G06F16/1744

Systems and methods for parallel execution of program analytics utilizing a common data object

An analytics platform for analyzing medical claims with low latency is configured to compress medical claims records into common data input objects that may be usable by a plurality of independent and parallel program analytics. The common data input objects are then passed as input to all of those program analytics, which are then configured to retrieve at least one compressed parameter file for use in processing data elements of the common data input object in accordance with a framework of a respective program analytic. The program analytics generate respective outputs based at least in part on data elements of the common data input objects, and the analytics platform combines those outputs into a single combined common output object.

System and method of detecting hidden processes by analyzing packet flows

A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.

Efficient embedding table storage and lookup
11599518 · 2023-03-07 · ·

The present disclosure provides systems, methods, and computer program products for providing efficient embedding table storage and lookup in machine-learning models. A computer-implemented method may include obtaining an embedding table comprising a plurality of embeddings respectively associated with a corresponding index of the embedding table, compressing each particular embedding of the embedding table individually allowing each respective embedding of the embedding table to be decompressed independent of any other embedding in the embedding table, packing the embedding table comprising individually compressed embeddings with a machine-learning model, receiving an input to use for locating an embedding in the embedding table, determining a lookup value based on the input to search indexes of the embedding table, locating the embedding based on searching the indexes of the embedding table for the determined lookup value, and decompressing the located embedding independent of any other embedding in the embedding table.

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

System for electronic data compression by automated time-dependent compression algorithm
11601136 · 2023-03-07 · ·

A system is provided for electronic data compression by automated time-dependent compression algorithm. In particular, the system may track instances in which a particular dataset is used, copied, or accessed over time. For certain datasets (e.g., datasets that have not been accessed for a threshold amount of time), the system may use a time-based compression algorithm that progressively removes the least significant bits of such datasets as time passes. The compression of the datasets may continue until the system detects that further compression would cause the dataset to be unreadable or unrecoverable. In this way, the system may minimize the computing resources allocated to storing datasets that are not frequently accessed.

Remote wiping for data transport, storage and retrieval

An input switching circuit dynamically connects, based on an input mapping table, input streams to inputs of a wavefront pre-transform circuit. An output switching circuit dynamically connects, based on an output mapping table, output data at outputs of the wavefront pre-transform circuit to transport streams. A controller controls, based on a wiping command, at least one of the input and output switching circuits to alter at least one of the input and output mapping tables such that the at least one of the input and output switching circuits is disabled for connection. A first subset of the transport streams operates in a foreground mode available to a user and is transported for storage in remote storage sites at a network and a second subset of the transport streams operates in a background mode available to an administrator and is not transported for storage in the remote storage sites.

Encoding / Decoding System and Method
20230119765 · 2023-04-20 ·

A computer-implemented method, computer program product and computing system for: encoding an unencoded data file to generate a related encoded data file based upon a plurality of mappings to a plurality of portions of a dictionary file; receiving a request to manipulate the unencoded data file, wherein the request would require a first sequence of operations to be performed on the unencoded data file; and processing the related encoded data file based upon the plurality of mappings and the dictionary file to generate a modified encoded data file, wherein processing the related encoded data file includes performing a second sequence of operations on the encoded data file to achieve the requested manipulations of the unencoded data file.

Encoding / Decoding System and Method
20230124896 · 2023-04-20 ·

A computer-implemented method, computer program product and computing system for: processing an unencoded data file to identify a plurality of file segments wherein the unencoded data file is a dataset for use with a long-range wireless communication platform; mapping each of the plurality of file segments to a portion of a dictionary file to generate a plurality of mappings, wherein each of the plurality of mappings includes a starting location and a length, thus generating a related encoded data file based, at least in part, upon the plurality of mappings; and transmitting the related encoded data file from a first location to a second location using the long-range wireless communication platform.

DATA PROCESSING METHOD AND ELECTRONIC DEVICE
20230068942 · 2023-03-02 ·

A data processing method includes: determining a first parameter of a first data file; determining a compression strategy for compressing the first data file according to the first parameter; and compressing the first data file according to the compression strategy, where the first parameter includes at least one of: a length of time during which the first data file remains unexecuted while the electronic device running, an immediacy of the first data file, and a size of the first data file. The present disclosure also provides an electronic device. With the data processing method and electronic device provided by the present disclosure, data may be compressed more efficiently and more content space may be saved without affecting the use of other data files.

Traversal rights

The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.