G06F9/44521

SHARING OF COMPUTING RESOURCES BETWEEN COMPUTING PROCESSES OF AN INFORMATION HANDLING SYSTEM
20220334836 · 2022-10-20 ·

Sharing of computing resources between computing process modules of an information handling system, including loading a single instance of a library at a source computing process module, the library being a collection of resources; extracting one or more features of the library; publishing, based on the extracted features, a library interface at the source computing process module, the library interface implemented by the library at the source computing process module; retrieving, through the library interface, the extracted features of the library, the extracted features retrieved at a target computing process module; and instantiating a dynamic object at the target computing process module that implements the library interface.

SECURE LOADING AND EXECUTION OF USER-DEFINED CONTENT ON EMBEDDED REMOTE TERMINAL UNIT CONTROLLER

Secure loading and execution of user-defined content on an embedded controller associated with a remote terminal unit (RTU) includes providing a factory default image for the RTU having a default secured read only filesystem and providing a developer image for extending the RTU functionality, having a read/write filesystem equivalent working in conjunction with the read only filesystem.

APPLICATION FUNCTION LIBRARY FOR CLOUD SYSTEMS
20230130202 · 2023-04-27 ·

A method, a system, and computer program product for application function library installation for cloud-based systems. An application function in a plurality of application functions is executed. The application function is executed using a server instance running in a container. A determination is made that execution of the application function requires an application function library. The application function library for executing of the application function is obtained. The obtained application function library is loaded during runtime of the application function.

SOFTWARE DEFINED RANDOMIZATION FOR THE MITIGATION OF UNKNOWN VULNERABILITIES

Various embodiments of an apparatus, methods, systems and computer program products described herein are directed to detecting initiation of one or more shared libraries being loaded into a runtime memory of an application. While the one or more shared libraries are being loaded into the runtime memory, randomization code is placed into the runtime memory. For each respective shared library loaded into the runtime memory: randomization code allocates a new segment of runtime memory. The randomization code inserts a copy of the shared library into the new segment of runtime memory and overwrites a current segment of runtime memory at which the shared library is currently stored.

Add-on management methods

A computing system is configured to execute a computer program on a server and to provide a video stream of the program output to a geographically remote client over a communication network. An add-on manager is provided to facilitate the use of add-ons to extend the functionality of the computer program. The add-on manager is responsive to commands received from the client and is configured to associate individual add-ons and add-on data with specific user accounts. The add-ons can be located on the server or some other location remote from the client.

Arithmetic enhancement of C-like smart contracts for verifiable computation

A system converts high level source code into an arithmetic circuit that represents the functionality expressed in the source code, such as a smart contract as used in relation to a blockchain platform. The system processes a portion of high level source code to generate an arithmetic circuit. The arithmetic circuit comprises one or more arithmetic gates arranged to represent at least some of the functionality expressed in the source code.

Roll back of data delta updates
11635955 · 2023-04-25 · ·

Disclosed embodiments relate to adjusting vehicle Electronic Control Unit (ECU) software versions. Operations may include receiving a prompt to adjust an ECU of a vehicle from executing a first version of ECU software to a second version of ECU software; configuring, in response to the prompt and based on a delta file corresponding to the second version of ECU software, the second version of ECU software on the ECU in the vehicle for execution; and configuring, in response to the prompt, the first version of ECU software on the ECU in the vehicle to become non-executable.

Multi-tenant java agent instrumentation system

In one embodiment, a device launches a core agent for a Java application. The core agent loads a first tenant and a second tenant, each tenant having its own isolated class loader. The device instruments, via the core agent and by each tenant, the Java application to capture data regarding execution of the Java application. The device provides the captured data to a user interface.

Distributed and redundant machine learning quality management

Provided is a process including: writing modelling-object classes using object-oriented modelling of the modelling methods, the modelling-object classes being members of a set of class libraries; writing quality-management classes using object-oriented modelling of quality management, the quality-management classes being members of the set of class libraries; scanning modelling-object classes in the set of class libraries to determine modelling-object class definition information; scanning quality-management classes in the set of class libraries to determine quality-management class definition information; using the modelling-object class definition information and the quality-management class definition information to produce object manipulation functions that allow a quality management system to access methods and attributes of modelling-object classes to manipulate objects of the modelling-object classes; and using the modelling-object class definition information and the quality-management class definition information to produce access to the object manipulation functions.

Serialization of objects using multiple serialization algorithms

Techniques for serializing objects stored in system memory are disclosed. The system may receive data representing an object stored in system memory. The system may select a particular serialization process, from among a plurality of serialization processes, for serializing the received data. The particular serialization process may be selected based at least in part on the received data. The system may serialize the data representing the object in system memory using the selected serialization process. Serializing the data may yield one or more stream objects.