G06F11/302

Systems and Methods for Dynamic Data Propagation Across Platforms

One method includes providing a plurality of events defined for a mobile application; providing a plurality of configuration options for the events, wherein the plurality of configuration options may include parameters; receiving an update to a first configuration option of the plurality of configuration options for a first event of the plurality of events in the list and a first parameter associated with the update; storing the updated first configuration option; transmitting to a first client device of a plurality of client devices running the mobile application, the updated first configuration option, wherein the updated first configuration option may cause the mobile application to monitor data of the mobile application for the occurrence of the first parameter; receiving from the first client device responsive to the first client device detecting the occurrence of the configuration option.

INTELLIGENT CLOUD SERVICE HEALTH COMMUNICATION TO CUSTOMERS

Example aspects include techniques for accurate and expeditious cloud service health communication to customers. These techniques may include determining that a service health incident has customer impact, the service health incident corresponding to an outage of one or more services of a cloud computing platform, identifying a plurality of customers impacted by the service health incident, and predicting, based on the service health incident and one or more other service health incidents, aggregated incident information identifying a plurality of service health incidents associated with the outage of the one or more services. In addition, the techniques may include identifying the one or more services associated with the service health incident, and transmitting, based at least in part on the aggregated incident information and the one or more services, a health notification to the plurality of customers.

METHOD AND SYSTEM FOR FUZZING WINDOWS KERNEL BY UTILIZING TYPE INFORMATION OBTAINED THROUGH BINARY STATIC ANALYSIS
20230051654 · 2023-02-16 ·

Disclosed is a window kernel fuzzing technique utilizing type information obtained through binary static analysis. The method of fuzzing a kernel of a computer operating system performed by a fuzzing system may include the steps of: automatically inferring type information of a system call using a library file provided by the computer operating system; and performing system call fuzzing on the basis of the type information of the system call obtained through the inference.

Security tool for n-tier platforms

An apparatus includes a memory and a hardware processor. The memory stores a plurality of logging rules. Each logging rule assigned to a tier of a multi-tier platform. The processor receives source code for an application configured to execute on a plurality of tiers of the multi-tier platform and detects, within the source code, an entry point and an exit point for a tier of the plurality of tiers. The processor determines, based on the plurality of logging rules, a first attribute that is to be logged during execution in the tier and a second attribute that is not to be logged during execution in the tier and inserts, between the entry point and the exit point in the source code, logging code that, when executed, logs the first attribute and hides the second attribute.

Software development kit engagement monitor
11579847 · 2023-02-14 · ·

An example developer tools system provided by a messaging system includes a software development kit (SKD) engagement monitor that permits capturing app open events in third party resources (e.g., third party apps) that use the developer tools system. The SKD engagement monitor is configured to operate in a manner that preserves privacy of the third party developers and avoids conveying to the messaging system backend environment personally identifiable information (PII) about the third party resource usage.

Systems and methods for margin based diagnostic tools for priority preemptive schedulers

In one embodiment, a method for margin determination for a computing system with a real time operating system and priority preemptive scheduling comprises: scheduling a set of tasks to be executed in one or more partitions, wherein each is assigned a priority, wherein the tasks comprise periodic and/or aperiodic tasks; executing the set of tasks on the computing system within the scheduled periodic time window; introducing an overhead task executed for an execution duration controlled either by the real time operating system or by the overhead task; controlling the overhead task to converge on a point of failure at which a length of the execution duration of the overhead task causes either: 1) a periodic task to fail to execute within a deadline, or 2) time available for the aperiodic tasks to execute to fall below a threshold; and defining a partition margin corresponding to the point of failure.

Resource determination based on resource definition data

In one example, a computer implemented method may include retrieving resource definition data corresponding to an endpoint. The resource definition data includes resource type information. Further, an API response may be obtained from the endpoint by querying the endpoint using an API call. Furthermore, the API response may be parsed and a resource model corresponding to the resource definition data may be populated using the parsed API response. The resource model may include resource information and associated metric information correspond to a resource type in the resource type information. Further, a resource and/or metric data associated with the resource may be determined using the populated resource model. The resource may be associated with an application being executed in the endpoint.

Implementing linear algebra functions via decentralized execution of query operator flows

A method for execution by a query processing system includes determining a query request that indicates a plurality of operators, where the plurality of operators includes at least one relational algebra operator and further includes at least one non-relational operator. A query operator execution flow is generated from the query request that indicates a serialized ordering of the plurality of operators. A query resultant of the query is generated by facilitating execution of the query via a set of nodes of a database system that each perform a plurality of operator executions in accordance with the query operator execution flow, where a subset of the set of nodes each execute at least one operator execution corresponding to the at least one non-relational operator in accordance with the execution of the query.

Model driven state machine transitions to configure an installation of a software program
11579860 · 2023-02-14 · ·

Disclosed are embodiments of a installed software program that receive a model from a product management system. The model is trained to select one of a plurality of predefined states based on operational parameter values of the installation of the software program. Each of the plurality of predefined states define configuration values of the installation of the software program. The defined configuration values indicate, in some embodiments, updates to operational parameter values of the installation of the software program.

Anomaly detection for cloud applications
11580135 · 2023-02-14 · ·

Requests are received for handling by a cloud computing environment which are then executed by the cloud computing environment. While each request is executing, performance metrics associated with the request are monitored. A vector is subsequently generated that encapsulates information associated with the request including the text within the request and the corresponding monitored performance metrics. Each request is then assigned (after it has been executed) to either a normal request cluster or an abnormal request cluster based on which cluster has a nearest mean relative to the corresponding vector. In addition, data can be provided that characterizes requests assigned to the abnormal request cluster. Related apparatus, systems, techniques and articles are also described.