G06F16/235

Vehicle readiness system
11482061 · 2022-10-25 · ·

A vehicle readiness system includes a processing circuit. The processing circuit is configured to receive subsystem diagnostic data regarding a status of a subsystem of a vehicle, receive inventory data regarding an inventory of equipment present on the vehicle, receive inspection data regarding a condition of an inspection point on the vehicle, determine a readiness score for the vehicle based on the subsystem diagnostic data, the inventory data, and the inspection data, and transmit a readiness report based on the readiness score, the subsystem diagnostic data, the inventory data, and the inspection data to at least one of a display device of the vehicle or a user device separate from the vehicle.

APPARATUS, SYSTEMS, AND METHODS FOR ANALYZING CHARACTERISTICS OF ENTITIES OF INTEREST

The present disclosure relates to apparatus, systems, and methods for analyzing characteristics of entities of interest. In particular, the present disclosure provides a mechanism for analyzing information about entities of interest and for rating or scoring the entities of interest based on the analyzed information. The rating or the score of an entity of interest can sometimes be referred to as a placerank value of an entity of interest.

System and method of detecting hidden processes by analyzing packet flows

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.

Systems and methods to facilitate rapid data entry for document review
11636088 · 2023-04-25 · ·

A computer-implemented method that includes generating a graphical user interface including a coding interface and a document viewer interface. The coding interface displays a grid that includes a plurality of cells representing a plurality of documents and a plurality of fields. A selection of one of the cells is received. The cell represents a selected one of the documents, and a selected one of the fields. A rendering of the selected document is automatically displayed in the document viewer interface. A value entered into the selected cell is received and the value is transmitted to a database for storage thereby.

Deferred reclamation of invalidated entries that are associated with a transaction log in a log-structured array

A storage control system is configured to obtain first data associated with a logical data device and to store the first data in a first entry of a log-structured array. The storage control system is further configured to invalidate a second entry of the log-structured array based at least in part on the storage of the first data in the first entry. The second entry comprises second data that was associated with the logical data device prior to obtaining the first data. The storage control system is further configured to determine that a first indication in a first metadata indicates that the invalidated second entry corresponds to a transaction log and to defer reclamation of the second entry based at least in part on the determination that the first indication in the first metadata indicates that the invalidated second entry corresponds to the transaction log.

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

WITHHOLDING NOTIFICATIONS DUE TO TEMPORARY MISPLACED PRODUCTS
20230124850 · 2023-04-20 ·

A system for processing images captured in a retail store and automatically identifying misplaced products is provided. The system may comprise at least one processor configured to receive one or more images captured by one or more image sensors from an environment of a retail store, detect in the one or more images a first product, determine that the first product is not located in the first correct display location, cause an issuance of a user-notification associated with the first product, detect in the one or more images a second product, determine that the second product is not located in the second correct display location, and after determining that the second product is not located in the second correct display location and when the second urgency level is lower than the first urgency level, withhold issuance of a user-notification associated with the second product.

IN-PLACE GARBAGE COLLECTION FOR STATE MACHINE REPLICATION

Garbage collection processing in a distributed shared log system includes a client identifying obsoleted log entries for a shared data object. The client sends information associated with the identified obsoleted log entries to a shared log server. The shared log server receives information associated with obsoleted log entries from all clients in the distributed shared log system and uses the information to delete the obsoleted log entries. The shared log server can update a snapshot mark to indicate the earliest time that a snapshot of the shared log can be taken. The snapshot mark can be updated based on the information associated with obsoleted log entries.

Map-reduce ready distributed file system

A map-reduce compatible distributed file system that consists of successive component layers that each provide the basis on which the next layer is built provides transactional read-write-update semantics with file chunk replication and huge file-create rates. Containers provide the fundamental basis for data replication, relocation, and transactional updates. A container location database allows containers to be found among all file servers, as well as defining precedence among replicas of containers to organize transactional updates of container contents. Volumes facilitate control of data placement, creation of snapshots and mirrors, and retention of a variety of control and policy information. Also addressed is the use of distributed transactions in a map-reduce system; the use of local and distributed snapshots; replication, including techniques for reconciling the divergence of replicated data after a crash; and mirroring.

Methods and apparatus for information storage and retrieval using a caching technique with probe-limited open-address hashing
11468033 · 2022-10-11 ·

A method and apparatus for performing storage and retrieval in an information storage system cache is disclosed that uses the hashing technique with the open-addressing method for collision resolution. Insertion, retrieval, and deletion operations are limited to a predetermined number of probes, after which it may be assumed that the table does not contain the desired data. Moreover, when using linear probing, the technique facilitates maximum concurrent, multi-thread access to the table, thereby improving system throughput, since only a relatively small section is locked and made unavailable while a thread modifies that section, allowing other threads complete access to the remainder of the table.