Follow us on Twitter
twitter icon@FreshPatents


Programming patents

      

This page is updated frequently with new Programming-related patent applications.




new patent Method and system for connecting heterogeneous internet of things devices for workflow automation
A method and computer program product of an internet of things (iot) platform for workflow automation of heterogeneous iot devices. The platform is implemented as a cloud service, and the iot devices are connected to the platform via application programming interfaces.
Ananse Incorporated


new patent System and providing a credential management api
Disclosed is an approach for enabling a user to login to a site without needing to manually type in credentials. A method includes receiving, from a site, at a browser and via a browser credential management application programming interface that defines a protocol for communicating data between the site and the browser for enabling a user to login to the site, a request associated with a login credential required for the site, retrieving, based on the request, user data and transmitting, to the site, from the browser and via the browser credential management application programming interface, a response to the request.
Monticello Enterprises Llc


new patent Flow controller automatically throttling rate of service provided by web api
A mechanism is provided in a data processing system for automatically throttling the rate of service provided by a web application programming interface (api) for a software service. A flow controller executing on the data processing system assigns a queue to each consumer of the software service.
International Business Machines Corporation


new patent Assessing penalties for sdks that violate policies in mobile apps
A system, method and program product for processing software development kits (sdks). A system is provided that includes a container creation system that wraps an inputted sdk in a penalty container to create a wrapped sdk, wherein the wrapped sdk includes re-instrumented code that redirects application programming interface (api) calls between the sdk and an associated app and operating system through a wrapper in order to monitor runtime behavior; wherein the container creation system instantiates a policy module that is configurable by an sdk provider and app developer to implement a mutual policy configuration for the penalty container; and wherein the penalty container includes a penalty manager that assesses penalties to the sdk provider based on sdk violations of the mutual policy configuration..
International Business Machines Corporation


new patent Modified jvm with multi-tenant application domains and class differentiation
A method and system for operating a modified java virtual machine (jvm) which is able to simultaneously host multiple java application programs is disclosed. In a first modification the jvm is modified to permit multiple class definitions of some of the java application programming interface (api) classes, so called non-sensitive classes, to be loaded multiple times but restrict other java api classes, so called sensitive classes, to be loaded only once, preferably onto a bootstrap class loader.
Waratek Limited


new patent Transforming data manipulation code into data workflow
Aspects extend to methods, systems, and computer program products for transforming data manipulation code into data workflow. Data manipulation code for a data science process is written in a data manipulation programming language.
Microsoft Technology Licensing, Llc


new patent Containerizing a block storage service
Containerization of a block storage service. A scheduler component of a block storage service is initiated in a first container via a containerization technology.
Red Hat, Inc.


new patent Navigation api for linking software applications
Provided are systems and methods for linking two or more software applications using a navigation application programming interface. In one embodiment, a first software application on a computing device can invoke a second software application on the computing device.
Google Inc.


System, method and computer program product for sharing content via links
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via links can enable customizable features associated with the operations related to those links.
Salesforce.com, Inc.


Specializing unsupervised anomaly detection systems using genetic programming
In one embodiment, a device in a network receives sets of traffic flow features from an unsupervised machine learning-based anomaly detector. The sets of traffic flow features are associated with anomaly scores determined by the anomaly detector.
Cisco Technology, Inc.


Cross platform social networking authentication system

Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information.
Zynga Inc.

System and neutral application programming interface

Systems and methods for neutral application programming interfaces are disclosed. In one embodiment, the disclosure relates to a system for neutral application programming interfaces.
Umbra Technologies Ltd.

Programmable logic accelerator in system on chip

A programmable logic array (pla) is disclosed employing programming logic tile (plt), system on chip (soc) interface bus, input output (io) blocks and logic processing blocks (lpb). Soc processors using soc interface bus program plt successively using different configuration memory bank values to realize a logic not limited by the plt resource counts.

Method for testing a graphical interface and corresponding test system

This test method for validating a specification of a graphical interface consists of developing a scenario file corresponding to the validation test to be performed. The scenario file includes a plurality of instructions, in a natural programming language, each instruction including a function, parameters and an expected state of the graphical interface following the application of the function.
Alstom Transport Technologies

Unmanned ground and aerial vehicle attachment system

Techniques are disclosed for hot swapping one or more module devices on a single host device. A module device can perform module-specific tasks that are defined in its module software driver.

Viewpoint navigation control for three-dimensional visualization using two-dimensional layouts

Systems and methods for supplying an open interface (e.g., web pages) for viewpoint navigation control of a three-dimensional (3-d) visualization of an object that is simple to create and fast and easy to use. This viewpoint navigation control application allows users to control the viewpoint in a 3-d environment by interacting with (e.g., clicking on) a 2-d hyperlink layout within a web browser (or other 2-d viewer with hyperlink capability).
The Boeing Company

Application programming interfaces for scrolling operations

At least certain embodiments of the present disclosure include an environment with user interface software interacting with a software application. A method for operating through an application programming interface (api) in this environment includes transferring a set bounce call.
Apple Inc.

Method and system of decoupling applications from underlying communication media through shim layers

In one example aspect, a computerized system of a shim layer that provides an application-level network overlay functionality without requiring any packet-level processing includes the step of implementing a shim layer underneath an application endpoint of an application, wherein the shim layer intercepts an application programming interface (api) between the application and the network and modifies a set of parameters exchanged in the api such that a network overlay is provided to the application. The method includes the step of assigning an identifier to the application endpoint, wherein the identifier can remain persistent when the application goes down and comes back up, and wherein the identifier can remain persistent when the application changes locations in a network..

Server-to-server content distribution

A non-limiting example method includes receiving a request to publish content that is stored on a user storage server in a personal data store. The method includes preparing the content for publication and moving the prepared content to a content repository to generate published content.
Microsoft Technology Licensing, Llc.

Sharing user context and preferences

Technology for interoperability is disclosed by enabling the sharing of user context or preferences for a computing experience across computing devices, operating systems, applications, or locations. A platform and application programming interface (api) are provided for computer applications and services to store and retrieve context data associated with a computing experience.
Microsoft Technology Licensing, Llc

Systems and methods for authenticating network messages

Networks and methods for use in authenticating messages are provided. One exemplary method generally includes receiving a message from a client, where the message includes a client certificate.
Mastercard International Incorporated

Universal application programming interface for augmented reality

An application programming interface (api) server accesses first data of a non-augmented reality (ar) application. The first data including first content data, first control data, first user interface data, and a first data format.
Daqri, Llc

System and method that expands the use of polar dynamic programming to segment complex shapes

The present invention provides a system and method that uses polar dynamic programming pdp (pdp) method to generate a segmented image of a shape.. .
Arizona Board Of Regents On Behalf Of The University Of Arizona

Tool experience aggregator

Various examples are directed to systems and methods for aggregating user tool experience. A record ingestion circuit may receive action record data from a user tool that describes an action performed with the user tool by the user.

Methods and systems for invoking code in a different programming language

Programmer input in a first programming language is received, the programmer input including i) a built-in function of the first programming language, the built-in function corresponding to generating code for remotely invoking an electronic object deployed, or to be deployed, on a server via a communication network, and ii) a parameter that indicates the electronic object, wherein the code for invoking the electronic object comprises a) code in a second programming language different than the first programming language, or b) code in a markup language interpretable by a web browser. The programmer input is evaluated to: i) generate the code for remotely invoking the electronic object deployed, or to be deployed, on the server, and ii) if the electronic object is not yet deployed on the server, deploy the electronic object on the server.
Wolfram Research, Inc.

Application programming interface (api) hub

Embodiments are directed to a system for controlling access to remote services, comprising an application programming interface (api) hub configured to provide an interface between a client application and one or more remote services. The client application accesses the api hub using a common data protocol, such as odata, that is not associated with the remote services.
Microsoft Technology Licensing, Llc.

On-demand network code execution with cross-account aliases

Systems and methods are described for utilizing cross-account access to tasks on an on-demand code execution environment or other distributed code execution environment to implement an application programming interface (api) on a network-accessible service. An on-demand code execution environment can utilize pre-initialized virtual machine instances to enable execution of user-specified code in a rapid manner, without delays typically caused by initialization of the virtual machine instances.
Amazon Technologies, Inc.

Method and supporting femtocell service capabilities for services

Techniques for supporting utilization of femtocell service capabilities for services are disclosed. A network device may be configured to implement a femto services gateway.
Interdigital Patent Holdings, Inc.

Method and supporting proximity discovery procedures

A method and apparatus are described for supporting a two-stage device-to-device (d2d) discovery using a d2d interworking function (iwf). A d2d iwf component may be configured to perform mapping between an application running on an application server and a third generation partnership project (3gpp) network, and provide a set of application programming interfaces (apis) to allow discovery to be provided as a service to d2d applications.
Interdigital Patent Holdings, Inc.

Multiuser application platform

Techniques for multiuser application platform are described. Generally, a multiuser application allow interaction by multiple different users with a single executing instance of the application.
Microsoft Technology Licensing, Llc

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified fey an email service profile, which specifies how to identify the email message, the data item and how to interact with the network-accessible application programming interface..
Airwatch Llc

Device configuration-based function delivery

The present disclosure is directed to a system for device configuration-based function delivery. A server receives a data structure including device configuration information that indicates the computing device comprises an application programming interface to allow a data function to access a call function of the computing device.
Google Inc.

Combining batch and queueable technologies in a salesforce platform for large volume parallel processing

Disclosed embodiments include a method for combining a batch application programming interface (api) and a queueable api on a salesforce platform to process records. The method can include accessing a programming environment associated with an add-on application for a salesforce platform, obtaining records via the add-on application to be processed on the salesforce platform in accordance with a job type, calling a batch api to process the records by batching the records to create job records, and calling a queueable api to process the job records in queueables including parallel queueables such that at least some job records included in the parallel queueables are processed in parallel in accordance with the job type..
Financialforce.com, Inc.

Multiple ply layered composite having low areal weight

A global optimization tool may be used to predict characteristics of a multiple ply layered composite as a condition of one or more continuous variables and/or one or more binary variables. For example, the global optimization tool may predict characteristics of a composite for a large range of fiber orientation angles of each of layer of the ply.
Sabic Global Technologies B.v.

Automated api publication for internet of things platform

A computer system may include a processor configured to search storage locations for candidate application programming interface (api) files that are to be published on an internet of things (iot) platform configured to interact with iot devices for different device manufacturers. The processor may generate a list of candidate apis based on searching the storage locations; generate a list of published platform apis published on the iot platform; compare the list of candidate apis with the list of published platform apis; generate an api create list based on the comparing; generate an api update list based on the comparing; create one or more candidate apis from the generated api create list on a testing system; and update one or more candidate apis from the generated api update list on the testing system..
Verizon Patent And Licensing Inc.

Framework for automated globalization enablement on development operations

Techniques provide a framework for dynamic globalization enablement for an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features.
International Business Machines Corporation

Automated globalization enablement on development operations

Techniques are disclosed for providing dynamic globalization enablement for developing an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features.
International Business Machines Corporation

Framework for automated globalization enablement on development operations

Techniques provide a framework for dynamic globalization enablement for an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features.
International Business Machines Corporation

Application interface on multiple processors

A method and an apparatus that execute a parallel computing program in a programming language for a parallel computing architecture are described. The parallel computing program is stored in memory in a system with parallel processors.
Apple Inc.

Detecting and enforcing control-loss restrictions within an application programming interface

The disclosed herein provides a method, system, and/or computer program product for determining control of a processing resource. To determine control of the processing resource, the method, system, and/or computer program can set a control-loss flag indicating whether a process has control of the processing resource and check the control-loss flag to determine whether the process lost control of the processing resource..
International Business Machines Corporation

Managing containers and container hosts in a virtualized computer system

One example relates to a computer system that includes a plurality of host computers each executing a hypervisor. The computer system further includes a virtualization manager having an application programming interface (api) configured to manage the hypervisor on each of the plurality of host computers, the virtualization manager configured to create a virtual container host within a resource pool that spans the plurality of host computers.
Vmware, Inc.

Automated globalization enablement on development operations

Techniques are disclosed for providing dynamic globalization enablement for developing an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features.
International Business Machines Corporation

Supporting replication and recovery of virtual volumes

Techniques for supporting replication and recovery of virtual volumes are provided. In various embodiments, these techniques can include workflows and application programming interfaces (apis) that facilitate: (1) the provisioning of virtual volumes with metadata indicating that the virtual volumes should be replicated from one virtual volume-enabled storage array/site to another; (2) the discovery of a replication topology across virtual volume-enabled storage arrays/sites; (3) the orchestration of a test failover of a set of virtual volumes; and (4) the orchestration of an actual failover of a set of virtual volumes..
Vmware, Inc.

Architecture for performing actions in a third-party service by an email client

Disclosed are various approaches performing actions on data items in a third-party service with a network-accessible application programming interface from an email client. The email client can perform an action as specified by an email service profile, which specifies how to identify the email message, the data item and how to interact with the network-accessible application programming interface..
Airwatch Llc

Method and self organizing networks

A method for running a self organizing network (son) module in a communication network provides an open application programming interface (api) for a son framework and executes the son module. The son module accesses the functionality of the son framework using the api.
Nokia Solutions And Networks Oy

Programming organizational links that propagate to mobile applications

The ability for an organization's administrator to customize assets and content that, their users have access to is a substantial capability. This capability is not just to facilitate delivery of the correct content to the relevant audience, but is also important to ensure that the content is appropriate for the endpoint.
Microsoft Technology Licensing, Llc

Clustering layers in multi-node clusters

Examples include a multi-node cluster having a node with a clustering layer. The clustering layer may be located between an application programming interface (api) layer and a service layer and the multi-node cluster may be associated with a database.
Hewlett Packard Enterprise Development Lp

Preserving long running sessions during side-by-side upgrade

The present disclosure is directed to preserving running sessions during a side-by-side upgrade of system resources. Example aspects include deploying a first version and a second version of a system resource to a server within a network, the first version and the second version of the system resource both maintained within the system network and accessible via a version agnostic application programming interface.
Microsoft Technology Licensing, Llc

Sealed network external applications

Embodiments are provided for external applications in a sealed network. A sealed network does not require administrators and may run on hardware and software that has been stripped of privileged capabilities.

Programmable infrastructure gateway for enabling hybrid cloud services in a network environment

An example method for a programmable infrastructure gateway for enabling hybrid cloud services in a network environment is provided and includes receiving an instruction from a hybrid cloud application executing in a private cloud, interpreting the instruction according to a hybrid cloud application programming interface, and executing the interpreted instruction in a public cloud using a cloud adapter. The method is generally executed in the infrastructure gateway including a programmable integration framework allowing generation of various cloud adapters using a cloud adapter software development kit, the cloud adapter being generated and programmed to be compatible with a specific public cloud platform of the public cloud.
Cisco Technology, Inc.

System and solving large scale supply chain planning problems with integer constraints

A system and method is disclosed for solving supply chain planning problems. The system includes a database that stores data representing a planning problem of a supply chain network and a computer that accesses the planning problem of the supply chain network stored in the database and models the planning problem as a network of nodes and edges.
Jda Software Group, Inc.

Mobile health management database, targeted educational assistance (tea) engine, selective health care data sharing, family tree graphical user interface, and health journal social network wall feed, computer-implemented system, method and computer program product

A system, method and computer program product of capturing and displaying health information of a first person on an electronic computing device, the electronic computing device can include: one or more computer processors; and one or more memory devices, the computer-implemented method can include, e.g., a) receiving data electronically about a first person user on the first client computing device, where the first person user has one or more family member users, each having one or more computing devices, or a user with which the user may wish to share a personal health data record, the data about the first person user can include: any identification data, any inputted health related data, or any captured health related data about the first person, can include: any health related data; an application programming interface (api) accessible data; or other health records such as, e.g., electronic medical record (emr); scanned data; sensed data; or optical character recognition (ocr) captured data; b) receiving data about one or more second person users, where the at least one second person user can include: any other person user with which the first person wishes to be connected, a family member, a guardian, a friend, an individual, or care provider, the data about the second person users can include: any identification data, any inputted health related data, or any captured health related data about the second person user(s); and c) sharing at least a portion of the data electronically about the first person user, to the second person user(s). Various other embodiments can include various features such as a health journal, targeted educational content, an interactive family tree, selectable sharing, escalated alerting, notifications, and collaborative digital file cabinet..
Icmed, Llc

Deconstructing and rendering of web page into native application experience

A lack of available responsive options for existing web sites and/or pages, and the wide spectrum under which they fall presents a challenge for a satisfying mobile user experience (ux) with a hosted collaboration service. Templates used to create a site and/or page may each have capabilities and features which “cross-over” into other templates.
Microsoft Technology Licensing, Llc

Method and system for managing and linking software applications

A computer-readable storage medium encodes computer executable instructions that, when executed by at least one processor, associate plural applications. That associating method includes receiving an application programming interface associated with each of the plural applications.
Svg Media Pvt Ltd

Defining application programming interfaces (apis) using object schemas

The present disclosure relates to accessing data using dynamically generated application programming interface (api) calls. According to one embodiment, a method generally includes receiving, at a computing system, a data request from a client device.
Intuit Inc.

Database searching based on user-definable parameters

A method of evaluating data in a database, the method including causing a workstation to display a graphical user interface which a user can use to create a screening rule by defining at least one screening condition and by entering a score, whether the score is applied to evaluate data in the database if the screening condition is met, whereby no knowledge of a programming language is required to create the screening rule. Other systems and methods are also provided..
James S. Farrin, P.c.

Messaging service application programming interface

A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method that enables short message service (sms) text messaging to be integrated into existing applications is presented. Consistent with some embodiments, the method may include receiving a request from a client application to transmit a message to a recipient device.
Zeta Global Corp.

Delivery of instructions in host applications

Embodiments of the systems described herein can implement one or more processes remotely delivering customized code to a host application and/or computing device. The host application may be configured as an application programming interface with a customized code processing library that may configure the host application to receive further instructions remotely.
Tealium Inc.

Authorization server, control method, and storage medium

During execution of authority transfer, a scope group obtained by grouping a plurality of scopes is used to perform authority transfer. Performing authority transfer with a scope group enables continuing the use of an application programming interface (api) without requiring a user to re-perform authorization confirmation even in a case where a scope is added to or removed from the scope group..
Canon Kabushiki Kaisha

System and supporting a selection service in a server environment

A system and method can support socket programming in a server environment, such as a distributed data grid. The server environment can include a selection service that operates to register a plurality of sockets, wherein each said socket is associated with a handler in a plurality of handlers.
Oracle International Corporation

Internet-of-things partner integration

A network device logs transmission control protocol (tcp) flow data for connections between registered devices that are registered for use of secure internet of things (iot) application programming interfaces (apis). The logging generates logged flow data.
Verizon Patent And Licensing Inc.

Dynamic programming of advanced nanometer flash memory

An improved method and apparatus for programming advanced nanometer flash memory cells is disclosed.. .
Silicon Storage Technology, Inc.

Computer messaging bot creation

Creation data can be received from a computer-readable developer profile, with the creation data including instructions to create a messaging bot. A messaging bot definition can be generated using the instructions, and a messaging bot may be executed using the definition.
Microsoft Technology Licensing, Llc

Transporation data analytics framework supporting additional programming languages

Provided are a method and device for analyzing transportation data within a transportation analytics framework. For example, the method may include receiving transportation data having a representation compatible with the transportation analytics framework including a transportation analytics programming language.
General Electric Company

Rapid visualization rendering package for statistical programming language

Methods, non-transitory computer readable media, and devices are disclosed for rendering a visualization using a package to expand a statistical programming language. For example, a processor may load the package, which may comprise a plurality of application programming interfaces including a first application programming interface for generating a first object to contain a metadata set and a second application programming interface for generating a second object for rendering a visual output to present via a display.
At&t Intellectual Property I, L.p.

Hybrid sdn controller

One embodiment provides a network interface controller. The network interface controller includes a portion of a hybrid software-defined networking (“sdn”) controller, the portion of the hybrid sdn controller including a service abstraction layer module (“sal”) and a southbound application programming interface (“sb api”), the sal including a representation of a physical network..
Intel Corporation

Application programming interface and hypergraph transfer protocol supporting a global hypergraph approach to reducing complexity for accelerated multi-disciplinary scientific discovery

A system and method for connecting one or more client applications with one or more knowledge representation servers and communicating there between includes an application programming interface (api) and a hypergraph transfer protocol (hgtp), for facilitating communication between the one or more client applications and one or more knowledge representation servers responsive to a client application request. The client application request includes an api call for a specific entity that is received by a first knowledge representation server.
Georgetown University

High availability failover manager

A high availability (ha) failover manager maintains data availability of one or more input/output (i/o) resources in a cluster by ensuring that each i/o resource is available (e.g., mounted) on a hosting node of the cluster and that each i/o resource may be available on one or more partner nodes of the cluster if a node (i.e., a local node) were to fail. The ha failover manager (ha manager) processes inputs from various sources of the cluster to determine whether failover is enabled for a local node and each partner node in an ha group, and for triggering failover of the i/o resources to the partner node as necessary.
Netapp, Inc.

System and event based internet of things (iot) device status monitoring and reporting in a mobility network

Protocol agnostic wrapping (paw) and/or data analytics engine (dae) functions are embedded within a service capability exposure function (scef) entity for handling dynamic device triggering, event monitoring, and/or reporting of internet of things (iot) devices. The enhanced scef creates a dynamic mobility network infrastructure model for global iot connectivity and new services delivery.
At&t Intellectual Property I, L.p.

Optimizing read operations in object schema-based application programming interfaces (apis)

The present disclosure relates to processing read requests to retrieve data from a plurality of data sources. According to one embodiment, an example method includes determining a navigable path of nodes accessed to satisfy a read request based on a graph projection of an application programming interface (api).
Intuit Inc.

System and providing multiple payment method options to users in connection with a browser payment request api

Disclosed is an approach for enabling a user to choose from multiple payment options using a browser api. The method includes transmitting, to a browser and via a browser payment request application programming interface, a payment request having data associated with a purchase of a product from the site for a user and presenting a choice between a first payment method and a second payment method for purchasing the product.
Monticello Enterprises, Llc

Extensible interface for synchronous and asynchronous payment

An applications programming interface (api) or other interface may be configured for use with a plurality of e-commerce applications and/or a plurality of payment systems. The api may be associated with an operating system of a client or may be otherwise located in an e-commerce system or network.
Microsoft Technology Licensing, Llc

Validation of multi-component design constraints for capital project design system

A system, method, and executable program code are used to design a capital project having a plurality of components. An application programming interface receives, from one or more 3d design systems, design change data for a checked component in the plurality of components.
Hexagon Technology Center Gmbh

Optimizing write operations in object schema-based application programming interfaces (apis)

The present disclosure relates to processing write requests across a plurality of data sources. According to one embodiment, an example method includes determining a navigable path of nodes accessed to satisfy a write request in a graph projection of an application programming interface (api).
Intuit Inc.

Methods for facilitating external cache in a cloud storage environment and devices thereof

A method, non-transitory computer readable medium and storage server computing device that stores an identifier for a file system block evicted from a buffer cache in an entry in a table. The file system block is inserted into a victim cache hosted by an ephemeral block-level storage device by invoking a function provided by an application programming interface (api).
Netapp, Inc.

Mapping non-generic markup language elements to generic object-oriented programming language objects

A system extends functionality of java architecture for xml binding, (jaxb). Represents non-generic elements of a markup language (for example, xml) document in an object oriented programming language (for example, java).
International Business Machines Corporation

Generating a response to a client device in an internet of things domain

The present disclosure relates to a method and device to generate a response to a client device in an iot domain. The disclosed computing device can receive a request from a client device to retrieve information from an internet of things (iot) application programming interface (api), and request a plurality of objects in a domain from the iot api.
Hewlett Packard Enterprise Development Lp

Automated generation and assembly of proposal elements

A computer-implemented method comprises: generating, by a computing device, a computer-accessible corpus including evidence passage generation information; storing, by the computing device, the corpus; automatically generating, by the computing device, evidence passages that support a proposer's response to a customer's proposal request, wherein the evidence passages include a narrative identifying the proposer's capabilities to satisfy evaluation criteria in the proposal request, and wherein the narrative is based on customer-specific information, wherein the generating includes accessing and searching the corpus via an application programming interface (api); and outputting, by the computing device, the evidence passages as an electronic document that is editable via software running on a user device via a user interface.. .
International Business Machines Corporation

Interface description language for application programming interfaces

An application programming interface (api) analysis engine can validate and parse an api specification. It can determine if the api specification (or portion thereof) contains major or minor changes from a previous version of the api specification.
Dropbox, Inc.

Robot motion program generating method and robot motion program generating apparatus

The purpose is to enable an instructor who does not know any programming language to easily teach robot movements and operation content to a robot without using a teach pendant. This method for generating a robot operation program includes a step, using a gui, for sequentially executing in a plurality of template element operation programs the feature of displaying a variable specification screen for specifying a variable of a certain template element operation program, and then storing the template element operation program for which the variable was specified in a storage unit as a custom element operation program.
Kawasaki Jukogyo Kabushiki Kaisha

Using an integration service to facilitate interactions between software systems

The disclosed embodiments provide a system that uses an integration service to facilitate access to an origin service. During operation, the integration service receives a request service from a software platform, wherein the request is made through an integration service application programming interface (api) provided by the integration service.
Zendesk, Inc.

Companion app to cooperate with an integrated tracker app

A mobile app generates and manages companion apps in a memory of the mobile computing device. The companion apps cooperate with one or more integrated tracker apps in a memory of a wearable device to provide a combined functionality to the wearable device.
Fitbit, Inc.

Microservices based multi-tenant identity and data security management cloud service

A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request includes a call to an application programming interface (“api”) that identifies the identity management service and a microservice configured to perform the identity management service.
Oracle International Corporation

Systems and methods for contextual services across platforms based on selectively shared information

A system may store a first merchant identifier in response to a registration of a first merchant and a user identifier in response to a registration of a user. The system may also store an access permission to control access by the first merchant to a first context.
American Express Travel Related Services Company, Inc.

Systems and methods for contextual services using voice personal assistants

A system may store a first merchant identifier in response to a registration of a first merchant and a user identifier in response to a registration of a user. The system may also store an access permission to control access by the first merchant to a first context.
American Express Travel Related Services Company, Inc.

Bespoke service-on-demand platform enabling translation of staff-to-staff requests

A computational system, which is a bespoke service-on-demand platform, is described. One or more computing units can receive a request generated by a staff computing device associated with staff of a property over a first communication network via a staff application programming interface (api), the request being formulated in a first language.
Fivepals, Inc.

Bespoke service-on-demand platform enabling translation of guest-to-staff requests

A computational system, which is a bespoke service-on-demand platform, is described. One or more computing units can receive a request for a service offered by a property submitted by a guest computing device over a first communication network via a guest application programming interface (api), the request being formulated in a first language.
Fivepals, Inc.

Bespoke service-on-demand platform integrated with a property management system

A computational system, which is a bespoke service-on-demand platform, is described. One or more computing units can receive a request for a service offered by a property submitted by a guest computing device via guest application programming interface (api).
Fivepals, Inc.

Bespoke service-on-demand platform enabling staff-to-staff requests

A computational system, which is a bespoke service-on-demand platform, is described. One or more computing units can receive a request generated by a first staff computing device associated with a first staff member of a property via staff application programming interface (api).
Fivepals, Inc.

Bespoke service-on-demand platform enabling assignment of guest requests to staff members based on data identifying staff availability

A computational system, which is a bespoke service-on-demand platform, is described. One or more computing units can receive a request for a service offered by a property generated by a guest computing device via guest application programming interface (api).
Fivepals, Inc.

Deep learning of bots through examples and experience

Embodiments include methods and systems for using, creating and maintaining goal-oriented, dialog systems (i.e., transactional bots) that provide interfaces to application functionality. The methods and systems of the embodiments provide a bot that may learn in supervised learning and reinforcement learning from conversational examples provided by domain experts and from interaction with users.
Microsoft Technology Licensing, Llc

Mapping non-generic markup language elements to generic object-oriented programming language objects

A system extends functionality of java architecture for xml binding, (jaxb). Represents non-generic elements of a markup language (for example, xml) document in an object oriented programming language (for example, java).
International Business Machines Corporation

Context-aware application programming interface response management

A device may receive, from a consumer device, an application programming interface (api) request that includes information associated with a consumer of data and information associated with a producer of the data. The data may be collected by one or more data sources associated with the producer.
Accenture Global Solutions Limited

Program conversion method using comment-based pseudo-codes and computerreadable recording medium, onto which program is recorded, for implementing

The present invention relates to a program conversion method using comment-based pseudo-codes and a computer-readable recording medium, onto which a program is recorded, for implementing the method, and the method by which a computer system converts a program by using comment-based pseudo-codes comprises the steps of: analyzing codes written in a universal programming language so as to confirm pseudo-codes expressed in comments; generating codes, written in a parallel programming language, by converting codes, if the codes belong to a pseudo-code area, into structure members by using the parallel programming language formed to be executed on one or more data parallel compute nodes, or by converting the same into kernel functions, and by converting codes, if the codes belong to the remaining areas, into host codes of the parallel programming language; and simultaneously executing the kernel functions of the generated codes by using the data parallel compute nodes.. .

System and customizing the identification of application or content type

Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection.
A10 Networks, Inc.

Modifying the modality of a computing device based upon a user's brain activity

Technologies are described herein for modifying the modality of a computing device based upon a user's brain activity. A machine learning classifier is trained using data that identifies a modality for operating a computing device and data identifying brain activity of a user of the computing device.

Automatic correction of cryptographic application program interfaces

A computer system may identify a cryptographic application programming interface (api) call for a program. The cryptographic api call may include a first variable.
International Business Machines Corporation

System and a programming an industrial robot

A programming tool generator configured to generate a guiding tool for programming the specific robot cell based on the program code of the selected sequences of programming blocks for the workstations in the robot cell, wherein the guiding tool comprises program code for generating a second wizard having a second graphical user interface comprising a sequence of views including instructions for guiding a user to program the specific robot cell, and allowing the user to select one or more of the workstations in the specific robot cell, and to input parameters in response to the displayed instructions.. .

Mobile network with software defined networking architecture

A network core with a software defined networking (“sdn”) controller is provided to control routing of traffic within the network and between the network and the traffic destination. The sdn controller is merged with existing 3rd generation partnership project (“3gpp”) network architecture to enable service deliveries via open application programming interfaces (“apis”) and move the network core towards an all internet protocol (“ip”), cloud based, and software driven telecom network.

Unified platform for a plurality of titles and gaming devices

A unified platform supports a plurality of game titles and diverse gaming devices to provide publishers and developers with a software development kit (sdk) including application programming interfaces (apis) for creating multiplayer tournaments. Developers use the sdk to create tournament definitions and permission levels for tournament organizers.

System and methods for determining advertising visibility on web pages

The system and methods of the present technology are configured to determine the in-view status of advertising from within an iframe configured to display the advertising, without relying on code operating the hosted web page bearing the advertising. The system and methods use a plug-in or applet resident in a client device and the application programming interface (api) of the client device, in combination, to determine if the advertising is in-view or not, by superimposing one or more invisible animation frames over a screen area occupied by the advertising.

Method and system for supporting intelligent export and integration of analytic system data

A system and methods configured for intelligent export and integration of analytics system data, by which user input either drives or controls a control mechanism (e.g., instruction set or a programming language), which allows or executes export of data into downstream databases and programs in a way that allows direct use of the data by those systems without use of manual or a case-by-case reformatting or importation processes. The control mechanism serves as a powerful tool for users to use for exporting data directly from a database into templates or downstream data bases..

Share token issuance for declarative document authoring

Issuance of job tokens performed by an authorization computing entity so that authoring authorizations can be shared with other authors. Each of the job tokens represents an authorization to engage in a particular manner in an authoring session in which a declarative document is being authored.

Streaming representation of moving objects and shapes in a geographic information service

A geographical information system (gis) is described that enables querying, analysis and visualization of real-time streaming data pertaining to at least one moving object or entity (e.g., vehicles, people, sensors, weather phenomena, etc.) in conjunction with relatively static multi-temporal geospatial data. An application programming interface is provided to present the gis functionality for handling dynamically moving objects or entities to clients..

Gransets for managing consistency groups of dispersed storage items

One or more techniques and/or computing devices are provided for managing an arbitrary set of storage items using a granset. For example, a storage controller may host a plurality of storage items and/or logical unit numbers (luns).

Key value file system

A file system includes: an application programming interface (api) configured to provide a file system access to an application running on a host computer; a key value file system configured to represent a file or a directory as an inode including one or more key-value pairs; a virtual file system configured to direct a file system call received from the application to the key value file system; and a key value api configured to provide the file system access to data stored in a data storage device. Each key-value pair contained in the inode includes a name of the file or the directory as a key and an identifier of a container that is associated with the file or the directory as a value.

Performing automatic map reduce job optimization using a resource supply-demand based approach

Determining optimum values for map reduce parameters by identifying parameters that affect performance of a map reduce job, determining a relationship between each of the identified parameters and a maximization of resource utilization for a plurality of computing resources configured for executing the map reduce job, representing a workflow based upon supply-demand relationships among the plurality of computing resources, modeling an execution cost as a function of the plurality of identified parameters, formulating a non-linear programming problem to minimize the execution cost, reformulating the non-linear programming problem as a linear programming problem, and solving the linear programming problem to determine a combination of parameter values for the plurality of identified parameters that minimizes the execution cost for the map reduce job.. .

Method and system for developing and deploying data science transformations from a development computing environment into a production computing environment

A method and system facilitates the development of data science transformations in one programming language and the deployment of the data science transformations in another programming language, according to one embodiment. The method and system preserves relationships, functions, configurations, and characteristics between combinations of data transformations, according to one embodiment.

Concurrent authoring session management for declarative document

Management of an authoring session in which a declarative document is authored by multiple authoring entities. The declarative document is a computer program that is formed of declarative statements made in a declarative programming language.

Unified platform for a plurality of titles and gaming devices

A unified platform supports a plurality of game titles and diverse gaming devices to provide publishers and developers with a software development kit (sdk) including application programming interfaces (apis) for creating multiplayer tournaments. Developers use the sdk to create tournament definitions and permission levels for tournament organizers.

Application programming interface for rendering personalized related content to third party applications

A system includes an ingestion component configured to receive a request from an entity for content related to a content item and a user identity. The request has a content identifier representative of the content item and a token.
Google Inc.

Post-evaluation and risk management and control power transmission engineering cost

A var-based post-evaluation and risk management and control method is disclosed herein. The power transmission engineering cost is broken down sub-item costs, and the stochastic behavior of sub-item costs is simulated by normal distribution, to determine the var of sub-item cost at a confidence, then the var and ratio of mean of sub-item costs are used as the weights of sub-item cost, to establish the post-evaluation model of sub-item cost, then according to the ratio of sub-item cost among total cost, a contribution degree index is established, and the main sub-item costs are screened according to the sequence of contribution degree index; then based on this, considering the constraint of risk rate interval and aiming at controlling the main sub-item cost within the allowable risk interval, a stochastic linear programming model is established; finally, monte carlo method is used to sample and simulate the random factors to solve the stochastic linear programming problem.
State Grid Corporation Of China

Application programming interfaces for scrolling

An electronic device with a display, a touch-sensitive surface, and software code configured to interact with applications and provide the applications with an application programming interface (api) for performing gesture operations in response to a user input detected on the touch-sensitive surface, detects, via the software code, a drag input that includes movement of a contact on the touch-sensitive surface that corresponds to movement over a displayed scrollable region in an application. While detecting the drag input, the device scrolls on the display, via the software code, the scrollable region of the application in accordance with the drag input.
Apple Inc.

Runtime generation of application programming interfaces for remote procedure call services

An application specific interface (api) for a service that is accessible by remote procedure calls is generated at run-time from an interface language definitions file. In operation, a client application requests a connection to a server and then a runtime api generator connects to the server and downloads an interface definition language (idl) file that defines services provided by the server.

Providing secure restriction-based api access to a networked software service

Security-restricted access to software can be provided through a particular application programming interface (api) architecture that captures and enforces security information at a time of application registration. Software service can be implemented through a group of one or multiple endpoints, access to which may be routed according to a service invocation request.

Linking servers using an api method

The present invention relates to a link system and link method of an upper shopping mall and an independent shopping mall of api (application programming interface) link method, in particular, to a technology that builds and manages an independent shopping mall having an independent domain address and an user interface besides the upper shopping mall which is registered together with the other sellers. According to the present invention, provided is a link system of an upper shopping mall having a plurality of sellers and an independent shopping mall operated independently by one person among the sellers, of api link method, which comprises a shopping mall database that stores a goods information, a member information, and a payment and delivery information; an independent shopping mall web server receives a goods inquiry or a purchase request from a user to output a factor for extracting data of the shopping mall database, and receives a necessary data from the shopping mall database; and an api server receives a factor from the independent shopping mall web server to analyze, and accesses to the shopping mall database so as to request that the necessary data should be sent to the independent shopping mall web server..

Recordation of user interface events for script generation

An example method of generating one or more scripts specific to an application programming interface (api) type and language and in accordance with user-selected events includes receiving an api type and a language in which to implement a script. Events selected by a user via a graphical user interface in response to receiving a request to record the events may be recorded.

Encapsulation system for programming languages

An adaptive self-modifying system for encapsulating programming languages using graphical objects. The encapsulation system is intuitively based and is suitable for non-qualified users.

Linear programming formulation for incremental layout in a graphical program

Various embodiments of a system and method for a linear programming formulation for incremental layout for a graph in a graphical program are described. A graphical programming development environment or other software application may be operable to automatically analyze a block diagram of a graphical program, e.g., in order to determine objects present in the block diagram, as well as their initial positions within the block diagram.

Collaborator network creation using cloud-based metadata

Systems for managing user collaboration over objects stored on a cloud-based service platform. A server in a cloud-based platform maintains a set of read/write metadata that is associated in one-to-one correspondence to stored objects that are accessible by two or more collaborators.
Box, Inc.

Computer security system and method

A method is provided for protecting a computer system, comprising creating an isolated process, then assigning a first process group to the process; creating an additional group process within the first process group; performing a first determination by an application programming interface (api) that the additional group process is within the first process group, and as a result of the first determination, causing the additional group process to inherit and duplicate a handle of the process. Process communications and control within isolated groups is permitted freely, whereas process control by an isolated process for non-isolated processes or isolated processes in different groups is constrained or prohibited..
Secure Vector, Llc

Safety features for high level design

Aspects of this disclosure relate generally to electronic design automation, and more specifically, to electronic design automation using high level synthesis techniques to generate circuit designs that include safety features. Some innovative aspects can be implemented in computer-readable media, systems and methods capable of accessing an algorithmic description representation of a circuit design.
Altera Corporation

Device based automated tool integration for lifecycle management platform

A device may identify a tool operating on a first device for integration into a lifecycle management platform operating on a second device. The tool may be associated with providing a functionality not included in the lifecycle management platform.
Accenture Global Solutions Limited

User interface event orchestration

Methods, systems and computer program products for user interface event orchestration are provided. A computer-implemented method may include defining a business domain object, associating the business domain object with a user interface component type, defining a rule for an event of the user interface component type, generating an event handling routine providing the defined rule in a programming language, and associating the generated event handling routine with a user interface component of an application interface..
Jpmorgan Chase Bank, N.a.

Application programing interface for adaptive audio rendering

The techniques disclosed herein provide application programming interfaces (apis) for enabling a system to select a spatialization technology. The apis also enable a system to balance resources by allocating audio objects to a number of applications executing on a computer system.
Microsoft Technology Licensing, Llc

Receiving device, transmitting device, and data processing method

Provided are a device and a method capable of efficiently performing a synthesis process of broadcast reception data and network reception data. Broadcast reception data received by a receiving device via a communication unit is set as a media source object corresponding to a processing object of an application executed by the receiving device under an application programming interface (api).
Sony Corporation

Application control interworking in network

Various communication systems may benefit from application control interworking in a network to expose certain service capabilities. For example, certain communication systems of the third generation partnership project (3gpp) that provide service capabilities that are exposed to application providers, for example, via open mobile alliance-application programming interface, may benefit from application control interworking in a network.
Nokia Solutions And Networks Oy

Dynamically adapting cloud applications

Techniques for dynamically adapting cloud applications are described. A current value of a key performance indicator (kpi) of an executing cloud service instance of a cloud application is detected.

Phy error indication messaging

This disclosure introduces an advancement to the error indication message to provide detailed information about errors in configurations that are arriving from the layer 2 to the layer 1. A method is disclosed, comprising: performing physical layer control (phy) of a wireless signal at a layer 1 (l1) software module; performing medium access control (mac) of the wireless signal at a layer 2 (l2) software module; providing an application programming interface between the l1 software module and the l2 software module for receiving l1 configuration messages and providing error codes to the l2 software module; receiving a l1 configuration message at a layer 1 software module; and providing an enhanced error code progressively from a l1 software module to the layer 2 (l2) software module..
Parallel Wireless, Inc.

Methods and systems for estimating offset and skew using linear programming

This invention relates to methods and systems for estimating offset and skew using linear programming. Embodiments of the invention relate to methods and systems which apply linear programming principles to links with asymmetric transmission rates which are estimated from an exchange of timing messages (for example under ieee 1588 ptp).
Emirates Telecommunications Corporation

Methods and systems for enforcing, by a kernel driver, a usage restriction associated with encrypted data

A method of providing a restricted set of application programming interfaces includes decrypting, by a secure object information reader executing on a computing device, an encrypted data object using information associated with the encrypted data object to generate a decrypted data object, the information received from an access control management system. The method includes intercepting, by a kernel driver executing on the computing device, from a process executing on the computing device, a request to access the decrypted data object.
Virtru Corporation

System for connecting computer dashboards with geographic information systems

The present invention provides a connector system for incorporating geographic information system (gis) data into a computer dashboard. The connector system comprises at least one map configuration file containing parameters for map elements and dashboard visual objects and a mapping module that visually renders a map within the dashboard using gis data according to parameters in the configuration file.
Us-analytics Solutions Group, Llc

System and data element tracing

A method and system of a method of tracing a data element for flow analysis includes receiving an input of a data element to be traced, tagging the data element to be traced and selecting one or more tiers of an application to trace the flow of the tagged data element. The selected one or more tiers of the application are parsed through a plugin associated with a software programming language and an entry is recorded at the plugin associated with a software programming language, when an instance of traced data element is encountered.
Infosys Limited

Electronic device capable of easy application creation

An electronic device includes: a central processing unit (cpu), and a storage device. The storage device includes: a first application; an add-on including: a first programming portion configured in a first programming language and a second programming portion configured in a second programming language and called by the first programming portion; and a second application using the add-on.
Kyocera Document Solutions Inc.

Identifying and correlating semantic bias for code evaluation

System and techniques are disclosed for associating annotation semantic bias with program code. A pre-processor partitions an annotation from program statements contained within one or more source files.
Ca, Inc.

Auto-vectorization in just-in-time compilers for dynamically typed programming languages

A computing device with an optimizing compiler is disclosed that is configured to generate optimized machine code including a vector operation corresponding to multiple scalar operations where the vector operation is a single operation on multiple pairs of operands. The optimizing compiler includes a vector guard condition generator configured to generate a vector guard condition for one or more vector operations, a mapping module to generate a mapping between elements of the vector guard condition and positions of the relevant scalar operations in the non-optimized machine code or intermediate representation of the source code, and a guard condition handler configured to initiate execution from a particular scalar operation in the non-optimized machine code or intermediate representation if the vector guard condition is triggered.
Qualcomm Innovation Center, Inc.

Apparatus for providing framework to develop client application executed on multiple platforms, and method using the same

A method for providing a framework to develop a client application executed on multiple platforms is disclosed. The method includes steps of: (a) an apparatus for providing a framework acquiring information on platform independent user interface (ui) and information on business logic written by using a general-purpose programming language; and (b) the apparatus performing (i) a process for generating a platform-dependent ui code corresponding to the acquired information on the platform independent ui as ui code for a target platform among the multiple platforms and (ii) a process for generating business logic code corresponding to the acquired information on the business logic as business logic code for the target platform..
Tmaxsoft. Co., Ltd.

Pre-formed instructions for a mobile cloud service

Methods, systems, and computer readable mediums are disclosed for introducing pre-formed instruction sets to a mobile cloud service. In some examples, an archive file, such as a .zip file, can include two sets of files: 1) logic for creating an application programming interface (api) and connecting the api with backend service behind a corporate enterprise network's firewall, and 2) custom user-code.
Oracle International Corporation

Trusted-code generated requests

Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call.
Amazon Technologies, Inc.

System and automated issue remediation for information technology infrastructure

A system and method for extensible, protective, and verifiable automated issue remediation for information technology infrastructure comprises invoking an application programming interface to obtain at least one issue object corresponding to an alert generated by a monitoring system; matching the issue object to at least one diagnosis plugin of a plurality of diagnosis plugins; obtaining a prescription object from the diagnosis plugin, the prescription object comprising a remedy; and invoking the remedy after verifying the remedy is authorized to proceed.. .
Dropbox, Inc.

System and modeling and verifying financial trading platforms

A computer-implemented method assesses operation of a financial computing system (fcs). An assessment computer system generates code for a model of the fcs that comprises a model specification for the fcs and a model environment for the fcs.
Aesthetic Integration Limited

Application aware export to object storage of low-reference data in deduplication repositories

Various embodiments for managing data in a data deduplication repository in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises issuing an application programming interface (api) command to scan metadata of a subset of entities in a local deduplication repository for identifying candidate data to offload from the local deduplication repository to an object storage, offloading the candidate data to the object storage, and returning a status result using the api command..
International Business Machines Corporation

Interference and/or power reduction for multiple relay nodes using cooperative beamforming

Systems and methods for interference and/or power reduction for multiple relay pairs using cooperative beamforming are provided. A method of operation of a network node in a cellular communications system includes determining beamforming weights for multiple of subchannels for each of multiple relay nodes such that a parameter is minimized.
Telefonaktiebolaget Lm Ericsson (publ)

Navigation application programming interface to accommodate multiple waypoint routing

Navigation application programming interfaces that can be used to embed navigation services in software applications are provided. In one embodiment, the application programming interface includes a first set of instructions specifying one or more first parameters to control the implementation of a navigation service by the software application.
Google Inc.

Navigation application programming interface

Navigation application programming interfaces that can be used to embed navigation services in software applications are provided. In one embodiment, the application programming interface includes a first set of instructions specifying one or more first parameters to control the implementation of a navigation service by the software application.
Google Inc.

Tools and methods for real-time dataflow programming language

A dataflow programming language can be used to express reactive dataflow programs that can be used in pattern-driven real-time data analysis. One or more tools are provided for the dataflow programming language for checking syntactic and semantic correctness, checking logical correctness, debugging, translation of source code into a secure, portable format (e.g., packaged code), translation of source code (or packaged code) into platform-specific code, batch-mode interpretation, interactive interpretation, simulation and visualization of the dataflow environment, remote execution, monitoring, or any combination of these.
Foghorn Systems, Inc.

System and methods for development of visual business applications

A system and methods for the development of data management applications are provided. In some embodiments, the system is represented as a “head” that exchanges data with a “body”, such that the head is represented in the business rules and in the body all computational elements needed to generate and use the data exchanged with the head, are represented.

In-memory data analytic system that provides an integrated tracking mechanism for explicit memory resources

Techniques and a system are provided for managing resources used by user-provided programs. The system includes an application programming interface (api) that allows user-provided programs to access memory resources managed by functions provided by the api.
Oracle International Corporation

System and process hollowing detection

A method and system for remediating a process hollowing intrusion on a user device comprising detecting a process starting on the user device, preparing the process to monitor application programming interface (api) calls between the process and an operating system of the user device, determining whether the process is associated with a process hollowing intrusion based on information associated with the process and/or the api calls, and executing security policies against the process associated with the process hollowing intrusion. In examples, it is determined whether the child process is associated with a process hollowing intrusion in response to determining whether one or more api calls associated with known process hollowing intrusions modify executable memory of and/or modify an entry point address of the child process..
Carbon Black, Inc.

Software defined network (sdn) application integrity

A software-defined network (sdn) authorizes application programming interface (api) calls from user sdn applications to user sdn controllers. A user sdn application transfers an embedded code to an authorization sdn controller.
Sprint Communications Company L.p.

Automated control of technology resources

The present invention provides for a fully automated process for controlling technology resources. Specifically, embodiments of the invention streamline the process for initiating a request by employing an application programming interface (api) to make calls to other applications/tools (e.g., project tools and the like) and automatically imports data from the other applications/tools to the technology resource module/tool.
Bank Of America Corporation

Network communication and cost awareness

Network communication and cost awareness techniques are described. In one or more implementations, functionality is exposed through one or more application programming interfaces (apis) that is accessible to a plurality of applications of the computing device to perform network communication.
Microsoft Technology Licensing, Llc

System and reverse command shell detection

A system and method for detecting reverse command shell intrusions at a process-level on a user device is disclosed. In one embodiment, the system detects each process starting on an operating system of the user device, such as a mobile phone or laptop computer, and monitors application programming interface (api) calls between each process and the operating system.
Carbon Black, Inc.

Real-time fluid contamination prediction using bilinear programming

Methods and systems are described for estimating the level of contamination of downhole fluid and underlying composition using physical property measurements, and mathematical modeling of contamination functions and fluid property mixing laws. The proposed approaches enable computation of estimates of the pumping time needed to achieve a certain contamination threshold level and the determination of whether or not sampling is appropriate at the current point in time based on the predicted compositional properties of the formation fluid..
Weatherford Technology Holdings, Llc

Systems and methods for enabling service interoperability functionality for wifi direct devices connected to a network via a wireless access point

Certain embodiments herein are directed to enabling service interoperability functionality for wireless fidelity (wifi) direct devices connected to a network via a wireless access point. A wifi direct device may identify various other wifi direct devices on a wifi network for performing a requested service, such as printing content or displaying content to a screen.
Intel Ip Corporation

Managing multiple cloud stores through a web service

A service exposes a storage system-independent application programming interface (api) and receives a data request from an application over the api. The service transforms the storage system-independent data request into a storage system-specific data request and executes it against an identified cloud-based storage system.
Microsoft Technology Licensing, Llc

External injection of cloud based network functions into network services

Disclosed herein are system, method, and computer program product embodiments for providing an api description of an external network service and using the api to integrate the external service into a network. An embodiment operates by receiving, from a service provider, a description of an application programming interface (api), transmitting a call to the service provider using the api for creating a new instance of a service and transmitting to the service provider a traffic flow upon which the service will be applied..
Level 3 Communications, Llc

Providing sip signaling data for third party surveillance

A method for facilitating surveillance of a targeted user participating in communication sessions conducted over a communications network, such as a voice over internet protocol (voip) network, that employs a session initiation protocol (sip). The method includes receiving a subscription request from a third party subscriber, the subscription request identifying a targeted user to be monitored, monitoring communication sessions in which the targeted user is a participant, to detect sip events corresponding to state transitions associated with the communication sessions.
Level 3 Communications, Llc

Data processing method and apparatus based on mobile application entrance and system

A data processing method is performed at a computer system managing application programming interfaces (apis) and mobile application entrances. An api invocation request initiated by an application system is received by the computer system, permission information corresponding to the application system is obtained according to an identifier of the mobile application entrance and an application system identifier that are carried in the api invocation request, then authentication is performed on the api invocation request according to the permission information and first authentication information carried in the api invocation request, and the application system is allowed to invoke an api for data processing when the authentication succeeds, so that internal data corruption caused due to that each application system at a mobile application entrance randomly invoke the api is avoided, thereby implementing uniform management on the internal data, greatly strengthening data security, and facilitating api interface expansion..
Tencent Technology (shenzhen) Company Limited

Programming language for execution by drone

One embodiment provides a method comprising maintaining a weather model based on predicted weather conditions for an air traffic control zone. A hash table comprising multiple hash entries is maintained.
International Business Machines Corporation

Card reader emulation for cardless transactions

Disclosed are method and apparatus that enable a cardless payment transaction to be executed from a merchant point-of-sale (pos) system. A user is enabled to check in at a merchant by using a mobile device of the user and then to pay by simply appearing at the merchant and mentioning his name.
Square, Inc.

Management device, management method, and computer-readable recording medium

A management device includes: a processor configured to: store, in a storage, request history information indicating a history of an application programming interface (api) request transmitted by an application and an access-number management table representing number of times api access of the application is able to be made in each unit time; calculate, upon reception of the api request, as for an application having transmitted the api request, a stability based on transition of contents of the api request from the application and the request history information; change the number of times api access of the application is able to be made according to the stability; and upon reception of the api request from the application, compare number of times of access of the application and the number of times api access of the application is able to be made, and determine whether acceptance of the api request is made.. .
Fujitsu Limited

Converting source code

A method includes receiving source code in a first programming language. The method further includes identifying a design pattern based on a flag included in the source code.
Wowza Media Systems, Llc

Determining a significant user location for providing location-based services

Systems, methods, and program products for providing services to a user by a mobile device based on the user's daily routine of movement. The mobile device determines whether a location cluster indicates a significant location for the user based on one or more hints that indicate an interest of the user in locations in the cluster.
Apple Inc.

Systems and methods for managing resources in networked environment

Methods and systems for a networked storage environment are provided. An object index for storing object identifiers is generated for uniquely identifying a plurality of resources represented by a plurality of objects for providing storage services in a networked storage environment.
Netapp, Inc.

Device, network-based address translation for multiple recipients

A network system, switch controller for multicast packet distribution by controlling a network switch having at least one ingress interface and at least one egress interface. The controller generates a control command using an application programming interface for the network switch, the control command having a replicate command to replicate the incoming signal packets by distributing the incoming signal packets based on a number of the plurality of destination addresses to a corresponding number of egress interfaces of the at least one egress interface of the network switch, each of the number of egress interfaces having a loopback connection to an ingress interface of the at least one ingress interface of the network switch, the control command having a header translation command to control the network switch to translate header address information of each of the replicated signal packets to a destination address of the plurality of destination addresses, the destination address for transmission of the translated replicated signal packets to a destination device listening to the destination address.
Imagine Communications Corp.

Software defined network (sdn) quality-of-service (qos)

A data communication system determines software defined network (sdn) quality-of-service (qos). Sdn applications transfer sdn controller application programming interface (api) calls and receive sdn controller api responses.
Sprint Communications Company L.p.

Processing of log data and performance data obtained via an application programming interface (api)

The disclosed system and method acquire and store performance measurements relating to performance of a component in an information technology (it) environment and log data produced by the it environment, in association with corresponding time stamps. The disclosed system and method correlate at least one of the performance measurements with at least one of the portions of log data..

System and providing a universal shopping cart

Disclosed is an approach for providing a multi-site shopping cart. A method includes receiving, via a browser shopping cart application programming interface associated with a browser, first data associated with a first product viewed by a user navigating on a first site using the browser.
Monticello Enterprises Llc

Spatial cooperative programming language

A system and method for a mixed reality, spatial, cooperative programming language is described. A sensor of a device detects a first physical object and a second physical object.
Daqri, Llc

Mobile device with multiple wifi interfaces

A mobile device with multiple wifi transceivers and a method of using the same are disclosed. The mobile device may include at least two separate wifi transceivers and at least two separate wifi stacks, each of the wifi stacks is coupled to one of the transceivers to enable separate control and concurrent use of the wifi transceivers.
Qualcomm Innovation Center, Inc.

Telecommunication networks

A mobile telecommunications network includes a core and a radio access network having a radio for wireless communication with mobile terminals registered with the network. The radio access network includes a controller operable to control the use of network resources by the mobile terminals.
Vodafone Ip Licensing Limited

Web-based user authentication techniques and applications

A system, apparatus, method, and machine readable medium are described for performing user authentication. For example, one embodiment of a system comprises: media capture logic implemented as a component within a browser executed on a client, the media capture logic configured to capture a user's voice from a microphone on a client or images of the user's face or other portion of the user's body from a camera on the client, the media capture logic exposing an application programming interface (api); and a web authentication application implemented as another component within the browser for communicating with an authentication server to perform biometric authentication of a user, the web authentication application making calls to the api of the media capture logic to capture raw biometric data comprising the user's voice from the microphone and/or images of the user's face or other portion of the user's body from the camera, the web authentication application to implement a biometric authentication process to authenticate the user with the raw biometric data..
Nok Nok Labs, Inc.

Managing network forwarding configurations using algorithmic policies

Techniques for managing forwarding configurations in a data communications network include accessing, at the at least one controller, an algorithmic policy defined by a user comprising one or more programs written in a general-purpose programming language other than a language of data forwarding element forwarding rules, which algorithmic policy in particular defines a packet-processing function specifying how data packets are to be processed through the data communications network via the at least one controller. A forwarding configuration for at least one data forwarding element in the data communications network may be derived from the user-defined packet-processing policy, and may be applied to the at least one data forwarding element..

Method for managing permission policy of application in an electronic terminal

A method for managing a permission policy of an application in an electronic terminal is provided. The method includes: obtaining an initial diagnostic script to create a diagnotor, a structure of the initial diagnostic script including an application identifier, an identifier of a permission policy diagnostic point, an application programming interface corresponding to the permission policy diagnostic point, an instruction corresponding to the permission policy diagnostic point, and a setting for a user's decision with respect to the instruction upon execution of the instruction; according to a control of the diagnotor, running a target application in a diagnostic mode; and when the permission policy diagnostic point is triggered during the running of the target application, executing the instruction corresponding to the permission policy diagnostic point, receiving the user's decision in accordance with the setting for the user's decision, and recording the user's decision with respect to the executed instruction..
Samsung Electronics Co., Ltd.

Adding or removing a storage provider in a unified storage manager

A method of implementations includes receiving, by a processing device executing a unified storage manager (usm), an update package comprising a configuration file for a storage service to add to the usm, adding, by the processing device, the configuration file to a set of configuration files maintained by the usm, responsive to detecting the addition of the configuration file, causing, by the processing device, a re-load of the set of configuration files at the usm without a shutdown and re-start of the usm, loading, by the processing device, the configuration file in the usm, and initializing, by the processing device, an adaptor component for the storage service at the usm, the adaptor component comprising a set of application programming interface (api) methods for the usm to communicate with the storage service.. .
Red Hat, Inc.

Portable video studio kits, systems, and methods

According to one aspect, it is realized that automated video production systems can be provided that are fully integrated, and even portable, thus permitting use by a wide variety of consumers. Stated broadly, various embodiments are directed to systems, methods, and kits configured to provide complete video production, which in some examples enables a sole operator to set up and use the production system.

Cloud storage methods and systems

A programmer input in a programming language is received, where the programmer input includes i) a built-in function of a computational application corresponding to retrieving data from electronic storage objects, and ii) a first parameter specifying the electronic storage object from which data is to be retrieved. The computational application evaluates the programmer input to generate one or more messages corresponding to requests for a server to retrieve data from the electronic storage object.
Wolfram Research, Inc.

Application programming interface access controls

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling access to apis. One of the methods includes receiving a request from a client for a computer authorization challenge to access an application programming interface; determining a computer authorization challenge with a difficulty of completion that satisfies a target computational cost for the application programming interface; and providing the computer authorization challenge to the client for access to the application programming interface..
Google Inc.

Taking actions on notifications using an incomplete data set from a message

An apparatus, a system, and a method in which a message notification application such as an e-mail notification application resident in a first memory on a wearable electronic device is configured to provide messaging actions; where the message notification application has a user interface to present content of a message originating from an message application resident on a mobile computing device; where the message notification application is configured to analyze a notification of the message to obtain an incomplete data set; and where the message notification application is configured to work with a server configured to integrate with one or more application programming interfaces of one or more messaging service providers, where the server has a server module configured to receive the incomplete data set and use all or a portion of the incomplete data set as search query terms to retrieve an instance of the message in its full-message format.. .
Pebble Technology, Corp.

Energy-efficient motor drive with or without open-circuited phase

An energy-efficient and accurate torque control system and method for multiphase nonsinusoidal pmsm with or without open-circuited phase(s) under time-varying torque and speed conditions is based on orthogonally decomposing a phase voltage vector into two components, which become primary and secondary control inputs for torque control and energy minimizer control. The primary control system includes nonlinear feedback from measured phase currents, motor angle, motor speed, and instantaneous value of reference torque and a signature vector indicating which phase(s) is/are open-circuited to establish a first-order linear relationship between reference and generated torques.
Canadian Space Agency

Techniques for emotion detection and content delivery

Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic.
Facebook, Inc.

Methods and systems for generating electronic forms

In a method for generating an electronic form, programmer input in a programming language is received, the programmer input including specification data corresponding to an electronic form to be generated. The programmer input is evaluated to generate an electronic form object that includes one or more user-interface mechanisms for receiving the user input, including evaluating the specification data to generate code in the electronic form object, the generated code capable of being processed by an application to render the electronic form on or via a user interface device such that the electronic form serially prompts the user over time for multiple user inputs.
Wolfram Research, Inc.

Method for verifying traceability of first instructions in a procedural programming language generated from second instructions in a modelling language

The present invention concerns a method for verifying traceability of first code instructions in a procedural programming language generated from second code instructions in a modelling language, characterised in that it comprises the implementation, by a piece of equipment (1), of steps of: (a) syntactic analysis: o of the first instructions so as to generate an ast, and o of the second instructions so as to generate an mdt; (b) semantic analysis: o of the ast so as to identify patterns representative of basic functional blocks of the first instructions; o of the mdt so as to identify characteristic properties of basic functional blocks of the second instructions; (c) matching, pairwise, the identified basic functional blocks, and confirming the traceability of first code instructions only if: o for each block of the first instructions, there is a functionally equivalent block in the second instructions, and o for each block of the second instructions, there is a functionally equivalent block in the first instructions.. .
Safran Electronics & Defense

Language-independent program composition using containers

An action sequence including a plurality of actions and a corresponding input dictionary are obtained. A first container, running an image for a first one of the actions implemented in a first programming language, is instantiated, and the image is executed on the input dictionary to obtain a first action result; the input dictionary is then updated with the first action result to obtain an updated input dictionary.
International Business Machines Corporation

Methods and systems of generating ease of use interfaces for legacy system management facilities

Embodiments include methods, and computer system, and computer program products for generating ease of use interfaces for legacy system management facilities (smf). Aspects include: retrieving an smf record from an smf data source through an smf data interface from a file, over a network or via a real-time api, smf record having a data control section (dsect) with code comments for storing a mapping of smf record defining data structure of smf record with one or more fields, converting mapping of smf record into an intermediate format representing mapping of smf record and corresponding information extracted from the code comments among the one or more fields of smf record, generating at least one application programming interface (api) in a different computer language using intermediate format, and accessing smf record using api generated.
International Business Machines Corporation

Semantically sensitive code region hash calculation for programming languages

Herein disclosed is an optimization for a compiler, the optimization configured to assign numeric values, or semantic fingerprints, to portions of code, and to combine these fingerprints to arrive at fingerprints for larger and larger portions of code. The fingerprints can be provided to various consumers such as code redundancy optimization modules and copyright violation and malware/virus identification modules.
Qualcomm Innovation Center, Inc.

Automated program synthesis from natural language for domain specific computing applications

Disclosed are various embodiments for automated program synthesis from a natural language for domain specific computing applications. In one embodiment, a natural language processor may be configured to parse words from a sentence of text formed in a natural language, such as english, following a grammatical structure for the natural language.
Virginia Tech Intellectual Properties, Inc.

Device configuration-based function delivery

The present disclosure is directed to a system for device configuration-based function delivery. A server receives a data structure including device configuration information that indicates the computing device comprises an application programming interface to allow a data function to access a call function of the computing device.
Google Inc.

Device configuration-based function delivery

The present disclosure is directed to a system for device configuration-based function delivery. A server receives a data structure including device configuration information that indicates the computing device comprises an application programming interface to allow a data function to access a call function of the computing device.
Google Inc.

Efficient hardware trust verification in data communication systems that comprise network interface cards, central processing units, and data memory buffers

A data communication system comprises a network interface card (nic), central processing unit (cpu), and data memory buffer (dmb) to efficiently verify hardware-trust. The nic, cpu, and dmb execute boot-up software, and in response, the nic, cpu, and dmb execute hardware-trust software to assert control over their application programming interfaces (apis).
Sprint Communications Company L.p.

Semantically sensitive code region fingerprint calculation for programming languages

Herein disclosed is an optimization for a compiler, the optimization configured to assign numeric values, or semantic fingerprints, to portions of code, and to combine these fingerprints to arrive at fingerprints for larger and larger portions of code. The fingerprints can be provided to various consumers such as code redundancy optimization modules and copyright violation and malware/virus identification modules.
Qualcomm Innovation Center, Inc.

General software modeling method to construct software models based on a software meta model

Software element model based univeral software modeling method to construct software model. After determining basic constituents of the software element model, the present invention constructs software models through the software hierarchy model, the software interface models, the software interaction models, the software algorithm model, the software process model, and the software transfer model as step features and thereby provides a specification for software modeling in various fields; such specification has advantages including generality and convenience; the software models constructed through the present invention is executable, has a clear structure, adjustable hierarchies, and controllable granularities for modeling; this method supports both top-down analysis and bottom-up integration for modeling in various software systems.
Chengdu Puzhong Software Limted Company

System and engergy management using linear programming

A system is disclosed including but not limited to a processor; a hybrid power source for servicing a system load, the hybrid power source comprising a natural gas engine, a diesel engine and a battery; a linear computer program comprising, instructions determining a current system load serviced by power provided from the hybrid power source; instructions to determine a current operating state for the natural gas engine, the diesel engine and the battery; instructions to use linear programming to determine a new operating state for the natural gas engine, the diesel engine and the battery to reduce for power consumption servicing the current system load the natural gas engine, the diesel engine and the battery; and instructions to replace the current operating state for the natural gas engine, the diesel engine and the battery to the new operating state for the natural gas engine, the diesel engine and the battery.. .
Electronic Power Design

Service and apis for remote volume-based block storage

Methods, apparatus, and computer-accessible storage media for providing a volume-based block storage service and application programming interfaces (apis) to the service. A block storage service and block storage service apis may allow processes (applications or appliances) on the service client network to leverage remote, volume-based block storage provided by the service provider.
Amazon Technologies, Inc.

Graphics-processing-unit shader program control flow emulation

The control flow of a first graphics-processing-unit shader program coded in a low-level programming language that allows arbitrary jumps is emulated in a second graphics-processing-unit shader program coded in a higher-level programming language that does not allow arbitrary jumps. Each instruction in the first program is individually evaluated as follows.
Microsoft Technology Licensing, Llc

Generic language application programming interface interpreter

Technical solutions are described for facilitating a first computer program product to communicate with a second computer program product. The first computer program product invokes an application programming interface (api) function from an api of the second computer program product, where the first computer program product and the second computer program product use distinct programming languages.
International Business Machines Corporation

System and preserving value and extending life of legacy software in face of processor unavailability, rising processor costs, or other issues

A method includes obtaining a copy of a first software executed by a first device in an industrial process control and automation system. The method also includes converting the first software to a second software.
Honeywell International, Inc.

System and creating concurrent programming languages by extending existing programming languages

A system and method for creating a concurrent programming language by extending existing programming languages. The system and method may be useful for extending known concurrent programming languages, such as java and c#.

Transparent node runtime and management layer

A server computer. The server computer comprises a processor, a non-transitory memory, a application comprising javascript instructions stored in the non-transitory memory, a runtime stored in the non-transitory memory, and a native agent module stored in the non-transitory memory.
Nodesource, Inc.

Devices, methods, and computer readable storage devices for providing application services

Application services associated with a mobile communication device are facilitated by a mediator gateway. A request for providing an application service is received by the mediator gateway.
At&t Mobility Ii Llc

Application programming interface for a sharing service

A computing device executes an application that is configured to call a sharing service application programming interface (“api”) to create a sharing session via a sharing service. The application can call the sharing service api to utilize one or more methods exposed by the sharing service api to connect to the sharing service and initiated the creation of the sharing session.
Amazon Technologies, Inc.

Detection of email-related vulnerabilities

Examples relate to detection of email-related vulnerabilities. The examples disclosed herein enable monitoring, at a runtime, application programming interface (api) calls made by a server-based application for the api calls related to at least one of a plurality of email protocols.
Hewlett Packard Enterprise Development Lp

Allocating and accessing hosting server resources via continuous resource availability updates

Systems and methods are provided for dynamically allocating and accessing hosting server resources to users of hosting services. The system may include one or more servers that provide multiple levels of access to the hosting server resources, and an administration server configured with one or more migration paths that allow the user to migrate the account between two levels while the account remains accessible to all entities authorized to access the account.
Go Daddy Operating Company, Llc

Gpu data sniffing and 3d streaming system and method

In one aspect, a graphics processing unit (gpu) data sniffing method includes the step of providing a video game software comprising a set of graphics data of a video game. The method includes the step of communicating the set of graphics data to a graphics library using an application programming interface (api) call to the graphics library.

Determine secure activity of application under test

Example embodiments disclosed herein relate to determining a secure activity of an application under test (aut). Execution of an application under test is monitored.
Hewlett Packard Enterprise Development Lp

Determining permissible activity based on permissible activity rules

Example embodiments disclosed herein relate to determining permissible activity in an application. Application programming interfaces (apis) of an application are monitored using a runtime agent.
Hewlett Packard Enterprise Development Lp

Mobile interface platform systems and methods

Mobile health interface (mhi) platform systems and methods of evaluating mobile applications include establishing evaluation criteria for mobile applications within a given industry; receiving mobile applications with associated application programming interfaces (apis) for the given industry; classifying, via the apis, each of the mobile applications into discreet packages; certifying and accepting the discreet packages for each of the mobile applications based upon the evaluation criteria, via processing circuitry of a single interoperable platform with data integration capability and associated virtual machine; authenticating a user access to the certified discreet packages for a set trial period of time; receiving trial sequence data indicating the user's preference via scoring for each of the certified discreet packages for the set period of time; ranking the certified discreet packages based upon the received trial sequence data; and receiving a selected bundle of certified and ranked discreet packages.. .

Methods and systems for generating electronic forms

Programmer input in a programming language is received, the programmer input including i) specification data corresponding to an electronic form to be generated, and ii) a parameter that indicates a function to be applied to user input. The programmer input is evaluated to generate an electronic form object that includes one or more user-interface mechanisms for receiving the user input, wherein evaluating the programmer input includes evaluating the specification data and/or the parameter that indicates the function to generate code in the electronic form object which is capable of being processed by an application to render the electronic form.
Wolfram Research, Inc.

Fast and accurate identification of message-based api calls in application binaries

Disclosed are various embodiments for fast and accurate identification of message-based application programming interface (api) calls in applications. A set of compliance rules is obtained from a compliance rule store.

Assigning applications to virtual machines using constraint programming

Techniques for assigning applications to virtual machines (vms) using constraint programming are disclosed. The applications are associated with application groups.
Oracle International Corporation

Multi-layer optimal chiller operation management framework

Aspects of the present disclosure describe a multi-layer chiller operation management framework and associated methods for managing heating, ventilation, and air conditioning (hvac) multi-chiller unit operation in real time serving varying system loads. According to the present disclosure, the framework includes two layers—a first layer providing 24-hour chiller operation planning thereby optimizing chiller operation using forecasted load profiles to minimize energy consumption.
Nec Laboratories America, Inc.

System and host-side configuration of a host channel adapter (hca) in a high-performance computing environment

Systems and methods for host-side configuration of a host channel adapter (hca). An exemplary embodiment can provide a hca, including a control circuit with a processor and a memory, and at least one port operative to connect the hca to a network fabric.
Oracle International Corporation

Application programming interface for premises networking device

A premises networking device includes hardware components including speakers, microphone, infrared sensor, spectrum analyzer and wireless interfaces. A touch screen display presents a user interface that provides information about network conditions and configuration settings and a menu for setting and changing configuration settings.
Starry, Inc.

Premises networking device user interface and operation

A premises networking device includes hardware components including speakers, microphone, infrared sensor, spectrum analyzer and wireless interfaces. A touch screen display presents a user interface that provides information about network conditions and configuration settings and a menu for setting and changing configuration settings.
Starry, Inc.

Method and device for evaluating local area network

A premises networking device includes hardware components including speakers, microphone, infrared sensor, spectrum analyzer and wireless interfaces. A touch screen display presents a user interface that provides information about network conditions and configuration settings and a menu for setting and changing configuration settings.
Starry, Inc.

Network management access network

A premises networking device includes hardware components including speakers, microphone, infrared sensor, spectrum analyzer and wireless interfaces. A touch screen display presents a user interface that provides information about network conditions and configuration settings and a menu for setting and changing configuration settings.
Starry, Inc.

Virtual network for containers

Techniques are disclosed for facilitating inter-container communications, via a cloud exchange, for containers executing at logically isolated networks. In one example, the techniques of the disclosure provide a method including sending, by a container to a cloud exchange via an application programming interface exposed by an interconnection platform of the cloud exchange, container registration data for the container, the container registration data including a network address for a host that executes the container and a container identifier for the container..
Equinix, Inc.

Transaction verification through enhanced authentication

Methods, systems, and computer program products for providing transaction verification through enhanced authentication are provided. A method performed by a computer system may include receiving an application programming interface (api) request from a client, detecting a change associated with the api request as compared to a prior use of the api by the client, generating an encrypted challenge to authenticate the api request based on detecting the change, and issuing the encrypted challenge to the client to authenticate the api request..
Ebay Inc.





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Programming for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Programming with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.4505

file did exist - 16417

2 - 1 - 253