G06F9/44526

Provisioning engine hosting solution for a cloud orchestration environment

Systems and methods provide for execution of different provisioning engines within a resource provider environment. A user may submit a request to provision one or more resources using a particular provisioning engine, which may include a provisioning engine that is non-native to the resource provider environment. A control plane may evaluate and transmit requests to the provisioning engine executing within the resource provider environment. Operations associated with the provisioning engine may be executed and stored within a data store, which may be processed upon completion and made accessible.

Method and control unit for configuring an addon interface
11579900 · 2023-02-14 · ·

A method and control unit for configuring an add-on interface of a vehicle are presented. The vehicle comprises at least one vehicle internal system, at least one add-on system, the add-on system being arranged in the vehicle after the vehicle is produced by a manufacturer, and at least one internal communication unit arranged for communication with at least one vehicle external communication unit. The method comprises: receiving, using the at least one internal communication unit, configuration information related to at least one sensor of the vehicle from the at least one vehicle external communication unit; and configuring, based on the configuration information, how at least one sensor signal S.sub.sensor from the at least one sensor is to be processed by an add-on interface, the add-on interface being arranged in the vehicle as an interface between the at least one vehicle internal system and the at least one add-on system.

Cryptographic data encoding method with enhanced data security

Data security and privacy are improved by a client providing a hashed version of collected data to a remote analysis service, and having the analysis service determine the relevancy of the data from the hashes before requesting the plaintext of the data. In one example, a browser plug-in obtains data which is divided into overlapping three-character sequences, and the sequences are hashed to produce a sequence of hashes. The sequence of hashes is sent by the plug-in to the remote service, which uses the hashes to determine if the associated data is relevant to the analysis performed by the remote service, without requiring access to the associated plaintext. After making the determination, the remote service may request that relevant data be provided to the service in plaintext form, while data that is not relevant need not be sent to the remote service.

Extension framework for data analytics
11582262 · 2023-02-14 · ·

Extending access to a data model in a data analytics computer data processing system includes loading into a programmatically isolated process address space of a computer, an instance of an extension framework computer program and executing in the framework, computer program logic configured to establish a communicative channel between the isolated process address space and a data analytics computer data processing system executing in a separate process address space. Thereafter, within the framework a directive may be received to access a data model managed in the data analytics computer data processing system. In response, a function may be selected in respect to an API to the data analytics computer data processing system corresponding to the received directive. Finally, the selected API function may be invoked over the communicative channel and a result derived from the data model may be received in the framework from over the communicative channel in response to the selected API function.

CUSTOMIZABLE REDAPTOR EXTENSIONS FOR SINGLE-PAGE WEB APPLICATIONS

A method, computer system, and computer program product are provided for modifying a web application at runtime. A single-page web application is loaded by a web browser of a client, wherein the single-page web application exchanges data between the client and a server. An extension for the single-page web application is obtained. The extension is applied to the single-page web application, wherein applying the extension adds a new feature, or modifies an existing feature, of the single-page web application without reloading the single-page web application.

Modifying elements in a computer-aided design application using enhanced selection filtering
11556679 · 2023-01-17 · ·

Examples can include a system for creating filters within a computer-aided design (“CAD”) application and performing actions on elements that satisfy the filter criteria. A plugin can generate an element modification window that is displayed on a graphical user interface (“GUI”). The plugin can receive criteria for a first filter based on a tab that allows the user to select a parameter, operator, and operand. The user can categorize and edit the filters and select an action to perform on elements that fit the filter criteria. Such actions can include copying a parameter, modifying a parameter, executing a macro, and changing an element's associated work set. The plugin automatically perform the action on new and modified elements based on a user selection.

APPLICATION RECORDING
20180013814 · 2018-01-11 ·

In one example of the disclosure, a graphic user interface is sent to a client system for display via a web browser. The graphic user interface is to enable receipt of a user instruction to commence recording of user actions made via the web browser upon a subject web application. Responsive to receipt of the user instruction, a key is caused to be sent via the web browser to a host system hosting the subject web application. The key and recording data indicative of user actions performed upon the subject web application via the web browser are received from the host system via the web browser. The key and the recording data are included within a web page or web pages of the subject web application. The key is utilized to access the recording data. The recording data is sent to the client system for display via the web browser.

CLOUD COMPUTING RESOURCE ORCHESTRATION
20180013637 · 2018-01-11 ·

Provided are example methods and apparatus for orchestrating cloud computing resources which enable customizing cloud management software to add, via user-provided code, features and functionality which go beyond base features built into the cloud management software, without otherwise modifying the cloud computing management software. The user-provided code can include a plug-in, a script, a webhook, a callout, the like, or a combination thereof.

METHODS, SYSTEMS, AND DEVICES FOR DYNAMICALLY MODELING AND GROUPING ENDPOINTS FOR EDGE NETWORKING
20230007031 · 2023-01-05 ·

Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.

Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking

Various embodiments described herein disclose an endpoint modeling and grouping management system that can collect data from endpoint computer devices in a network. In some embodiments, agents installed on the endpoints can collect real-time information at the kernel level providing the system with deep visibility. In some embodiments, the endpoint modeling and grouping management system can identify similarities in behavior in response to assessing the data collected by the agents. In some embodiments, the endpoint modeling and grouping management system can dynamically model groups such as logical groups, and cluster endpoints based on the similarities and/or differences in behavior of the endpoints. In some embodiments, the endpoint modeling and grouping management system transmits the behavioral models to the agents to allow the agents to identify anomalies and/or security threats autonomously.