Patent classifications
G06F2209/542
MULTI-PRESENCE APPLICATION ARCHITECTURE
A principal application may be executed on a principal computing device. A surrogate application may be executed on a surrogate computing device. The surrogate application running on the surrogate computing device may be a surrogate for the principal application running on the principal computing device. The principal application running on the principal computing device and the surrogate application running on the surrogate computing device may form multiple presences of the principal application on separate computing devices. Information may be relayed between the principal application running on the principal computing device and the surrogate application running on the surrogate computing device.
System and method for controlling inter-application association through contextual policy control
A method for controlling the interoperation of a plurality of software applications and resources includes intercepting communications from a first application to a second application or resource, directing the communication to a context management system, generating a candidate list of contexts for the communication, evaluating the candidate list according to at least one policy defined for these contexts to identify the resultant action and namespace for the communication, and performing the action as defined by the policies within the identified namespace. The method further includes tracking one or more versions of the second application, as well as tracking an evolution of application and/or resource names. The method further includes identifying one or more operations associated with a context on the candidate list, and executing the identified operations prior to a further communication.
EVENT-LEVEL GRANULAR CONTROL IN AN EVENT BUS USING EVENT-LEVEL POLICIES
A message-level policy implemented with for a message routing system may be used to mediate between a variety of message sources and message targets that receive and use messages. The message-level policy may allow fine grained message-by-message policy assessment that a message routing system policy may be able to provide. The message-level policy may furthermore interact with the message routing system policy to provide mechanisms to avoid accidental leakage of protected messages or spill-over to protected regions.
ENABLING MICROAPP ACCESS BASED ON DETERMINED APPLICATION STATES AND USER-INITIATED TRIGGERING EVENTS
One disclosed method involves receiving, by a first application managed by an operating system, first data indicating that a second application managed by the operating system is in a first state; receiving, by the first application, second data indicating that a first user input has been provided to a client device; determining, by the first application and based at least in part on the first data and the second data, that the first user input occurred while the second application was in the first state; and causing, by the first application and based at least in part on the first user input having occurred while the second application was in the first state, the client device to present a first user interface for a third application, the first user interface configured to cause the third application to take a first action with respect to a fourth application in response to a second user input to the client device.
Multi-level caching to deploy local volatile memory, local persistent memory, and remote persistent memory
A technique is introduced for applying multi-level caching to deploy various types of physical memory to service captured memory calls from an application. The various types of physical memory can include local volatile memory (e.g., dynamic random-access memory), local persistent memory, and/or remote persistent memory. In an example embodiment, a user-space page fault notification mechanism is used to defer assignment of actual physical memory resources until a memory buffer is accessed by the application. After populating a selected physical memory in response to an initial user-space page fault notification, page access information can be monitored to determine which pages continues to be accessed and which pages are inactive to identify candidates for eviction.
System and method for compressing controller area network (CAN) messages
A system for compressing Controller Area Network (CAN) messages, the system comprising a processing resource configured to: obtain a CAN messages sequence including a plurality of CAN messages intercepted at a given order by at least one device adapted to monitor messages transmitted via communication channel(s) of a vehicle; group the CAN messages of the CAN messages sequence into MID groups, by a CAN MID field of the CAN messages; for each given MID group of the MID groups split the CAN messages of the MID group into field groups, wherein each field group comprises a respective field of a plurality of fields of the CAN messages of the MID group; employ at least one compression scheme on at least one of the field groups; generate a data structure comprising the field groups; and compress the data structure using a lossless compression algorithm, giving rise to a compressed data structure.
DEVICE AND METHOD USING MACHINE LEARNING MODEL SHARED BY PLURALITY OF APPLICATIONS
An electronic device may map a target application to a machine learning model matched to a request of the target application among a plurality of machine learning models, may generate an inference result for sensing data corresponding to the machine learning model based on the sensing data being sensed by the at least one sensor, and may transfer the generated inference result to at least one of the target application and another application.
DYNAMIC LOAD BALANCING IN REACTIVE SYSTEMS
A computer system hosting (micro)services that uses a service mesh to govern communication between the services. The services include consumer services and an event stream service, the latter directing an event stream from a producer service to the individual consumer services. The control plane of the service mesh has the role of creating and removing service instances. Based on a specified event capacity that is to be provided by the consumer services collectively, the control plane manages service provisioning by estimating the current event capacity of the system. This is done by measuring the event capacities of each consumer service instance and summing them, from which any shortfall or excess of the current event capacity in relation to the specified event capacity can be determined. Consumer service instances are then added in case of a shortfall or removed in case of an excess as needed to avoid over or under-provisioning.
METHOD AND DEVICE FOR EXECUTING A TIME-CRITICAL PROCESS IN NON-REAL-TIME OPERATING SYSTEM
Method and device for executing time critical processing in a non-real-time operating system. The method includes capturing a message by a packet capturing tool; analyzing whether the message is a sample value message associated with the time critical processing, and when the message is a sample value message associated with the time critical processing, writing a data unit included in the sample value message into a first buffer; preprocessing the data unit, the preprocessing includes arranging and combining bytes of the data unit so that the bytes indicate sample value is located at specific position; writing the preprocessed data unit from the first buffer into a second buffer and triggering a real-time dedicated thread at the same time, in response to the preprocessed data unit in the first buffer reaching the predetermined number; and executing the time critical processing by reading the preprocessed data unit from the second buffer.
SYSTEM AND METHOD FOR CORRELATING FILESYSTEM EVENTS INTO MEANINGFUL BEHAVIORS
One example method includes integrating user space applications with kernel space events including primitives. The events are intercepted in kernel space and processed in user space. The events can be stored in a session cache that allows a holistic view of behavior to be determined with regard to resources of the computing system. The events in the session cache can be correlated to user or process behavior by provided a time-based view of the events.