Patent classifications
G06F16/953
Methods and apparatuses for vulnerability detection and maintenance prediction in industrial control systems using hash data analytics
Method, apparatus and computer program product for detecting vulnerability and predicting maintenance in an industrial control system are described herein.
Publicly verifiable proofs of space
A verifying entity of a decentralized system is configured to receive information associated with at least one ledger entry of a distributed ledger of the decentralized system, to verify at least a portion of one or more computations associated with the received information, to generate evidence of at least one error in the at least a portion of the one or more computations associated with the received information, and to associate the generated evidence with a public key of the verifying entity. The decentralized system may comprise a proof of space based mining system, and the at least one ledger entry of the distributed ledger may comprise at least one proof of space for the proof of space based mining system.
Publicly verifiable proofs of space
A verifying entity of a decentralized system is configured to receive information associated with at least one ledger entry of a distributed ledger of the decentralized system, to verify at least a portion of one or more computations associated with the received information, to generate evidence of at least one error in the at least a portion of the one or more computations associated with the received information, and to associate the generated evidence with a public key of the verifying entity. The decentralized system may comprise a proof of space based mining system, and the at least one ledger entry of the distributed ledger may comprise at least one proof of space for the proof of space based mining system.
Systems and methods for pushing firmware binaries using nested multi-threader operations
A computer may receive a request to generate a snapshot view of the enterprise network infrastructure. The computer may implement a multithread process to contemporaneously query a plurality of blade servers and server enclosures within the entire network infrastructure. The computer may contemporaneously receive a plurality of information files from the queried network resources (e.g. the blade servers, server enclosures). In active state modes, the computer may push firmware update binaries to the network resources. In a server processing and an active state mode, the computer may implement a multithreaded process to push the firmware update binaries to standalone servers or blade servers that can be accessed directly. In a blade enclosure processing and an active state mode, the computer may implemented a nested multi-threader, using child threads nested within a parent thread to a blade server enclosure to push firmware update binaries to blade servers in the enclosure.
Systems and methods for pushing firmware binaries using nested multi-threader operations
A computer may receive a request to generate a snapshot view of the enterprise network infrastructure. The computer may implement a multithread process to contemporaneously query a plurality of blade servers and server enclosures within the entire network infrastructure. The computer may contemporaneously receive a plurality of information files from the queried network resources (e.g. the blade servers, server enclosures). In active state modes, the computer may push firmware update binaries to the network resources. In a server processing and an active state mode, the computer may implement a multithreaded process to push the firmware update binaries to standalone servers or blade servers that can be accessed directly. In a blade enclosure processing and an active state mode, the computer may implemented a nested multi-threader, using child threads nested within a parent thread to a blade server enclosure to push firmware update binaries to blade servers in the enclosure.
Method, non-transitory computer-readable medium, and system for determining recommended search terms for a user of an online concierge system
An online concierge system may determine recommended search terms for a user. The online concierge system may receive a request from a user to view a user interface configured to receive a search query. The online concierge system retrieves long-term activity data including previous search terms entered by the user while searching for items to add to an online shopping cart. For each previous search term, the online concierge system retrieves categorical search terms corresponding to one or more categories to which the previous search term was mapped. The online concierge system determines a set of nearby categorical search terms and sends, for display via a client device, the set of nearby categorical search terms as recommended search terms.
Method, non-transitory computer-readable medium, and system for determining recommended search terms for a user of an online concierge system
An online concierge system may determine recommended search terms for a user. The online concierge system may receive a request from a user to view a user interface configured to receive a search query. The online concierge system retrieves long-term activity data including previous search terms entered by the user while searching for items to add to an online shopping cart. For each previous search term, the online concierge system retrieves categorical search terms corresponding to one or more categories to which the previous search term was mapped. The online concierge system determines a set of nearby categorical search terms and sends, for display via a client device, the set of nearby categorical search terms as recommended search terms.
Systems and methods for integration of multiple programming languages within a pipelined search query
According to one embodiment, a method that supports queries deploying operators based on multiple programming languages is described. A sequence of operators associated with a query is identified, where the sequence of operators includes at least two neighboring operators including a first operator based on a first programming language and a second operator based on a second programming language that is different from the first programming language. Thereafter, a schema associated with the first operator and a schema associated with the second operator is determined along with the compatibility between the schema of the first operator and the schema of the second operator. A query error message is generated in response to incompatibility between the first operator schema and the second operator schema. Compatibility is determined when an output generated by execution of the first operator provides machine data needed as input for execution of the second operator.
Systems and methods for integration of multiple programming languages within a pipelined search query
According to one embodiment, a method that supports queries deploying operators based on multiple programming languages is described. A sequence of operators associated with a query is identified, where the sequence of operators includes at least two neighboring operators including a first operator based on a first programming language and a second operator based on a second programming language that is different from the first programming language. Thereafter, a schema associated with the first operator and a schema associated with the second operator is determined along with the compatibility between the schema of the first operator and the schema of the second operator. A query error message is generated in response to incompatibility between the first operator schema and the second operator schema. Compatibility is determined when an output generated by execution of the first operator provides machine data needed as input for execution of the second operator.
AUGMENTED REALITY DEPTH DETECTION THROUGH OBJECT RECOGNITION
A computer-implemented method includes receiving a two-dimensional image of a scene captured by a camera, recognizing one or more objects in the scene depicted in the two-dimensional image, and determining whether the one or more recognized objects have known real-world dimensions. The computer-implemented method further includes determining a depth of at least one recognized object having known real-world dimensions from the camera, and overlaying three-dimensional (3-D) augmented reality content over a display the 2-D image of the scene considering the depth of the at least one recognized object from the camera.