Patent classifications
G06F16/1873
Systems and methods for automated governance, risk, and compliance
Systems and methods for configuration vulnerability checking and remediation are provided. The systems provided herein identify risk based upon service indications of a particular configuration, such that automated risk analysis may be facilitated.
System and Method for Non-Disruptive Upgrade for Metadata Log with Minimal Hiccup
A method, computer program product, and computer system for controlling, by a computing device, access to a non-volatile memory using a non-volatile lock as a reader of the non-volatile memory. Metadata (MD) non-volatile memory commits may be throttled until capacity of the non-volatile memory is at a threshold capacity.
MODEL OBJECT MANAGEMENT AND STORAGE SYSTEM
A model management system provides a centralized repository for storing and accessing models. The model management system receives an input to store a model object in a first model state generated based on a first set of known variables. The model management system generates a first file including a first set of functions defining the first model state and associates the first file with a model key identifying the model object. The model management system receives an input to store the model object in a second model state having been generated based on the first model state and a second set of known variables. The model management system generates a second file including a second set of functions defining the second model state and associates the second file with the model key. The model management system identifies available versions of the model object based on the model key.
DATA CORRELATION USING FILE OBJECT CACHE
Some examples relate generally to computer architecture software for data classification and information security and, in some more particular aspects, to verifying audit events in a file system.
MODIFICATION OF A DOCKERFILE TO REPAIR VULNERABILITIES EXISTING IN THE DOCKERFILE
A method, computer program product, and computer system for repairing a Dockerfile. Library versions containing initial version numbers of libraries are extracted from the Dockerfile. A Monte Carlo tree search (MCTS) is executed, using the extracted library versions as input, which generates a tree that includes multiple levels populated with noses. Each node in a level represents the generic library name of a library version in the Dockrerfile and an associated randomly selected version number. At least one of the randomly selected version numbers associated with at least one node in a level differs from the initial version number associated with a versionf. A best successful installation path is selected from the at least one successful installation path. The Dockerfile is repaired by inserting randomly selected version numbers into Dockerfile as replacements for some of the initial version numbers.
System and method for clustering distributed hash table entries
A distributed storage system may store data object instances in persistent storage and may store keymap information for those data object instances in a distributed hash table on multiple computing nodes. Each data object instance may include a composite key containing a user key. The keymap information for each data object instance may map the user key to a locator and the locator to the data object instance. A request to store or retrieve keymap information for a data object instance may be routed to a particular computing node based on a consistent hashing scheme in which a hash function is applied to a portion of the composite key of the data object instance. Thus, related entries may be clustered on the same computing nodes. The portion of the key to which the hash function is applied may include a pre-determined number of bits or be identified using a delimiter.
SYSTEMS AND METHODS FOR CONFIGURABLE ORDERED TRANSFORMATION OF DATABASE CONTENT
A system includes processor hardware and memory hardware that stores instructions. The instructions include, in response to receiving a request, determining a request type of the request, retrieving a first set of collected information, and selecting a first set of instructions corresponding to the request type. The instructions include constructing a first result by executing each instruction of the first set of instructions to create the first entry as a nested entry within the first result including data of the first set of collected information identified in the first set of instructions as nested or retrieve first data of the first set of collected information identified by the first instruction and add the first data to the first entry of the first result. The instructions include transforming a display of the operator device to complete a set of fields displayed on the display with corresponding entries of the first result.
TEMPLATE APPLICATION PROGRAM
The present disclosure includes system and methods for executing an action for a file, including receiving a plurality of items to be docketed, wherein each of the plurality of items includes one or more types of respective docket items, locating a plurality of templates, each of the plurality of templates associated with one of the plurality of item to be docketed, and executing one or more actions for each of the plurality of items to be docketed based on the correlated plurality of templates.
ENHANCED CO-AUTHORING AND FILE SYNCING
In an implementation, a sync engine running on a computing device synchronizes a local copy of a file with a copy of the file hosted by an online file service. An application on the device receives a request/command to open the file and responsively opens a temporary copy of the file in memory. The application populates the temporary file with content from the local copy of the file and also establishes a connection between the application and a co-authoring service. Note that the connection between the application and the co-authoring session bypasses the sync engine such, when connected to the co-authoring service, the application is able to synchronize the content in the temporary copy of the file with content in the hosted copy of the file over the connection.
System and method for creating a mutual reference between a blockchain and a private repository
A system and method for the secure management of digital contracts utilizes technology from the following fields: digital timestamping, encryption, distributed storage, and distributed payment systems. The existing state-of-the-art contract management systems require counter-parties to give a substantial level of trust to third parties to perform functions such as storage and verification. This system and method reduces the amount of trust that the counterparties need to give to a single third party. The system and method may be used for the secure construction and management of digital contract data and metadata.