Patent classifications
G06F16/212
Modifying event generation rules responsive to detected schema changes
A schema consistency mechanism monitors data ingested by a data intake and query system for changes to the structure, or data schema, associated with the data. A schema consistency monitor obtains data from a data source (or, more generally, from any number of separate data sources) at a plurality of points in time. The data is analyzed to determine whether a first portion of the data received at a first point in time conforms to a first data schema and that a second portion of the data received at a second point in time conforms to a second data schema that is different from the first data schema (thereby indicating a change to the associated data schema). A graphical user interface (GUI) can be generated that includes indications of identified changes to one or more data schemas associated with data.
Reversible data transforms
In an example, a method to generate a visualization of data from a data source based on a contract includes applying a first reversible transform to data of a data source to generate a first intermediate data structure without modifying the data of the data source. The method includes applying a second reversible transform to the first intermediate data structure to generate a second intermediate data structure without modifying the data of the data source. At least one of the first intermediate data structure or the second intermediate data structure is in a format suitable to satisfy a contract. The method includes displaying a visualization of the data of the data source based on the contract satisfied by one or both of the first intermediate data structure or the second intermediate data structure. The displayed visualization has a visualization type specified by the contract.
Management of instrumentation data using a resource database
Methods, systems, and computer programs encoded on computer storage medium, for receiving a request for instrumentation data describing one or more devices in the computing environment, the request received from a resource management interface; retrieving the instrumentation data describing the one or more devices from a resource database; identifying a schema associated with the resource management interface; converting the instrumentation data describing the one or more devices based on the identified schema associated with the resource management interface; and transmitting the instrumentation data describing the one or more devices to the resource management interface.
Systems and methods for reconstruction of a vehicular crash
A method may include receiving sensor data of a sensor associated with a vehicle occupied by a user, the sensor data indicating that the vehicle is involved in an accident. The method may further include determining one or more potential injuries sustained by occupants of the vehicle during the accident and transmitting an indication of the one or more injuries to a mobile device of the user. Still further, the method may including prompting the user to provide a response confirming or modifying the one or more potential injuries and updating the one or more potential injuries based on the response. The method may also include generating at least one insurance claim form for the accident based on the one or more potential injuries.
BUILDING DATA PLATFORM WITH AN ENRICHMENT LOOP
A building system including one or more memory devices having instructions stored thereon, that, when executed by one or more processors, cause the one or more processors to receive an event from an event source, the event comprising data and a timestamp. The building system operates to identify first contextual data describing the event in a digital twin, the digital twin comprising a virtual representation of a building, enrich the event with the first contextual data, and provide the enriched event to a consuming system, the consuming system generating an output event based on the enriched event. The building system operates to identify second contextual data describing the output event in the digital twin, enrich the output event with the second contextual data, and provide the enriched output event to the consuming system or another consuming system.
System and method for protecting software licensing information via a trusted platform module
Methods for protecting software licensing information via a trusted platform module (TPM) are performed by systems and devices. When a licensing server is unreachable, a license is generated for a software application by a licensing manager. The license is generated via a secure register of the TPM using an asymmetric key, specific to the software application and policy-tied to the secure register, to generate a signature of a hashed license file for the software application. The asymmetric key is stored, mapped to the license file, and used for subsequent license validation. A licensing manager validation command is provided to validate the license using the key, as applied to the hash, to verify the signature and checking validity of the time stamp. Time stamp expiration or alteration of the license are determined to provoke invalidation indications for the validating application.
SYSTEM AND METHOD FOR CONTINUOUS COLLECTION, ANALYSIS AND REPORTING OF ATTACK PATHS CHOKE POINTS IN A DIRECTORY SERVICES ENVIRONMENT
A system and method for analyzing directory service environment attack path choke points for an enterprise may continuously collect data about the attack paths and provide alerts.
Automating optimizations for items in a hierarchical data store
Performance of optimizations to correct duplicate, missing, or other user-induced errors in hierarchical data storage may be automated. Relationships between items may be used to determine whether a modification should be made to items. Once identified, a determination may be made as to whether the modification will impact query performance. If so, then permission may be obtained before the modification is made. If not, then the modification may be made automatically.
SECURE DATABASE WITH USER-DEFINED SCHEMAS
Systems and methods are described for providing secure communications among users from different organizations. An example method includes: providing a communication service to (i) a first group of users from a first organization having a first computing environment and (ii) a second group of users from a second organization having a second computing environment; creating a data storage schema in the first computing environment; encrypting the data storage schema using an encryption key in the first computing environment; sending the encrypted data storage schema from the first computing environment to a cloud storage infrastructure; receiving the encrypted data storage schema from the cloud storage infrastructure in the second computing environment; decrypting the data storage schema using the encryption key in the second computing environment; and using the data storage schema to share data between the first group of users and the second group of users.
PROFILE DATA EXTENSIONS
A method for providing generating data extensions for a first data profile includes receiving a request for historical data, the data being associated with a first data profile, the first data profile being generated from data supplied by a data source system, creating a data model for obtaining the historical data based on data from at least one of the first data profile, a second data profile, or the data source system, executing the data model to obtain the historical data, and storing the historical data as a data extension of the first data profile. The first data profile and the data extension of the first data profile may be generated and stored separately, and the data extension of the first data profile is generated on the fly at runtime.