-
公开(公告)号:US11500553B2
公开(公告)日:2022-11-15
申请号:US17160607
申请日:2021-01-28
Applicant: salesforce.com, inc.
Inventor: Luc Marcel Giavelli , Joshua James Luft-Glidden , Radhika Nair , Fabrice Talbot , Srinivasa Gopaladasu , Venkata Kolla , Lucas Pfister , Chintan Tank , Chaitanya Bhatt
IPC: G06F3/06
Abstract: A processor can determine that a set of the memory cells is controlled by signals from a first portal. The processor can determine a function of a second portal in a relationship between the first portal and the second portal. The processor can cause, in response to a determination that the function of the second portal is a specific function, a memory control circuitry to be configured so that a subset, of the set, is controlled also by signals from the second portal. The processor can determine a function of a third portal in a relationship between the first portal and the third portal. The processor can cause, in response to a determination that the function of the third portal is the specific function, the memory control circuitry to be configured so that the subset, of the set, is controlled also by signals from the third portal.
-
公开(公告)号:US20220361097A1
公开(公告)日:2022-11-10
申请号:US17308716
申请日:2021-05-05
Applicant: salesforce.com, inc.
Inventor: Abhijit Sur , Rasmus Mencke
Abstract: Techniques are disclosed relating to temporary networks of edge computing devices. In some embodiments, an edge computing device manages, in response to occurrence of an event, a temporary network of edge computing devices. Managing the temporary network includes: forming the temporary network, managing membership of edge computing devices in the temporary network, causing the temporary network to perform a specified set of tasks, transmitting, to a remote server computing system, information associated with the specified set of tasks, and causing disbanding of the temporary network after determining that the specified set of tasks is complete. The disclosed techniques for managing temporary networks of edge computing devices may advantageously reduce the overall use of a network's bandwidth by reducing the amount of communication with a remote server system.
-
193.
公开(公告)号:US20220360492A1
公开(公告)日:2022-11-10
申请号:US17687428
申请日:2022-03-04
Applicant: salesforce.com, inc.
Inventor: Sriram Srinivasan , Joshua Paul Meier , Varun Gupta , Mayakrishnan Chakkarapani , Neil Natarajan
IPC: H04L41/0803 , G06F16/9035 , H04L67/10
Abstract: Computing systems, for example, multi-tenant systems create data centers in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives a cloud platform independent declarative specification describing a new datacenter to be created and a customization specification for customizing the data center. The system compiles the declarative specification along with the customization specification to generate a metadata representation of the data center. The metadata representation is used to generate a data center on a target cloud platform. Different customization specifications can be provided to generate different customized datacenters based on the same declarative specification. For example, the different customized data centers may implement different policies, for example, network policies, security policies, and so on.
-
公开(公告)号:US20220350796A1
公开(公告)日:2022-11-03
申请号:US17306560
申请日:2021-05-03
Applicant: salesforce.com, inc.
Inventor: Prabhjot Singh , Kalyan Chakravarthy Thatikonda , Niyati Omprakash Verma , Sathyavelrajan Avudaiappan
IPC: G06F16/242 , G06F16/23 , G06F9/46 , G06F16/2455
Abstract: Optimizing transaction times for distributed databases is described. A system receives a request which specifies an identifier of a database record associated with a distributed database. If the request is associated with a primary database of the distributed database, any user-defined function is associated with the database record in the primary database, and any associated user-defined function does not require any call that is external to a subnet and/or a firewall associated with the primary database, then the system executes, within the subnet and/or the firewall associated with the primary database, each associated user-defined function for the database record in the primary database. The system outputs a result which is based on executing any associated user-defined functions.
-
公开(公告)号:US20220350587A1
公开(公告)日:2022-11-03
申请号:US17302307
申请日:2021-04-29
Applicant: salesforce.com, inc.
Inventor: Vaishnavi Vithal Galgali , Arpeet Kale
Abstract: Systems and methods for deploying services may include accessing configuration data associated with a service to be deployed, the configuration data generated independently of the service and configured to include environment-related data and infrastructure-related data, the environment-related data identifying at least versioning information associated with the service, and the infrastructure-related data identifying at least artifact repository information associated with the service; accessing data related to a packaged service from an artifact repository based on the artifact repository information, the packaged service generated by a package manager based on the service; updating the packaged service using the environment-related data to generate an updated packaged service; and causing the updated packaged service to be deployed to a deployment destination.
-
公开(公告)号:US11489828B2
公开(公告)日:2022-11-01
申请号:US17112525
申请日:2020-12-04
Applicant: salesforce.com, inc.
Inventor: Prasad Peddada , Taher Elgamal
Abstract: A service may leverage a mutual transport layer security (mTLS) service to authenticate a client that is configured with a client certificate chain. The client may request access to the service, and the service may transmit a redirection response to the client. The redirection response may indicate an endpoint for the mTLS service that is associated with the tenant. In response to receiving the redirection response, the client may perform a digital handshake with the mTLS service, and the mTLS service may validate the client digital certificate and digitally sign the client digital certificate. The mTLS may transmit a redirection response, which redirects the client to the service where the client presents an indication of the digitally signed digital certificate chain. The service may validate the chain of trust associated with the digitally signed digital certificate chain and issue an indication that the client is authenticated to access the service.
-
公开(公告)号:US11487939B2
公开(公告)日:2022-11-01
申请号:US16549985
申请日:2019-08-23
Applicant: salesforce.com, inc.
Inventor: Tong Niu , Caiming Xiong , Richard Socher
IPC: G06F40/284 , G06N3/08 , H03M7/42 , H03M7/30 , G06F40/40
Abstract: Embodiments described herein provide a provide a fully unsupervised model for text compression. Specifically, the unsupervised model is configured to identify an optimal deletion path for each input sequence of texts (e.g., a sentence) and words from the input sequence are gradually deleted along the deletion path. To identify the optimal deletion path, the unsupervised model may adopt a pretrained bidirectional language model (BERT) to score each candidate deletion based on the average perplexity of the resulting sentence and performs a simple greedy look-ahead tree search to select the best deletion for each step.
-
公开(公告)号:US11487885B2
公开(公告)日:2022-11-01
申请号:US15884885
申请日:2018-01-31
Applicant: salesforce.com, inc.
Inventor: Alexandre Hersans
Abstract: Methods, systems, and devices for enabling and validating data encryption are described. A data storage system (e.g., including a database and validation server) may receive an encryption request indicating a data object or data field. Prior to performing encryption, the validation server may perform one or more validations to determine whether the system supports encrypting the indicated data. The validation server may identify any formula fields that directly or indirectly (e.g., via other formula fields) reference the data object or field, and may determine whether each of these formula fields is encryption compatible. In some cases, the validation process may involve synchronously executing a first set of validators, marking the data as pending encryption, and asynchronously executing a second set of validators. Based on the results of the validation process, the system may or may not encrypt the indicated data, and may transmit an indication of the validation results.
-
公开(公告)号:US11487718B2
公开(公告)日:2022-11-01
申请号:US16947360
申请日:2020-07-29
Applicant: salesforce.com, inc.
Inventor: William Gradin , Matthew Davidchuk , Qiu Ma , Leonid Zemskov , Amy Palke
IPC: G06F16/21 , G06F16/90 , G06F16/28 , G06F16/903 , G06F16/23
Abstract: Disclosed are systems, apparatus, methods, and computer readable media for suppressing network feed activities using an information feed in an on-demand database service environment. In one embodiment, a message is received, including data indicative of a user action. An entity associated with the user action is identified, where the entity is a type of record stored in a database. A type of the entity is identified. It is determined whether the entity type is a prohibited entity type. When the entity type is not a prohibited entity type, the message data is saved to one or more tables in the database. The tables are configured to store feed items of an information feed capable of being displayed on a device. When the entity type is a prohibited entity type, the saving of the message data, to the one or more tables in the database configured to store the feed items, is prohibited.
-
公开(公告)号:US11487546B2
公开(公告)日:2022-11-01
申请号:US17148363
申请日:2021-01-13
Applicant: salesforce.com, inc.
Inventor: Jeaneth Vergara , Arifullah Khan Pattan
Abstract: Computing systems, for example, multi-tenant systems deploy software artifacts in data centers created in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives an artifact version map that identifies versions of software artifacts for datacenter entities. The system generates a master pipeline for deploying services on a target cloud platform. The master pipeline includes a change management stage comprising instructions for interacting with a change management system. The execution of the change management stage of a pipeline provides a status of deployment of one or more services to the change management system. The details recorded can be used for auditing, for example, to determine why certain change in the configuration of services of the datacenter was made.
-
-
-
-
-
-
-
-
-