Patent classifications
G06F9/4488
Systems and methods for developing digital experience applications
In one implementation, systems and methods are provided for developing a computer-implemented digital experience application having a first and a second micro-application. Each micro-application includes a front end interface configured to receive and display information. The first micro-application includes a first event manager configured to detect an application event belonging to a category, and a first state manager configured to detect an application state belonging to the category. The digital experience application further includes a driver application configured to host the first and second micro-applications, an event hub configured to receive the detected application event from the first micro-application, and a state store configured to store the detected application state received from the first micro-application. The second micro-application includes a second event manager configured to receive the detected application event from the event hub, and a second state manager configured to receive the detected application state from the state store.
SYSTEM AND METHOD FOR ADAPTING EXECUTABLE OBJECT TO A PROCESSING UNIT
Embodiments are generally directed to a system and method for adapting executable object to a processing unit. An embodiment of a method to adapt an executable object from a first processing unit to a second processing unit, comprises: adapting the executable object optimized for the first processing unit of a first architecture, to the second processing unit of a second architecture, wherein the second architecture is different from the first architecture, wherein the executable object is adapted to perform on the second processing unit based on a plurality of performance metrics collected while the executable object is performed on the first processing unit and the second processing unit.
Updating An Edge Node of a Process Control System
A method, edge node application investigator, computer program and computer program product for for updating an edge node of a process control system using an information model for the edge node, where the information model representing the edge node as an object to which one or more application objects are linked, which application objects represent applications that are provided for being run by the edge node as well as to a process control system including such an edge node application investigator. The edge node application investigator compares applications of the edge node with the application objects in the information model and changes the applications of the edge node, if there is a deviation between the applications of the edge node and the application objects of the information model, so that the applications of the edge node correspond to the application objects of the information model.
Object-Oriented Memory for Client-to-Client Communications
Systems and corresponding methods employ an object-oriented (OO) memory (OOM) to effect inter-hardware-client (IHC) communication among a plurality of hardware clients included in same. A system comprises a centralized OOM and the plurality of hardware clients communicate, directly, to the centralized OOM device via OO message transactions. The centralized OOM device effects IHC communication among the plurality of hardware clients based on the OO message transactions. Another system comprises a plurality of OO memories (OOMs) capable of inter-object-oriented-memory-device communication. A hardware client communicates, directly, to a respective OOM device via OO message transactions. The inter-object-oriented-memory-device communication effects IHC communication among the plurality of hardware clients based on the OO message transactions.
System and method for adapting executable object to a processing unit
Embodiments are generally directed to a system and method for adapting executable object to a processing unit. An embodiment of a method to adapt an executable object from a first processing unit to a second processing unit, comprises: adapting the executable object optimized for the first processing unit of a first architecture, to the second processing unit of a second architecture, wherein the second architecture is different from the first architecture, wherein the executable object is adapted to perform on the second processing unit based on a plurality of performance metrics collected while the executable object is performed on the first processing unit and the second processing unit.
Object oriented smart contracts for UTXO-based blockchains
Disclosed is method and system for turning existing object-oriented programming languages into smart contract languages without introducing new syntactic features. The invented method and system provide a protocol that enables storing a history of computations on a decentralized computer network, such as UTXO-based blockchain system, for any object-oriented computer language. The invented method and system further provide for storing and updating data on blockchains, where such blockchains may be used in cryptocurrency applications and for smart contracts.
Implementing a type restriction that restricts to a non-polymorphic layout type or a maximum value
A type restriction contextually modifies an existing type descriptor. The type restriction is imposed on a data structure to restrict the values that are assumable by the data structure. The type restriction does not cancel or otherwise override the effect of the existing type descriptor on the data structure. Rather the type restriction may declare that a value of the data structure's type is forbidden for the data structure. Additionally or alternatively, the type restriction may declare that an element count allowable for a data structure's type is forbidden for the data structure. Type restriction allows optionality (where only a singleton value for a data structure is allowed), empty sets (where no value for a data structure is allowed), and multiplicity (where only a limited element count for a data structure) to be injected into a code set independent of data type. Type restriction allows certain optimizations to be performed.
Domain events for a multi-platform data stream
This disclosure relates to methods, non-transitory computer readable media, and systems that relay domain-event objects within an enhanced multi-platform data stream to listen for and react to digital events indicated by the domain-event objects that occur across a wide variety of computing platforms. Specifically, the disclosed systems can receive domain-event objects within the multi-platform data stream. From among the domain-even objects transmitted through the multi-platform data stream, the disclosed systems can identify a domain-event object that is relevant to a digital-analytics platform by identifying domain-event objects that include properties satisfying domain-event-listener rules. Based on an entity identifier and an object event from the relevant domain-event object, the disclosed systems can perform a platform action within the digital-analytics platform (e.g., to react to a change in another platform as indicated by the domain-event object).
CROSS-PLATFORM CONTEXT-SPECIFIC AUTOMATION SCHEDULING
A frontend of a platform of a multiplatform system can be monitored for user input. Upon receiving a user input that includes particular content, a data object describing the context in which the user input was provided may be created. One or more automations may be selected from an automation database based on a similarity to the determined context. The selected automations can be automatically displayed for the user, thereby encouraging the user to leverage automations across multiple platforms without requiring the user to switch between different platforms and without requiring the user to learn or understand platform-specific automation engines.
Microcontroller and semiconductor device
A microcontroller includes a CPU and a cryptographic circuit, and when a first program uses the cryptographic circuit, the second program transmits installation information of the first program and encrypted program installation information to the cryptographic circuit. The cryptographic circuit decrypts the encrypted program installation information and compares it with the installation information of the first program. In the case of match, the use of the cryptographic circuit by the first program is permitted.