Controlling actions in a file system environment using buckets corresponding to priority

    公开(公告)号:US12174793B1

    公开(公告)日:2024-12-24

    申请号:US18418479

    申请日:2024-01-22

    Inventor: Hwee Lin Yeo

    Abstract: A method can include receiving requests to perform actions in a file system environment. The method can include populating a first bucket with first tokens. The first bucket can be associated with actions in the file system environment. The method can include populating second buckets, which can correspond to different tenants, with corresponding second tokens based on priorities of the tenants. The second tokens may correspond to allowable actions on behalf of the tenants. Each token of the first tokens and the second tokens may be in one-to-one correspondence with a single action. The method can include prioritizing the second buckets. The method can include generating an execution list for executing the requests. The method can include executing the execution list based on the first tokens and the second tokens.

    PREDICTING MISSING ENTITY IDENTITIES IN IMAGE-TYPE DOCUMENTS

    公开(公告)号:US20240420497A1

    公开(公告)日:2024-12-19

    申请号:US18335845

    申请日:2023-06-15

    Abstract: Techniques for predicting a missing value in an image-type document are disclosed. A system predicts the identity of a supplier associated with an image-type document in which the supplier's identity may not be extracted by text recognition. When a system determines that the supplier identity cannot be identified using a text recognition application, the system generates a set of machine learning model input features from features extracted from the image-type document to predict the supplier's identity. One input feature is a data file bounds feature indicating whether the image-type document is a scanned document or a non-scanned document. The system predicts a value for the supplier's identity based on the data file bounds value and additional feature values, including color channel characteristics and spatial characteristics of regions-of-interest. The system generates a mapping of values to defined attributes based in part on the predicted value for the supplier's identity.

    HIGH-PRECISION LOCALIZATION OF A MOVING OBJECT ON A TRAJECTORY

    公开(公告)号:US20240420343A1

    公开(公告)日:2024-12-19

    申请号:US18210506

    申请日:2023-06-15

    Abstract: Techniques for generating high-precision localization of a moving object on a trajectory are provided. In one technique, a particular image that is associated with a moving object is identified. A set of candidate images is selected from a plurality of images that were used to train a neural network. For each candidate image in the set of candidate images: (1) output from the neural network is generated based on inputting the particular image and said each candidate image to the neural network; (2) a predicted position of the particular image is determined based on the output and a position that is associated with said each candidate image; and (3) the predicted position is added to a set of predicted positions. The set of predicted positions is aggregated to generate an aggregated position for the particular image.

    USER INTERFACES FOR CLOUD LIFECYCLE MANAGEMENT

    公开(公告)号:US20240414069A1

    公开(公告)日:2024-12-12

    申请号:US18809089

    申请日:2024-08-19

    Abstract: Techniques are disclosed for managing aspects of identifying and/or deploying hardware of a dedicated cloud to be hosted at a customer location (a “DRCC”). A DRCC may comprise cloud infrastructure components provided by a cloud provider but hosted by computing devices located at the customer's (a “cloud owner's”) location. Services of the central cloud-computing environment may be similarly executed at the DRCC. A number of user interfaces may be hosted within the central cloud-computing. These interfaces may be used to track deployment and region data of the DRCC. A deployment state may be transitioned from a first state to a second state based at least in part on the tracking and the deployment state may be presented at one or more user interfaces. Using the disclosed user interfaces, a user may manage the entire lifecycle of a DRCC and its corresponding hardware components.

    Visualizing and Filtering Graph Data

    公开(公告)号:US20240404135A1

    公开(公告)日:2024-12-05

    申请号:US18327264

    申请日:2023-06-01

    Inventor: Saju ASOKAN

    Abstract: Embodiments visualize graph data including vertices interconnected by edges. Embodiments receive a selection of a source vertex and generate a filtered layer corresponding to a filter condition relative to the source vertex. Embodiments automatically place a plurality of vertices that correspond to the filter condition on the filtered layer.

    PROGNOSTICS ACCELERATION FOR MACHINE LEARNING ANOMALY DETECTION

    公开(公告)号:US20240402689A1

    公开(公告)日:2024-12-05

    申请号:US18203771

    申请日:2023-05-31

    Abstract: Systems, methods, and other embodiments associated with quadratic acceleration boost of compute performance for ML prognostics are described. In one embodiment, a prognostic acceleration method includes separating time series signals into a plurality of alternative configurations of clusters based on correlations between the time series signals. Machine learning models are trained for individual clusters in the alternative configurations of clusters. One or more of the alternative configurations of clusters is determined to be viable for use in a production environment based on whether the trained machine learning models for the individual clusters satisfy an accuracy threshold and a completion time threshold. Then, one configuration is selected from the alternative configurations of clusters that were determined to be viable configurations. Production machine learning models are deployed into the production environment to detect anomalies in the time series signals based on the selected configuration.

    DETECTING PEAK ACTIVITY OF COMPUTING RESOURCES

    公开(公告)号:US20240394112A1

    公开(公告)日:2024-11-28

    申请号:US18321664

    申请日:2023-05-22

    Inventor: Thierry Manfé

    Abstract: Systems that analyze the performance of a computing resource based on a usage information timeline are disclosed. A system detects peak activity periods occurring in the usage information of the computer resource and scores the individual peak activity periods. Based on the respective scores, the system identifies an anchor period from the peak activity periods. Using the anchor period, the system aggregates the peak activity periods around the anchor period. The aggregating include incrementally sliding a window through the usage information around the anchor period, wherein increments represent candidate activity period. The system selects a candidate activity period including peak activities periods with the greatest workload. The system allocates capacity to the computer resource based on characteristic of the selected candidate activity period.

    Load balancing agent
    130.
    发明授权

    公开(公告)号:US12155720B2

    公开(公告)日:2024-11-26

    申请号:US17160316

    申请日:2021-01-27

    Inventor: Scott Oaks

    Abstract: A client-side load balancer replaces standard name serving functions. An operating system on client machine receives a command to start a client application. The command includes a command line argument (a switch) based on which the operating system also starts the client-side load balancer, which intercepts name service requests. The client-side load balancer controls a cache memory with a list of IP addresses of available servers that are associated with a URL for a particular service request. In response to successive name service requests for the URL, the client-side load balancer provides IP addresses from the list in a strictly repetitive order. The order may be a Round Robin order, or any permutation of a Round Robin order.

Patent Agency Ranking