G06F9/465

Systems and methods for programming mobile devices

Embodiments of a system and method are described for generating and distributing programming to mobile devices over a network. Devices are provided with Players specific to each device and Applications that are device independent. Embodiments include a full-featured WYSIWYG authoring environment, including the ability to bind web components to objects.

Making communication interfaces pluggable by using mechanisms comprising of exchange/broker for communication interfaces
11275567 · 2022-03-15 · ·

A large software application comprises of multiple modules that communicate or exchange data with each other. To facilitate communication between modules, each module implements interfaces, and it is required to create communication code to allow communication and collaboration between these interfaces. To allow collaboration between modules today, the necessary communication code (that facilitates communication between any two interfaces) is created and managed manually. It is desirable to invent tools, methods, and mechanisms to automate various tasks and activities necessary to create and manage the communication code. Current invention discloses such novel tools, methods, and mechanisms to facilitate communication between modules, by allowing communication between modules through their interfaces. To facilitate communication between the interfaces, the interfaces also include and provide the necessary information (e.g. look-up keys) to the novel tools to look up and find each pair of interfaces (i.e. two interfaces) that need to communicate with each other and to facilitate the necessary communication between the two interfaces.

UNIFIED OPERATING SYSTEM FOR DISTRIBUTED COMPUTING
20220075604 · 2022-03-10 · ·

In some embodiments, a real-time event is detected and context is determined based on the real-time event. An application model is fetched based on the context and meta-data associated with the real-time event, the application model referencing a micro-function and including pre-condition and post-condition descriptors. A graph is constructed based on the micro-function. The micro-function is transformed into micro-capabilities by determining a computing resource for execution of a micro-capability by matching pre-conditions and post-conditions of the micro-capability, and enabling execution and configuration of the micro-capability on the computing resource by providing access in a target environment to an API capable of calling the micro-capability to configure and execute the micro-capability. A request is received from the target environment to execute and configure the micro-capability on the computing resource. The micro-capability is executed and configured on the computing resource, and an output of the micro-capability is provided to the target environment.

CODE-FREE AUTOMATED MACHINE LEARNING

Techniques for code-free automated machine learning (ML) are described. Users can train high-quality ML models and pipelines without necessarily needing to write code by providing a training dataset to a code-free machine learning service. The service may deploy an ML orchestration function and a storage location on behalf of a user. When a modification is made to the storage bucket, such as by the user providing a training dataset, the orchestration function is invoked and can automatically initiate an AutoML process using at least the training data to train multiple ML model variants. The resultant ML model(s) and associated metrics can be provided to the user, deployed behind an endpoint, and/or used to generate inferences.

Transfer of files with arrays of strings in soap messages

A method of transferring files in a data-processing network using a current node within the network includes reading an outbound content and outbound characteristics of an outbound file. An outbound message is created having outbound strings including a first set of the outbound strings representing the outbound characteristics and a second set of the outbound strings representing the outbound content. The outbound message is sent to a receiver node within the network. An inbound message is received from a sender node within the network. The inbound message has inbound strings including a first set of the inbound strings representing inbound characteristics and a second set of the inbound strings representing inbound content. An inbound file having the inbound content is stored, and the inbound characteristics are applied to the inbound file.

Cross-platform stateless clipboard experiences

In non-limiting examples of the present disclosure, systems, methods and devices for assisting with cross-platform copy and paste operations are provided. A first and second computing device may be connected. When a copy command is received in relation to an object, the object may be copied to the copying device's clipboard. Metadata describing the object may be sent to the other device. A paste command may be received by the pasting device and that command may be relayed to the device where the copy command was received. The object may be sent from the copying device to the pasting device and injected/pasted directly into the construct where the paste command was received. The object may be translated into a compatible format prior to its injection/pasting.

SYSTEM AND METHOD FOR PROCESS AND DATA ISOLATION IN A NETWORKED SERVICE ENVIRONMENT
20210389982 · 2021-12-16 ·

Embodiments as disclosed herein provide computing systems and methods that effectively serve to isolate processes in a computing environment. The isolation of such processes may serve additionally to substantially increase the observability of such processes, allowing a granular insight into data associated with those processes and the performing of individual tasks.

SYSTEM AND METHOD FOR MANUFACTURING AND TRADING SECURITIES AND COMMODITIES

Systems and methods are disclosed for a distributed trading system. The preferred invention offer solutions to problems that arise with High-Frequency Trading and the future of stock market regulation. The use of a distributed object brokered interface to facilitate transactions not only makes the trading faster but also more secure.

METHODS AND SYSTEMS FOR SERVICE DISCOVERY AND TUNNELLING IN A DISTRIBUTED ARCHITECTURE

A method for distributed service management includes; running, by client nodes and service provider nodes, respective instances of a distributed service management unit, wherein the distributed service management unit comprises a distributed hash set table (DHST); providing, by the distributed service management unit, an application programming interface (API), wherein all connections between a client node and a service provider node are tunneled through the API; registering, by a service provider, a service on a network node; storing, by the registering network node, an endpoint of the service in a dataset of the DHST with a key corresponding to the service; requesting, by the client node, the service; and returning, by the distributed service management unit, all endpoints stored in the DHST with the key corresponding to the service.

FAULT-TOLERANT AND HIGHLY AVAILABLE CONFIGURATION OF DISTRIBUTED SERVICES

Fault-tolerant and highly available configuration of distributed services including a computer-implemented method for role-based configuration discovery comprising receiving a request comprising an identifier of a role; identifying a first key, in a replica of a distributed configuration store, comprising a first value that matches the role identifier; identifying one or more other key-value pairs associated in the replica with the first key; and returning a response to an entity that sent the request comprising the value of at least one key-value pair that is specific to the role the service has. Also disclosed are techniques for log forwarding.