-
公开(公告)号:US20230306382A1
公开(公告)日:2023-09-28
申请号:US18328423
申请日:2023-06-02
Applicant: Palantir Technologies Inc.
Inventor: Dayang Shi , Kirat Singh , Marie Kindblom , Michael Weisz
IPC: G06Q10/20 , G06F3/0482 , G06Q10/0631 , G06F18/25
CPC classification number: G06Q10/20 , G06F3/0482 , G06Q10/06312 , G06Q10/06315 , G06F18/256
Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
-
公开(公告)号:US12189933B2
公开(公告)日:2025-01-07
申请号:US17961908
申请日:2022-10-07
Applicant: Palantir Technologies Inc.
Inventor: Robert Speare , Dayang Shi , Spencer Lake
IPC: G06F3/04847 , G06F3/0482 , G06F9/451 , G06F16/26 , G06N20/00
Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
-
公开(公告)号:US20240146758A1
公开(公告)日:2024-05-02
申请号:US18393394
申请日:2023-12-21
Applicant: Palantir Technologies Inc.
Inventor: Elliot Colquhoun , Abhishek Agarwal , Andrew Eggleton , Brandon Helms , Carl Ambroselli , Cem Zorlular , Daniel Kelly , Gautam Punukollu , Jeffrey Tsui , Morten Kromann , Nikhil Seetharaman , Raj Krishnan , Samuel Jones , Tareq Alkhatib , Dayang Shi
CPC classification number: H04L63/1433 , G06F8/65 , H04L63/1441 , H04L67/75
Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
-
公开(公告)号:US12147950B2
公开(公告)日:2024-11-19
申请号:US18328423
申请日:2023-06-02
Applicant: Palantir Technologies Inc.
Inventor: Dayang Shi , Kirat Singh , Marie Kindblom , Michael Weisz
IPC: G06Q10/20 , G06F3/0482 , G06F18/25 , G06Q10/0631
Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
-
公开(公告)号:US11494068B2
公开(公告)日:2022-11-08
申请号:US17104553
申请日:2020-11-25
Applicant: Palantir Technologies Inc.
Inventor: Robert Speare , Dayang Shi , Spencer Lake
IPC: G06F3/04847 , G06F3/0482 , G06F9/451 , G06F16/26 , G06N20/00
Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
-
公开(公告)号:US20210004742A1
公开(公告)日:2021-01-07
申请号:US16689724
申请日:2019-11-20
Applicant: Palantir Technologies Inc.
Inventor: Dayang Shi , Kirat Singh , Marie Kindblom , Michael Weisz
IPC: G06Q10/06 , G06K9/62 , G06F3/0482
Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
-
公开(公告)号:US20250037093A1
公开(公告)日:2025-01-30
申请号:US18917239
申请日:2024-10-16
Applicant: Palantir Technologies Inc.
Inventor: Dayang Shi , Kirat Singh , Marie Kindblom , Michael Weisz
IPC: G06Q10/20 , G06F3/0482 , G06F18/25 , G06Q10/0631
Abstract: A computing system generates user interface data renderable to display an interactive graphical user interface including a cell-based grid having a first axis and a second axis. The first axis corresponds to one or more assets. The second axis corresponds to one or more time periods. The cell-based grid comprises a plurality of cells indicating values of the one or more assets for the one or more time periods. The interactive graphical user interface displays information relating to the value indicated in the selected cell responsive to a user selection.
-
公开(公告)号:US20220321595A1
公开(公告)日:2022-10-06
申请号:US17845514
申请日:2022-06-21
Applicant: Palantir Technologies Inc.
Inventor: Elliot Colquhoun , Abhishek Agarwal , Andrew Eggleton , Brandon Helms , Carl Ambroselli , Cem Zorlular , Daniel Kelly , Gautam Punukollu , Jeffrey Tsui , Morten Kromann , Nikhil Seetharaman , Raj Krishnan , Samuel Jones , Tareq Alkhatib , Dayang Shi
Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
-
公开(公告)号:US11418529B2
公开(公告)日:2022-08-16
申请号:US16293690
申请日:2019-03-06
Applicant: Palantir Technologies Inc.
Inventor: Elliot Colquhoun , Abhishek Agarwal , Andrew Eggleton , Brandon Helms , Carl Ambroselli , Cem Zorlular , Daniel Kelly , Gautam Punukollu , Jeffrey Tsui , Morten Kromann , Nikhil Seetharaman , Raj Krishnan , Samuel Jones , Tareq Alkhatib , Dayang Shi
Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
-
公开(公告)号:US11882145B2
公开(公告)日:2024-01-23
申请号:US17845514
申请日:2022-06-21
Applicant: Palantir Technologies Inc.
Inventor: Elliot Colquhoun , Abhishek Agarwal , Andrew Eggleton , Brandon Helms , Carl Ambroselli , Cem Zorlular , Daniel Kelly , Gautam Punukollu , Jeffrey Tsui , Morten Kromann , Nikhil Seetharaman , Raj Krishnan , Samuel Jones , Tareq Alkhatib , Dayang Shi
CPC classification number: H04L63/1433 , G06F8/65 , H04L63/1441 , H04L67/75
Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
-
-
-
-
-
-
-
-
-