Patent classifications
G06F9/44521
Analyzing data using a hierarchical structure
Apparatus, systems, and methods for analyzing data are described. The data can be analyzed using a hierarchical structure. One such hierarchical structure can comprise a plurality of layers, where each layer performs an analysis on input data and provides an output based on the analysis. The output from lower layers in the hierarchical structure can be provided as inputs to higher layers. In this manner, lower layers can perform a lower level of analysis (e.g., more basic/fundamental analysis), while a higher layer can perform a higher level of analysis (e.g., more complex analysis) using the outputs from one or more lower layers. In an example, the hierarchical structure performs pattern recognition.
Systems and methods of migrating client information
The present disclosure relates to linking processing codes between platforms, and more particularly, to automatically record linking processing codes between platforms and methods of use. The method includes: obtaining a legacy processing code from a legacy system; obtaining a virtual code from a virtual entry table (VET) which corresponds with the legacy processing code; and mapping the legacy processing code to a target processing code using the virtual code from the VET.
METHOD AND APPARATUS FOR ISOLATED EXECUTION OF COMPUTER CODE WITH A NATIVE CODE PORTION
Example embodiments describe a computer-implemented method, comprising: i) receiving a request to execute a computer code for a tenant in an intra-process execution environment; ii) executing the computer code in a tenant-specific process when the computer code comprises a native code portion; ii) otherwise, executing the computer code in a global process or in the tenant-specific process. Wherein the tenant-specific process is configured to only execute computer codes associated with the same tenant in different intra-process execution environments, and the global process is configured to execute computer codes associated with different tenants in different isolated intra-process execution environments.
Reusable custom functions for playbooks
Techniques are described for enabling users of an information technology (IT) and security operations application to create highly reusable custom functions for playbooks. The creation and execution of playbooks using an IT and security operations application generally enables users to automate operations related to an IT environment responsive to the identification of various types of incidents or other triggering conditions. Users can create playbooks to automate operations such as, for example, modifying firewall settings, quarantining devices, restarting servers, etc., to improve users' ability to efficiently respond to various types of incidents operational issues that arise from time to time in IT environments.
DYNAMICALLY BINDING DATA IN AN APPLICATION
In a method for dynamically binding data in an application, an expression describing a relation between a first property of a first data of the application to a first property of a second data of the application is received. A binding is created between the first data and the second data based on the relation. A change is propagated to the first property of the second data based on a change to the first property of the first data. It is determined when to execute the expression in the application.
SYSTEM AND METHOD FOR EXECUTING MULTIPLE SCRIPTS AT A SINGLE EXTENSION POINT
Systems and methods of executing multiple scripts at an extension point are provided. If there are multiple scripts that are associated with an extension point for a service instance in a SAAS platform, a script execution schedule is determined. This can indicate the order of execution of the multiple scripts, but may also specify how the inputs and outputs of the multiple script executions are obtained. For example, the inputs for multiple scripts can be the same, and be those provided by the SAAS platform at the extension point. In this case, in effect the multiple scripts are executed independently. Alternatively, the output of one script can function as the input to another script, which requires a certain order of execution. After all of the scripts are executed, output rules are used to determine an overall output of the script execution to be returned the platform through the extension point.
USING CONTAINERS TO CLEAN RUNTIME RESOUCES WHEN UNLOADING A SHARED LIBRARY
Embodiments of the invention include a computer-implemented method that includes accessing, using a processor, a loader library; using the processor to generate a mock library comprising a mock version of the loader library; using the processor to containerize the loader library; and using the processor to unload the loader library.
IMAGE SEGMENT STORAGE AMONG ONE OR MORE STORAGE TIERS
Examples described herein relate to a system that prior to execution of a virtualized execution environment on a compute node, store at least one image block into at least one tier of storage of a hierarchical storage system based on priority of the at least one image block. In some examples, the at least one image block comprises at least one portion of an image of the virtualized execution environment.
Software protection method and system thereof
A software protection method includes decrypting an encrypted executable file by a processor, and the steps of decrypting include the following steps. A linking instruction is executed in a first execution environment; based on the linking instruction, a signature corresponding to the encrypted executable file is generated in the first execution environment; based on the signature and a hash table, a decryption algorithm is performed and a key is generated in the first execution environment; and the key is transmitted from the first execution environment to a second execution environment that is different from the first execution environment. The encrypted executable file is in the second execution environment. A software protection system is also disclosed herein.
Systems and methods for platform-independent application publishing to a front-end interface
Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.