G06F9/45512

DATA MIGRATION BETWEEN STORAGE SYSTEMS

Described herein are techniques and mechanisms for migrating data in a flexible and platform-independent manner that does not require installation on a customer site to be executed. In some embodiments, a software tool may be written in a scripting language, which may be interpreted at run-time as opposed to requiring compilation beforehand. The tool may include multiple modules, where each module may be configured to perform one or more specific functions in accordance with the invention, and each module may be capable of receiving and outputting data in a flat-file format, for example, with comma-delimited values. The software tool may present a command-line interface (CLI) that enables a user to specify execution of one or more actions by entering commands on a command line.

Operating system-agnostic container runtime
11520614 · 2022-12-06 · ·

Novel techniques are described for operating system (OS) agnostic containerization for application deployment. For example, an application is being deployed to a large number of target computational environments running a variety of different OSs, including OSs that are either unknown to the deployment environment or not directly supported by OS-specific container runtimes accessible to the deployment environment. Embodiments can automatically generate a resource profile of a target OS running in a target computational environment, for example, by exploiting functionality of a network interface application also running in the target computational environment. The resource profile can be used to convert an OS-agnostic container runtime into a target-tailored container runtime (tailored for the target OS), and the target-tailored runtime can be deployed to build the containerized application in the target computational environment.

SECURITY INSPECTIONS

In some examples, a method for performing an out-of-band security inspection of a device comprises generating a snapshot of the state of the device, storing data representing the snapshot to a non-volatile storage of the device, and storing a hash of the snapshot in a device BIOS, transitioning the power state of the device, triggering boot of a trusted diskless operating system image, providing the data representing the snapshot and the hash of the snapshot to the trusted diskless operating system image, and executing a script selected on the basis of a trigger event and the hash of the snapshot to analyse at least a portion of the non-volatile storage of the device.

User and device onboarding

Various embodiments are directed to a system and method for establishing a secure communication pathway between a network-connected device and a computing platform. Such configurations encompass encrypting a device-specific installation package passed to the device using a device-generated cryptography key, verifying the identity of the computing platform at the device, encrypting a response message via a platform-generated cryptography key, transmitting the response message to the computing platform, verifying characteristics of the device via the response message, and establishing a secure communication platform upon verification of the device.

SYSTEMS AND METHODS FOR PROCESSING OF MESSAGES SUBJECT TO DEAD LETTER QUEUES IN REPRESENTATIONAL STATE TRANSFER ARCHITECTURES TO PREVENT DATA LOSS IN CLOUD-BASED COMPUTING ENVIRONMENTS
20230054871 · 2023-02-23 ·

Systems and methods are provided for processing of messages subject to dead letter queues in representational state transfer (“REST”) architectures to prevent data loss in cloud-based environments. For example, as opposed to conventional RESTful application programming interface (“API”) approaches to handling message failures, the systems and methods provide a new system component to handle these failures. Specifically, instead of relying on a conventional dead letter queue (e.g., requiring a system to read the queue via lambda functions), the systems and methods create a representative system file based on any REST call in which a failure is detected.

Managing containers across multiple operating systems

Aspects of the disclosure provide for mechanisms for managing containers across operating systems in a computer system. A method of the disclosure includes: running a first container corresponding to a first operating system, wherein the first container is created in view of a container image; receiving a user request to switch from the first operating system to a second operating system; in response to receiving the user request, switching, by a processing device, from the first container to a second container corresponding to the second operating system, wherein the second container is created in view of the container image, wherein switching from the first container to the second container comprises: configuring the second container in view of a plurality of configurations of the first container; and running the configured second container.

MULTI-ANCHOR BASED EXTRACTION, RECOGNITION, AND MACHINE LEARNING OF USER INTERFACE (UI)
20230051443 · 2023-02-16 · ·

Multiple anchors may be utilized for robotic process automation (RPA) of a user interface (UI). The multiple anchors may be utilized to determine relationships between elements in the captured image of the Ul for RPA. The results of the anchoring may be utilized for training or retraining of a machine learning (ML) component.

Robotic Process Automation (RPA) Comprising Automatic Document Scrolling
20220355473 · 2022-11-10 ·

In some embodiments, a robotic process automation (RPA) robot is configured to search for a target element within a first part of a document currently exposed within a user interface. When the search fails, the robot may automatically actuate a scroll control of the respective UI to cause it to bring another part of the respective document into view. The robot may then continue searching for the RPA target within the newly revealed part of the document. In some embodiments, the robot automatically determines whether the respective document is scrollable, and identifies the scroll control according to a type of target application (e.g., spreadsheet vs. web browser).

Executing commands in a virtual environment

An apparatus for executing one or more commands, for use with a virtualization environment operable to execute one or more virtualization functions, the apparatus comprising: an interface operable to determine an identifier associated with a first virtualization function; a parser operable to determine one or more commands available for execution using the first virtualization function; a store for storing each determined command with the first virtualization function identifier; a searcher, responsive to input of a first command, for matching the first command with each determined command in order to determine one or more matching commands; and an executor, responsive to selection of a first matching command, for executing the associated first virtualization function and the first matching command.

A CRAWLER OF WEB AUTOMATION SCRIPTS
20230095006 · 2023-03-30 ·

For a given input query specifying a task to be performed on a website, the correct sequence of actions (or UI script) is machine learned without having any previous knowledge about the website or the query. To learn the correct UI script, a task agent is created that performs multiple task agent runs comprising different sequences of actions of UI elements on the website (e.g., buttons, text fields, menus, and the like). The states of the webpages are monitored after each action of a UI element is performed. Tasklets are created that include the performed sequences of actions for each task agent as well as their assigned scores, and the correct UI script is chosen from the tasklets based on the scores (e.g., tasklet with the highest score).