Patent classifications
G06F9/547
Systems and methods for assisted code development
The present invention generally relates to the field of automated and flexible information extraction for assisted and streamlined development of computer code. The invention provides for accommodating coding representations of reusable utilities in a technology agnostic pattern so that, based on a specified coding stack, the technology agnostic embeddings can be decoded and deployed into developers' integrated development environment. The present invention includes a technologic agnostic digital wallet for developers capable of storing reusable components either from open source repositories or user-defined functions in an embedded pattern in a centralized storage platform such as cloud or hosted virtual desktop.
Systems and Methods for Automating Processes for Remote Work
A method may include a method of automating processes for remote work. The method may include receiving, at a server, first login data from a client software application. The client software application may be executing on a user device of a remote worker user. The method may include authenticating the remote worker user based on the first login data. The method may include receiving, at the server, command data from the client software application. The command data may include data indicating to the server to launch a software application. The method may include launching, on the server, the software application. The method may include inputting, using a robotic process automation (RPA) process, second login data of the remote worker user into the software application. The method may include key site information, speech-to-text functionality, onboarding functionality, automated support, or activity logging.
SYSTEMS AND METHODS FOR USE OF PERIPHERAL HARDWARE BY MODERN WORKSPACES
Methods and system support use of peripheral devices by workspaces operating on an Information Handling System (IHS), where the workspaces operate in isolation from the hardware and other software of the IHS. Workspaces are thus unable to interface with hardware coupled to the IHS, including peripheral devices coupled to the IHS. In embodiments, workspace issue request for use of a remote operation supported by a peripheral device. A handle is then provided for invoking the remote operation supported by the peripheral device and for providing the workspace with exclusive use of the peripheral device for the duration of a validity of the handle. One the handle is used to invoke the remote operation supported by the peripheral device, the workspace is provided with output from the remote operation conducted during exclusive use of the peripheral device by the workspace.
Systems and Methods for Automating Processes for Remote Work
A method may include a method of automating processes for remote work. The method may include receiving, at a server, first login data from a client software application. The client software application may be executing on a user device of a remote worker user. The method may include authenticating the remote worker user based on the first login data. The method may include receiving, at the server, command data from the client software application. The command data may include data indicating to the server to launch a software application. The method may include launching, on the server, the software application. The method may include inputting, using a robotic process automation (RPA) process, second login data of the remote worker user into the software application. The method may include key site information, speech-to-text functionality, onboarding functionality, automated support, or activity logging.
Apparatus and method for joint profile-based slicing of mobile access and optical backhaul
Software Defined Networking concepts apply to access, fronthaul, backhaul and core networks of 5G mobile networks and beyond. Such network components currently have individual/segmented control planes and associated controllers to provide configurability, provisioning, and network slicing. This is because of technology disparity between these network components: access is wireless/cellular, backhaul and fronthaul are optical/fiber, and core is electrical/wire-line. A system/method is detailed that enables a coordinated and unified end-to-end slicing, wherein the coordination is provided in the system/method that (a) attaches to the respective controllers of these network components in real-time, (b) collects the connectivity topology of each network segment as the network evolves, (c) passes the slice-profile information (translating according to capabilities of that network segment to configure an end-to-end slice with a specified bandwidth requirement and service quality level), and (d) passes across a VLAN tag to be used across network segments to associate with the same slice.
Portable policy execution using embedded machines
Some embodiments provide a method for evaluating authorization policies that restrict access to API (Application Programming Interfaces) calls to an application executing on a host system. At the application, the method receives an API call to execute. The method directs a process virtual machine (VM) executing inside the application to make an authorization decision for the API call. The method executes the API call after receiving an authorization decision to allow the API call from the process VM executing inside the application.
Anti-pattern detection in extraction and deployment of a microservice
Disclosed are various embodiments for anti-pattern detection in extraction and deployment of a microservice. A software modernization service is executed to analyze a computing application to identify various applications. When one or more of the application components are specified to be extracted as an independently deployable subunit, anti-patterns associated with deployment of the independently deployable subunit are determined prior to extraction. Anti-patterns may include increases in execution time, bandwidth, network latency, central processing unit (CPU) usage, and memory usage among other anti-patterns. The independently deployable subunit is selectively deployed separate from the computing application based on the identified anti-patterns.
Comprehension indexing feature
Some embodiments of the invention provide a method for defining code-based policies. The method generates a policy-builder first view of a policy for display in a graphical user interface (GUI) by processing a syntax tree that is generated from a code second view of the policy. The method receives, through the policy-builder first view, a modification to a portion of the policy. To reflect the modification, the method updates a portion of the syntax tree that corresponds to the portion of the policy that is affected by the modification. Based on the updating of the syntax tree, the method updates the code second view by modifying a portion of the code second view that corresponds to the updated portion of the syntax tree.
Digital identity network interface system
There is a provided a digital identity network interface system that may include a communications module and a processor. The processor may be configured to receive a signal representing a digital identity request, the digital identity request defining one or more scopes associated with the request, at least one of the scopes identifying a data type associated with the request, generate a query based on the scopes by translating at least one of the scopes into a query having a query format associated with a digital identity network, the digital identity network storing data associated with a plurality of users, send a signal representing the query to the digital identity network, send a link to an authorization device, after successful authentication, obtain data associated with the digital identity request from the digital identity network, and release at least some of the data.
System, method and computer-accessible medium for resource centric authorization in multi partner ecosystem
An exemplary system, method and computer accessible medium can include receiving an authorization token related to a customer(s), determining a client identification (ID) associated with the customer(s) based on the authorization token, and determining access to a microservices(s) based on the client ID. An application for a loan(s) from the customer (s) can be received based on the client ID and the loan(s) can be associated with an application ID(s). A further authorization token related to a further customer(s) can be received, a further client ID can be determined based on the further authorization token, a determination can be made as to whether the further client ID has access to the application, and access to the application can be granted to the further customer(s) if the further client ID is determined to have access to the application.