G06F9/44568

Interactive interfaces as computerized tools to present summarization data of dataset attributes for collaborative datasets

Various embodiments relate generally to data science and data analysis, and computer software and systems, to provide an interface between repositories of disparate datasets and computing machine-based entities that seek access to the datasets, and, more specifically, to a computing and data storage platform that facilitates consolidation of one or more datasets, whereby one or more interfaces, such as user interfaces, may be implemented as computerized tools for presenting summarization of dataset attributes to facilitate discovery, formation, and analysis of interrelated collaborative datasets. In some examples, a method may include presenting data representing summary characteristic data in a user interface. This may include user interface elements each specifying a value of a dataset attribute for a collaborative dataset. Also, the method may include presenting aggregated data attributes for a subset of the collaborative dataset associated with the linked atomized datasets. In one example, an interactive overlay window may be activated.

APPLICATION PROGRAMMING INTERFACE TO GENERATE A REPRESENTATION OF GRAPH CODE
20220334851 · 2022-10-20 ·

Apparatuses, systems, and techniques to cause a descriptive representation of graph code to be generated. In at least one embodiment, a descriptive representation of graph code is caused to be generated based on, for example, CUDA or other parallel computing platform code.

Systems and methods for rapidly provisioned data management services

System and methods are provided for rapid provisioning of data management services. A user creates a data management service through a user interface. The creation of the data management services is initiated by the user without any programming by the user in a scalable, rapidly provisioned environment. The data management service natively supports the CRUD model (create, read, update, and delete) for data entities, metadata, references, as well as other features, such as search capabilities and/or data lineage. Once the data management service has been provisioned, the service scales as usage of the service increases. The data management service is an abstraction layer and the organization that created the service can remain unaware of the underlying implementation details of the service.

Method and apparatus for loading multiple differing versions of a native library into a native environment

A method for loading multiple versions of the same native library in a native runtime environment. In one embodiment, the method comprises cloning a native library workspace with a first version number as a cloned native library; applying a namespace across the cloned native library; injecting a macro into source code associated with the cloned native library; adding a dependency to the cloned native library in source code associated with the native runtime environment; and registering the first version number in a project configuration of the native runtime environment.

Method and a device for processing frequency converter monitoring data and a storage medium
11650896 · 2023-05-16 · ·

Embodiments disclose a method and a device for processing frequency converter monitoring data and a storage medium. An embodiment of the method includes: acquiring a script file containing a monitoring parameter specifying field and a storage location; parsing the script file to acquire the storage location and the monitoring parameter specifying field and determining the monitoring parameter specified by the monitoring parameter specifying field; collecting the monitoring data corresponding to the monitoring parameter; and storing the monitoring data in the storage location. The embodiments provide a script file based processing solution for frequency converter monitoring data, without no special tracking or debugging software tool required. Thus, the implementation complexity is reduced and the service cost and time are saved.

EMBEDDED APPLICATIONS

Embedding applications, or parts thereof, into other applications, or parts thereof, is described. In an example, an engagement with a first application, or a part thereof, can be detected, which can trigger a second application, or a part thereof, to be initialized in response to the engagement. In at least one example, the first application, or a part thereof, can provisionally transfer to the second application, or a part thereof. Based at least in part on detecting a user interaction with the second application, or a part thereof, a portion of the user interaction can be embedded in the first application, or a part thereof, and the embedded portion of the user interaction can be presented via a user interface associated with the first application, or part thereof, via a user computing device.

METHODS, DEVICES, AND SYSTEMS FOR INTERACTIVE CLOUD GAMING

The various implementations described herein include methods, devices, and systems for interactive cloud gaming. In one aspect, an interface device with processors and memory storing an application program is used for cloud gaming. The interface device includes a communication module for receiving and/or transmitting messages and media streams between the interface device, a game controller, and a remote gaming server. The interface device further includes an output module configured to provide output of the application to an input of a display device coupled to or integrated with the interface device. The application is configured to implement a first mode in which the interface device processes and displays outputs associated with substantially all messages transmitted by the game controller, and a second mode in which the interface device processes and displays a predefined subset of messages from the game controller and displays gaming media streams from the gaming server.

Control flow integrity system and method

An improved CFI system and method is described that provides security from attacks to hijack computer software. The improved CFI system and method inserts two tags to execute label identification. The first tag is positioned before any instruction that would result in an indirect control flow transfer and requires the program to execute a check. The second tag is located before the first line of any legitimate transfer destination and when discovered by the tag check allows a program to carry out the indirect transfer. This tag orientation does not prevent transfers to targets other than the origin instruction's specific intended destination but limits transfers to destinations that begin with the proper label dedication. Although, an incorrect address may be called, that will be within the software program's assortment of legitimate indirect transfer targets. Attempts to exploit or reroute indirect transfers outside of the established control flow are eliminated.

System for downloading and executing a virtual application

A virtual process manager for use with a client application. Both the process manager and the client application are installed on a client computing device. In response to a user command to execute a virtual application at least partially implemented by a virtualized application file stored on a remote computing device, the client application sends a high priority command to the process manager to execute the virtual application. Before receiving the user command, the client application sends a low priority command to the process manager to download at least a portion of the virtualized application file. In response to the high priority command, and without additional user input, the process manager downloads any portion of the file not downloaded in response to the low priority command, and executes the virtual application on the client computing device. The client application may comprise a conventional web browser or operating system shell process.

DO-NOT-DISTURB METHOD AND TERMINAL
20220311859 · 2022-09-29 · ·

A do-not-disturb method and a terminal. The method includes: displaying, by the terminal, an interface of a first application, then, if the interface of the first application includes a media playing window, and the first application is in a media do-not-disturb mode, determining whether any first media playing in the window was triggered by a playing operation of a user. If the playing of the first media in the window was triggered by the playing operation of the user, the method includes playing the corresponding media, and if the playing of the first media in the window was not triggered by the playing operation of the user, the method includes pausing or stopping play of the corresponding media. This method can avoid automatic playing of media, to reduce resource waste, data traffic consumption, a processing load of a mobile phone, and power consumption.