy of application content
11750544 · 2023-09-05 · ·

Implementations set forth herein relate to an automated assistant that allows third party applications to inject dependencies to leverage automated assistant functions. Furthermore, enabling such dependency injections can allow third party applications to preserve privacy of any application content that is used during execution of automated assistant functions. In some implementations, a third party application can initialize a function with an assistant dependency using parameters that are tagged as private. Initializing a function in such as a way can allow private content communicated between the third party application and the automated assistant to be abstracted for security purposes. The abstracted content can thereafter be communicated to a remote server—such as a server hosting an extensively trained machine learning model. Intelligent output provided by the server can then be incorporated into one or more processes of the third party application without comprising security.

Systems, methods, and computer-readable media for executing a web application scan service

Systems, methods, and computer-readable media for performing web app scans of an application are provided. Telemetry events derived from the web app scan are intercepted by a runtime that has been instrumented in conjunction with the application. The telemetry events are collected and transmitted to a platform that analyzes the collected events and presents information based on the analysis.

Dynamic load balancing in reactive systems

A computer system hosting (micro)services that uses a service mesh to govern communication between the services. The services include consumer services and an event stream service, the latter directing an event stream from a producer service to the individual consumer services. The control plane of the service mesh has the role of creating and removing service instances. Based on a specified event capacity that is to be provided by the consumer services collectively, the control plane manages service provisioning by estimating the current event capacity of the system. This is done by measuring the event capacities of each consumer service instance and summing them, from which any shortfall or excess of the current event capacity in relation to the specified event capacity can be determined. Consumer service instances are then added in case of a shortfall or removed in case of an excess as needed to avoid over or under-provisioning.

ADAPTIVE APPLICATION VERSION INTEGRATION SUPPORT

An Application Programming Interface (API) call that is directed from a first application to a second application is intercepted. A first version number is identified for the first application and a second version number is identified for the second application. One or more transformations are processed on the API call to produce a compatible API call that is compatible with the second application. The compatible API call is provided to the second application for processing on behalf of the first application.

AUTOMATED ASSISTANT ARCHITECTURE FOR PRESERVING PRIVACY OF APPLICATION CONTENT
20220329550 · 2022-10-13 ·

Implementations set forth herein relate to an automated assistant that allows third party applications to inject dependencies to leverage automated assistant functions. Furthermore, enabling such dependency injections can allow third party applications to preserve privacy of any application content that is used during execution of automated assistant functions. In some implementations, a third party application can initialize a function with an assistant dependency using parameters that are tagged as private. Initializing a function in such as a way can allow private content communicated between the third party application and the automated assistant to be abstracted for security purposes. The abstracted content can thereafter be communicated to a remote server—such as a server hosting an extensively trained machine learning model. Intelligent output provided by the server can then be incorporated into one or more processes of the third party application without comprising security.

ADAPTIVE APPLICATION VERSION INTEGRATION SUPPORT

An Application Programming Interface (API) call that is directed from a first application to a second application is intercepted. A first version number is identified for the first application and a second version number is identified for the second application. One or more transformations are processed on the API call to produce a compatible API call that is compatible with the second application. The compatible API call is provided to the second application for processing on behalf of the first application.

Using browser context in evasive web-based malware detection

The use of browser context in detecting malware is disclosed. A client device requests content from a remote server. Data received by the client device from the remote server is transmitted to an external scanner for analysis by the external scanner. The external scanner is configured to use a browser executed in an instrumented virtual machine environment to analyze the data provided by the client device. The client device is configured to act as a proxy on behalf of the external scanner.