Controlling access to memory cells
    191.
    发明授权

    公开(公告)号:US11500553B2

    公开(公告)日:2022-11-15

    申请号:US17160607

    申请日:2021-01-28

    Abstract: A processor can determine that a set of the memory cells is controlled by signals from a first portal. The processor can determine a function of a second portal in a relationship between the first portal and the second portal. The processor can cause, in response to a determination that the function of the second portal is a specific function, a memory control circuitry to be configured so that a subset, of the set, is controlled also by signals from the second portal. The processor can determine a function of a third portal in a relationship between the first portal and the third portal. The processor can cause, in response to a determination that the function of the third portal is the specific function, the memory control circuitry to be configured so that the subset, of the set, is controlled also by signals from the third portal.

    Temporary Network of Edge Computing Devices

    公开(公告)号:US20220361097A1

    公开(公告)日:2022-11-10

    申请号:US17308716

    申请日:2021-05-05

    Abstract: Techniques are disclosed relating to temporary networks of edge computing devices. In some embodiments, an edge computing device manages, in response to occurrence of an event, a temporary network of edge computing devices. Managing the temporary network includes: forming the temporary network, managing membership of edge computing devices in the temporary network, causing the temporary network to perform a specified set of tasks, transmitting, to a remote server computing system, information associated with the specified set of tasks, and causing disbanding of the temporary network after determining that the specified set of tasks is complete. The disclosed techniques for managing temporary networks of edge computing devices may advantageously reduce the overall use of a network's bandwidth by reducing the amount of communication with a remote server system.

    DECLARATIVE SPECIFICATION BASED OVERRIDE MECHANISM FOR CUSTOMIZING DATA CENTERS DEPLOYED ON CLOUD PLATFORMS

    公开(公告)号:US20220360492A1

    公开(公告)日:2022-11-10

    申请号:US17687428

    申请日:2022-03-04

    Abstract: Computing systems, for example, multi-tenant systems create data centers in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives a cloud platform independent declarative specification describing a new datacenter to be created and a customization specification for customizing the data center. The system compiles the declarative specification along with the customization specification to generate a metadata representation of the data center. The metadata representation is used to generate a data center on a target cloud platform. Different customization specifications can be provided to generate different customized datacenters based on the same declarative specification. For example, the different customized data centers may implement different policies, for example, network policies, security policies, and so on.

    OPTIMIZING TRANSACTION TIMES IN DISTRIBUTED DATABASES

    公开(公告)号:US20220350796A1

    公开(公告)日:2022-11-03

    申请号:US17306560

    申请日:2021-05-03

    Abstract: Optimizing transaction times for distributed databases is described. A system receives a request which specifies an identifier of a database record associated with a distributed database. If the request is associated with a primary database of the distributed database, any user-defined function is associated with the database record in the primary database, and any associated user-defined function does not require any call that is external to a subnet and/or a firewall associated with the primary database, then the system executes, within the subnet and/or the firewall associated with the primary database, each associated user-defined function for the database record in the primary database. The system outputs a result which is based on executing any associated user-defined functions.

    METHODS AND SYSTEMS FOR DEPLOYMENT OF SERVICES

    公开(公告)号:US20220350587A1

    公开(公告)日:2022-11-03

    申请号:US17302307

    申请日:2021-04-29

    Abstract: Systems and methods for deploying services may include accessing configuration data associated with a service to be deployed, the configuration data generated independently of the service and configured to include environment-related data and infrastructure-related data, the environment-related data identifying at least versioning information associated with the service, and the infrastructure-related data identifying at least artifact repository information associated with the service; accessing data related to a packaged service from an artifact repository based on the artifact repository information, the packaged service generated by a package manager based on the service; updating the packaged service using the environment-related data to generate an updated packaged service; and causing the updated packaged service to be deployed to a deployment destination.

    Tenant aware mutual TLS authentication

    公开(公告)号:US11489828B2

    公开(公告)日:2022-11-01

    申请号:US17112525

    申请日:2020-12-04

    Abstract: A service may leverage a mutual transport layer security (mTLS) service to authenticate a client that is configured with a client certificate chain. The client may request access to the service, and the service may transmit a redirection response to the client. The redirection response may indicate an endpoint for the mTLS service that is associated with the tenant. In response to receiving the redirection response, the client may perform a digital handshake with the mTLS service, and the mTLS service may validate the client digital certificate and digitally sign the client digital certificate. The mTLS may transmit a redirection response, which redirects the client to the service where the client presents an indication of the digitally signed digital certificate chain. The service may validate the chain of trust associated with the digitally signed digital certificate chain and issue an indication that the client is authenticated to access the service.

    Systems and methods for unsupervised autoregressive text compression

    公开(公告)号:US11487939B2

    公开(公告)日:2022-11-01

    申请号:US16549985

    申请日:2019-08-23

    Abstract: Embodiments described herein provide a provide a fully unsupervised model for text compression. Specifically, the unsupervised model is configured to identify an optimal deletion path for each input sequence of texts (e.g., a sentence) and words from the input sequence are gradually deleted along the deletion path. To identify the optimal deletion path, the unsupervised model may adopt a pretrained bidirectional language model (BERT) to score each candidate deletion based on the average perplexity of the resulting sentence and performs a simple greedy look-ahead tree search to select the best deletion for each step.

    Enabling and validating data encryption

    公开(公告)号:US11487885B2

    公开(公告)日:2022-11-01

    申请号:US15884885

    申请日:2018-01-31

    Abstract: Methods, systems, and devices for enabling and validating data encryption are described. A data storage system (e.g., including a database and validation server) may receive an encryption request indicating a data object or data field. Prior to performing encryption, the validation server may perform one or more validations to determine whether the system supports encrypting the indicated data. The validation server may identify any formula fields that directly or indirectly (e.g., via other formula fields) reference the data object or field, and may determine whether each of these formula fields is encryption compatible. In some cases, the validation process may involve synchronously executing a first set of validators, marking the data as pending encryption, and asynchronously executing a second set of validators. Based on the results of the validation process, the system may or may not encrypt the indicated data, and may transmit an indication of the validation results.

    Change management of services deployed on datacenters configured in cloud platforms

    公开(公告)号:US11487546B2

    公开(公告)日:2022-11-01

    申请号:US17148363

    申请日:2021-01-13

    Abstract: Computing systems, for example, multi-tenant systems deploy software artifacts in data centers created in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives an artifact version map that identifies versions of software artifacts for datacenter entities. The system generates a master pipeline for deploying services on a target cloud platform. The master pipeline includes a change management stage comprising instructions for interacting with a change management system. The execution of the change management stage of a pipeline provides a status of deployment of one or more services to the change management system. The details recorded can be used for auditing, for example, to determine why certain change in the configuration of services of the datacenter was made.

Patent Agency Ranking