Interactive topological views of combined hardware and software systems
L Molesky, C Marshman, J Smoler, L Guros… - US Patent …, 2015 - Google Patents
A method and system for visualizing a system. The method includes obtaining a context
managed entity from a client system, wherein the context managed entity corresponds to …
managed entity from a client system, wherein the context managed entity corresponds to …
In-memory interconnect protocol configuration registers
KY Cheng, DA Roberts - US Patent 9,767,028, 2017 - Google Patents
Abstract Systems, apparatuses, and methods for moving the interconnect protocol
configuration registers into the main memory space of a node. The region of memory used …
configuration registers into the main memory space of a node. The region of memory used …
Graph-based user tracking and threat detection
HKB Singh, V Kapoor, M Bog, Y Chen - US Patent 10,419,469, 2019 - Google Patents
Log data associated with at least one user session associated with an original user is
received. A logical graph is generated using at least a portion of the received log data. One …
received. A logical graph is generated using at least a portion of the received log data. One …
Dynamic management of groups for entitlement and provisioning of computer resources
W Pugh - US Patent 8,955,151, 2015 - Google Patents
BACKGROUND Today's world demands that administering entitlements and access to
computer resources be efficient, accurate, and secure. As more and more computing is done …
computer resources be efficient, accurate, and secure. As more and more computing is done …
Operating a network using relational database methodology
BACKGROUND Network management and operation arguably continues to thwart
modernization attempts by the networking commu nity. There are a number of reasons for …
modernization attempts by the networking commu nity. There are a number of reasons for …
Extended user session tracking
M Bog, V Kapoor, SJ Pullara III, Y Chen… - US Patent …, 2019 - Google Patents
Network activity data is received, for example, from a set of agents reporting collectively
information about a set of hosts. The received network activity data is used to identify a user …
information about a set of hosts. The received network activity data is used to identify a user …
Using graph-based models to identify datacenter anomalies
V Kapoor, SJ Pullara III, M Bog, Y Chen… - US Patent …, 2020 - Google Patents
Activities within a network environment are monitored (eg, using agents). At least a portion of
the monitored activities are used to generate a logical graph model. The generated logical …
the monitored activities are used to generate a logical graph model. The generated logical …
Cloud infrastructure services
Y Mao, M Fernandez, C Liu… - US Patent 9,106,584, 2015 - Google Patents
An aspect of the disclosed technology is a general-purpose platform that may be used to
provide resilient cloud services. Tasks may be written as procedures in general-purpose pro …
provide resilient cloud services. Tasks may be written as procedures in general-purpose pro …
Using static analysis for vulnerability detection
PW O'hearn, TM Reed, Y Chen… - US Patent 12,034,754, 2024 - Google Patents
Using static analysis for vulnerability detection, including: inspecting, using an
underapproximate static code analysis, a non-executable representation of an application to …
underapproximate static code analysis, a non-executable representation of an application to …
Learning from similar cloud deployments
Ú Erlingsson, Y Chen - US Patent 11,785,104, 2023 - Google Patents
Learning from similar cloud deployments, including: identifying, for at least a portion of a first
cloud deployment, one or more additional cloud deployments to utilize for cross-customer …
cloud deployment, one or more additional cloud deployments to utilize for cross-customer …