Run time prediction for data queries

    公开(公告)号:US10133775B1

    公开(公告)日:2018-11-20

    申请号:US14219802

    申请日:2014-03-19

    Abstract: Techniques are described for modeling data query execution time based on a cost of data queries, where the cost provides a measure of the processing resources used by the data query while executing. Using regression analysis or other statistical methods, a model may be generated that enables the prediction of the query execution time based on the query cost. In some cases, the model may be generated based on a linear regression analysis of previously measured execution times and previously determined data query costs. The model may be stored and employed prior to, or during, the subsequent execution of a data query, to predict the execution time of the data query. Data queries that execute substantially longer than the predicted execution time may be terminated.

    Facilitation of lost item return and item inventory

    公开(公告)号:US10043152B1

    公开(公告)日:2018-08-07

    申请号:US13911800

    申请日:2013-06-06

    Abstract: Disclosed are various embodiments for facilitating the return of lost items and maintaining an inventory registry of items which are all associated with a user who participates in an item protection program. A user may update an inventory registry to include items that are associated with the user. Therefore, the user may be able to manage his or her items in one place and determine the overall value associated with the items. Additionally, a unique identifier code may be assigned to each user participating in a user protection program. The unique identifier code may be embedded on an item or item label so that it may be scanned to identify the owner of the item. Therefore, if the item were lost, the finder may scan the unique identifier code using an item protection application to initiate the return of the lost item to the owner.

    Bootstrapping user authentication
    24.
    发明授权

    公开(公告)号:US09973495B2

    公开(公告)日:2018-05-15

    申请号:US15423980

    申请日:2017-02-03

    CPC classification number: H04L63/083 H04L63/0815 H04L63/102

    Abstract: Disclosed are various embodiments relating to bootstrapping user authentication. A first security credential is received for a user account from a user. A first application is then authenticated with another computing device using the first security credential. After authenticating the first application, a bootstrap request is then sent to the other computing device for a second security credential to authenticate a second application without using the first security credential. The bootstrap request specifies a bootstrap session identifier. The second security credential is then received from the other computing device.

    Systems and methods providing optimization data
    27.
    发明授权
    Systems and methods providing optimization data 有权
    提供优化数据的系统和方法

    公开(公告)号:US09292336B1

    公开(公告)日:2016-03-22

    申请号:US14161412

    申请日:2014-01-22

    CPC classification number: G06Q10/04

    Abstract: Service fleets made up of many pieces of computer hardware may perform computational tasks. Described herein are systems and methods for optimizing costs associated with the computer hardware. In one example, an optimization system indicates an amount of hardware needed such that the service fleet operates at an optimal cost. The amount of hardware may be determined based on hardware cost metric data generated for a service fleet.

    Abstract translation: 由许多计算机硬件组成的服务队伍可以执行计算任务。 这里描述了用于优化与计算机硬件相关联的成本的系统和方法。 在一个示例中,优化系统指示需要的硬件量,使得服务机构以最佳成本运行。 可以基于为服务车队生成的硬件成本度量数据来确定硬件量。

    Adapting decoy data present in a network
    28.
    发明授权
    Adapting decoy data present in a network 有权
    适应网络中存在的诱饵数据

    公开(公告)号:US09152808B1

    公开(公告)日:2015-10-06

    申请号:US13849772

    申请日:2013-03-25

    Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.

    Abstract translation: 公开了用于获得策略数据的各种实施例,该策略数据指定在对数据存储的访问的响应中有资格插入的诱饵数据。 至少基于策略数据,在多个非诱饵数据之间的响应中检测诱饵数据。 响应于满足可配置阈值的数据存储的访问,启动与诱饵数据相关联的动作。

    Page prefetching
    30.
    发明授权

    公开(公告)号:US10560344B1

    公开(公告)日:2020-02-11

    申请号:US15688748

    申请日:2017-08-28

    Abstract: A method for optimizing resource prefetch criteria may include identifying a prefetch criteria for a selectable item, the first prefetch criteria being associated with the selectable item. The first prefetch criteria may be modified to a second prefetch criteria different from the first prefetch criteria, where the modification includes a change of shape of a prefetch area from a first shape to a second shape different from the first shape. The first prefetch criteria may be replaced with the second prefetch criteria.

Patent Agency Ranking