Follow us on Twitter
twitter icon@FreshPatents


Cloud patents

      

This page is updated frequently with new Cloud-related patent applications.


. .


. .


. .

Management of resource allocation in a mobile telecommunication network
A network entity (100) for managing resource allocation in a mobile telecommunication network and for coordinating operations between one or more network managing entities (20) and one or more cloud managing entities (10). The mobile telecommunication network comprises one or more user policy entities (70) configured to store, for each user of a plurality of users, a set of rules associated with one or more services.
Vodafone Ip Licensing Limited


Cloud-based proximity pairing and switching for peer-to-peer devices
A first wireless communication device (ue device) associated with a certain user (or included in a specified set/group of ue devices) may establish a first communication link with an accessory device according to a short-range radio access technology, and transmit link (pairing) information associated with the first communication link to a server, such as a cloud-based server. The server may share this (first) link information with other ue devices associated with the same user (or belonging to the same specified group of ue devices as the first ue device).
Apple Inc.


Cloud-based decisioning for addressable asset system
A system and associated functionality are disclosed for managing and monitoring the delivery of assets to network users to comply with campaign specifications. The system is largely independent of content/asset delivery mechanisms, and thus facilitates management and monitoring of asset delivery with respect to a single device or multiple devices, including, multiple devices of multiple networks or modalities, e.g., a television, a laptop and a tablet..
Invidi Technologies Corporation


Managing addressable asset campaigns across multiple devices
An addressable asset system (100) includes user equipment devices (ueds) (102), a cloud decisioning system (cds) (106) and a business data management system (bdms) (108). The bdms (108) collects information that is used by the cds (106) to manage delivery of assets by the ueds (102).
Invidi Technologies Corporation


Networking between voip -and pstn- calls
Programmatically reversing numerical line identity presented at a communications services gateway into named ip telephony users with “prior association”, delivers dynamic “reverse address resolution” switching connections from ground to cloud, permitting any conventional telephone to dial and connect to any associated ip telephony endpoint in the world, without changes to the conventional telephone. Reversing line identity into associated named users bridges both the addressability and economic divide between mass conventional “paying” (mobile and fixed) and “free”.
Starlogik Ip Llc


Computer-implemented managing tenants on a multi-tenant sip server system
A computer-implemented method of managing tenants on a multi-tenant sip server system has at least two multi-tenant enabled sip server instances in an sip server cloud or private datacenter environment. Each sip server instance of the plurality of sip server instances is configured as a virtual application.
Unify Patente Gmbh & Co. Kg


Compression of dental images and hybrid dental imaging system with local area and cloud networks
Methods and systems for storing and accessing dental images. The system includes an imaging system for acquiring x-ray projection frames.
Dental Imaging Technologies Corporation


Link-server caching

A computer system for optimizing bandwidth usage within a cloud storage system identifies distinct requests to access a particular digital file. When the number of requests exceeds a threshold, the computer system queries a remote directory server for the particular digital file.
Vivint, Inc.

Method and architecture for application mobility in distributed cloud environment

A method for moving application related records between distributed cloud domains when a user terminal changes its physical location and a predetermined condition is fulfilled. The user terminal is connected to a telecommunication network and uses an application (app).
Telefonaktiebolaget Lm Ericsson (publ)

Swapping non-virtualizing and self-virtualizing devices

A computer in a cloud computing environment includes a virtualization instance (vi) providing cloud services to a consumer device. The computer includes non-virtualizing and self-virtualizing type devices.
International Business Machines Corporation

Forming neighborhood groups from disperse cloud providers

A cloud manager, for forming neighborhood groups from disperse cloud providers, receives provider data relating to a plurality of disperse cloud providers for a plurality of data subcategories classified under n-number main categories. The cloud manager generates a respective vector to represent each of the plurality of disperse cloud providers based on the provider data.
Cisco Technology, Inc.

Wireless ecu configuration updating

Systems, apparatuses, and methods disclosed provide for wirelessly updating engine control unit (ecu) configuration. The method includes determining parameters to be changed on an engine control unit of an equipment, generating a write package including the parameters to be changed, and transmitting the write package to the equipment over the air through a cloud connected application system..
Cummins Inc.

Systems and methods for cloud-based service function chaining using security assertion markup language (saml) assertion

A cloud-based method of service function chaining using security assertion markup language (saml) assertions includes receiving configuration information related to any of users, services, and correspondence between the users and the services; responsive to a request from a user, generating a saml assertion for the request and attaching a stack of service tags with the saml assertion, wherein the stack of service tags defines a service chain for the user and for the request; and providing the saml assertion with the stack of service tags to the user in response to the request. The method can further include providing the saml assertion by the user to one or more services, wherein each of the services creates a context based on the stack of service tags.
Zscaler, Inc.

Method of instant sharing invoked from wearable devices

Techniques are disclosed herein for establishing a file transfer connection via wearable devices (e.g., head-mounted wearable devices). A service executing on a cloud platform receives a connection authentication request including authentication data from wearable devices, each associated with a mobile device.
International Business Machines Corporation

Compression and secure, end-to-end encrypted, zfs cloud storage

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Cloud service control device, cloud service control system, cloud service control method, and storage medium

A cloud service control device includes a first communicator configured to control communication with a cloud service providing a plant control function of controlling a plant, a second communicator configured to control communication with a first device using service information related to the cloud service, a verifier configured to verify an operation state of the cloud service, a selector configured to select the cloud service on the basis of the verified operation state, and an information transferor configured to transfer the service information between the selected cloud service and the first device.. .
Yokogawa Electric Corporation

Apparatus and providing secure execution environment for mobile cloud

Disclosed herein are an apparatus and method for providing a secure execution environment for a mobile cloud. The apparatus for providing a secure execution environment includes a general execution unit for, when a request for service execution is received, generating authentication information, transmitting the authentication information to a cloud server, and receiving a security key required for secure communication from the cloud server, and a secure execution unit for verifying the security key received from the general execution unit and performing secure communication with the cloud server by running a service execution monitor when verification succeeds, wherein the general execution unit is configured to transmit the authentication information, including general authentication information corresponding to the general execution unit and secure authentication information received from the secure execution unit, to the cloud server, thus allowing the cloud server to verify the general execution unit and the secure execution unit..
Electronics And Telecommunications Research Institute

Strong resource identity in a cloud hosted system

Aspects of the present disclosure relate to systems and methods for providing strong resource identification. When a resource is created, saved, or re-based, a cryptographic key pay may be generated and associated with the resource.
Microsoft Technology Licensing, Llc

Differential privacy with cloud data

Embodiments described herein enable data associated with a large plurality of users to be analyzed without compromising the privacy of the user data. In one embodiment, a user can opt-in to allow analysis of clear text of the user's emails.
Apple Inc.

Safety automation system and operation

A safety automation system (20) for an occupiable structure and method of operation includes a plurality of detection devices (30) to facilitate the detection of a hazard condition and output a hazard detected signal to a computing management system (44) that may be a cloud computing system. The management system includes a computer processor (46), and a computer readable storage medium (48) capable of generating various notifications to a mobile user interface device (32)..
Carrier Corporation

Systems and methods for projecting planar and 3d images through water or liquid onto a surface

Systems and methods for projecting planar and 3d images through water or liquid onto a surface include creating a 3d model of the body of liquid and surface and 3d models of creative elements to be used in scenes. Animating the 3d models of the creative elements, placing them inside the 3d model of the body of liquid.
Pointcloud Media, Llc

Systems and methods for computer-based visualization, rendering, and representation of surfaces using point clouds

Presented are embodiments for the generation of point clouds on a surface. A surface is described by a mathematical function.

System and multi-layered billing in a cloud service brokerage

A system for multi-layered billing in a cloud service brokerage is provided, including at least one service vendor configured to provide software services, a cloud service broker, at least one transaction mediator, at least one downstream subscriber, where the cloud service broker receives service vendor pricing rules, service vendor billing rules, downstream subscriber pricing rules, and downstream subscriber billing rules, the cloud service broker further configured to apply the service vendor pricing rules and the service vendor billing rules, and to calculate settlements and perform reconciliations. A method of multi-layered billing in a cloud service brokerage is also provided, the method includes configuring a software service, integrating software services to create integrated software services, establishing a communication provisioning channel, monitoring using at least one transaction mediator the integrated software services, creating a subscription to the integrated software services, receiving service vendor pricing rules, service vendor billing rules, downstream subscriber pricing rules, and downstream subscriber billing rules, applying the service vendor pricing rules and the service vendor billing and calculating and performing settlements and reconciliations..
Ingram Micro Inc.

Provision of rules-based system as cloud service

An endless loop in an inference engine processing a set of rules according to facts stored in a database may be detected by: (a) analyzing the set of rules to identify a subset of the set of rules comprising rules that are triggered by an updated fact (b) executing the rules of the subset; (c) updating at least one of the facts based on the execution of the rules; (d) storing an identifier for each executed rule of the subset; (e) associating each stored identifier with a subset number for the subset in a consecutive sequence of subset numbers for executed subsets; and repeating steps (a)-(e) until the identifier for a rule, to be executed, is associated with an excessive number of subset numbers that are equally offset from each other in the sequence of subset numbers for executed subsets.. .
Sap Se

Distributed and decentralized clound storage system and method thereof

A distributed and decentralized cloud storage method, which comprises: dynamically establishing a set of private notes (‘pn”) after a service requiring note (“srn”) releasing a cloud storage requirement, wherein the pn comprises a plurality of service providing notes (“spn”), and the service providing note provides storage space for the srn; the srn signing a storage contact with the plurality of spn of the pn; the srn performing slicing and encrypting process to a file to be stored, and sending a plurality of sub-files obtained from the process to the plurality of spn which sign the storage contact with the srn respectively; and each spn storing the sub-files received to accomplish the distributed cloud storage of the file to be stored. Compared with the prior art, the method of the present invention solves the problems of low accessing speed and unsecured privacy, hence improves security of cloud storage..
Isuncloud Limited

Consistent file system semantics with cloud object storage

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Cloud migration of file system data hierarchies

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

File system hierarchy mirroring across cloud data stores

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Zfs block-level deduplication at cloud scale

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Hybrid cloud mirroring to facilitate performance, migration, and availability

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Low-latency direct cloud access with file system hierarchies and semantics

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

File system hierarchies and functionality with cloud object storage

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Guaranteed file system hierarchy data integrity in cloud object stores

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Cloud gateway for zfs snapshot generation and storage

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Efficient incremental backup and restoration of file system hierarchies with cloud object storage

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications.
Oracle International Corporation

Cloud servers and methods for handling dysfunctional cloud services

A cloud server including a communication device, a plurality of hardware resources, and a controller is provided. The communication device provides a network connection to the internet and an electronic computing device on the internet.
Quanta Computer Inc.

Method, system, and computer program product for application identification in a cloud platform

A method, system, and computer program product, include extracting information related to one or more processes of one or more applications running on a virtual machine from a memory of the virtual machine, building at least one first application signature based on the extracted information, and identifying the one or more applications running on the virtual machine by matching the at least one first application signature with one or more second application signatures previously stored.. .
International Business Machines Corporation

Methods and systems for processing local and cloud data in a vehicle and a cloud server for transmitting cloud data to vehicles

Methods and systems are provided for receiving local data via a vehicle sensing module of a vehicle control system, receiving remote data via a cloud interface unit of the vehicle control system from a cloud server, and processing the local data and the remote data via a processing unit of the vehicle control system. Based on the processing of the local data and the remote data, at least one vehicle feature is controlled.
Gm Global Technology Operations Llc

Method for controlling the orientation of a solar tracker based on cartographic models

Servo-controlling the orientation of the solar tracker by applying the orientation setpoint value associated to said cloud coverage model retained during step c).. .

Air-conditioning control method, air-conditioning control apparatus, and storage medium

A cloud server includes an environment history db storing in-room temperature history information representing a history of an in-room temperature change in a living room whose temperature is adjusted by an air-conditioner in relation to operation history information representing an operation history of the air-conditioner, an in-room environment predictor that predicts, as a predicted off-state in-room temperature, a future in-room temperature of the living room based on the in-room temperature history information and the operation history information for a case where the temperature is not adjusted by the air-conditioning apparatus, and an air conditioning setting unit that determines, based on the predicted off-state in-room temperature, a control parameter of the air-conditioner used to control the in-room temperature so as to reach a target temperature at a target time.. .
Panasonic Intellectual Property Management Co., Ltd.

Optical detector for encounter with debris suspension cloud

A system includes an image capture device within an existing aircraft shell having a turbine or a rotary wing, the image capture device including an optical assembly having a field of view directed towards at least one of the turbine, the rotary wing, and a surface of the aircraft shell, the image capture device configured to capture an image of radiant flux, and an image analysis unit in communication with the image capture device to analyze the captured radiant flux image to determine a particulate matter concentration in a debris suspension cloud. The system can also include a quantizer unit to quantize an electrical signal from the image capture device, the electrical signal proportional to an intensity of the radiant flux, and an integrator unit to obtain an about continuous value of the radiant flux intensity.
General Electric Company

Cloud generation of content to be streamed to vr/ar platforms using a virtual view broadcaster

The disclosure provides a virtual view broadcaster, a virtual view broadcasting system, and a video gaming broadcaster. In one embodiment, the virtual view broadcaster includes: (1) a cloud-based renderer configured to generate virtual view images from a virtual camera positioned in a computer application, and (2) an image processor configured to generate a virtual view stream for the virtual camera employing the virtual view rendered images, wherein the virtual view images are from different viewing directions at the virtual camera..
Nvidia Corporation

Timing correction method and module for 3d display, and 3d display system using the same

This disclosure provides a timing correction method for 3d display and system. The method includes the following steps: transmitting correction video stream having a preset frame rate to display device, where two successive frame of images of the correction video stream are a first image and a second image respectively; obtaining display image corresponding to the correction video stream, and recording a first time point at which a preset image has been acquired; determining a time difference between the first time point which the preset image has been acquired and a second time point which the preset image has been sent out; correcting, according to the time difference, a time point which a switch signal is transmitted from the master control system to the 3d glasses.
Isuncloud Limited

Imaging apparatus and imaging system

A communication unit which receives a first setsc command to mount an internal recording medium and a second setsc command to mount a cloud storage from a client apparatus over an ip network and a surveillance camera which, if a command received by the communication unit is a first setstorageconfiguration command, mounts the internal recording medium by an access protocol for accessing the internal recording medium and, if the command received by the communication unit is a second setstorageconfiguration command, mounts the cloud storage by cdmi.. .
Canon Kabushiki Kaisha

Global cloud applications management

Systems, methods, and computer program products to perform an operation comprising deploying a first application in a first cloud computing environment of a plurality of cloud computing environments, wherein the first application is composed of a first instance of a first service, determining that the first service has become unavailable in the first cloud computing environment, identifying, by an instance of inventory module executing in the first cloud computing environment, a second instance of the first service in one of the plurality of cloud computing environments, building the first application using the second instance of the first service; and redeploying the first application built using the second instance of the first service in the first cloud computing environment.. .
International Business Machines Corporation

Method and scheduling resources in a cloud system

An objective of the present disclosure is to provide a method and apparatus for scheduling resources in a cloud system. The method according to the present disclosure comprises steps of: determining, according to stability of computing resources in the cloud system, respective resource priority levels of the respective computing resources; determining a scheduling algorithm corresponding to a current job when it is needed to schedule the resources; and allocating the resources based on the scheduling algorithm and resource priority levels of currently available respective computing resources.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Network resource schedulers and scheduling methods for cloud deployment

In scheduling network resource for cloud network environment including a plurality of hosts, a scheduler determines whether one or more hosts from among the plurality of hosts are available to host a first virtual machine by filtering the plurality of hosts based on (i) first virtual machine type indicator information associated with a request to schedule the first virtual machine and (ii) second virtual machine type indicator information associated with the plurality of hosts. If one or more hosts are available to host the first virtual machine, the scheduler selects a host based on selection criteria associated with the filtered plurality of hosts, and schedules the first virtual machine to run on the selected host.

Efficient communication within hybrid cloud system

Techniques for communicating between service nodes within a hybrid cloud computing system. These techniques include utilizing a messaging provider within an off-premise computing system to pass messages between off-premise servers holding a connection to an on-premise computer system and off-premise servers holding a connection to an end user computer system..
Vmware, Inc.

Geolocation-based activation and de-activation of hardware and software functionalities in the cloud

A method, system and/or computer program product alters a computer resource while in a particular geolocation of a cloud computing environment. One or more processors detect that a geolocation of a computer resource has changed to a first geolocation within a cloud computing environment.
International Business Machines Corporation

Media content management device

A media content management device includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method for providing management of media content. The device may receive media content from a data source and determine a set of media operations that can be performed by the device on a locally stored copy of the media content on the storage means or by a cloud storage system on a remotely stored copy.
Western Digital Technologies, Inc.

Execution of data logging in a networked computing environment

Embodiments of the present invention provide systems and methods for organization of data logging in a networked computing environment. A plurality of logging and monitoring zones, referred to as “logmon” zones are defined.
International Business Machines Corporation

Mqtt cluster shared subscription hub for fat-pipe cloud applications

A computer implemented method of improving server coverage of a publish-subscribe cluster comprising using one or more hardware processors to execute one or more shared subscriptions hubs each adapted to retrieve shared subscriptions information from a cluster comprising multiple servers executing multiple messaging engines of a publish-subscribe service for forwarding messages to a plurality of subscribing clients, each message is associated with one or more of a plurality of topics, receive shared subscriptions requests for subscribing for one or more of the topics from distributed subscriptions client(s) applying shared subscriptions for the topic(s) through subscription group(s) comprising a subset of the subscribing clients, connect to preferred messaging engine(s) selected to improve server coverage of the subscription group(s) according to the shared subscriptions information to serve each of the plurality of shared subscriptions requests and forward messages associated with the topic(s) received from the selected messaging engine(s) to the subscription group(s).. .
International Business Machines Corporation

Technologies for privacy-preserving security policy evaluation

Technologies for privacy-safe security policy evaluation include a cloud analytics server, a trusted data access mediator (tdam) device, and one or more client devices. The cloud analytics server curries a security policy function to generate a privacy-safe curried function set.
Mcafee, Inc.

Method and system for shunting reflective ddos traffic

Disclosed are a method and system for shunting reflective ddos traffic. The method includes: acquiring and detecting data flow of a network node a to obtain an attack source ip address and a set of attack types (set t) where the attack source ip address generates attack traffic of which the type belongs to the set of attack types (set t); sending the attack source ip address and the set of attack types (set t) to a drainage device; sending, by the drainage device, all requests for the set of attack types (set t) to the attack source ip address; and draining attack traffic sent by the attack source ip address to a network node b where the attack traffic is cleaned.
Guangdong Eflycloud Computing Co., Ltd.

Cloud service usage risk analysis based on user location

A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter detected anomalies. The locations from which the cloud usage activities are made are analyzed and designated as trusted or non-trusted.
Skyhigh Networks, Inc.

System and providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment

A trigger event monitoring system is provided in one or more virtual assets. One or more trigger parameters, including security threat patterns, are defined and trigger data is generated.
Intuit Inc.

System and method to implement cloud-based threat mitigation for identified targets

An on-premises network protection system and method for providing on-premises network protection are provided. The system includes a memory configured to store instructions and a processor disposed in communication with the memory, wherein the processor upon execution of the instructions is configured to receive notification that a characteristic of premises-based network traffic associated with at least one identified target of a network attack exceeds a predetermined threshold, and submit, based on the notification, a request, that identifies the at least one identified target, to a cloud-based protection system to provide cloud-based threat mitigation for a portion of network traffic associated with the at least one identified target..
Arbor Networks, Inc.

Secure service for receiving sensitive information through nested iframes

Methods and systems for receiving sensitive information include receiving a request for entering sensitive information, the request received from a user interface rendered on a client device. The methods and systems rely upon nested iframes, each of which is hosted by a different server.
Excalibur Ip, Llc

Verification of geolocation of devices in a cloud data center

A processor-implemented method alters a computer resource based on its new geolocation. One or more processors receive a message that a computer resource has moved from a first geolocation to a new geolocation.
International Business Machines Corporation

Personal cloud device for digital media

A personal cloud device includes a housing, one or more processors disposed within the housing, a local area network interface to communicatively couple the processors to a local area network, at least one of: (i) internal persistent storage disposed within the housing, or (ii) an interface to removably attach the personal cloud device to a persistent storage device, to store a library of digital media files including photo and/or video content, and a memory disposed within the housing. The memory stores identifiers of users authorized to operate the personal cloud device, and instructions that cause the personal cloud device to detect a trigger condition related to a location of a user device associated with one of the authorized users, and, in response to detecting the trigger condition, automatically retrieve digital media files from the user device for storage in the internal persistent storage or the persistent storage device..
Monument Labs. Inc.

Technologies for securely extending cloud service apis in a cloud service marketplace

Technologies for securely extending cloud service application programming interfaces (apis) in a cloud service marketplace include a connector hub of a marketplace computing device communicatively coupled to a cloud service provider interface of a cloud service provider and a cloud service broker interface of a cloud service broker. The connector hub is configured to deploy an api connector instance in a connection factory of the marketplace computing device, transmit provider provisioning channel credentials to the api connector instance and the cloud service provider interface and transmit broker provisioning channel credentials to the api connector instance and the cloud service broker interface.
Ingram Micro Inc.

Method and deploying security access control policy

A method and an apparatus are provided for deploying a security access control policy in the field of network security. The method, executed by a cloud management platform, includes: determining, according to an application creation instruction, an application template used for an application that needs to be created and a security profile corresponding to the application template; instructing a virtualization platform to create, according to the application template, a corresponding virtual machine for each application component in the application, and obtaining an ip address of each virtual machine created by the virtualization platform; generating a group of security access control policies corresponding to the application according to the ip address of each virtual machine and by using the security profile; and delivering the group of security access control policies to a corresponding firewall.
Huawei Technologies Co., Ltd.

System and coupling a home area network with the cloud creating a highly secure and scalable private topology

A device, system and method, according to various embodiments, can include, for example, a hybrid cloud network, one or more personal cloud virtual lans, and a home area network. The hybrid cloud network can be configured to provide public access and private access.

Wide area service discovery for internet of things

A cloud-based dns-sd architecture may link together separate lans to form a virtual discovery zone from a service discovery perspective that includes a cloud based dns-sd server separate from regular internet dns, and asleep node handling, among other things. In an example, a cloud based dns-sd server is separate from the regular internet dns servers.
Convida Wireless, Llc

Cluster assisted mqtt client coverage for fat-pipe cloud applications

A computer implemented method of improving server coverage of a publish-subscribe cluster of servers, comprising using a cluster comprising a plurality of servers each having hardware processor(s), the cluster is adapted to execute messaging engines of a publish-subscribe service for forwarding a plurality of messages to a plurality of subscribing clients, each message is associated with one of a plurality of topics, wherein distributed subscriptions client(s) applies shared subscriptions for one or more topics through subscription group(s) each comprising a subset of the subscribing clients, monitor shared subscriptions made by the subscription group(s) to each of the messaging engines for each topic, generate a shared subscriptions information for each topic by analyzing the shared subscriptions and publish the shared subscriptions information to the clients to allow client(s) of the subscription group(s) to subscribe for the topic(s) on a preferred messaging engine to improve a server coverage of their subscription group.. .
International Business Machines Corporation

Cloud-based spam detection

A cloud based mobile internet protocol messaging spam defense. Short message service (sms) messages are analyzed by a cloud based virtual machine to determine if should be considered potentially unwanted messages (e.g., spam).
At&t Intellectual Property I, L.p.

System, providing a virtual network edge and overlay

A network system is provided between at least a first client site and a second client site, the first and the second client site are at a distance from one another. A client site network component is implemented at least at the first client site, the client site network component bonding or aggregating one or more diverse network connections so as to configure a bonded/aggregated connection that has increased throughput.
Teloip Inc.

System and evaluation of migration of applications to the cloud

The computer-implemented method for evaluation of migration of application to the cloud evaluates subject applications by executing an application discovery tool to capture application inventory data associated with the subject applications and to store the captured application inventory data. The method analyzes user-defined objectives for application cloud migration obtained via user interface and filters a set of predetermined cloud risk probability (crisp) categories based on user-defined objectives.
Syntel, Inc.

Migrating legacy non-cloud applications into a cloud-computing environment

A method and associated system automatically migrates a non-cloud service from a legacy non-cloud virtualized computing environment into a cloud-computing environment. These methods and systems enhance standard cloud-management systems with the introduction of independent infrastructure-discovery and application-discovery tools.
International Business Machines Corporation

Intelligent clothes washing control system and control method

The disclosure provides an intelligent clothes washing control system and control method. The system comprises: a washing procedure module, an acquisition module, a processing module, a recommendation module and a communication module which are arranged at an intelligent terminal, and a server which is arranged in a cloud, wherein the terminal is in communication connection with the server; the washing procedure module comprises at least one washing procedure; the acquisition module acquires the washing records of the washing procedures; the processing module sends the washing records to the server for analysis; the server analyzes the washing records, utilizes big data to obtain washing recommendations matched with the washing records, and sends to the recommendation module; and the recommendation module displays the washing recommendations and the washing procedures sent by the server on a terminal interface.
Qingdao Haier Washing Machine Co., Ltd.

Method and system for secure data storage exchange, processing, and access

A multi-user encrypted secure data storage schema is described that is particularly suited for cloud based storage scenarios. This schema protects against an insider attacks be limiting administrator access to encrypted user data.

Active flow diagnostics for cloud-hosted networks

An overlay network refers to a network that is implemented as various different virtual resources on a physical network referred to as an underlay network. Diagnostics are performed on the overlay network by injecting diagnostic packets from a source endpoint targeting a target endpoint.
Microsoft Technology Licensing, Llc

Conference word cloud

Various disclosed implementations involve processing and/or playback of a recording of a conference involving a plurality of conference participants. Some implementations disclosed herein involve receiving speech recognition results data, including a plurality of speech recognition lattices and a word recognition confidence score for each of a plurality of hypothesized words of the speech recognition lattices, for a conference recording.
Dolby Laboratories Licensing Corporation

Threat detection system having remote/cloud or local central monitoring unit for communicating with internet addressable gateway devices and associated wireless sensor and sub-sensor devices, that blanket a venue using multi-hop and low power communication platforms with such communication by mesh zigbee, z-wave, ipv6, bluetooth, wifi, cellular, satellite or broadband network arrangement and reporting data, data rate of change non-compliance and device location non-compliance and device non-resp

A data sensing and threat detection network comprising a plurality of wireless sensor devices and their related wireless sub-sensor devices, for communication, with wireless detector units/gateways in a network arrangement to allow transmission of data there between in optimized paths, such wireless detector units to communicate, by secure means, to and front a central monitoring unit that manages the sensing and client alert processes, based upon wireless sensor values/conditions and wireless sub-sensor values/conditions as they relate to pre-determined values/conditions, and sensor device location co-ordinates data (derived from gps or cts, or the like) as it relates to pre-determined “location differential values”, data “timeframe-based rate of change” as it relates to pre-determined “rate of change differentials” in a pre-determined timeframe or part thereof, and the like, with the central monitoring unit enabling related devices and alerting clients, and confirming that such related devices have been enabled and alerts have been delivered, as and when required. Notwithstanding, the data sensing and threat detection network provides clients with a powerful, flexible and dynamic central monitoring system and related wireless gateways, sensor and sub-sensors that provide a true data management solution with homeland security color coded normal, aware, alert and urgent alert graphic representation, and archiving, of all data, in accordance with client needs..

Environmental mapping system

An augmented reality (ar) display application generates mapped visualization content overlaid on a real world physical environment. The ar display application receives sensor feeds, location information, and orientation information from wearable devices within the environment.
Daqri, Llc

Enrichment of point cloud data for high-definition maps for autonomous vehicles

A vehicle computing system performs enhances relatively sparse data collected by a lidar sensor by increasing the density of points in certain portions of the scan. For instance, the system generates 3d triangles based on a point cloud collected by the lidar sensor and filters the 3d triangles to identify a subset of 3d triangles that are proximate to the ground.
Deepmap Inc.

Stereoscopic rendering using raymarching and a virtual view broadcaster for such rendering

The disclosure provides a virtual view broadcaster, a cloud-based renderer, and a method of providing stereoscopic images. In one embodiment, the method includes (1) generating a monoscopic set of rendered images and (2) converting the set of rendered images into a stereoscopic pair of images employing depth information from the monoscopic set of rendered images and raymarching..
Nvidia Corporation

Methods and systems for automatic fullness estimation of containers

A method and apparatus for (a) receiving a three-dimensional (3d) point cloud from a depth sensor that is oriented towards an open end of a shipping container, the point cloud comprising a plurality of points that each have a respective depth value, (b) segmenting the received 3d point cloud among a plurality of grid elements, (c) calculating a respective loaded-container-portion grid-element volume for each grid element, (d) calculating a loaded-container-portion volume of the shipping container by aggregating the calculated respective loaded-container-portion grid-element volumes, (e) calculating an estimated fullness of the shipping container based on the loaded-container-portion volume and a capacity of the shipping container; and (f) outputting the calculated estimated fullness of the shipping container.. .
Symbol Technologies, Llc

Systems and methods for improving electronic futures spread exchange

The present disclosure relates to systems for creating an improved futures spread exchange for trading futures and futures option spread products. The present disclosures may include an exchange computer, vendors, customers, and a conversion device.

Digital data commerce system and methods with digital media object to cloud redirection

The invention provides, in some aspects, a digital commerce system that includes a first digital data device, a second digital data device and a third digital data device, each of which is connected to a network that provides at least intermittent communications coupling between the second digital data device and each of the first and second digital data devices. Redirection logic executing on at least the second digital data device effects storage on the third digital data device of a digital media object downloaded from the first digital data device to the second digital data device.
Redigi, Inc.

Cloud-based transactions with magnetic secure transmission

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (luk) to generate a transaction cryptogram, and transmitting a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The token and the transaction cryptogram can be transmitted to a magnetic stripe reader by generating an emulated magnetic signal.

Distributed cache cleanup for analytic instance runs processing operating data from industrial assets

In some embodiments, a cloud-based services architecture may receive operating data associated with a set of assets from a set of enterprise system devices. The cloud-based services architecture may then process the received operating data.
General Electric Company

Autonomous ev charging priority network

Systems of an electrical vehicle and the operations thereof are provided. One embodiment details how autonomous ev's can communicate with each other as well as with charging station(s).
Nextev Usa, Inc.

System and transferring data from a cloud-based database to a private network database for long-term storage

A system and method for the protection of sensitive information by transferring data from a cloud-based database to a private network database for long-term storage is presented. The system includes an online cloud endpoint having a cloud application database and a cloud temporary database for the selective storage of information.

Representation of a data analysis using a flow graph

Techniques facilitating using flow graphs to represent a data analysis program in a cloud based system for open science collaboration and discovery are provided. In an example, a system can represent a data analysis execution as a flow graph where vertices of the flow graph represent function calls made during the data analysis program and edges between the vertices represent objects passed between the functions.
International Business Machines Corporation

Representation of a data analysis using a flow graph

Techniques facilitating using flow graphs to represent a data analysis program in a cloud based system for open science collaboration and discovery are provided. In an example, a system can represent a data analysis execution as a flow graph where vertices of the flow graph represent function calls made during the data analysis program and edges between the vertices represent objects passed between the functions.
International Business Machines Corporation

Onboarding portal for cloud platform

The example embodiments are directed to an onboarding portal for adding a new iot software item to a cloud platform. In an example, a web service of the cloud platform may receive a plurality of user inputs associated with an iot analytic application input via an onboarding user interface.
General Electric Company

Advanced zero-knowledge document processing and synchronization

Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and in a server system) and the data is retained in cyphertext, and where the cloud-based server system is not tasked with the saving or management of the relevant cryptographic keys. Because the network- or cloud-based server system has “zero-knowledge” about the document's data content or the relevant cryptographic keys, an attack on the server system does not put the security of the document's data at risk.
Entefy Inc.

Advanced zero-knowledge document processing and synchronization

Techniques disclosed herein decouple a document's structure from its general content wherein the structure is retained in plaintext (both at a client device and in a server system) and the data is retained in cyphertext, and where the cloud-based server system is not tasked with the saving or management of the relevant cryptographic keys. Because the network- or cloud-based server system has “zero-knowledge” about the document's data content or the relevant cryptographic keys, an attack on the server system does not put the security of the document's data at risk.
Entefy Inc.

Guided machine-learning training using a third party cloud-based system

Systems and methods may enable a user who may not have any experience in machine learning to effectively train new models for use in object recognition applications of a device. Embodiments can include, for example, analyzing training data comprising a set of images to determine a set of metrics indicative of a suitability of the training data in machine-learning training for object recognition, and providing an indication of the set of metrics to a user.
Qualcomm Incorporated

Method and system for protecting web applications against web attacks

The present disclosure provided a method and system for protecting web applications against web attacks comprising a cloud service for generating rules and receiving reports, an agent manager in communication with the cloud service receiving rules from the cloud service and passing reports thereto, and an in-application agent in communication with the agent manager for receiving rules therefrom and passing reports thereto for protecting an application in which the in-application agent is embedded.. .
Trend Micro Incorporated

Infinite memory fabric hardware implementation with router

Embodiments of the invention provide systems and methods for managing processing, memory, storage, network, and cloud computing to significantly improve the efficiency and performance of processing nodes. More specifically, embodiments of the present invention are directed to a hardware-based processing node of an object memory fabric.
Ultrata, Llc

Cloud-based event calendar synching and notification

A device executes a calendar event application, and the calendar event application receives a notification, from cloud storage, associated with an occurrence related to a calendar event. The calendar event application obtains event information of the calendar event, and presents multiple selectable user interface icons that cause the user device to engage in multiple different forms of electronic communication with at least one attendee of the event, at least one recipient of a notification of the event, or at least one other individual.
Verizon Patent And Licensing Inc.

Information providing method and information providing apparatus

A cloud server (104) receives environmental information of respective installation sites of a plurality of appliances (101a, 101b, 101c, 102a, 102b) via a network (1000), and determines one or more appliances that are installed in a same room among the plurality of appliances (101a, 101b, 101c, 102a, 102b), based on the received environmental information.. .
Panasonic Intellectual Property Corporation Of America

Detection of traffic dynamics and road changes in autonomous driving

In some embodiments, the disclosed subject matter involves a system and method for dynamic object identification and environmental changes for use with autonomous vehicles. For efficient detection of changes for autonomous, or partially autonomous vehicles, embodiments may use a technique based on background removal and image subtraction which use motion detection rather than full object identification for all objects in an image.

Method and system for determining the aerodynamic resistance of a cyclist

A method for determining the aerodynamic resistance of an object or a person having its own movement, remarkable in that it includes at least the following steps: acquiring, between two moments tinit and tfin 3d clouds of dots corresponding to the spatial position of various points positioned at different locations of the object or the person; determining 3d models as a function of time, for each moment between tinit and tfin, from dots of the clouds of dots acquired at each moment between the moments tinit and tfin; simulating the movement of the solids described by the clouds of dots corresponding to the object with a person in a fluid, for each moment between the moments tinit and tfin; and calculating the average of the aerodynamic resistance forces exerted on the object or person between the moments tinit and tfin.. .
Apeira Technologies

High definition map updates with vehicle data load balancing

An online system builds a high definition (hd) map for a geographical region based on sensor data captured by a plurality of autonomous vehicles driving through a geographical region. The autonomous vehicles detect map discrepancies based on differences in the surroundings observed using sensor data compared to the high definition map and send messages describing these map discrepancies to the online system.
Deepmap Inc.

Detection of vertical structures based on lidar scanner data for high-definition maps for autonomous vehicles

A vehicle computing system performs enhances relatively sparse data collected by a lidar sensor by increasing the density of points in certain portions of the scan. For instance, the system generates 3d triangles based on a point cloud collected by the lidar sensor and filters the 3d triangles to identify a subset of 3d triangles that are proximate to the ground.
Deepmap Inc.

Occupancy map updates based on sensor data collected by autonomous vehicles

An online system builds a high definition (hd) map for a geographical region based on sensor data captured by a plurality of autonomous vehicles driving through a geographical region. The autonomous vehicles detect map discrepancies based on differences in the surroundings observed using sensor data compared to the high definition map and send messages describing these map discrepancies to the online system.
Deepmap Inc.

Centrally controlled safe management system

A cash management system utilizes a cloud computing model wherein a cloud of one or more servers may be locally networked or may be geographically dispersed and accessed by the client device over the internet. The client device is a cash management safe.
Fireking Security Products, Llc

Block processing configurations for base stock production from deasphalted oil

Systems and methods are provided for block operation during lubricant and/or fuels production from deasphalted oil. During “block” operation, a deasphalted oil and/or the hydroprocessed effluent from an initial processing stage can be split into a plurality of fractions.
Exxonmobil Research And Engineering Company

Remotely granting vehicle permissions

A system for remotely granting vehicle permissions over a cloud network may be performed by one or more processors connected to the cloud network. The one or more processors may generate an electronic key for permitting one or more registered users to access and operate a vehicle, and the electronic key may include a plurality of permission settings.
Faraday&future Inc.

System and pairing devices to cloud-based applications

A system and method for automatically pairing local electronic devices with a gateway after registration of such electronic devices by a manufacturer. A lookup table is generated from the registration information and stored on an information platform connected to the gateway.
Safenet International, Llc

Pre-roaming security key distribution for faster roaming transitions over cloud-managed wi-fi networks of heterogeneous ip subnets

A cloud control element distributes security keys prior to roaming to facilitate fast transition roaming across different ip subnets. The cloud control element distributes security keys to access points identified as neighboring and sharing a common ssid (service set identifier), but over different ip subnets.
Cloudmondo, Inc.

Securing credential distribution

Methods, systems and apparatus for securing credential distribution are disclosed. One method includes receiving, by a cloud system, a notification from a credential management system that a wireless device is associated with an authenticated user of the credential management system, wherein the credential management system stores private network credentials of the authenticated user, and wherein the cloud system further receives an identifier of the wireless device with the notification, authenticating, by the cloud system, the wireless device, receiving, by the cloud system, a request from the wireless device for private network credentials, and distributing, by the cloud system, the private network credentials to the wireless device, thereby allowing the wireless device to obtain local network access with the private network credentials..
Cirrent, Inc.

Situation awareness system, method and computer-readable recording medium for providing smart service in internet of things environment

Context-aware system, method, and computer-readable recording medium for providing an intelligent service in an internet of things (iot) environment are provided. The context-aware system includes a plurality of iot devices, each including at least one sensor and a communication unit, a gateway connected to the plurality of iot devices and including at least one gateway device connected to an internet network, and a cloud server layer which transmits and receives data to and from the plurality of iot devices through the internet network and the gateway, wherein at least one iot device, which cannot perform a context-aware processing process in real time, generates context information, and transmits it to a context-aware server of the cloud server layer.
Samjin Lnd Co., Ltd

Long term evolution intelligent subscriber profile

A processor may be configured to perform real-time analysis during a cloud service session so that intelligent subscriber profile information may be updated to a server for future cloud services for the originating user device and the terminating cloud service device.. .
At&t Intellectual Property I, L.p.

Cloud dvr optimization

In one embodiment, a method, system and apparatus are described for cloud digital video recorder optimization. A cloud based storage unit stores recorded content items in response to recording requests by users from among a plurality of users, each recorded content item belonging to at least one content item type category and each user belonging to at least one user type category.
Cisco Technology, Inc.

Systems and methods for improved video call handling

Systems and methods for providing video subtitling and text communications (e.g., real time text (rtt) and conventional text messaging) during video calls. The system can include video calling with voice recognition based subtitles.
T-mobile Usa, Inc.

Edge node, mesh network and method to deliver content at an edge of a mesh network

A network entity is provisioned to support cloud services for a mesh network that includes at least one edge node. The network entity comprises: a processor, operably coupleable to a content store; and a content agent registry coupled to the processor and configured to identify content to be delivered to the at least one edge node.
Vituosys Limited

Connecting public cloud with private network resources

The automatic provisioning of a connection between a public cloud and an on-premises resource in a private network. This allows a connection to be more easily made when an application in the public cloud is to access that on-premises resource in the private network.
Microsoft Technology Licensing, Llc

Automated etl resource provisioner

Aspects automatically provisioning of cloud resources for etl job execution as a function of optimizer output data. Access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing an sql commands against a relational database.
International Business Machines Corporation

Automated etl resource provisioner

Aspects automatically provision cloud resources for extract, transform and load job execution as a function of optimizer output data. Aspect access paths identify overall cost and individual step operator costs and statistics relative to cloud resources for executing structured english query language command against a relational database.
International Business Machines Corporation

Internet-of-things transaction resoruce with finite state automata

Cloud container resource binding and tasking using keys is generally described herein. An exemplary device to perform a transaction with a peer device includes a server having a transaction resource finite state automaton (fsa) to perform the transaction.

Method and system for managing cloud based operations

Computing resources 202, from a cloud computing network 200, are adjusted for a virtualized operation. Data comporting to the computing sources 202 and metrics of the virtualized operation are received and compared against the parameters that are associated with the virtualized operation.
Bebop Technology Llc

Hybrid distributed communication

A method includes establishing a connection between a physical signaling module and a physical media module, the physical signaling module configured to establish a connection between two communication endpoints, the physical media module configured to transfer media between the two communication endpoints. The method further includes establishing a connection between the physical signaling module and a media virtual network function (vnf) module, the media vnf module running in a cloud-based environment, the media vnf module configured to transfer media between the two communication endpoints..
Genband Us Llc

Method for auditing cloud access in real time

A method for auditing cloud access in real time includes steps of step 1: client obtains necessary information from a synchronization server (sys), by executing a library comprising index function Γ required by program, and saving a root hash value r of a fully binary hash tree (fbhtree) in sys; step 2: the client obtains leave node position corresponding to fbhtree and corresponding tree node position by inputting an index function Γ via file absolute path; step 3: obtaining slice of fbhtree based on the leave node position in step 2; step 4: performing a hash computation on tree node position in the slice and hash value saved at another tree node position to obtain hash value of tree node position of one previous level till root hash value y is obtained; step 5: comparing the hash value y and the root hash value r saved by the client.. .
Tidetime Sun Ltd.

Systematic enhancement of contact information

A system for systematically enhancing consumer and business contact information is disclosed. A server located “in the cloud” systematically controls a database of contact data elements, some of which have preferred and/or user-selected privacy protocols and update availability.

Systems and methods for cloud based unified service discovery and secure availability

Systems and methods implemented by an application executed on a user device for service discovery and connectivity include discovering one or more cloud services for a user associated with the user device; creating and operating an interface on the user device; and intercepting traffic at the interface from one or more client applications on the user device and splitting the traffic based on configuration to the one or more cloud services. The method can further include authenticating the user into the one or more cloud services prior to the splitting..
Zscaler, Inc.

Cloud-based onboarding of cloud-controlled wi-fi network devices

A cloud-based onboarding server receives first identification information associated with a network device, from a wireless station authenticated to the cloud-based wi-fi onboarding server, the identification information being sent on behalf of the network device. Additionally, second identification information associated with the network device is received from the network device.
Cloudmondo, Inc.

Secure execution and tracking of workflows in a private data center by components in the cloud

One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user.
Vmware, Inc.

Address allocation

An access point (ap), deployed at a user network side, identifies a type of a packet received from a wireless client at the user network sid and performs a tunnel encapsulation on the packet if the packet is a dynamic host configuration protocol (dhcp) request packet to generate a tunnel encapsulated dhcp request packet. The ap sends the tunnel encapsulated dhcp request packet to an access controller (ac) deployed at a cloud platform side.
Hangzhou H3c Technologies Co., Ltd.

Methods and devices for switching a virtual internet protocol address

Methods and devices for switching a virtual internet protocol (vip) address are provided. In one implementation, the method may include sending to a control center of a vip address system a first address resolution protocol (arp) mapping message for mapping a vip address to a vm address of a virtual machine (vm) of the vip address system.
Alibaba Group Holding Limited

Software-defined socket activation

Cloud providers must provide a consistently high availability of resources in order to respond to flexible demand. However, available but idle resources are inefficient.
Interwise Ltd.

Determining the health of an iot application

The example embodiments are directed to a system and method for monitoring the health of analytical applications. In certain embodiments, these analytic applications may be a part of a broader iot solution that may optionally be hosted on a cloud platform.
General Electric Company

Cloud migration and maintenance controls

Improved interfaces for cloud migration are provided. In one implementation, the interface may include a plurality of quadrants reflecting risk associated with cloud deployment of a plurality of software technology assets along a first axis and cost associated with cloud deployment of the plurality of software technology assets along a second axis as well as a plot point for each of the plurality of software technology assets, each plot point being mapped to one of the plurality of quadrants corresponding to an associated risk and cost of the corresponding software technology asset..
Capital One Services, Llc

Secure plug and play configuration of wireless distribution system (wds) wi-fi range extenders

A cloud-based onboarding server detects a network change and facilitates an onboarding process for a new access point. An ssid and authentication credentials for an existing wi-fi channel are sent over a temporary wi-fi channel using a preconfigured ssid and passphrase generated by both the new access point and the master access point.
Cloudmondo, Inc.

Distributed storage quota enforcement

Embodiments are directed to client-side enforcement of storage quotas in a cloud service or distributed computing environment. A storage driver is configured to monitor access to an external storage system by a cloud process and to enforce storage limits for the external storage system.
Microsoft Technology Licensing, Llc

Fast bss transitions between access points for stations of cloud-controlled wi-fi networks

A cloud-based wi-fi controller facilitates fast bss transitions. Ieee 802.11r or other fast bss transition parameters are transferred through the cloud from the wireless station, for pre-population in neighboring or nearby access points.
Cloudmondo, Inc.

Method and agent for sharing information about cloudlet properties in distributed cloud environments

It is disclosed an agent (30) of a first cloudlet and a method performed therein, the first cloudlet having one or more service properties, the first agent having associated a first group of one or more other cloudlets. Based on exchange (202, 204) of information about service properties of cloudlets accessible to each agent, a comparison (206) is made between service properties from different cloudlets, and if a certain cloudlet has at least one service property that exceeds a service property of any one of the first group of cloudlets, said certain cloudlet is added (212) to the a group of cloudlets, which efficiently represents service properties available to the first agent..
Telefonaktiebolaget Lm Ericsson (publ)

Object signing within a cloud-based architecture

A system and method for digitally signing an object. An object signing agent sends a signing request for an object to a remote signing server, which, in response to receiving the request, generates a virtual machine executing code for signing the object.
Digicert, Inc.

Cloud authentication of layer 2-connected member devices via an ip-connected active device

Techniques for enabling cloud authentication of layer 2-connected member devices via an ip-connected active device are provided. In one set of embodiments, the member device can transmit, to the active device, a request to authenticate the member device with a cloud management platform.
Brocade Communications Systems, Inc.

Personal digital identity card device for fingerprint bound asymmetric crypto to access merchant cloud services

A personal digital id device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press.
Tyfone, Inc.

Distributed mimo and/or transmit diversity in a cloud-ran system

One embodiment is directed to a system that implements a downlink transmission mode that precodes sequences of symbols using a precoder matrix selected from a codebook. Linear transformations are performed on the sequences of precoded symbols using a distribution matrix.
Commscope Technologies Llc

Cloud based power management system for electronic devices

The invention is directed to a connected charging device configured to be paired with at least one chargeable device for performing a charging session of said at least one chargeable device, wherein during said charging session the charging device is configured to store at least one real-time data related to the power/charging status of the at least one chargeable device and transmit the data to a cloud based data store and analytics module, together with said charging device id for monitoring power profile behaviour of said at least one chargeable device. The invention is further directed to a system comprising a cloud based data store and analytics module; said system is configured to receive data from an at least one charging device; wherein said data being received during a charging session performed by said at least one charging device, wherein said data being related to the power/charging status of a chargeable device being charged by said charging device during said charging session; wherein said analytic module is configured for analysing said data and for managing said charging device and/or chargeable device as a result of said analysis..
Humavox Ltd.

Method, system, and voice and video digital travel companion

The present invention contemplates a variety of improved techniques using a travel companion. The travel companion can include a headset, a user device, and the cloud.
Essential Products, Inc.

Method and system for providing artificial intelligence analytic (aia) services for performance prediction

One embodiment of the present invention predicts a vehicular event relating to machinal performance using information obtained from interior and exterior sensors, vehicle onboard computer (“voc”), and cloud data. The process of predication is able to activate interior and exterior sensors mounted on a vehicle operated by a driver for obtaining current data relating to external surroundings, interior settings, and internal mechanical conditions of the vehicle.
Surround . Io Corporation

Method and system for providing artificial intelligence analytic (aia) services using operator fingerprints and cloud data

One embodiment of the present invention discloses a process of providing a report predicting potential risks relating to an operator driving a vehicle using information obtained from various interior and exterior sensors, vehicle onboard computer (“voc”), and cloud network. After activating interior and exterior sensors mounted on a vehicle operated by a driver for obtaining data relating to external surroundings and internal environment, the data is forwarded to voc for generating a current fingerprint associated with the driver.
Surround.io Corporation

Comprehensive real-time monitoring and management of security patrolling operations

The present disclosure relates to a comprehensive system and associated method for real-time monitoring and management of the patrolling operations by a number of security personnel. The present system includes one or more electronic communication devices that are configured to run a security patrol management application.
Infostandard Sdn. Bhd.

Method and system for imaging and analysis of anatomical features

A method and system are provided for characterizing a portion of biological tissue. This invention comprises a smartphone and tablet deployable mobile medical application that uses device sensors, internet connectivity and cloud-based image processing to document and analyze physiological characteristics of hand arthritis.
Etreat Medical Diagnostics Inc.

Tethered 3d scanner

In a computer-implemented method and system for capturing the condition of a structure, the structure is scanned with a three-dimensional (3d) scanner. The 3d scanner generates 3d data.
State Farm Mutual Automobile Insurance Company

System and generating and storing digital receipts for electronic shopping

A system and a method are provided for generating a digital receipt for purchases made utilizing a digital wallet or with other payment procedures. The digital receipt is stored in the cloud in a digital receipts repository for later retrieval.
Mastercard International Incorporated

Policy-based scaling of computing resources in a networked computing environment

Embodiments of the present invention provide an approach for policy-driven (e.g., price-sensitive) scaling of computing resources in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a workload request for a customer will be received and a set of computing resources available to process the workload request will be identified.
International Business Machines Corporation

Cloud-assisted perceptual computing analytics

A computing device and method for cloud-assisted perceptual computing is described. The computing device includes a sensor to collect data for perceptual computing.
Intel Corporation

Parallel model creation in cloud platform

A system, method, and computer-readable medium to receive at least one data table relating to a data set; receive a plurality of dimensions; combine, by a first parallelization process, the plurality of dimensions into a plurality of different clusters, each cluster being a grouping of different dimensions; transmit each of the plurality of different clusters to a cloud platform; divide, by a second parallelization process, the at least one data table into a plurality of different chunks of data; and transmit each of the plurality of different chunks of data to the cloud platform, in parallel to and independent of the transmission of the plurality of different clusters the cloud platform, the cloud platform to generate a data model based on a combination of the transmitted plurality of different clusters and the transmitted plurality of different chunks of data.. .
Sap Se

Method and organizing database system in a cloud environment

A method for organizing database system in a cloud environment is disclosed. The method comprises selecting, in response to a received database service request, a storage node appropriate to the request from a plurality of storage nodes in the cloud environment, building a storage server corresponding to an instance for processing an i/o stream of the requested database on the selected storage node; managing, by a database manager, information including the database service request and the built storage server as meta information, and organizing, by a computing node, a database system responding to the request based on the meta information..
Tmax Cloud Co., Ltd.

Data synchronization management

In general, a data synchronization management system is disclosed in which files (and/or other data) are synchronized among two or more client computing devices in connection with a backup of those files. Synchronization polices specify files to be synchronized based on selected criteria including file data, metadata, and location information.
Commvault Systems, Inc.

Fast geo recovery elastic cloud storage

One embodiment is related to a method for remote replication recovery, comprising: determining that a damaged data chunk at a first zone of a cloud storage system is not recoverable locally; determining one or more data fragments of the damaged data chunk that are to be recovered with remote replication recovery based on data stored at a second zone and at a third zone of the cloud storage system, wherein the damaged data chunk comprises a plurality of data fragments; recovering the one or more data fragments of the damaged data chunk with remote replication recovery based on the data stored at the second zone and at the third zone of the cloud storage system; and repairing the damaged data chunk with the recovered data fragments at the first zone.. .
Emc Ip Holding Company Llc

Content-aware data recovery elastic cloud storage

One embodiment is related to a method for avoiding recovery and storage of useless data, comprising: determining whether all of one or more unavailable data fragments of a data chunk correspond only to useless data; and in response to determining that all of the one or more unavailable data fragments of the data chunk correspond only to useless data, generating redundancy data for protecting available data fragments of the data chunk without recovering content of the one or more unavailable data fragments.. .
Emc Ip Holding Company Llc

Remote operation authorization between pairs of sites with pre-established trust

One or more embodiments provide techniques for executing a workflow in a private data center. The cloud data center receives a request from a user.
Vmware, Inc.

Identifying application usage roles for devices provided to virtual machines

Embodiments of the disclosure provide techniques for or managing devices for a virtual machine. A method is provided that includes associating, by a processing device of a cloud management system, a device with a virtual machine.
Red Hat, Inc.

True high availability of workloads in a cloud software-defined data center

In accordance with an embodiment of the invention, a cloud computing system is disclosed. The system includes a software-defined data center (sddc), the sddc including at least one cluster supported within the sddc and at least one host computer running within the cluster, wherein the at least one host computer is configured to support at least one workload comprising an operating system and an application, and a cloud infrastructure, the cloud infrastructure including at least one child vm, the at least one child vm configured to virtualize the at least one host computer running within the cluster, and at least one parent virtual machine, wherein additional child vms are deployed by forking the at least one parent vm..
Vmware, Inc.

Method, system and generating, editing, and deploying native mobile apps

A cloud based mobile app building platform that enables rapid development, testing, deployment, new version distribution and analysis of all apps. A platform for building apps visually facilitates app development, updates and changes..

System and disk identification in a cloud based computing environment

A system and method for identifying corresponding disks. The method includes determining identifying information of a primary disk, wherein the primary disk is a logical disk; causing the primary disk to be enlarged to create a first additional disk space; causing primary metadata to be written to the first additional disk space, wherein the primary metadata includes the identifying information of the primary disk; determining a corresponding replicated disk that corresponds to the primary disk by comparing the primary metadata to replicated metadata associated with the replicated disk, wherein the replicated disk is a logical disk; and matching the corresponding replicated disk with the primary disk..
Cloudendure Ltd.

Using lightning data to generate proxy reflectivity data

Methods, systems, and computer program products are described herein for generating proxy reflectivity data associated with lightning activity. A computing device receives data associated with lightning activity for one or more geographical areas.
Earth Networks, Inc.

Methods and systems for capturing the condition of a physical structure via chemical detection

In a computer-implemented method and system for capturing the condition of a structure, the structure is scanned with a three-dimensional (3d) scanner. The 3d scanner generates 3d data.
State Farm Mutual Automobile Insurance Company

Cloud-based game slice generation and frictionless social sharing with instant play

Methods enable creation of a game slice from a game. Plurality of games is provided for presentation on a display device.
Sony Interactive Entertainment America Llc

Management of resource allocation in a mobile telecommunication network

A network entity (100) for managing resource allocation in a mobile telecommunication network comprise a first interface (101) configured to enable the network entity (100) to communicate with one or more cloud managing entities (10), wherein each of the one or more cloud managing entities (10) manages respective remote resources, and a second interface (102) configured to enable the network entity (100) to control operations between one or more network managing entities (20) and the one or more cloud managing entities (10), wherein each of the one or more network managing entities (20) manages respective network elements. Said network entity (100) is configured to exchange information with said one or more cloud managing entities (10) over said first interface (101) and control the operations between said one or more network managing entities (20) and said one or more cloud managing entities (10) based on said information, said information comprising a status of at least one of the respective remote resources (50) managed by said one or more cloud managing entities (10)..
Vodafone Ip Licensing Limited

Load balancing for a cloud-based wi-fi controller based on local conditions

Load balancing for cloud-based monitoring of wi-fi devices on local access networks is based on local conditions. Requests for connection are received from wi-fi devices of the plurality of wlans exceed a threshold.
Meru Networks

Devices and methods for providing foveated scanning laser image projection with depth mapping

Devices and methods are described herein for providing foveated image projection. In general, at least one source of laser light is used to generate a laser beam, and scanning mirror(s) that reflect the laser beam into a pattern of scan lines.
Microvision, Inc.

Systems and methods of fusing multi-angle view hd images based on epipolar geometry and matrix completion

Systems and methods for image processing including a memory having stored multi-angled view images of a scene. Each multi-angled view image includes pixels, and at least one multi-angled view image includes a clouded area in the scene, resulting in missing pixels.
Mitsubishi Electric Research Laboratories, Inc.

Cloud-enabled i/o configuration of a control system

A system and method for configuring a cloud-enabled industrial control system is disclosed involving a cloud computing system receiving instrument data, configuring the instrument data to create an instrument index, alerting and automatically correcting, by a cloud service, configuration errors in the instrument index that occurred during the configuration of the instrument data; creating, by at least a rules engine cloud service using the instrument index, a hardware layout for at least a portion of the cloud-enabled industrial control system; and assigning, by the rules engine cloud service, input/output (i/o) points from the instrument index to the hardware layout to create an i/o configuration file for the cloud-enabled industrial control system.. .
General Electric Company

Software defined network controller and network service allocating system and method

A network service allocating system for a software defined network (sdn) includes an sdn controller, a plurality of sdn switches, a cloud server, and a local server. The sdn controller includes modules for service managing and path managing.
Hon Hai Precision Industry Co., Ltd.

Collaboration data proxy system in cloud computing platforms

In various embodiments, methods and systems for enhanced access to storage data based on a collaboration data proxy system are provided. A plurality of metadata tables on one or more peer nodes are referenced for data corresponding to a data request of a requesting node.
Microsoft Technology Licensing, Llc

System and quality-aware recording in large scale collaborate clouds

An example method includes establishing a communication session between a first participant and a second participant, programming, via a control plane, a stream classifier which is to process packets associated with the communication session with classification logic. The method includes receiving a first packet at the stream classifier and, when the communication session requires recording, applying the classification logic at the stream classifier to route the first packet into a chosen service function path that includes a recording service function which reports media quality data to the control plane.
Cisco Technology, Inc.

Moving a portion of a streaming application to a public cloud based on sensitive data

A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be increased, selects based on the sensitive data which portion(s) of the streaming application can be moved to a public cloud. The streams manager then interacts with the public cloud manager to move the selected portion(s) of the streaming application to the public cloud.
International Business Machines Corporation

System and cloud-based operating system event and data access monitoring

A cloud-based operating-system-event and data-access monitoring method includes collecting event information from a monitored cloud-based element. One or more structured event payloads based on the event information is then generated.
Threat Stack, Inc.

Distributing cloud-computing platform content to enterprise threat detection systems

A content service executing in a cloud-computing-based cloud platform receives enterprise threat detection (etd) content transmitted from an etd content development system (cds) as a publication of the etd content from the etd cds. The received etd content is stored into a content management system (cms).
Sap Se

Method of dynamic resource allocation for public clouds

A device comprises a memory storage comprising instructions and one or more processors in communication with the memory. The one or more processors execute the instructions to access data for a plurality of previous time periods for a client of a plurality of clients, the data for each previous time period of the plurality of previous time periods including resource usage data for a plurality of jobs of the client, apply a time series analysis algorithm to the accessed data to predict a distribution of characteristics of resource usage for a future time period for the client, based on the predicted distribution of characteristics of resource usage, simulate a number of future predicted workloads for the future time period for the client, and based on the simulated number of future predicted workloads, automatically reserve a set of resources for the future time period for the client..
Futurewei Technologies, Inc.

Online cloud-based service processing system, online evaluation method and computer program product thereof

An online cloud-based service processing system, an online evaluation method and a computer program product thereof are provided. The online evaluation method includes: running at least one application service unit of the processing system; executing at least one evaluation registration procedure for at least one application service evaluation unit of the processing system in response to at least one registration request; running the at least one application service evaluation unit; dispatching at least one online service request respectively to the at least one application service unit and the at least one application service evaluation unit, and generating at least one output result corresponding to the at least one online service request; and calculating at least one ranking for each of the at least one application service evaluation unit based on output result(s) generated by the at least one application service evaluation unit among the at least one output result..
Industrial Technology Research Institute

System and cloud-based user interface application deployment

Systems and methods are provided for user interface deployment that include a server with a cloud application and a client device with a client application. The cloud application is a fully functional application, such as a headless application, and transmits scene graph data including presentation data and behavior data for a first set of user interface elements viewable at the client device in a first operational state.
You I Labs Inc.

Cloud-enabled testing of control systems

A system and method for testing a control system is disclosed. The control system includes a field device located in one area and a controller located in a different area.
General Electric Company

Secure provisioning of unique time-limited certificates to virtual application instances in dynamic and elastic systems

A method is provided for automatically provisioning unique x.509 certificates and private keys into application instances in a dynamic and elastic cloud environment. The method provides a means of creating a secure identity to be used for secure communications and resource allocation.
Arris Enterprises Llc

Cloud-based fuel quality recording and fuel station selection system, and utilizing same

A system and method for selecting a fueling station for vehicle refueling, including receiving fuel information from a remote device corresponding to one or more fueling stations near a vehicle; upon the vehicle travelling to a selected one of the one or more fueling stations, setting a flag to a value based upon a fuel grade of fuel used to refuel the vehicle at the selected one of the one or more fueling stations; and capturing location information for at least one of the vehicle and the selected one of the one or more fueling stations. Subsequent to refueling at the selected one of the one or more fueling stations, the method further includes determining fuel information of the fuel used to refuel the vehicle; and sending the flag, the fuel information of the fuel used to refuel the vehicle, and the captured location information to the remote device..
Continental Automotive Systems, Inc.

Systems and methods for assessing available cargo capacity for multiple vehicles

In some embodiments, systems and methods are provided herein useful to assess or determine available cargo capacity for multiple commercial product delivery vehicles. In certain embodiments, systems are provided to determine available cargo capacity for multiple vehicles and may include sensors, delivery agent interfaces, and databases communicatively coupled to control circuits.
Wal-mart Stores, Inc.

Apparatus and deploying analytics

A location where to deploy an analytic is determined. The location is at the cloud or at the site of the industrial machine.
General Electric Company

Systems, methods, and devices for securing data stored in a cloud environment

Devices, systems, and methods for performing particularized encryption of confidential information within real-world data files that are subsequently stored within a cloud environment are described. Specific rules/logic are executed in a local computing environment to identify the type(s) and/or magnitude(s) of confidential information contained within each real-world data file.
Mastercard International Incorporated

Enabling secure big data analytics in the cloud

Methods are provided for enabling secure big data analytics in the cloud. A method includes reading a secure file, by a secure distributed file system in a public cloud service provider.
International Business Machines Corporation

System and correlating cloud-based big data in real-time for intelligent analytics and multiple end uses

A processing platform integrates etl (extract, transform, and load), real time stream processing, and “big data” data stores into a high performance analytic system that runs in a public or private cloud. The platform performs real time pre-storage enrichment of data records to form a single comprehensive record usable for analytics, searching and alerting.
Leidos, Inc.

Apparatus and sorting time series data

At the cloud, time series data is received from at least one industrial machine. The time series data is sensed by at least one sensor at the at least one industrial machine and the data arrives out of time-order.
General Electric Company

Transparent virtualization of cloud storage

Embodiments present a virtual disk image to applications such as virtual machines (vms) executing on a computing device. The virtual disk image corresponds to one or more subparts of binary large objects (blobs) of data stored by a cloud service, and is implemented in a log structured format.
Vmware, Inc.

Certification process for cloud platform

The example embodiments are directed to an automated cloud platform certification process. In one example, the method includes receiving a request for adding an application to the cloud platform, executing the application and performing an automated certification process based on the executed application.
General Electric Company

Verification for device management

A method of eliminating false positives when testing a device management platform for controlling endpoints. The method includes sending, by a computing device, a request to a cloud controller to create an entity.
Nutanix, Inc.

Workload-to-cloud migration analysis based on cloud aspects

Methods and systems for evaluating compatibility of a cloud of computers to perform one or more workload tasks. One or more computing solution aspects are determined that corresponding to one or more sets of workload factors, where the workload factors characterize one or more workloads, to characterize one or more computing solutions.
International Business Machines Corporation

Low impact snapshot database protection in a micro-service environment

An implementation of the disclosure provides a system for generating low impact snapshots comprising a memory to store application data and a processing device coupled to the memory. The processing device is to identify a plurality of transactions within a cloud computing environment.
Red Hat, Inc.

Framework for workflow extensibility in a cloud computing system

An example method of extending a cloud director configured to manage a cloud computing system includes: receiving requests to register external services with the cloud director; generating phase associations between the external services and an extensible phase of a workflow of the cloud director; executing the workflow of the cloud director and, in response to reaching the extensible phase, determining an execution order for at least one of the phase associations; and sending a message from the cloud director to each external service of the at least one phase association based on the execution order.. .
Vmware, Inc.

Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting

A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (i/o) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram.
International Business Machines Corporation

Storage layer based orchestration virtual machine migration across disparate virtualization environments

A storage layer based orchestration method can efficiently migrate a virtualized, enterprise scale system across disparate virtualization environments. A copy of a source logical storage container with multiple virtual disks of virtual machines (vms) can be created in a public cloud destination as a destination logical storage container.
Netapp, Inc.

Integrated services for forms generation and maintenance on cloud

Various embodiments of systems and methods for integrated services for form generation and maintenance on cloud are described herein. The method includes receiving a request for a form-related service from a client.
Sap Se

Method and system for updating occupancy map based on super ray

Disclosed herein are a method and system for updating an occupancy map based on a super ray. The method of updating an occupancy map based on grids and octrees includes the step of generating a mapping line based on point clouds obtained from a sensor, generating a super ray by identifying a cell belonging to a plurality of cells forming the occupancy map and traversing an identical cell based on the generated mapping line, and updating the occupancy map by updating a cell through which the super ray corresponding to some of rays related to the plurality of cells forming the occupancy map passes..
Korea Advanced Institute Of Science And Technology

Method for capturing a 3d scene by means of a lidar system and a lidar system for this purpose

A 3d scene is acquired using a lidar system including a transmitter, a receiver, and a pivotable mirror arrangement between the transmitter and the 3d scene. The transmitter is operated as a laser light source and the receiver is configured as a matrix sensor with an irradiation optical system and light sensors distributed over a surface.
Jena-optronik Gmbh

Systems and methods for remote sensing of the earth from space

A constellation of satellites may include a plurality of satellites in each of two or more different orbits. Satellites in a given orbit may operate in pairs, flying in tandem, one satellite leading, the other trailing closely behind, to be positioned to image the same target(s) of interest with substantially the same orientation (geographical coincident) at substantially the same time (temporally coincident).
King Abdulaziz City Of Science And Technology

Method and device for inspecting crankshaft

The present invention provides a method for inspecting a crankshaft, which enables accurate detection of defects which occur partially in the crankshaft, such as underfills and dent flaws, by discriminating these defects from bending and torsion over an entire length of the crankshaft. The present invention includes steps of: acquiring three-dimensional point cloud data over an entire length of a measurement object region of a crankshaft s by an optical three-dimensional shape measurement device 1; dividing the acquired three-dimensional point cloud data to create a plurality of subregion three-dimensional point cloud data, each of the subregion three-dimensional point cloud data respectively corresponding to each of a plurality of subregions of the crankshaft along a direction parallel to the rotational center axis l of the crankshaft; translating and rotating each of the created subregion three-dimensional point cloud data to superpose each of the subregion three-dimensional point cloud data on a surface shape model of the crankshaft, such that a distance between each of the subregion three-dimensional point cloud data and the surface shape model becomes minimum; and detecting a partial defect such as an underfill of the crankshaft based on a distance between each of the subregion three-dimensional point cloud data after being superposed and the surface shape model..
Nippon Steel & Sumitomo Metal Corporation

System for monitoring a wind turbine blade

The present disclosure relates to a system for determining at least one blade state parameter of a wind turbine blade, wherein the system is configured to: obtain blade data relating to the wind turbine blade from a sensor system associated with the wind turbine blade; compare at least one reference model of at least a portion of the wind turbine blade with the blade data; identify a reference model in dependence on the comparison; and determine at least one blade state parameter in dependence on the identified reference model. The blade data may take the form of an image, for example a 3-dimensional measurement such as a point cloud representing at least a portion of the blade..
Vestas Wind Systems A/s

Extending dewaxing cycle length

Methods are provided for dewaxing a distillate fuel boiling range feed to improve one or more cold flow properties of the distillate fuel feed, such as cloud point. The dewaxing can be performed in the presence of an olefin co-feed that allows for an increase in the average temperature for exposure of the feed to the dewaxing catalyst.
Exxonmobil Research And Engineering Company

Compact wearable phonocardiogram and electrocardiogram continuous monitoring system

Apparatus and method are provided to collect and analyze phonocardiogram (pcg) an electrocardiogram (ecg) waveforms. In one novel aspect, the pcg and ecg waveforms are collected from wearable devices.
Bayland Scientific Llc

Portable beverage brewing and beverage analyte tracking devices and systems

Disclosed are systems, devices and methods for providing a beverage brewing and analyte tracking portable platform. In some embodiments of the disclosed portable beverage brewing and analyte tracking technology, an intelligent beverage management system includes a portable brewing device in communication with a user's mobile device (e.g., smartphone, smartwatch, etc.) for monitoring and controlling consumption and metabolism of caffeine and other compounds from beverages consumed using the portable brewing device and/or other beverages logged by the user.
Teango Technologies, Inc.

Lte-wifi aggregation (lwa) support in a cloud-ran system

One embodiment is directed to a system to provide wireless service to user equipment using licensed radio frequency spectrum and unlicensed rf spectrum. The system comprises a controller and a plurality of radio points to transmit and receive radio frequency signals to and from the user equipment using the licensed rf spectrum.
Commscope Technologies Llc

Cloud-based packet controller and methods for use therewith

Aspects of the subject disclosure may include, for example, a cloud-based communication resource controller that operates by correlating communication requirements, network parameters, end-user device information for a plurality of end-user devices in accordance with the position and trajectory data for these devices to generate correlated end-user and network data. The cloud-based communication resource controller allocates communication resources of a wireless access network for communication to the plurality of end-user devices and controls beamforming by the communication nodes in accordance with the position and trajectory data..
At&t Mobility Ii Llc

Integral program content distribution

This document describes techniques using, and devices embodying, integral program content distribution. These techniques and devices enable a request for program content to be received from an end-user device.
Google Inc.

Edge computing system

An edge computing system comprises an application store, an edge server and a cloud computing system comprising a backend server. The edge server is configured to receive an application from the application store with additional information defining capabilities of the edge server that are required for the application to run on the edge server and/or capabilities of devices connected to the edge server.
Vituosys Limited

Optimizing provisioning of java-based web applications on paas like cloud foundry

A system and method of reducing network bandwidth for application development are provided. The method comprises receiving from a developer platform (i) core application software and (ii) dependency software associated with the core application software.
Sap Se

Systems and methods to anonymize web browsing

A method includes sending one or more messages, from a computing device to a server, to cause the server to establish a connection with the computing device, to cause the server to identify a first set of anonymization characteristics, and to cause the server to instantiate a first instance of an access application within a first cloud container using the first set of anonymization characteristics. The method also includes receiving, by the computing device, second data from the server via the connection.
International Business Machines Corporations

Meta broker for publish-subscribe-based messaging

A messaging meta broker gateway for publish-subscribe messaging environments can provide connectivity, message routing, and subscription management between large numbers of clients and large numbers of brokers. The messaging meta broker gateway can provide access to large numbers of brokers to a client through a single connection.
Sap Se

Systems and methods to anonymize web browsing

A method includes, in response to a request from a computing device, establishing a connection between a server and the computing device. The method additionally includes identifying a first set of anonymization characteristics for a first instance of an access application.
International Business Machines Corporation

Distributed load balancing system, health check method, and service node

A distributed load balancing system includes a cloud management platform, an access node, and at least one service node, where the access node and the at least one service node are physical servers, a first virtual load balancer runs on the access node, and at least one backend server runs on the service node. A detection message is sent by using a detection module on a target service node to detect a status of a target backend server, and the status of the target backend server is shared to a first virtual load balancer by using the detection module.
Huawei Technologies Co., Ltd.

Method and system for sharing file between devices

A method for sharing file of a first electronic device used by a user using a share message implemented by a computer may include: uploading a file to be shared with a second electronic device used by the user to a server according to the share message transmitted through a chat session set between an account of the user of the first electronic device and the server providing a cloud service; storing the share message including a link of a storage location of the server for the file uploaded to the server as an instance message of a private chat room corresponding to the chat session; and displaying the share message stored as the instance message through the private chat room on a screen of the first electronic device, wherein the second electronic device may be configured to access the private chat room with the account of the user.. .
Nhn Entertainment Corporation

Multimedia aware cloud for mobile device computing

Techniques for configuring and operating a multimedia aware cloud, particularly configured for mobile device computing, are described herein. In some instances, clusters of servers are organized for general computing, graphic computing and data storage.
Microsoft Technology Licensing, Llc

Edge computing system

An edge computing system comprises: a cloud computing system; an edge processing function; a connection between the edge processing function and the cloud computing system; a backend server within the cloud computing system. An assessment module is configured to receive information about processing goals, and processing capabilities of the backend server and the edge processing function.
Vituosys Limited

Hybrid cloud integration systems and methods

In one embodiment, first and second computer systems are integrated to exchange information and coordinate processing of data. A first computer system may access data in a database for a document ready for external processing.
Sap Se

Suppressing broadcasts in cloud environments

A method for suppressing broadcast messages includes receiving a broadcast message from a client that requests configuration information from a configuration server. The method includes queueing the broadcast message in a request queue and then identifying an oldest message in a request queue.
Vmware, Inc.

System and simplifying mandatory access control policies

This invention relates to a system and method for simplifying mandatory access control policies. A central dashboard provides a single location for managing policies across multiple environments.
Wanclouds Inc.

Controlled environment secure media streaming system

A controlled environment secure media streaming system manages the delivery of content to secured devices. Cloud services provide content to integration hub.
Global Tel*link Corporation

Distributed validation of credentials

Systems, methods, and computer program products for distributed validation of credentials are described. Upon receiving a request to perform an action by a user, a system performs a multi-part authentication where in each part, only a portion of authentication information is passed.
Pivotal Software, Inc.

Secure data exchange platform

In one embodiment, a device in a network receives sensor data from one or more nodes in the network. The device selects a processing mode from among a plurality of processing modes based on a plurality of attributes of the sensor data.
Cisco Technology, Inc.

Generating and managing names of instances

A method includes provisioning, by a cloud provisioning server, a first instance based on a template. The template belongs to a tenant, and the first instance includes one of an instantiated software and an instantiated computing service.
International Business Machines Corporation

A network, a cloud-based server, and a registering for a service

A method is provided of registering for a service a device residing in a small cell provided by a small cell base station, the small cell base station being associated with a cloud-based server, the server including a docker container for controlling the service in that small cell, the docker container having a docker port, and the method including the steps of: the device sending a request to register including a small cell identifier of the small cell, the server receiving the request and relating the small cell identifier in the request to a corresponding docker port identifier, the device being informed of the docker port identifier of the docker associated with that small cell.. .
Alcatel Lucent

Deploying a networking test tool in a cloud computing system

Methods, systems, and computer readable media for deploying a networking test tool in a cloud computing system are disclosed. An example method includes receiving user input specifying configuration information for a networking test tool for deployment in a cloud computing system.
Ixia

Methods, systems and apparatus to propagate node configuration changes to services in a distributed environment

Methods, apparatus and articles of manufacture to propagate node changes in a cluster of nodes and reconfigure services based on the node changes in a cloud computing environment are disclosed. Example methods disclosed herein include analyzing a node change event message at a first node of the plurality of nodes to identify a node change event type contained in the node change event message.
Vmware, Inc.

Determining identities for executing cloud processing and approvers of the executing

A method includes configuring, by a cloud provisioning server, a first user identity to execute a provisioning to provision an instance. The instance to be provisioned includes one of an instantiated software resource and a computing service.
International Business Machines Corporation

Configuring and naming of cloud provisioning entities

A method includes configuring, by a cloud provisioning server, a first cloud domain. The first cloud domain and a second cloud domain use at least one of the same operating system and the same system resource pool.
International Business Machines Corporation

Performing actions that have been defined for provisioned instances

A method includes provisioning, by a cloud provisioning server, an instance of a software resource or service for an end user. The provisioning is based on a template for the software resource or service.
International Business Machines Corporation

Systems and methods for multi-region encryption/decryption redundancy

Methods and systems for encrypting and decrypting data comprising sending sensitive information to a first cryptographic processing system in a first cloud region for encryption with a first key encryption key generated by and stored by the first cryptographic processing system. The first encrypted sensitive information received from the first cryptographic processing system is stored in a first database.
Index Systems, Inc.

Method, apparatus and system for registering, photographing, tracking and managing surgical instruments and equipment

A method, apparatus and system for registering, photographing, tracking and managing surgical instruments and equipment by multiple users. An integrated check-in & check-out station is provided to check medical equipment into a health care facility, take photos, provide labels, and create a cloud based record of the equipment delivered, including photo(s) of equipment checked in.

Cloud and name optimized speech recognition

A name file service is described that optimizes speech recognition in the cloud environment. The name file service monitors changes of users associated with tenant accounts and automatically updates a name file (or dictionary of names) for generating a grammar file used by speech recognition services.
Microsoft Technology Licensing, Llc

Livestock biosecurity system and use

The present invention relates in general to a biosecurity system for the livestock industry, and more specifically, animal production facilities. The livestock biosecurity system comprises a biometric recognition component, a cloud database, and a smart device (e.g., smartphone, tablet, laptop, etc.).
Novetechnologies, Llc

Systems and methods for creating and sharing a 3-dimensional augmented reality space

A 3-dimensional augmented reality (ar) world is a version of our “real” physical world augmented with virtual 3d objects that may be experienced by a user, such as someone who “sees” the virtual 3d objects through a smartphone or special eyewear. A shared 3d ar world is one in which multiple individuals can simultaneously experience the same augmented reality, even if they are not using the same devices.

Point cloud cleaning method

Methods for cleaning a point cloud using an electronic computing device are presented, the method including: causing the electronic computing device to decompose the point cloud into a number of cell voxels; removing a number of outlier cell voxels; subsampling the point cloud; removing a first number of outlier points; removing a number of double surfaces; and removing a second number of outlier points. In some embodiments, method further include outputting a clean point cloud to file.
Indoor Reality Inc.

Electronic care and content clothing label

The technology disclosed here encodes a clothing item id as an alphanumeric code within the clothing item, such as within a radio-frequency identification tag. A clothing item cleaning appliance, such as a cell phone, or a washing machine reads the clothing item id from the clothing item, and retrieves the care and content information from a database maintained on a cloud.

Methods and systems to determine virtual storage costs of a virtual datacenter

Methods and systems that allocate the total cost of virtual storage created from hard disk drives (“hdds”) and solid state drives (“ssds”) of server computers and mass-storage devices of a cloud-computing facility are described. The virtual storage is used to form virtual disks (“vds”) of virtual machines (“vms”) comprising a virtual datacenter (“vdc”).
Vmware, Inc.

Electronic care and content clothing label

The technology disclosed here encodes a clothing item id as an alphanumeric code within the clothing item, such as within a radio-frequency identification tag. A clothing item cleaning appliance, such as a cell phone, or a washing machine reads the clothing item id from the clothing item, and retrieves the care and content information from a database maintained on a cloud.

Systems and methods for secure file transmission and cloud storage

Disclosed are systems and methods to encrypt an image for secure image transmission and parallel decryption using resources from a networked environment. Upon reception of encrypted data from the mobile user, the data can be decrypted by transforming the data, decrypting the transformed data, and inversing the transformation.
Board Of Regents, The University Of Texas System

Oblivious order-preserving encryption

Methods, systems, and articles of manufacture are provided for oblivious order preserving encryption. A method may include: traversing, by a cloud service provider, an order preserving encryption (ope) tree based on a result of an oblivious comparison performed by a data owner and a data client, the ope tree having nodes that each correspond to a ciphertext of data associated with the data owner, the ciphertext of the data being stored at the cloud service provider, and a relative position of the nodes within the ope tree corresponding to an order that is present in the data associated with the data owner; and determining, based on the traversing of the ope tree, an ope encoding for an input value from the data client, the ope encoding for the input value indicative of a position of a node corresponding to the input value within the ope tree..
Sap Se

Chaining analytic models in tenant-specific space for a cloud-based architecture

In some embodiments, a cloud-based services architecture may receive operating data from a set of enterprise system devices. The cloud-based services architecture may include a tenant-specific space and an orchestration run-time execution service to manage creation and execution of a first and a second custom analytic model in the tenant-specific space.
General Electric Company

Hyperdata generation in the cloud

A system and method for building a hyperdata hub to access an enriched data model is presented. One or more data models are built based on user input to a user interface, and one or more query definitions are built based on the user input to the user interface.
Sap Se

Systems and methods for document search and aggregation with reduced bandwidth and storage demand

Methods and systems are disclosed for reducing bandwidth and storage demands during document search and aggregation. A method for accomplishing these objects may comprise deduplicating files on a local content repository, denisting files on the local content repository; and sending the deduplicated and denisted files to a cloud facility for storage.
Exterro, Inc.

Method and system for managing cloud storage

A method and a system for integrally managing at least one cloud storage in a system for managing cloud storage implemented by a computer may include: configuring a network drive for a first cloud storage on a first server related to the system for managing cloud storage which is assigned to a user of a first electronic device; linking a second cloud storage on a second server used by the user; and integrally managing the first cloud storage and the second cloud storage through the network drive.. .
Nhn Entertainment Corporation

Automatic testing of disaster recovery scenarios in cloud environments

A test application running on a first platform in a first data center is configured for disaster recovery. A first request is sent to the test application, including determining that the first request is processed by a first test application instance in the first data center.
Sap Se

Production-like testing and complex business to business auditing system

A system of testing updated software may include a cloud-based production environment. The system may also include a cloud-based testing environment.
Global Healthcare Exchange, Llc

Integrating heterogeneous business events in hybrid cloud environments

Systems, methods, and computer program products to perform an operation comprising receiving a request from a first application to receive business events from a second application, deploying a first connector selected according to a set of parameters specified in the request, receiving, by the first connector from the second application, a first unit of event data of a first format, and converting the first unit of event data to a second format specified in the request.. .
International Business Machines Corporation

Secure iot device update

The disclosed technology is generally directed to updating of applications, firmware and/or other software on iot devices. In one example of the technology, a request that is associated with a requested update is communicated from a normal world of a first application processor to a secure world of the first application processor.
Microsoft Technology Licensing, Llc

Service broker code generator

Provided are a system and method for generating a service broker code for a service deployed on a cloud platform. In one example, the method includes generating service broker code for the service in which the generated service broker code includes built-in code that supports a plurality of operations of the service broker built and one or more gaps in the code corresponding to one or more operations of the service broker not supported by the built-in code thereby enabling customization of the service broker.
General Electric Company

Apparatus and analysis of machine performance

Asset performance management (apm) information associated with an industrial machine that is producing a product is obtained. At least one of machine operation information and output characteristic information is received from the industrial machine.
General Electric Company

Information processing method, cloud service platform and information processing system

The present disclosure discloses an information processing method, a cloud service platform and an information processing system. The method includes: receiving, by a cloud service platform, appliance operating data and user data transmitted by a smart home appliance control device; analyzing the appliance operating data and the user data to generate an analysis result; judging whether the analysis result satisfies a preset condition; and transmitting the analysis result to user equipment of the user when the analysis result satisfies the preset condition, so that the user can manage the at least two smart home appliances according to the analysis result received and output by the user equipment..
Sichuan Changhong Electric Co., Ltd.

Methods and three-dimensional (3d) imaging

A method of imaging a scene includes estimating multiple three-dimensional (3d) representations, each of which corresponds to a respective portion of the scene. Neighboring portions of the scene area are at least partially overlapping.
Massachusetts Institute Of Technology

System and semantic simultaneous localization and mapping of static and dynamic objects

A system for semantic simultaneous tracking, object registration, and 3d mapping (storm) can maintain a world map made of static and dynamic objects rather than 3d clouds of points, and can learn in real time semantic properties of objects, such as their mobility in a certain environment. This semantic information can be used by a robot to improve its navigation and localization capabilities by relying more on static objects than on movable objects for estimating location and orientation..
The Charles Stark Draper Laboratory, Inc.

Pre-provisioning of a device

Configuration information can be associated with a device (and unique device id) at a point of sale location. At the point of sale location, the device can be associated with a user's account in a cloud system via unique id.
Microsoft Technology Licensing, Llc

Real-time cloud-based video watermarking systems and methods

A video generation system is configured to provide streaming video as a cloud processed service to viewers over a computing network. In response to a request from a viewer, a video source is configured to provide video and an identifier source is configured to provide an identifier for inclusion in the video.
Sony Interactive Entertainment America Llc

System for providing cloud-based user interfaces and method thereof

Disclosed are a system for providing cloud-based user interfaces and a method thereof. More particularly, a subscriber terminal device according to the present disclosure may include a control command receiver configured to receive a first control command including description information on a template repeated on a ui (user interface) screen and a second control command including a replication command for the template from a remote application server; a template generator configured to generate a template the based on the description information on the template; a ui resource acquirer configured to acquire a ui resource based on the second control command; and a ui element generator configured to generate ui elements based on replication of the template and apply the ui resource to the ui element..
Alticast Corporation

System for providing cloud-based user interfaces and method therefor

Disclosed are a system for providing cloud-based user interfaces (uis) which controls rendering of content and a ui resource by reusing a ui object stored in a subscriber terminal device, and a method thereof. By the system for providing cloud-based uis of the present disclosure and the method thereof, the amount of a control command transmitted to the subscriber terminal device from a remote application server may be drastically reduced..
Alticast Corporation

Mobile cloud-based registration ssytem

Allowing for event attendees to print customized event badges may include receiving registration information associated with a particular attendee of a specified event. In response to receiving the registration information, a confirmation message that includes at least one user-selectable link is sent to the particular attendee.
Electronic Exposition Information Technology, Inc.

Interactive campaign-based customer feedback collection platform

This disclosure provides systems, methods, services, and platforms for prompting a user to respond to an offer on a mobile device. The disclosure enables mobile network operators to create campaigns to target customers who are nearing the limit of their data plans, voice plans, sms plans, and mms plans.
Onepin, Inc.

Computer device and reading or writing data by computer device

A computer device and a method for reading or writing data by a computer device are provided. In the computer device, a central processing unit (cpu) is connected to a cloud controller using a double data rate (ddr) interface.
Huawei Technologies Co., Ltd.

Automatic provisioning of devices

A secure and automated system can be used to provision devices with configuration information. A temporary connection can be used to access configuration information from a cloud server.
Microsoft Technology Licensing, Llc

Server for providing cloud service and operating method thereof

An operating method of a server for providing a cloud service is provided. The operating method includes receiving shared file information from each of a plurality of devices connected to the server, transmitting the shared file information in response to a request from one of the plurality of devices, and, when receiving a request for a shared file included in the shared file information, receiving the shared file from a device in which the shared file is stored and transmitting the shared file to a device that requested the shared file..
S-printing Solution Co., Ltd.

Hybrid cloud methods, apparatus and systems for secure file sharing and synchronization with backup and server virtualization

Integrated file sharing and synchronization (fss) and backup management and storage (bms) in a network appliance deployed behind a firewall and within a private trusted local area network (lan). The appliance processes backup image files of a lan server's file system to generate fully constructed backup recovery points for the lan server.
Datto, Inc.

Network-based file cloud synchronization method

The present disclosure provides a network-based file cloud synchronization method, including: prior to file synchronizations between user terminals and a server, respectively creating file registration information tables for the multiple user terminals and the server, wherein the file registration information tables on the respective user terminals include identifiers of all files created by the respective user terminals and the file registration information table on the server includes identifiers of files already uploaded to the server; on the currently used user terminal, randomly scanning data of a to-be-synchronized file so as to obtain a random feature code to be stored; identifying whether the data of the to-be-synchronized file is consistent with the data of the synchronized file according to the two comparisons between the identifiers and the random feature codes and determining a whole file synchronization operation is performed, no synchronization is performed, or only an incremental synchronization operation is performed.. .
Phicomm (shanghai) Co., Ltd.

Method, apparatus and system for quantifying defense result

A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect ip address in a suspect ip address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes..
Alibaba Group Holding Limited

Enterprise level cybersecurity automatic remediation

Automatic detection and remediation of cybersecurity threats to an information technology installation is disclosed. An information technology installation receives at an orchestration system a requested update which may include a configuration change, a code change, a change to a binary, or other change to the installation.
Cybric Inc.

System and analyzing forensic data in a cloud system

Disclosed is a system for the analysis of forensic data, wherein the forensic data is present in a cloud system. The system has an analysis unit for analysing the forensic data, wherein the analysis unit is arranged in the cloud system, and has an operating unit for operating the analysis unit, wherein the operating unit is located outside the cloud system remote from the analysis unit.
Siemens Aktiengesellschaft

System and methods to prevent security breaching by authorized users in a cloud environment

A system to facilitate preventing security breach of internal organizational resources by authorized system users. Resource access analysis prevents breaching sensitive organizational information stored in a cloud infrastructure environment.
Ocucloud Ltd.

Secure access to on-premises web services from multi-tenant cloud services

Methods, systems, and computer-readable media for using a multi-tenant web relay service to provide secure access to on-premises web services from a tenant-specific cloud service are described herein. In one or more embodiments, a multi-tenant web relay service may receive from a tenant-specific cloud service a connection request to an on-premises web service hosted within a tenant datacenter.
Citrix Systems, Inc.

Method and registering device in cloud server

An apparatus and a method for registering a device in a cloud server are provided. The apparatus includes detecting the device by using short-range communication, requesting an authentication code used for registering the device in the cloud server from an account server in response to the device being detected, receiving the authentication code from the account server, and transmitting the received authentication code and connection address information of the cloud server to the device..
Samsung Electronics Co., Ltd.

Dual server system for sending a large email attachment

An electronic device with a touch-sensitive surface and display can execute a messaging application. The messaging application provides options for sending a message with a large attachment.
Apple Inc.

Bandwidth adjustment method and related device

The present invention discloses a bandwidth adjustment method and a related device, so as to flexibly adjust a bandwidth. A controller obtains behavior characteristic statistics sent by an end cloud node device, and obtains bandwidth resources remaining on a system.
Huawei Technologies Co., Ltd.

Method and system to allocate bandwidth based on task deadline in cloud computing networks

A method implemented to provide a virtual network to tenants requiring bandwidth in a cloud computing environment is disclosed. The method starts with receiving a request for a task at a network device, the request including a first parameter indicating vms required, a second parameter indicating bandwidths the required vms need, a third parameter indicating a duration of the task, and a fourth parameter indicating a deadline of the task.
Ericsson Ab

Automated feature deployment for active analytics microservices

In some embodiments, operating data may be collected from a set of enterprise system devices via a cloud-based services architecture. The operating data may be processed, for example, via requests handled by analytic microservices.
General Electric Company

Orchestration of cloud and fog interactions

Systems, methods, and computer-readable media for orchestrating cloud to fog interactions. In some examples, a method can involve partitioning an application into software containers, each of the software containers being configured to host a respective component of the application.
Cisco Technology, Inc.

Interconnection platform for real-time configuration and management of a cloud-based services exchange

In one example, a cloud-based services exchange comprises a plurality of interconnection assets configured to connect a customer of the cloud-based services exchange to one or more cloud service providers, the plurality of interconnection assets including a virtual circuit by which the customer accesses a cloud service from the one or more cloud service providers; and an orchestration engine configured to modify the plurality of interconnection assets.. .
Equinix, Inc.

Systems and methods for identifying cloud configurations

Provided are methods and systems for facilitating selection of a cloud configuration for deploying an application program with high accuracy, low overhead, and automatic adaptivity to a broad spectrum of applications and cloud configurations. The methods and systems are designed for building a performance model of cloud configurations, where the performance model is capable of distinguishing an optimal cloud configuration or a near-optimal cloud configuration from other possible configurations, but without requiring the model to be accurate for every cloud configuration.
Microsoft Technology Licensing, Llc

Network visibility appliances for cloud computing architectures

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. However, accessing virtualized traffic traversing the cloud computing platforms for application, network, and security analysis is a challenge.
Gigamon Inc.

Power charger with charge indicating power button

A power charger includes a charger housing having a rechargeable battery internally disposed therein, and a charge-indicating power button operatively connected with the battery to direct a power charge from the battery to a power connection interface provided on the housing. At least one led light is associated with the power button such that manipulation of the led light (such as by illumination or blinking of the light) causes the power button to provide an indication of the battery charge level.
Halo2cloud, Llc

Conversational voice interface of connected devices, including toys, cars, avionics, mobile, iot and home appliances

An apparatus and method for interacting between users and connected devices utilizing a conversational voice user interface. The device is connected over a network to a cloud-based artificial intelligence dialogue system that controls conversational interactions and allows for real time updates to dialogue content..
Shenetics, Inc.

Localized traffic data collection

A system and method for collecting, processing, storing, or transmitting traffic data. A localized data collection module may retrieve, receive, or intercept traffic data through or from hardware installed in a traffic control cabinet adjacent an intersection or other roadway feature of interest.
Acyclica Inc.

System and simulating user interaction with virtual objects in an interactive space

Systems and methods for simulating user interaction with virtual objects in an augmented reality environment are provided. Three-dimensional point cloud information from a three-dimensional volumetric imaging sensor may be obtained.
Meta Company

Method and generating a cleaned object model for an object in a mapping database

An approach is provided for generating a cleaned object model to represent an object in a mapping database. The approach includes receiving point cloud data depicting the object.
Here Global B.v.

Method and testing accuracy of high-precision map

Disclosed embodiments relate to a method and an apparatus for testing accuracy of a high-precision map. In some embodiments, the method includes: reverting the high-precision map to a road network map; acquiring a 3d point cloud road image labeled with an actual coordinate of a map element; fitting the 3d point cloud road image into the road network map to obtain a road network map with the fitted 3d point cloud road image; calculating a differential between the actual coordinate of the 3d point cloud road image in the road network map with the fitted 3d point cloud road image and a map coordinate in the road network map; and determining the high-precision map as being accurate in response to the differential being less than or equal to a preset threshold..
Baidu Online Network Technology (beijing) Co., Ltd.

Scanner vis

A method for registering two or more three-dimensional (3d) point clouds. The method includes, with a surveying instrument, obtaining a first 3d point cloud of a first setting at a first position, initiating a first simultaneous localisation and mapping (slam) process by capturing first initial image data at the first position with a camera unit comprised by the surveying instrument, wherein the first initial image data and the first 3d point cloud share a first overlap, finalising the first slam process at the second position by capturing first final image data with the camera unit, wherein the first final image data are comprised by the first image data, with the surveying instrument, obtaining a second 3d point cloud of a second setting at the second position, and based on the first slam process, registering the first 3d point cloud and the second 3d point cloud relative to each other..
Hexagon Technology Center Gmbh

Financial operating platform for autonomous and semi-autonomous cash forecasting and projecting financial results

A platform is disclosed for autonomous or semi-autonomous generation of financial reports. Financial data is received from a plurality of data sources, the data sources each being connected with the computer processor, the data sources comprising one or more of a financial institution, an enterprise resource planning (erp) system, external market data, user-generated content, and external global market news and events.
Trovata, Inc.

Methods and systems for using a cloud computing environment to share biological related data

The present disclosure provides a novel approach for shifting or distributing various information (e.g., protocols, analysis methods, sample preparation data, sequencing data, etc.) to a cloud-based network. For example, the techniques relate to a cloud computing environment configured to receive this information from one or more individual sample preparation devices, sequencing devices, and/or computing systems.
Illumina, Inc.

Geographical position-based internet outdoor advertisement delivering system and delivering method

The present invention discloses a geographical position-based internet outdoor advertisement delivery system and method, the system comprising a platform, a mobile terminal, and a cloud server. The platform comprises an agent web platform, an advertiser web platform and a background management web platform, wherein the advertiser web platform is connected to the agent web platform and the background management web platform via a web server.
Shanghai Bihu Network Technology Co.,ltd

Mobile based common platform for outlet specific customer engagement

In one example, a method for providing a common platform for outlet-specific customer engagement is described. A plurality of companies, a plurality of outlets corresponding to each of the companies, and users are enabled to subscribe with a cloud-based server.
Ittiam Systems Pte. Ltd.

Order optimization in hybrid cloud networks

A method for enhancing on-premise order management systems (oms) designed for fulfillment transactions with analytic and optimization technologies and services hosted in a shared multi-tenant software-as-a-service (saas) environment, such as a hybrid cloud. The computer-implemented method improves an order management system by leveraging a “punch-out” approach based on user exits to integrate with and augment currently implemented order management processing and transaction flows.
International Business Machines Corporation

Image analytics platform for medical data using expert knowledge models

Embodiments described herein provide an image analytics platform that follows a microservice-based architecture. The platform provides a set of algorithms implemented as microservices to design knowledge-based models.
General Electric Company

Method and recognizing obstacle of vehicle

The present disclosure discloses a method and an apparatus for recognizing an obstacle to a vehicle. The method comprises: acquiring point cloud data of a target region by a lidar sensor and acquiring image data of the target region by using an image capturing apparatus; recognizing obstacle information in the point cloud data by a preset point cloud recognition model, and labeling a recognition result to obtain a first labeled result; recognizing obstacle information in the image data by a preset image recognition model, and labeling a recognition result to obtain a second labeled result; comparing the first labeled result with the second labeled result to decide whether the first and the second labeled result are identical; and determining a correct labeled result from the first and the second labeled result in response to the first and the second labeled result being not identical and outputting the correct labeled result..
Baidu Online Network Technology (beijing) Co., Ltd.

Secure cloud-based storage of data shared across file system objects and clients

Techniques to provide secure cloud-based storage of data shared across file system objects and clients are disclosed. In various embodiments, a primary encryption key is determined for an object associated with a plurality of component chunks of file system data.
Emc Ip Holding Company Llc

Identification of entity performing operation on local file(s) and notification to reduce misuse risk

Identification of an entity performing a deletion or modification action on locally stored files and notification to mitigate risks to cloud stored files is provided. A local or remote file watcher may monitor locally stored files and detect a deletion or modification action.
Microsoft Technology Licensing, Llc

Isolating data for analysis to avoid malicious attacks

Determining, by a machine learning model in an isolated operating environment, whether a file is safe for processing by a primary operating environment. The file is provided, when the determining indicates the file is safe for processing, to the primary operating environment for processing by the primary operating environment.
Cylance Inc.

Enabling migration of relational database to a cloud network

The invention provides a server administration tool for migration of a relational database to a cloud server environment. The server administration tool includes a database migration tool a server patching tool to monitor and maintain a server system.
Bank Of America Corporation

Implicit coordination of deployment and regression testing across data centers and system clusters

The disclosed methods and systems for coordinating deployment and regression testing across data centers and system clusters in multiple service clouds include accessing test suites via a versioning platform that maintains a metadata notation of an applicable-version to which a version of a test suite applies. They include receiving a request-to-test to run a selected test suite against a selected system; making a machine-to-machine query about the selected system and receiving back a response that specifies a version-to-be-tested; automatically selecting from the versioning platform a test suite version with the applicable-version that supports the version-to-be-tested consistent with the metadata notation of the applicable-version of the selected test suite; and reporting results of running the selected test suite.
Salesforce.com, Inc.

Enabling a cloud controller to communicate with power systems

An approach is disclosed that receives power related data from one or more power systems. The approach then determines, based on an analysis of the power related data, an anticipated power outage, with the power outage includes a power outage time estimate.
International Business Machines Corporation

Automated image layer blacklisting in the cloud

A computer-implemented method is provided. The method includes identifying, by one or more processors, faulty layers from among a plurality of layers of a container image stored in a container-based cloud system.
International Business Machines Corporation

Cloud service framework for toolkit deployment

Described is a system, method, and computer-implemented apparatus for deploying and updating toolkits in hybrid cloud-local development platforms. In one embodiment, a cloud based software development environment is connected with a local development environment, enabling the cloud based software development environment (cloud environment) to inquire into the toolkit versions installed on the local machine.
Sap Se

Automated server analysis and patching for enabling relational database migration to a cloud network

The invention provides a server administration tool for migration of a relational database to a cloud server environment. The server administration tool includes a database migration tool a server patching tool to monitor and maintain a server system.
Bank Of America Corporation

Customized application state transition

An example method for managing application deployment in a cloud environment may maintain a state machine. The state machine may include a plurality of application states, a plurality of state operations, and relationships among the plurality of application states and the plurality of state operations.
Vmware, Inc.

Spreadsheet-based software application development

Aspects described herein may be used with local spreadsheet applications, web, and/or cloud-based spreadsheet solutions, to create complex custom software applications. Spreadsheets themselves lack the conceptual framework to be used as a platform tool to build custom or complex software applications.

Spreadsheet-based software application development

Aspects described herein may be used with local spreadsheet applications, web, and/or cloud-based spreadsheet solutions, to create complex custom software applications. Spreadsheets themselves lack the conceptual framework to be used as a platform tool to build custom or complex software applications.

Methods, systems, and apparatus to trigger a workflow in a cloud computing environment

Methods, apparatus and articles of manufacture to provide workflow subscription management in a cloud computing environment are disclosed. Example disclosed methods include, in response to a first input identifying an event topic, causing, by executing an instruction with a processor, a corresponding event schema to be displayed, accessing a second input identifying a field included in the event topic schema and a third input identifying a threshold value corresponding to the field.
Vmware, Inc.

Gesture recognition cloud command platform, system, method, and apparatus

Systems and methods described herein are for transmitting a command to a remote system. A processing system determines the identity of the user based on the unique identifier and the biometric information.

Power-preserving communications architecture with long-polling persistent cloud channel for wireless network-connected thermostat

Methods and systems facilitate network communications between a wireless network-connected thermostat and a cloud-based management server in a manner that promotes reduced power usage and extended service life of an energy-storage device of the thermostat, while at the same time accomplishing timely data transfer between the thermostat and the cloud-based management server for suitable and time-appropriate control of an hvac system. The thermostat further comprises powering circuitry configured to: extract electrical power from one or more hvac control wires in a manner that does not require a “common” wire; supply electrical power for thermostat operation; recharge the energy-storage device (if needed) using any surplus extracted power; and discharge the energy-storage device to assist in supplying electrical power for thermostat operation during intervals in which the extracted power alone is insufficient for thermostat operation..
Google Llc

Apparatus and controlling distributed cloud for three-dimensional printers

Provided is an apparatus for controlling a distributed cloud for three-dimensional (3d) printers, the apparatus including a user matcher configured to transmit and receive data to/from a user terminal, a 3d model receiver configured to receive a 3d model selected by the user terminal from a 3d model distribution platform server, a 3d printer manager configured to manage a plurality of 3d printers connected to a distributed cloud for 3d printers, a 3d part model generator configured to divide the 3d model into 3d part models, each of which is producible by a single 3d printer, on the basis of property information of the 3d model and specification information of the 3d printers collected by the 3d printer manager, and a 3d part model transmitter configured to transmit the 3d part models to the plurality of 3d printers on the basis of the property information of the 3d model and the specification information of the 3d printers collected by the 3d printer manager.. .
Electronics And Telecommunications Research Institute

. .

. .

. .

. .

Cloud-based document quality assurance

The present disclosure relates to cloud-based document quality assurance. One example embodiment includes a method for evaluating document quality.
Kyocera Document Solutions Inc.

File storage instant communication messages

A method and an apparatus for storing a file of an instant communication message are disclosed. The method may include obtaining an instant communication message received by an instant communication application; determining that a file is included in the instant communication message; and storing the file in a cloud storage space corresponding to the instant communication application.
Alibaba Group Holding Limited

Method for storing data in a cloud and network for carrying out the method

A method for storing data in a cloud includes providing at least one data file to be stored together with a predefined number t of replicas of the at least one data file within the cloud, at least one authentication tag corresponding to the at least one data file and t functions that are configurable to take at least a predefined time to compute. The at least one data file, the at least one authentication tag and the t functions are transmitted to the cloud.
Nec Europe Ltd.

Learned behavior based security

The present system and method pertain to the detection of malicious software and processes such as malware. A cloud security policy system receives hashes and behavioral information about applications and/or processes executing on user devices.
Carbon Black, Inc.

Methods and systems for generating dashboards for displaying threat insight information

Dashboards for displaying threat insight information are provided herein, as well as systems and methods for generating the same. According to some embodiments, methods for providing a threat dashboard may include locating metrics regarding a malicious attack against a targeted resource, where the metrics indicate instances where users were exposed to the malicious attack or instances where a cloud-based threat detection system prevented the user from being exposed to the malicious attack.
Proofpoint, Inc.

Detection of botnets using command-and-control access patterns

A method and device for detecting botnets in a cloud-computing infrastructure are provided. The method includes gathering data feeds over a predefined detection time window to produce a detection dataset, wherein the detection dataset includes at least security events and a first set of bot-labels related to the activity of each of at least one virtual machine in the cloud-computing infrastructure during the detection time window; generating, using the detection dataset, a features vector for each of a plurality of virtual machines in the cloud-computing infrastructure, wherein the features vector is based on idiosyncratic (isync) scores related to botnet activity; transmitting each generated features vector to a supervised machine learning decision model to generate a label indicating if each of the plurality of virtual machines is a bot based on the respective features vector; and determining each virtual machine labeled as a bot as being part of a botnet..
Microsoft Technology Licensing, Llc.

Information processing system, information processing terminal, and information processing method

An information processing system is provided that includes a cloud server and an information processing terminal. The cloud server includes a storage device storing a program for using a cloud service and account information of a cloud account registered with the cloud service, and a first processor that manages execution of an authentication process for controlling access to the cloud service.
Ricoh Company, Ltd.

Hybrid cloud management

A hybrid cloud management system in a cloud environment having a more than one cloud platforms is described. The system includes a management interface, a cloud broker including cloud connectors, and a resource broker.
Hewlett Packard Enterprise Development Lp

Distributed assignment of video analytics tasks in cloud computing environments to reduce bandwidth utilization

Example task assignment methods disclosed herein for video analytics processing in a cloud computing environment include determining a graph, such as a directed acyclic graph, including nodes and edges to represent a plurality of video sources, a cloud computing platform, and a plurality of intermediate network devices in the cloud computing environment. Disclosed example task assignment methods also include specifying task orderings for respective sequences of video analytics processing tasks to be executed in the cloud computing environment on respective video source data generated by respective ones of the video sources.

Information processing device, communication control method, and computer-readable recording medium

An overall management device decides network information on an internet gw router and a router. A cloud environment management device performs a first setting on the internet gw router based on the network information decided by the overall management device and cancels, if the first setting has failed, the first setting performed on the internet gw router.
Fujitsu Limited

Managing a generation and delivery of digital identity documents

An approach is provided for managing requests by a cloud-based multipurpose messaging queue (mpmq) located in a first computer. For each given request in requests received by the mpmq, the mpmq receives a specification of whether the given request is a standard or a critical request based on whether the given request requires an action by a second computer of a third party to respond to the given request.
International Business Machines Corporation

Managing security in a computing environment

In response to at least one message received by a processor of a gateway server from a user device wherein each message requests that an encryption key be downloaded to the user device, the processor generates at least one unique encryption key for each message and sends the at least one generated encryption key to the user device, but does not store any of the generated encryption keys in the cloud. For each encryption key having been sent to the user device, the processor receives each encryption key returned from the user device.
International Business Machines Corporation

Vehicle tutorial sending vehicle tutorial to tutorial manager device

A vehicle tutorial system includes a data storage device having at least one vehicle tutorial, an on-board identification sensor, an on-board vehicle communication device, a tutorial manager device located in a cloud computer and/or the remote device, and an on-board vehicle controller. The on-board vehicle controller is programmed to identify the user of the vehicle based on information from the on-board identification sensor, select the vehicle tutorial, select the remote device associated with the user of the vehicle, offer the vehicle tutorial to the user at a first time, and upon the user declining the offer at the first time, send the vehicle tutorial to the tutorial manager device.
Nissan North America, Inc.

Emergency detection and response system using led-lighting module, and method thereof

Disclosed is an emergency detection and response system using led-lighting modules. The emergency detection and response system using led-lighting modules, according to the present invention, comprises: a plurality of led-lighting modules having an emergency sensor for sensing an emergency and a communication sensor; a communication network for, if an emergency is detected by the emergency sensor, receiving emergency detection signals transmitted via the communication sensor and providing the emergency detection signals to an operation unit; a control unit for controlling the led-lighting modules according to control signals received from the operation unit or a specific emergency detection signal among the emergency detection signals; and a cloud platform for building, as a database, the emergency detection signals received from the communication network or the control signals corresponding to the emergency detection signals and transmitting an early warning signal on the basis of the received signals..
Jpk Korea Co., Ltd.

System for determining a subject advertisement's impressions and unique reach

This system is a set of newsstands connected to cloud-based servers. Each newsstand has at least one monitor.
Redpost, Inc.

Selective publication and/or subscription of information

Described herein is a system for communicating changed information. A first digital assistant component can identify and/or publish changed information of a user (e.g., contact information) to a changed information service system (e.g., cloud-based service).
Microsoft Technology Licensing, Llc

A method and a device for extracting local features of a three-dimensional point cloud

A method and a device for extracting local features of a 3d point cloud are disclosed. Angle information and the concavo-convex information about a feature point to be extracted and a point of an adjacent body element are calculated based on a local reference system corresponding to the points of each body element.
Peking University Shenzhen Graduate School

Advanced cloud detection using machine learning and optimization techniques

Techniques for automatically determining, on a pixel by pixel basis, whether imagery includes ground images or is obscured by cloud cover. The techniques include training a cloud dictionary and a ground dictionary, determining whether a given pixel is best represented by “words” from the cloud dictionary or “words” from the ground dictionary to make an initial determination of cloud or ground, and performing a max-flow, min-cut operation on the image to determine whether each pixel is a cloud or ground imagery..
Digitalglobe, Inc.

Systems and methods for event delivery in a cloud storage system

Cloud storage systems and methods are described for providing event-based user state synchronization among the various cloud elements. A global user directory is maintained on a remote cloud storage system.
Egnyte, Inc.

Virtual private cloud that provides enterprise grade functionality and compliance

Techniques to enforce policies with respect to managed files and/or endpoints are disclosed. A policy to be applied with respect to one or more files included in a synchronization set and/or an endpoint associated with the synchronization set is received.
Emc Ip Holding Company Llc

Configuring disaster recovery for a cloud based application

In one respect, there is provided a method. The method can include: determining that a second instance of the cloud-based application is deployed at a second cloud platform landscape; replicating, at a second database at the second cloud platform landscape, at least a portion of data from a first database at the first cloud platform landscape, the data from the first database being associated with the first instance of the cloud-based application; and configuring a domain name system (dns) service to include a primary universal resource locator (url) for the first instance of the cloud-based application and a secondary url for the second instance of the cloud-based application, the primary url and the secondary url both being associated with a custom domain of the cloud-based application..
Sap Se

Managing of storage resources

In general, it is proposed to define techniques for managing a virtual storage volume in a cloud architecture comprising hosts which provide storage volume. The managing is achieved by checking the available virtual storage volume when a storage service request from a request interface is received.
Telefonaktiebolaget Lm Ericsson (publ)

Cloud volume storage

According to examples, a data storage system may include a plurality of storage arrays of a cloud volume provider (cvp), in which the plurality of storage arrays is a plurality of logical volumes. The data storage system may also include a cvp portal to link a first compute instance of a first cloud service provider (csp) with a first logical volume over a network.
Hewlett Packard Enterprise Development Lp

System and offloading robotic functions to network edge augmented clouds

A system and method for offloading scalable robotic tasks in a mobile robotics framework. The system comprises a cluster of mobile robots and they are connected with a back-end cluster infrastructure.
Tata Consultancy Services Limited

Ridar apparatus based on time of flight and moving object

Provided are a lidar apparatus based on a time of flight and a moving object which output an electrical signal by transmitting and receiving light, generate a control signal by analyzing the electrical signal, measure a pin point distance by calculating a time of flight of the light based on the control signal, and process point cloud data generated based on a measured distance to accurately construct information on a surrounding environment.. .
Yujin Robot Co., Ltd.

Monitoring device for drug application with a drug pen, with logging, communication and alarms

The present invention provides a device (1) for monitoring the application of a drug to a patient by means of a drug pen (100), whereby the drug pen comprises a front end provided with an injection needle and a rear end provided with an actuation pushbutton, the device comprising a body (2) which can be dismountably coupled to the pen; an injection detection means determining when a drug injection is carried out; and a processing means configured for storing the date and time of the injection when the injection detection means detects that a drug injection is carried out, whereby the body is configured to be coupled to the pushbutton of the pen such that the pushbutton is actuated by pushing directly on the body, whereby the injection detection means is implemented as actuation detector configured for detecting said pushing action.. .
Insulcloud, S.l.

Device and determining a circumferential shape of an electrode array for electrical impedance tomography

An electrical impedance tomography device (1) includes an electrode array, including a plurality of electrodes (33) arranged spaced apart from one another, a signal feed unit (51) and a signal acquisition unit (50). A calculation and control unit (70) is configured to determine a current elliptical circumferential shape (20′) of the electrode array on a thorax (34) of a human being and to provide a control signal (79), which indicates the elliptical circumferential shape (20) of the electrode array.
Drägerwerk Ag & Co. Kgaa

Device and determining an axial twist position of an electrode array for electrical impedance tomography

An electrical impedance tomography device (1) includes an electrode array, including a plurality of electrodes (33) arranged spaced apart from one another, a signal feed unit (51) and a signal acquisition unit (50). A calculation and control unit (70) is configured to determine a situation with an axial twist angle of the electrode array on a thorax (34) of a human being and to provide a control signal (79), which indicates the situation with axial twist angle of the electrode array.
Drägerwerk Ag & Co. Kgaa

Basf Se

. .

Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture

There is disclosed a method of staging real-time data in proximity to a mobile device. The method includes determining a geographic location associated with the mobile device and identifying a storage device located in proximity to the determined geographic location.
Fedex Corporate Services, Inc.

System and capturing and delivering video images

Disclosed herein is a system and method for providing, over a network, updated and accurate video segments of vehicular and pedestrian traffic. At least one camera forms a part of the system receiving a set of instructions to capture a video segment of a predetermined duration at predetermined time intervals.
Solutions Xyz, Llc

Efficient application build/deployment for distributed container cloud platform

Described herein is a technology which facilitates an effective and efficient management of a data center. In one implementation, the data center includes a container cloud manager which embeds container framework, such as docker framework to manage app images and containers of the data center.
Sap Se

Embedded database as a microservice for distributed container cloud platform

Disclosure is a framework for providing microservices for database with embedded container service in a container cloud platform. The framework includes a container cloud manager for performing distributed management of resources in a data center.
Sap Se

Managing metadata in cloud driven, thin client video applications

A client device may send a first request and then receive, in response to sending the first request, a first response and a first fingerprint tree corresponding to the first response. Next, the client device may cache the first response and the first fingerprint tree corresponding to the first response.
Cisco Technology, Inc.

Capturing configuration items from hybrid-cloud provisioning data

A method and associated systems for capturing configuration items from hybrid-cloud provisioning data. A processor of a service-management system intercepts a service request requesting that the hybrid cloud's orchestration mechanism provision or deprovision a configuration item of the hybrid cloud.
International Business Machines Corporation

Data management in an edge network

Generally discussed herein are systems, devices, and methods for data management in a reverse content data network (rcdn). A component of the rcdn may include a memory to hold content received from a first sensor device of a plurality of sensor devices of the rcdn and first attributes that describe properties of the content.
Intel Corporation

Systems and methods for load balancing in a cloud environment

Methods, systems, and media for load balancing communication traffic in a publication system or cloud environment are disclosed. In one example, a load balancing system comprises a load balancer component configured to perform operations on a first portion of the communication traffic, and an elastic traffic manager component configured to perform operations on a second portion of the communication traffic.
Ebay Inc.

Mobile interactive kiosk method

To regulate information exchanges, provide personal security and enhance personal privacy inside and outside a network and to regulate devices. Provided is a personal bio-data mining and pairing method of a human user to one or more communications devices capable of functioning in a network cloud environment and, where the rules governing cloud organization and communications are based in part upon a human user bio-data and real world information exchanges commonly occurring at specific geographical locations..
Manna Llc

Distributed cloud-based security systems and methods

A distributed security method is implemented in a processing node of a distributed security system comprising one or more processing nodes and one or more authority nodes, wherein the distributed security system is located external to a network edge of an enterprise and external from one of a computer device and a mobile device associated with a user. The distributed security method includes monitoring a content item sent from or requested by an external system which is external from a network edge of the external system; and responsive to a security policy associated with the external system, performing one of allowing the content item through the processing node; precluding the content item at the processing node; and threat detecting the content item at the processing node and one of allowing or precluding the content item based on the threat detecting..
Zscaler, Inc.

Optimizing resource allocation for projects executing in a cloud-based environment

Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects.
Splunk Inc.

Connectivity between cloud-hosted systems and on-premises enterprise resources

Connectivity required for cloud computing services is provided by an ssl/tls-based vpn client computer system operatively connected to a customer network of a cloud service customer. The vpn client instantiates an ssl/tls-based vpn tunnel with an ssl/tls-based vpn server operatively connected to a provider network of a cloud services provider.
Citrix Systems, Inc.

Pooling public cloud resources from different subscriptions using reservations

An example method of managing virtualized computing resources provided by a public cloud includes: grouping subscriptions in the public cloud into reservations, each of the reservations including constraints on virtualized computing resources provided by at least one of the subscriptions; allocating the reservations among a plurality of principals; receiving a request to provision a workload from a user associated with a first principal of the plurality of principals, wherein the workload includes metadata describing constraints of the workload; generating a deployment plan for the workload based on the metadata therein and at least one of the reservations allocated to the first principal, the deployment plan specifying a first subscription of the subscriptions; and transmitting a deployment. .
Vmware, Inc.

Subscription-agnostic deployment of workloads to a public cloud

An example method of deploying a workload to a public cloud includes: receiving a request to provision a first workload from a first user, wherein the first workload includes metadata describing constraints; generating a first deployment plan for the first workload based on the metadata thereof. The step of generating comprises identifying a plurality of reservations assigned to the first user, each of the plurality of reservations including computing resources backed by a subscription provided by the public cloud; and selecting a first reservation from the plurality of reservations having available computing resources backed by a first subscription provided by the public cloud and satisfying the constraints of the first workload.
Vmware, Inc.

Multi-cloud resource allocation

An example method for allocating resources in a multi-cloud environment may include receiving, by an allocation broker executing in the multi-cloud environment, a client request to create an allocation of cloud resource in a plurality of clouds. The method may include receiving, by the allocation broker from a reservation broker, a reservation candidate based on a reservation type.
Vmware, Inc.

Dynamic service chaining and late binding

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform.
Gigamon Inc.

Forensic software investigation

In accordance with aspects of the disclosure, systems and methods are provided for managing forensic investigations of client assets associated with a client based on a forensic service agreement between the client and a cloud service provider, including establishing the forensic service agreement between the client and the cloud service provider for servicing the forensic investigations of the client assets associated with the client, acquiring forensic data related to each client asset associated with the client, and generating one or more client inventory records for each client asset based on the forensic data related to each client asset, and generating one or more client evidence records for each client asset based on each client inventory record generated for each client asset.. .
Sap Se

Distributed visibility fabrics for private, public, and hybrid clouds

Improved network visibility may be achieved by deriving network traffic information from numerous visibility platforms that are communicatively coupled to one another. In some embodiments, an end user interacts with a distributed visibility fabric via a user interface, which can include a high-level representation of each visibility platform.
Gigamon Inc.

Graph-based network fabric for a network visibility appliance

With exponential growth in virtualized traffic within physical data centers, many end users (e.g., individuals and enterprises) have begun moving work processes and data to cloud computing platforms. A visibility platform can be used to monitor virtualized traffic traversing a cloud computing platform, such as amazon web services, vmware, or openstack.
Gigamon Inc.

Lifecycle management of custom resources in a cloud computing environment

Methods, apparatus and articles of manufacture to provide lifecycle management of custom resources in a cloud computing environment are disclosed. Example methods disclosed herein for custom resource lifecycle management include accepting, with an extensibility service implemented by a virtual appliance, a resource definition and a lifecycle definition for a custom resource to be executed in a cloud computing environment.
Vmware, Inc.

Content driven public cloud resource partitioning and governance

An example method of extending a cloud manager configured to manage a public cloud includes: receiving a content package at the cloud manager, the content package including a component entity, the component entity including a resource type entity that represents a resource provided by the public cloud, a user interface (ui) form entity that defines a ui for configuring the resource, and a lifecycle operations logic that extends at least one phase of a workflow of the cloud manager; receiving a request from a user through the ui defined by the ui form entity to create the resource in the public cloud; executing the workflow of the cloud manager in response to the request; and executing the lifecycle operations logic during execution of the workflow.. .
Vmware, Inc.

Imaging protocl manager pushing systems and methods

A cloud-based imaging protocol manager pushes standard imaging protocols from the cloud to imaging devices registered with the protocol manager. The protocol manager maintains a library storing standard imaging protocols, determines whether an imaging device is compatible with the standard protocol(s) to be pushed, creates a push command which requests pushing the standard protocol(s) to a compatible imaging device, stores the push command in a command queue, converts the standard protocol(s) to raw protocol(s) usable by the imaging device.
General Electric Company

Orchestrated digital display system

A system for orchestrating multiple digital display devices to display a digital content item across the multiple digital display devices, including multiple digital display devices, where each digital display device includes a display screen, a memory, a processor, and data link capabilities, a user device including a display screen, a user interface, a memory, a processor, and data link capabilities, and a cloud-based computing system configured to communicate with the multiple digital display devices and the user device.. .
Videri Inc.

Method and system for mold prevention in rental units through wireless monitoring of temperature and humidity using internet cloud servers

A mold prevention or mitigation solution includes one or more humidity monitors installed in an indoor environment and operable to monitor a current relative therein, an alarm server communicable with said one or more humidity monitors over a data network, and a network connection by which the alarm server is communicable with one or more meteorological server that provides current weather data. The alarm server receives a current relative humidity value from the one or more humidity monitors, automatically obtains a current outdoor temperature from the meteorological server(s), automatically adjusts a humidity alarm set point based on the current outdoor temperature, and automatically compares the set point against the current relative humidity value to trigger an alert in the event that said current relative humidity value exceeds the humidity alarm set point..
Iot Cloud Technologies Inc.

Computer program, pose derivation method, and pose derivation device

A method includes : obtaining a first 3d model point cloud associated with surface feature elements of a 3d model corresponding to a real object; obtaining a 3d surface point cloud from current depth image data of the real object; obtaining a second 3d model point cloud associated with 2d model points in a model contour; obtaining a 3d image contour point cloud at respective intersections of first imaginary lines and second imaginary lines; and deriving a second pose based at least on the first 3d model point cloud, the 3d surface point cloud, the second 3d model point cloud, the 3d image contour point cloud and the first pose.. .
Seiko Epson Corporation

A detecting objects within a 3d environment

A method and system for detecting objects within a three-dimensional (3d) environment, comprising obtaining a 3d point-cloud representation of the environment, the point-cloud comprising a set of point locations, and converting the point-cloud to a 3d feature grid, wherein converting the point-cloud to the 3d feature grid comprises discretising the 3d space into cells according to a grid size; determining which cells contain points from the 3d point-cloud; and mapping any that do to a feature vector; and mapping any that do not to a zero feature vector. The method further comprises generating a detection window sized to contain an integral number of the cells and having a set of positions which can be occupied; calculating a detection score for each of the positions by: casting a vote for each cell within the detection window into which at least one point falls, wherein each vote is calculated using the feature vector of the cell and a weighting vector; and summing the votes, and determining whether each position contains an object of interest based on the detection score, each detection window with a detection score greater than a threshold being classified as containing an object of interest..
Oxford University Innovation Limited

Whole object surface area and volume of partial-view 3-d models

A technique for estimating a whole object surface area and volume of a micro-scale three-dimensional model with a partially visible surface includes receiving a single-view stereoscopic image of an object of interest and an unconstrained three-dimensional point cloud of the object, generating a constrained three-dimensional point cloud using the image, the unconstrained three-dimensional point cloud, and a digital elevation model (dem) of the object generated from the image, generating, using the constrained three-dimensional point cloud, a three-dimensional mesh representing an estimate of the surface of the object, calculating a partial surface area and/or partial volume of the object using the three-dimensional mesh, estimating an extent of a visible surface of the object, and calculating a whole surface area and/or a whole volume of the object based on the partial surface area of the object and the estimated extent of the visible surface of the object.. .
University Of New Hampshire

Multiple hypotheses segmentation-guided 3d object detection and pose estimation

A machine vision system and method uses captured depth data to improve the identification of a target object in a cluttered scene. A 3d-based object detection and pose estimation (odpe) process is use to determine pose information of the target object.
Seiko Epson Corporation

System for inventory management

An automated system for tracking inventory is provided. The automated system tracks the sufficiency of an inventory by the weight of the items composing the inventory so that resulting inventory deficiencies can be automatically sensed either continuously or periodically at predetermined polling intervals through container transducers coupled to a wifi enabled microprocessor, wherein the microprocessor posts the weight-based output of the transducers to a cloud server that determines if the weight-based output signifies an inventory deficiency by comparing it to a predetermined threshold.

Server and cloud computing resource optimization method thereof for cloud big data computing architecture

A server and a cloud computing resource optimization method thereof for cloud big data computing architecture are provided. The server runs a dynamic scaling system to perform the following operations: receiving a task message; executing a profiling procedure to generate a profile based on an to-be-executed task recorded in the task message; executing a classifying procedure to determine a task classification of the to-be-executed task; executing a prediction procedure to obtain a plurality of predicted execution times corresponding to a plurality of computing node numbers, a computing node type and a system parameter of the to-be-executed task; executing an optimization procedure to determine a practical computing node number of the to-be-executed task; and transmitting an optimization output message to a management server to make the management server allocate at least one data computing system to execute a program file of the to-be-executed task..
Institute For Information Industry

Co-authoring on documents saved to non-cloud locations

Providing automatic updates to transmitted copies of an electronic document is disclosed herein. In response to the first user such as the author/first user saving the electronic document, a copy of the electronic document is uploaded to a shared location and a reference to the copy of the electronic document uploaded to the shared location is stored in metadata of the electronic document.
Microsoft Technology Licensing, Llc

Contextual file manager

A contextual file manager is described herein. Contextual information regarding files and folders of a file system of an operating system is collected.
Microsoft Technology Licensing, Llc

Load balancing by endpoints

A mechanism is provided for in a cloud computing infrastructure, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions.
Microsoft Technology Licensing, Llc

Flexible job management for distributed container cloud platform

Described herein is a container framework which includes a flexible job management platform for managing jobs of the data center. The flexible job management platform is based on an embedded hana container service, such as docker service, in the container cloud manager.
Sap Se

Algorithm and infrastructure for robust and efficient vehicle localization

Location of an autonomous driving vehicle (adv) is determined with respect to a high definition map. On-boards sensors of the adv obtain a 3d point cloud of objects surrounding the adv.
Baidu Usa Llc

Multi-site cloud based analytics system

A system is provided for monitoring water usage of a plurality of appliances in a plurality of distributed locations remote from one another. The system may comprise at least one central processor.
Wint Wi Ltd

Dimensioning system for, and , dimensioning freight in motion along an unconstrained path in a venue

A ranging system captures successive point clouds from moving freight, and a tracking system tracks successive positions and orientations of the moving freight. A computing device correlates each successive point cloud with each successive position and orientation and time of the moving freight, combines the correlated point clouds to obtain a composite point cloud of the moving freight, and processes the composite point cloud to dimension the moving freight.
Symbol Technologies, Llc

Dart scoring system

A platform for facilitating a dart tournament allows gathering, at an electronic bracket program, a master tournament player list for the tournament, which includes the event or events in which each player is participating. The platform allows generating, at a cloud server application, a tournament record based on the master tournament player list.
Dartconnect Llc

Classifying of weather situations using cameras on automobiles

The disclosure is directed to classifying weather conditions using cameras and/or other sensors on a vehicle. The system can detect one or more weather conditions, such as a sunny sky, a cloudy sky, rain, lighting, thunderstorms, hail, snow, windy conditions, and darkness.
Faraday&future Inc.

Welding systems and methods utilizing cloud computing and data storage

Welding systems and methods utilizing cloud computing and data storage are disclosed. An example method includes receiving, via communication circuitry of a cloud-based resource, welding data relating to a welding operation from a first customer; storing the welding data in computer-readable storage media associated with the cloud-based resource; offering the welding data for sale, via the cloud based resource; receiving, via the communication circuitry, an offer for the welding data from a second customer, different from the first customer, wherein the first and second customers are individual welders, factories, distributed manufacturing operations, or a combination thereof; performing a financial transaction with the second customer; and transmitting, via the communication circuitry, the welding data to the second customer..
Illinois Tool Works Inc.

Discovery of neighbor radio access systems by a user mobile communications device serviced by a radio access network (ran) for reporting discovered systems to a serving system in the ran

Discovery of a neighbor radio access system by a user mobile communications device serviced in a radio access network (ran) for reporting to a serving system in the ran. User mobile communications device serviced by a ran is configured to scan one or more frequency ranges (e.g., bands) to discover other neighbor radio access systems.
Spidercloud Wireless, Inc.

Management device and management method thereof for cloud radio access network and user equipment

A management device and a management method for cloud radio access network (c-ran) and a user equipment are provided. The management device connects to a plurality of baseband units (bbus) and receives a resource utilization index report from the bbus.
Institute For Information Industry

Wireless motion sensor system and method

A motion analysis system comprises a human wearable peripheral, a human wearable communication hub, a beacon, a data analysis server, and a cloud server. The peripheral comprises an orientation sensor that comprises an accelerometer, a magnetometer, and a gyroscope.

Transforming machine data in a communication system

A method for processing machine data within a communication system that includes a computing unit receiving a network data message from a wireless access node of the communication system and determining whether the network data message includes machine data. When the network data message includes the machine data, the method further includes the computing unit identifying a wireless data device associated with the network data message to produce a wireless data device identifier, identifying one or more cloud services to produce one or more cloud service identifiers, and for each cloud service, processing the machine data to produce a transformed data message, where the transformed data message is in accordance with a data protocol associated with the cloud service, and facilitating transmission of the transformed data message to the cloud service..
Xaptum, Inc.

Aggregating content from different content sources at a cloud service

A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include electronic messages, calendar information, contacts, social network content, feed data, search results, and the like.
Microsoft Technology Licensing, Llc

Method and cloud streaming service

Provided are a method and apparatus for providing a cloud streaming service. A cloud streaming server efficiently manages server resources and supports a number of terminals which is greater than a number of browsers to be concurrently executed by assigning a browser only when an input is received from a terminal and streaming an execution result corresponding to the input to the terminal and storing an execution result according to the same input in the cloud streaming server, rather than by assigning browsers to terminals connected to the cloud streaming server..
Sk Techx Co., Ltd.

Cloud protection techniques

Cloud protection techniques are provided. A security breach is detected in a source cloud environment.
Micro Focus Software Inc.

Systems and methods for blocking targeted attacks using domain squatting

Systems and methods for identifying and addressing domains suspected as malicious domains used for targeted attacks in a cloud-based system include receiving valid domains; receiving an unidentified domain; comparing the unidentified domain to the valid domains to derive a distance calculation of the unidentified domain to each of the valid domains; determining whether the unidentified domain is a cybersquatting attempt of one of the valid domains based on the comparing; and, responsive to the determining the unidentified domain is a cybersquatting attempt, one of notifying an operator/user and blocking the unidentified domain in the cloud-based system.. .
Zscaler, Inc.

Multi-tenant cloud security threat detection

Methods and systems for security threat detection are disclosed. For example, a virtual machine with a network interface of a plurality of virtual machines includes a plurality of applications including first and second applications.
Red Hat, Inc.

Mobile caller authentication for contact centers

A call request is received, from a mobile device, to establish a communication with a contact center. For example, the call request may be to establish a voice call with the contact center.
Avaya Inc.

Central namespace controller for multi-tenant cloud environments

A centralized namespace controller allocates addresses in a distributed cloud infrastructure on-demand. Upon receiving a request to allocate addresses for a network to be provisioned by a cloud computing system included in the distributed cloud infrastructure, the centralized namespace controller allocates a network address that is unique within the distributed cloud infrastructure.
Vmware, Inc.

Multi-cloud resource reservations

An example method for reserving resources in a multi-cloud environment may include receiving, by a reservation broker executing in the multi-cloud environment, a first client request to reserve a first cloud resource in a plurality of clouds. The plurality of clouds includes a corresponding plurality of cloud brokers.
Vmware, Inc.

Multipath forwarding in an overlay network

The use of overlay networks, such as network virtualization using overlays over layer 3 (nvo3), is a growing trend to address networking issues in data centers that make use of virtualization and cloud computing techniques. Additional considerations may be required to support multipath forwarding scenarios..
Telefonaktiebolaget Lm Ericsson (publ)

Systems and methods for updating the configuration of a cloud service

The present disclosure facilitates improving the operation of a cloud service by updating its configuration information and its resource requirements. The resource utilization of the cloud service can be monitored, and a decision logic module can determine whether action is required.
Connectwise, Inc.

Apparent cloud access for hosted content items

Techniques for apparent cloud access of a hosted content item. In one embodiment, for example, a method performed at a personal computing device executing a user agent comprises: receiving a block agent request for a content item from the user agent; determining content item block identifiers of content item blocks that make up the content item; determining which, if any, of the content item blocks that make up the content item are not stored in a local storage of the personal computing device; downloading, from a block server of an online content management system, any of the content item blocks that are not stored in a local storage of the personal computing device; and sending to the user agent, in a response to the block agent request, data of each of the content item blocks that make up the content item..
Dropbox, Inc.

Cloud network services provider having a gateway for subscriber specified connection to a cloud service provider

A system for connection of a subscriber to a cloud service provider through a gateway, having a proprietary routing and switching system for abstraction, modification and reassembly of a subscriber communication message (also “data packet”), for transmission to a subscriber specified cloud service provider. This process of abstraction, modification and reassembly of the communication message, effects subscriber specified changes of (a) the routing address of the subscriber network address and (b) subscriber vlan assignment of the vlan layer, to translate or adapt said communication message to comport with a vlan assignment to a subscriber specified cloud service provider, preliminary to transmission to a specified cloud service provider.
Cloud Conductor, Llc (a Florida Limited Liability Company)

Method to support multi-protocol for virtualization

A network element (ne) configured as a local cloud switch point (csp) comprises a memory configured to store remote virtual routing information in association with an identifier (id) of a remote csp in a mapping table, wherein the remote virtual routing information is associated with a remote virtual network associated with the remote csp, and wherein the remote virtual routing information comprises a virtual extensible network (vxn) type identifier (id), an address family id (afi), and a subsequent afi (safi). The ne further comprises a processor coupled to the memory and configured to perform encapsulation on a data packet to generate a encapsulated data packet by adding an outer header to the data packet based on the afi, adding a virtualization header to the data packet based on the vxn type id, and adding an inner header to the data packet based on the safi.
Futurewei Technologies, Inc.

Detecting and responding to emergency vehicles in a roadway

The present invention extends to methods, systems, and computer program products for detecting and responding to emergency vehicles in a roadway. Aspects of the invention can be used to detect emergency vehicles and properly yield to emergency vehicles depending on roadway configuration.
Ford Global Technologies, Llc

Program and vehicle interaction

One or more techniques and/or systems are provided for facilitating communication between a program and a vehicle computing device of a vehicle. For example, a vehicle profile may be used as an intermediary abstraction layer between the program (e.g., hosted on a mobile device, hosted on a vehicle navigation unit, etc.) and the vehicle computing device.
Inrix Inc.

Out-of-core point rendering with dynamic shapes

A method, apparatus, and system provides the ability to process and render a point cloud. The points in the point cloud are grouped into three-dimensional (3d) voxels.
Autodesk, Inc.

Advanced k-d tree encoding for point clouds by most significant axis selection

An encoder includes a processor, a buffer, and a memory. The memory includes code as instructions that cause the processor to perform a number of steps.
Google Inc.

System of enclaves

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for instantiating and managing systems that utilize hierarchal enclaves in a cloud environment.. .
Google Llc

Mobile health intelligent medical guide system and method thereof

The present invention discloses a mobile health intelligent medical guide system and method thereof. The method comprises steps: collecting patient chief complaint, sending the patient chief complaint to a cloud server, analyzing and processing the patient chief complaint, text word segmentation, fuzzy matching and sorting recommendation technologies, generating a disease examination result, and generating an intelligent medical guide result to be fed back to the mobile terminal; reminding the patient to supplement the chief complaint information if the patient does not end this query or the diagnosis result does not achieve the optimum, and then optimizing the disease examination result and the intelligent medical guide result until the patient ends the query or the diagnosis result achieves the optimum.
Hefei University Of Technology

Multimode mobile electronic medical record system and working method thereof

The present invention discloses a multimode mobile electronic medical record system and a working method thereof. The multimode mobile electronic medical record system comprises a plurality of mobile terminals, service server, push server, authentication server and cloud server.
Hefei University Of Technology

K-d tree encoding for point clouds using deviations

An encoder includes a processor, a buffer, and a memory. The memory includes code as instructions that cause the processor to perform a number of steps.
Google Inc.

System and monitoring changes in databases and websites

A system and method is described for constructing a differential web in which information including objects, numbers, or text in databases and web pages may be selected using pointing device movements. Once selected, objects may be designated to be monitored for changes, said changes being captured and made browsable on web-like constructs.
Sensoriant, Inc.

Framework for aggregating default and overriding content from multiple sources

A method and system is provided for customizing a web page of an application of an application provider. A host (e.g., cloud service), which hosts the application, provides the web page to a user of the application provider on behalf of the application provider.
Microsoft Technology Licensing, Llc

Temporal task scheduling in a hybrid system

A system and method of scheduling tasks include receiving inputted data task variables for a private cdc and a plurality of public clouds; initializing parameters for a plurality of representative entities in a cluster of entities; determining a fitness level of each representative entity in the cluster of entities; updating one or more task scheduling parameters for a given number of time slots based on the parameters for the plurality of representative entities and the fitness level of each representative entity; determining a total number of data tasks to be dispatched to the private cdc and the plurality of public clouds based on an iteration result of a final time slot for the given number of time slots for a global best position; and updating the data task variables using the total number of data tasks to be dispatched.. .
King Abdulaziz University

Methods and systems for configuration-file inheritance

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks.
Vmware, Inc.

Tenant-controlled cloud updates

Systems and methods are taught for providing customers of a cloud computing service to control when updates affect the services provided to the customers. Because multiple customers share the cloud's infrastructure, each customer may have conflicting preferences for when an update and associated downtime occurs.
Microsoft Technology Licensing, Llc

Policy enabled application-release-management subsystem

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks.
Vmware, Inc.

Content driven automated upgrade of running web applications in on-premise environments

An enterprise web application management system includes a cloud computing network having a webapp database to store webapp code. An on-premise local computing network is remotely located from the cloud computing network.
International Business Machines Corporation

Point-in-time backups via a storage controller to an object storage cloud

A storage controller receives a command from a host application to perform a point-in-time backup of a source dataset to a storage cloud. The storage controller generates a target dataset via a point-in-time copy of the source dataset, and a mapping that indicates a correspondence between locations of the source dataset and locations of the target dataset.
International Business Machines Corporation

Distributed solar energy prediction imaging

Concepts of distributed solar energy prediction imaging are described. In one embodiment, a solar forecast system includes a computing environment, a network, and an imaging device.
Board Of Regents, The University Of Texas System

Method and system to annotate objects and determine distances to objects in an image

A controller/application synchronizes a camera's image capture rate with a lidar light burst rate and direction. A user may identify and manually bound an object-of-interest in an image captured with the camera with a user interface.
Wheego Electric Cars, Inc.

Gas detection, imaging and flow rate measurement system

A system analyzes radiation from a scene in a field of view that includes a gas cloud with absorption characteristics in a wavelength band. The system includes first and second devices.
Ci Systems (israel) Ltd.

Navigation system and navigation method

The present disclosure provides a navigation system that includes an electronic device and a cloud server. The electronic device is configured to capture an environmental image, and to transmit the environmental image and a target information.
Inventec Corporation

Spacecraft landing and site-to-site transpsort for a planet, moon or other space body

A method, operable in the presence of ambient cosmic rays, is provided for braking a craft upon approach to a planet, moon or other space body, e.g. In preparation for landing.

Vehicles and cloud systems for sharing e-keys to access and use vehicles

A vehicle configured to communicate with a server of a cloud system to enable access to use the vehicle via one or more electronic keys is provided. The vehicle includes electronics and a subsystem of the vehicle for enabling unlocking of the vehicle.
Emerging Automotive, Llc

Kettlebell with integrated motion sensors and kinetic charging system

A kettlebell includes sensors to collect movement data during use, a controller to track movement data, a kinetic charging circuit to charge a kettlebell battery, a network interface over which to transmit movement data to a networked device, and a user interface to display a representation of electricity generated by the kettlebell movement. The sensors include an accelerometer or a gyroscope.
Fujitsu Limited

Dual air flow rebuildable dripping atomizer with an adjustable air flow sleeve for an electronic cigarette

A dual air flow rebuildable dripping atomizer for use with electronic cigarettes which uses a sleeve lock that allows the user to adjust and direct the air flow is provided. The adjustable air flow sleeve also allows the sleeve to be locked in place preventing the e-liquid from leaking out.
Apvlab Llc

System and orientating point cloud data relative to base reference data

A system for orientating point cloud data of a first surface relative to base reference data of a structure includes an input source generator adapted to provide the point cloud data, a tilt-correction means for orientating the point cloud data relative to the base reference data, a data editing means to filter spurious point data from the point cloud data, and a volume measurement means to measure the volume of objects that are non-fixably connected to the surface to segment the non-fixably connected objects from the point cloud data. The first surface is the surface of a wear liner.
Koppe Royalty B.v.

Antenna monitoring system including cloud based server communication via cellular telephone transceiver and related methods

An antenna monitoring system includes a cloud based server, and sensor devices, with each sensor device including a portable housing to be mounted on a respective directional antenna, and at least one alignment sensor carried by the portable housing and configured to sense alignment of the respective directional antenna. Each sensor also includes a cellular telephone transceiver carried by the portable housing, and a controller carried by the portable housing, and configured to collect alignment data from the at least one alignment sensor, and communicate with the cloud based server via the cellular telephone transceiver.
Sunsight Holdings, Llc

Secure cloud-managed content delivery computer ecosystem

Systems and methods for secure cloud-based content delivery are disclosed herein. A system for secure cloud-based content delivery can include an administrator device communicatingly connected with a server via a wireless network.
Pearson Education, Inc.

Automatic goods consumption judgment system and method

An automatic goods consumption judgment system includes a container tray system, a sensor measurement system, a supporting system, a mobile terminal device, a data transmission unit, a control and data processing system, and a cloud computer. Using the internet of things and cloud services, the consumption tendency and consumption state of goods are automatically measured in real time through the system, data are uploaded to a cloud server, and the cloud server sends analyzed and processed data to the terminal device used by users; customers are reminded of the consumption tendency and consumption state of goods according to the analysis and judgment obtained through cloud service computation, the consumption speed of goods and the fact whether required goods need to be prepared in advance or not are determined according to the analysis and judgment..

Integrated solution of internet of things and smart grid network pertaining to communication, data and asset serialization, and data modeling algorithms

A smart grid network is provided including one or more transformer monitoring devices configured to collect metering data from one or more metering devices in the smart grid network. The smart grid network further includes a cloud-based data processing and storage system with one or more cloud data processors configured to receive data from the one or more transformer monitoring devices and process the received data into categories including at least a first category of data comprising the collected metering data.
Delta Energy & Communications, Inc.

Architecture and high performance on demand video transcoding

Video streams, either in form of on-demand streaming or live streaming, usually have to be transcoded based on the characteristics of clients' devices. Transcoding is a computationally expensive and time-consuming operation; therefore, streaming service providers currently store numerous transcoded versions of the same video to serve different types of client devices.
University Of Louisiana At Lafayette

Video and media content delivery network storage in elastic clouds

Content delivery network storage may be provided. A first proxy module may receive a first content object request from a first user device.
Cisco Technology, Inc.

Systems and methods for decentralized service placement in a resource pool

Exemplary methods for distributed multi-component service placement in a resource pool include utilizing a hierarchy of agents associated with computing resources of a cloud architecture. A root agent in the hierarchy can receive service requests specifying resource requirements and optionally location or affinity constraints, transform these into service request descriptions, and pass the service request descriptions down through the hierarchy to arrive at leaf nodes.
Telefonaktiebolaget Lm Ericsson (publ)

Secure cloud-managed content delivery computer ecosystem

Systems and methods for secure content delivery are disclosed herein. The system can include a content driver communicatingly connected with a user device via a layered protocol model or via a user datagram protocol (udp).
Pearson Education, Inc.

Methods and systems for endpoint device operating system in an asset intelligence platform

In embodiments of the present disclosure improved capabilities are described for an asset intelligence platform for organizing information collected and stored on or with respect to large fleets of asset, such as used in connection with the internet of things, with capabilities for providing improved intelligence and security in the local environment of an asset, in the network and in remote locations, such as in the cloud.. .
Tego, Inc.

Method for presenting schedule reminder information, terminal device, and cloud server

A method, a terminal device, and a cloud server includes using a first account by a first terminal to log into a cloud server, acquiring schedule information stored in the cloud server, where the schedule information is information that is created by a second user who registers a second personal account and is transmitted to the cloud server by a second terminal that logs in, by using the second personal account, to the cloud server, when reminder time of the schedule information arrives, acquiring a biometric characteristic information of a first user who is using the first terminal, and when the biometric characteristic information is authenticated, presenting reminder information of the schedule information.. .
Huawei Device (dongguan) Co., Ltd.

Securing content using pipelines

A transcoding service is described that is capable of transcoding or otherwise processing content, such as video, audio or multimedia content, by utilizing one or more pipelines. A pipeline can enable a user to submit transcoding jobs (or other processing jobs) into an available pipeline, where a transcoding service (or other such service) assigns one or more computing resources to process the jobs received to each pipeline.
Amazon Technologies, Inc.

Cloud-based video delivery

Techniques described herein provide for cloud-based media delivery that accepts or ingests media content, transcodes it according to various media profiles to create a plurality of video files, and provides notification that at least a portion of the video files is ready for delivery. The notification can be provided using a notification unique resource locator (url), which can be provided in a request to prepare the media content for delivery.
Brightcove, Inc.

System and a cloud computing abstraction layer with security zone facilities

In embodiments of the present invention improved capabilities are described for a virtualization environment adapted for development and deployment of at least one software workload, the virtualization environment having a metamodel framework that allows the association of a policy to the software workload upon development of the workload that is applied upon deployment of the software workload. This allows a developer to define a security zone and to apply at least one type of security policy with respect to the security zone including the type of security zone policy in the metamodel framework such that the type of security zone policy can be associated with the software workload upon development of the software workload, and if the type of security zone policy is associated with the software workload, automatically applying the security policy to the software workload when the software workload is deployed within the security zone..
Csc Agility Platform, Inc.

Method, apparatus, and system for remotely accessing cloud applications

Disclosed herein are methods, apparatuses, and systems for remotely accessing cloud applications. In one embodiment, the method comprises receiving an access request of a requester, sent by a cloud server, requesting being accessed by a controlling party; establishing a secure channel with the cloud server based on the access request of the requester, sent by the cloud server, requesting being accessed by the controlling party; receiving, via the safety channel, a login key generated based on the access request of the requester sent by the cloud server; generating, based on the login key, a login request for logging into the requester and sending the login request to the cloud server; receiving mode information of a login success returned by the cloud server after the cloud server verifies the login request; and receiving current mode information of the requester pushed by the cloud server, and entering a remote access mode for the requester.
Alibaba Group Holding Limited

Method and system for enabling media optimization in a cloud conference

An example method is provided and includes receiving a relay address allocation request from an endpoint, the relay address allocation request comprises a unique session identifier that identifies a conference session joined by the endpoint for media streaming; determining a relay candidate comprising a relay transport address for allocating to each endpoint of the conference session having the unique session identifier. Further, the method includes mapping the relay candidate with the unique session identifier and sending a relay address allocation response that comprises at least the relay candidate mapped with the unique session identifier.
Cisco Technology, Inc.

Distributed fpga solution for high-performance computing in the cloud

A data processing system, method and device. A device can include a plurality of data cards having host interface connectors initially configured to transmit signals according to a first communication protocol and data card connectors that communicate with external devices using a different communication protocol.
Lda Technologies Ltd.

Adaptive algorithm for cloud admission policies

Disclosed is a novel system and method for managing requests for an additional virtual machine. The method begins with operating at least one virtual machine accessing at least one computer resource associated with at least one physical machine within a computing cluster.
International Busines Machines Corporation

System and a cloud computing abstraction layer

According to one system of the invention, the system provides a cloud-computing service from a cloud-computing environment comprising a plurality of cloud-computing resources. The system may comprise: a management module configured to manage a cloud-computing resource of the plurality of cloud-computing resources as a cloud-computing service, wherein the cloud-computing service performs a computer workload; an adapter configured to connect to the cloud-computing resource to the system and translate a management instruction received from the management module into a proprietary cloud application program interface call for the cloud-computing resource; a cloud service bus configured to route the management instruction from the management module to the adapter; a consumption module configured to allow a user to subscribe the cloud-computing service; a planning module configured to plan the cloud-computing service; and a build module configured to build the cloud-computing service from the cloud-computing resource and publish the cloud-computing service to the consumption module..
Servicemesh, Inc.

System and routing in software defined networks using a flow header

An ingress forwarder receives the ip packet and strips off the entire packet header and replaces it with the simple flow header assigned by the controller, and looks up its flow-table to determine from which port to forward the packet. All other forwarders along the path up to the egress forwarder perform the forwarding action simply by inspecting the flow header.
Argela Yazilim Ve Bilisim Teknolojileri San. Ve Tic. A.s.

Cloud visualization and management platform

Techniques for providing visualizations of changes in characteristics of a cloud-based network of resources over a period of time are described herein. The techniques may include obtaining data from a cloud-service provider representing changes in the characteristics of cloud-based resources for the period of time.
2nd Watch, Inc.

Automatic provisioning of cloud services

Systems and methods for automatically provisioning a service instance in a cloud computing system are presented. In an example embodiment, a message is retrieved by one of multiple provisioner nodes from a message queue shared by the provisioner nodes, the message including a service request to provision a service instance on the computing infrastructure.
General Electric Company

Secure database featuring separate operating system user

Embodiments manage access to cryptography keys for database data, within a secure key store of a local key server owned by a new (security) operating system (os) user separate from an original default os user. Existing principles governing distinct os user access privileges engrained within the os itself, are leveraged to preclude the default os user from accessing files of the new security os user.
Sap Se

Dynamic licensing for applications and plugin framework for virtual network systems

A network functions virtualization (nfv) method integrating third-party virtual network functions (vnf) through a plugin framework includes operating, via one or more servers in an nfv cloud, the plugin framework with application programming interfaces (api) to one or more third-party vnfs; providing a catalog of vnf services comprising the one or more third-party vnfs to an end user; and operating the one or more third-party vnfs with the end user via the nfv cloud, wherein the one or more third-party vnfs are from a different vendor than an operator of the nfv cloud.. .
Ciena Corporation

Method and system for providing encrypted data on a client

The present invention relates to a method for providing encrypted data on a client, a cloud or the like, performed in a memory available to a computation device comprising the steps of a) providing for each user a user specific encryption key for encrypting user-specific plaintext, b) computing a common decryption key with a pre-determined function using the user specific encryption keys as input for said function, and wherein the common decryption key is computed based on at least two product groups of the same prime order, c) encrypting each user-specific plaintext with the corresponding user-specific encryption key resulting in user-specific ciphertexts, d) computing a common ciphertext with said function using the user-specific ciphertexts as input for said function, e) providing the common ciphertext and the common decryption key for decryption, preferably to a user, wherein step c) is performed such that encryption is homomorphic in the user-specific plaintext as well in the user-specific encryption keys, wherein said function is a polysized function supporting poly-many additions and a single multiplication.. .
Nec Europe Ltd.

Radiobeacon data sharing by forwarding low energy transmissions to a cloud host

Remote actuation of machines or machine systems is realized by a system for coupling a radiobeacon to a smart device and in turn to a broader network. The smart device is configured as a proximity-actuated “community nodal device” by an application that operates as part of the system.
Pb, Inc

Context-based smartphone sensor logic

Methods employ sensors in portable devices (e.g., smartphones) both to sense content information (e.g., audio and imagery) and context information. Device processing is desirably dependent on both.
Digimarc Corporation

Smart swimming pool or hot tub monitor

A smart pool maintenance monitor and alert system configured to communicate with an internet-connected device is described. The system employs a floating buoy for use within the water of a swimming pool or hot tub, and a gateway.
Cec - Comunicações E Computadores Sa

System and portable active 3d scanning

A method for generating a three-dimensional model of an object, by a scanning system including a client-side device including: an acquisition system configured to capture images; and an interaction system including a display device and a network interface includes: capturing a plurality of images of the object by the acquisition system, the images being captured from a plurality of different poses of the acquisition system; computing depth maps from the images of the objects, each of the depth maps corresponding to one of the poses of the acquisition system; combining the depth maps to generate a combined point cloud; and displaying, on the display device, the combined point cloud or a 3d mesh model generated from the combined point cloud.. .
Aquifi, Inc.

System and automatic selection of 3d alignment algorithms in a vision system

A system and method for selecting among 3d alignment algorithms in a 3d vision system is provided. The system and method includes a 3d camera assembly to acquire at least a runtime image defined by a 3d point cloud or runtime 3d range image having features of a runtime object and a vision system processor.
Cognex Corporation

System and improved scoring of 3d poses and spurious point removal in 3d image data

This invention provides a system and method for estimating match of a 3d alignment pose of a runtime 3d point cloud relative to a trained model 3d point cloud. It includes scoring a match of a candidate pose of the runtime 3d point cloud relative to the trained model 3d point cloud, including a visibility check that comprises (a) receiving a 3d camera optical center (b) receiving the trained model 3d point cloud; (c) receiving the runtime 3d point cloud; and (d) constructing a plurality of line segments from the optical center to a plurality of 3d points in the 3d point cloud at the runtime candidate pose.
Cognex Corporation

System and protecting information for enhanced life cycle support and disaster recovery of industrial process control and automation systems

A method includes allocating a cloud-based information repository to a customer. The information repository is hosted by a vendor and includes a plurality of compartments.
Honeywell International Inc.

System and associating data with a firearm

A system and method for tracking, recording, maintaining, and scheduling maintenance for firearms and other tactical assets, with full review capabilities in which desired information is preferably backed up to easy-to-use and easy-to-edit cloud-based database. The desired information is stored in, or associated with, computer-readable markings engraved with fiber laser on, or in rfid's positioned on or embedded within, the firearm or asset.

Anonymous and secure classification using a deep learning network

A machine-learnt classifier is used for more anonymous data transfer. Deep learning, such as neural network machine learning, results in a classifier with multiple distinct layers.
Siemens Healthcare Gmbh

Methods and sharing, transferring and removing previously owned digital media

The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (dmo) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors..
Redigi, Inc.

Multi-layer merge in a storage virtualization system

The state of a file may be a combination of local state, typically small (e.g., a placeholder file), and some external source state such as that maintained in a read-only namespace managed by a cloud provider or by another local file system, typically large. A file system component responsible for overlaying (i.e., merging) the partial local state and the external source state into a single file system view that can be used by an application of a container as if the full state exists locally.
Microsoft Technology Licensing, Llc

Storing and retrieving restricted datasets to and from a cloud network with non-restricted datasets

Provided are techniques for storing and retrieving restricted datasets to and from a cloud network with non-restricted datasets. A request to dump datasets from one or more storage devices to the cloud storage is received, wherein the datasets include restricted datasets and non-restricted datasets, and wherein the restricted datasets are in a format that is not supported by the cloud storage.
International Busines Machines Corporation

Providing document feature management in relation to communication

Variety of approaches to provide document feature management in relation to a communication are described. A productivity application initiates operations to present a communication through a productivity application user interface (ui).
Microsoft Technology Licensing, Llc

Debugging in a private cloud environment

The present disclosure involves systems, software, and computer implemented methods for remotely debugging applications in a private cloud environment. One example method includes establishing a first secure connection with a client device in response to receiving a request from the client device for a secure debugging session to remotely debug an application instance running in a private cloud environment.
Sap Se

Method and starting virtual machine

A method and apparatus for starting a virtual machine. A specific implementation of the method comprises: acquiring, by a physical machine, a mirror image file required for starting a to-be-started target virtual machine from a distributed block storage system, in response to an entered instruction to start the target virtual machine; and starting the target virtual machine by using the mirror image file.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Next generation autonomous structural health monitoring and management using unmanned aircraft systems

A structural health monitoring and management system and oil and gas monitoring system includes a ground station having a computer, a cloud storage and a plurality of unmanned aircraft systems (uas). Mounted to the uas is a robotic arm and an ultrasonic system.
Infradrone Llc

Systems and methods for recognizing and analyzing emotional states of a vehicle operator

A system is disclosed for reducing the likelihood of vehicle accidents, particularly accidents involving large commercial vehicles, such as aircraft. The system includes one or more wearable electronic devices worn by a vehicle operator, such as a pilot.
Honeywell International Inc.

Amusement park game system and gaming method thereof

The present invention is an amusement park game system and gaming method thereof, mainly applied for digital pet raising simulation game, comprising a mobile device application, a wearable device, field system, and a cloud system. After a parent downloaded the application in his/her smart mobile device, it can connect the wearable device of the child, such that the parent can use the mobile device application to assign task to the wearable device for the child to perform the task and obtain game points.
Origin Media Co. Ltd.

Mobile development platform in a cloud based architecture

Activation of the cloud code may include associating the cloud code with one or more function calls and/or with one or more trigger points.. .

. .

. .

Longwood Gardens, Inc.

. .

. .

. .

. .

. .

. .

. .

. .

Method and vehicle to cloud network traffic scheduling

A system includes a processor configured to receive a data transfer request including a data transfer constraint. The processor is also configured to receive a vehicle route.
Ford Global Technologies, Llc

Network connected marine electronics system

A network connected marine electronics system has one or more marine electronic devices, a mobile software application for installation on a mobile communications device, and a remote cloud-based information system. Marine data on the user's mobile communications device can be synchronized with marine data on the user's marine electronic devices and vice versa using a wireless marine network onboard a marine vessel and without the need to connect to a remote server.
Garmin Switzerland Gmbh

Cloud to on-premise port forwarding with ip address bound to loopback alias

An example method to provide communication between a first computer in a first computer network and a second computer in a second computer network is disclosed. The method includes aliasing the second computer's address in the second computer network to a loopback interface of a third computer in the first computer network and establishing a tunnel between the third computer and a fourth computer in the second computer network.
Nicira, Inc.

Continuous cognitive cloud service maximization

Embodiments of the invention include a method, system and computer program product for the continuous cognitive discovery and management of cloud services in an aggregated distributed application. One method includes receiving a textual specification of cloud service criteria, searching a registry for cloud services corresponding to the textual specification and presenting locating cloud services corresponding to the textual specification.
International Business Machines Corporation

Continuous cognitive cloud service maximization

Embodiments of the invention include a method, system and computer program product for the continuous cognitive discovery and management of cloud services in an aggregated distributed application. One method includes receiving a textual specification of cloud service criteria, searching a registry for cloud services corresponding to the textual specification and presenting locating cloud services corresponding to the textual specification.
International Business Machines Corporation

Provisioning a bare-metal server

A method and device for provisioning bare-metal servers to tenants of a cloud provider is provided. The cloud provider operating a datacenter receives a profile of a tenant.
International Business Machines Corporation

Hybrid clouds

Systems and methods are disclosed for creating and managing hybrid clouds including both standard compute nodes and edge devices. Edge devices can be enrolled in a hybrid cloud by deploying a lightweight container to the edge device..
At&t Intellectual Property I, L.p.

Transferring data between block and file storage systems

A processor may receive a request to transmit a logical volume to a cloud-based server. The logical volume may be stored in a data storage subsystem that includes one or more ranks.
International Business Machines Corporation

Transferring data between block and file storage systems

A processor may receive a request to transmit a logical volume to a cloud-based server. The logical volume may be stored in a data storage subsystem that includes one or more ranks.
International Business Machines Corporation

Synthetic transaction to determine centroid for cloud hosting

One or more data centers are selected to host an online conference. The selection of the data center is based on a set of metrics that are measured from ‘synthetic’ transactions.
Microsoft Technology Licensing, Llc

Secure application zones for cloud burst environments

A cloud infrastructure security assurance service is enhanced to facilitate bursting of cloud applications into other cloud infrastructures. The security assurance service provides a mechanism to enable creation and management of secure application zones within a cloud infrastructure.
International Business Machines Corporation

Cloud checking and killing method, device and system for combating anti-antivirus test

A cloud checking and killing method for combating an anti-antivirus test includes receiving, by a cloud sever, a cloud checking and killing request for performing virus checking and killing on a sample. The method further includes analyzing the cloud checking and killing request, and determining whether the cloud checking and killing request is a cloud checking and killing request of an anti-antivirus test.
Beijing Qihoo Technology Company Limited

Cloud-based malware detection

Systems, methods and apparatus for malware detection detect and stop the distribution of malware and other undesirable content before such content reaches computing systems. A cloud-based malware detection method includes receiving a signature from a computer, wherein the signature which identifies a file and the signature is smaller in size than the file; determining whether the file is trusted, untrusted, or unknown for malware based on the signature; and transmitting whether the file is trusted, untrusted, or unknown for malware to the computer based on the determining, wherein the computer is precluded from distribution of the file responsive to the file being untrusted..
Zscaler, Inc.

Geofencing of data in a cloud-based environment

Disclosed is an approach to incorporate geographical access control features for a cloud-based storage platform. This allows, for example, enterprise administrators to define geographical areas (geofences) with arbitrary precision within which content access can be denied for items of data..
Box, Inc.

Method to notify entities to preserve privacy and track compliance

A method for notifying entities to preserve privacy and track their compliance. The method embodies computing devices of users and a cloud service.

Dynamic certificate generation on a certificate authority cloud

Techniques are disclosed for dynamically generating a digital certificate for a customer server. A customer server creates a certificate profile and receives an associated profile identifier from a certificate authority (ca).
Digicert, Inc.

Searchable encryption enabling encrypted search based on document type

A searchable encryption method enables encrypted search of encrypted documents based on document type. In some embodiments, the searchable encryption method is implemented in a network intermediary, such as a proxy server.
Skyhigh Networks, Inc.

Anonymous sharing of microblog publication

Anonymity and confidentiality of information published from a microblogging platform, are preserved using randomly chosen relays (not related to the publisher account) in order to hide content in the cloud of published messages. The information can be relayed in clear text or in encrypted format.
Sap Se

Cloud based logging service

Methods and systems are provided for facilitating access to a cloud-based logging service. According to one embodiment, access to a cloud-based logging service is integrated within a network security appliance by automatically configuring access settings for the logging service and creating an account for the security appliance with the logging service.
Fortinet, Inc.

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a volume service that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Systems and methods for management of cloud exchanges

A method involving receiving application monitoring data for a first application executing in a first cloud provider and a second application executing in a second cloud provider, wherein both the first and second cloud providers communication via a cloud exchange, performing traffic latency analytics using the received application monitoring data, determining, based on the traffic latency analytics, that a peering agreement between the first cloud provider and the cloud exchange should be moved to a central office re-architected as a data center (cord), requesting a path computation engine to find the cord that meets a required set of criteria, establishing a private link between the cord and the cloud exchange, moving the at least one peering agreement to be between the first cloud provider and the cord, and forwarding at least a portion of the traffic originating from the first application in the first cloud provider directly via the cord.. .
Ciena Corporation

Intelligently suggesting computing resources to computer network users

A method of improving resource performance in a hybrid cloud environment is provided. The hybrid cloud environment includes multiple cloud systems, each of which includes at least one resource that utilizes an application.
International Business Machines Corporation

Cloud services platform

Embodiments of the disclosed technology comprise a cloud-hosted central service platform that interfaces and enables access to both central and distributed resources and peripherals for connected mobile applications. For example, this platform allows service providers and application developers to create a large number of new classes of applications, leveraging web access to devices, sensors, and/or actuators of any kind.
Mentor Graphics Corporation

System and associating metadata with computing resources across multiple providers

Systems, apparatuses, and methods for modifying metadata associated with database objects obtained from providers, such as cloud providers, are disclosed. Modifying metadata associated with database objects obtained from cloud providers may include identifying resources in a computer network that originate from providers, such as cloud providers that do not have associated metadata.
Servicenow, Inc.

Operating room black-box device, system, method and computer readable medium for event and error prediction

A multi-channel recorder/encoder for collecting, integrating, synchronizing and recording medical or surgical data received as independent live or real-time data streams from a plurality of hardware units. The medical or surgical data relating to a live or real-time medical procedure.
Surgical Safety Technologies Inc.

Traffic prediction and real time analysis system

A traffic routing and analysis system uses data from individual cellular or mobile devices to determine traffic density within a transportation network, such as subways, busses, roads, pedestrian walkways, or other networks. The system may use historical data derived from monitoring people's travel patterns, and may compare historical data to real time or near real time data to detect abnormalities.
Dataspark Pte, Ltd.

Parking lot management method, portable terminal, and parking lot management system

A parking lot management method, a portable terminal, and a parking lot management system where the method includes the steps of: receiving a remote call request; identifying a manager's portable terminal used by a manager of a parking lot that has sent the remote call request; transmitting to the identified manager's portable terminal a connection request for connection with a device that has sent the remote call request; and upon receipt of a response to the connection request for connection with the device, establishing a video channel between the manager's portable terminal and the device that has sent the remote call request, wherein the manager's portable terminal receives a video signal of a camera provided at the device through the video channel.. .
Parkingcloud Co., Ltd.

Parking lot management method, parking lot management server, and parking lot management system

A parking lot management method, a parking lot management server, and a parking lot management system where the method includes the steps of: (a) receiving vehicle entry information including a vehicle license plate number; b) generating a vehicle entry guide message of a vehicle associated with the vehicle license plate number; and (c) transmitting the vehicle entry guide message to a user's mobile phone associated with the vehicle license plate number by using the vehicle entry information including the vehicle license plate number, wherein the vehicle entry guide message includes information on a parking lot where the vehicle associated with the vehicle license plate number enters, and guide information on a partnership store associated with the parking lot, the vehicle entry guide message being displayed on the user's mobile phone.. .
Parkingcloud Co., Ltd.

Methods and systems for fast resampling point cloud data

Systems and methods for determining a pattern in time series data representing an operation of a machine. A memory to store and provide a set of training data examples generated by a sensor of the machine, wherein each training data example represents an operation of the machine for a period of time ending with a failure of the machine.
Mitsubishi Electric Research Laboratories, Inc.

Generation, transmission and rendering of virtual reality multimedia

A method of generating virtual reality data includes: obtaining point cloud data, the point cloud data including colour and three-dimensional position data for each of a plurality of points corresponding to locations in a capture volume; generating primary image data containing (i) a first projection of a first subset of the points into a two-dimensional frame of reference, and (ii) for each point of the first subset, depth data derived from the corresponding position data; generating secondary image data containing (i) a second projection of a second subset of the points into the two-dimensional frame of reference, the second projection overlapping with at least part of the first projection in the two-dimensional frame of reference, and (ii) for each point of the second subset, depth data derived from the corresponding position data; and storing the primary image data and the secondary image data in a memory.. .
Pcp Vr Inc.

Zero-knowledge predictions market

A service running on a server includes a method running on a server, for example as a cloud server. The method begins with receiving from a user using a zero-knowledge protocol, each of a unique token associated with the user, an identifier of a statement to be rated, a vote related to the statement; and a pledged quantity tied to a reputation of the user and the vote.
International Business Machines Corporation

Generating solution keyword tag clouds based on support forum post analytics

Generating a solution keyword tag cloud is provided. Keywords are identified in a question asking how to resolve an issue experienced by a user with a product.
International Business Machines Corporation

Method and system for recording at least one parameter in the transportation of perishable products

A system and method for recording and managing at least one parameter associated with the transport of perishable products in a refrigeration container includes at least one recording device for being housed in the interior of a refrigeration container. The recording device includes at least one sensor for measuring the at least one parameter at repeated occasions during the time which the transport lasts.

Systems and methods for automatically executing workflows of third-party systems

Systems and methods for surfacing contextually relevant data into the workflow of a third party system are discussed herein. The system implements a near-real-time method of detecting activity corresponding to particular electronic health records associated with particular patients in third-party systems using specifically configured software systems.
Snaps Solutions Llc

Systems and methods for tracking data across disparate computing systems via a distributed architecture

Systems and methods for surfacing contextually relevant data into the workflow of a third party system are discussed herein. The system implements a near-real-time method of detecting activity corresponding to particular electronic health records associated with particular patients in third-party systems using specifically configured software systems.
Snaps Solutions Llc

Systems and methods for surfacing contextually relevant content into the workflow of a third party system via a cloud-based micro-services architecture

Systems and methods for surfacing contextually relevant data into the workflow of a third party system are discussed herein. The system implements a near-real-time method of detecting activity corresponding to particular electronic health records associated with particular patients in third-party systems using specifically configured software systems.
Snaps Solutions Llc

Systems and methods for automatically detecting electronic access of files and surfacing contextually relevant content in response thereto

Systems and methods for surfacing contextually relevant data into the workflow of a third party system are discussed herein. The system implements a near-real-time method of detecting activity corresponding to particular electronic health records associated with particular patients in third-party systems using specifically configured software systems.
Snaps Solutions Llc

Systems and methods for surfacing contextually relevant content into the workflow of a third party system via a distributed architecture

Systems and methods for surfacing contextually relevant data into the workflow of a third party system are discussed herein. The system implements a near-real-time method of detecting activity corresponding to particular electronic health records associated with particular patients in third-party systems using specifically configured software systems.
Snaps Solutions Llc

Snapshot metadata arrangement for efficient cloud integrated data management

A storage appliance arranges snapshot data and snapshot metadata into different structures, and arranges the snapshot metadata to facilitate efficient snapshot manipulation, which may be for snapshot management or snapshot restore. The storage appliance receives snapshots according to a forever incremental configuration and arranges snapshot metadata into different types of records.
Netapp, Inc.

Partial rebuild operation within a dispersed storage network including local memory and cloud-based alternative memory

A method includes detecting an encoded data slice of a set of encoded data slices that requires rebuilding. A storage unit of the dsn includes a local memory and cloud-based alternative memory.
International Business Machines Corporation

Segmented cloud storage

A computer system for optimizing bandwidth usage within a cloud storage system receives a request, through an application program interface (api), to store a digital file. The computer system then encodes the digital file into a set of multiple distinct blocks of data.
Vivint, Inc.

Cloud embedded process tenant system for big data processing

A process owner platform may be associated with a cloud embedded big data application and may exchange information with a tenant service executor platform. The process owner platform may establish a process using a process tenant template, the process being associated with public and private data and transmit, to the remote tenant service executor platform, information including the public data (without including the private data).
Sap Se

Gpu simulation method

A gpu simulation method. An instruction sequence of a client gpu is intercepted in a kernel state simulator based on system virtualization and gpu using principle, and a mechanism is selected according to user configuration to accomplish simulation of the client gpu.
Massclouds Innovation Research Institute (beijing) Of Information Technology

Distribution of a software client application towards a client computing device

A method for improved distribution of a software client application includes: in a first step, an initializing software application is transmitted to a client computing device, wherein the initializing software application is related to the software client application and corresponds to a preliminary part of the software client application; and in a second step subsequent to the first step and upon being requested by the initializing software application, software code of the software client application is transmitted to the client computing device in view of the software client application being installed and/or activated on the client computing device in order to provide the cloud-based communication service.. .
Deutsche Telekom Ag

Dynamic and customizable user interface platform

Systems and methods for providing dynamic graphical user interface (gui) platforms which facilitate time-saving and operation-streamlining functionality for existing target applications. A gui platform may include a gui which executes command scripts which communicate information to a selected (e.g., target) application executing within an operating system (os) of a processor-based system.
Fluent Systems, Inc.

Smart storage policy

Storage virtualization techniques that automate the management of content between local storage and cloud storage in a manner that is both flexible and user-friendly are disclosed herein. A smart storage policy engine may be configured to detect the occurrence of one or more events relating to a storage capacity of the computing device, determine, in response to the detection, a need to free an amount of storage of the computing device, and execute one or more policies relating to stored content of the computing device..
Microsoft Technology Licensing, Llc

Unmanned aircraft systems (uas) robotic-platform (drone) management

An unmanned aircraft systems (uas), automated management method is invented for civilian unmanned aerial vehicle (uav) safe, controlled and accountable deployments. The method includes an attachable electronic module, use of a computerized networked enterprise (cloud), biometric operator authentication, all of which provides automated identification, gps tracking location data and recording of all relevant information.

Methods and machine learning predictions of manufacture processes

The subject technology is related to methods and apparatus for discretization and manufacturability analysis of computer assisted design models. In one embodiment, the subject technology implements a computer-based method for the reception of an electronic file with a digital model representative of a physical object.
Xometry, Inc.

Method of controlling a motorized window treatment

A method comprises measuring a light intensity at a window; determining if the light intensity exceeds a cloudy-day threshold; operating in a sunlight penetration limiting mode to control the motorized window treatment to control the sunlight penetration distance in the space; enabling the sunlight penetration limiting mode if the light intensity is greater than the cloudy-day threshold; and disabling the sunlight penetration limiting mode if the total lighting intensity is less than the cloudy-day threshold. The cloudy-day threshold is maintained at a constant threshold if a calculated solar elevation angle is greater than a predetermined solar elevation angle, and the cloudy-day threshold varies with time if the calculated solar elevation angle is less than the predetermined solar elevation angle.
Lutron Electronics Co., Inc.

Systems and methods for monitoring food processing and food storage

We describe a cloud-based system for monitoring food storage/processing. The system comprises: at least one fixed sensor for installation in an environment to be monitored, configured to collect fixed location environment data relating to the monitored environment; at least one handheld sensor for a user to collect mobile location environment data relating to the monitored environment; and a remote monitoring and reporting system located remote to the monitored environment, to collect the fixed location environment data and the mobile location environment data from the fixed sensor and handheld sensor respectively, and to audit the collected data as coming from the fixed sensor and the handheld sensor.
Checkit Limited

Responsive fluid dispersion for controlled fog and mist

An apparatus unit that adjusts fluid dispersion in response to an independent variable such as an environmental factor, to optimize the drizzle, mist or fog effect by suspending fluid droplets of a specific size in a gas. A preferred embodiment is a solar powered pump, self-contained within a buoy over a coral reef, for the purpose of providing enough mist during the sunniest time of the day to reduce coral bleaching.

Generation of gameplay video based on social network sharing

A method, including: executing, by a cloud gaming system, a session of a video game; recording the user's gameplay of the video game; analyzing the user's recorded gameplay to determine a region of interest, the region of interest being a region of the video game having social network sharing levels that exceed a predefined threshold; during the session of the video game, receiving a request from the client device, the request being initiated from a button of a controller device interfaced to the client device; responsive to the request, presenting, through the client device, the region of interest; generating, by the cloud gaming system, a gameplay video of the video game based on the region of interest; sharing the gameplay video of the video game over the social network to one or more additional client devices for viewing by one or more additional users.. .
Sony Interactive Entertainment America Llc

Bicyclic compound and use thereof for medical purposes

Since a compound represented by the general formula (i) (wherein definition of each group is as described in the specification), a salt thereof, a solvate thereof, or a prodrug thereof has strong and sustaining intraocular pressure lowering activity and, further, has no side effect on eyes such as ocular stimulating property (hyperemia, corneal clouding etc.), aqueous humor protein rise etc., it has high safety, and can be an excellent agent for preventing and/or treating glaucoma etc.. .
Ono Pharmaceutical Co., Ltd.

Wireless notification electronic rodent traps

A remote notification electronic rodent trapping system and method is provided having a plurality of rearming electronic rodent trapping devices configured to wirelessly communicate trap information to a base station that is in communication with a cloud server. When a trap is activated by a rodent trigger it changes from a set state to a kill alert state and initiates a killing cycle.
Woodstream Corporation

Technique for extending capacities of a radio access network

An approach for extending capacities of a radio access network (ran) is presented. An exemplary method implementation of that approach comprises flying a drone to an ran site.
Telefonaktiebolaget Lm Ericsson (publ)

Cloud-based device configuration management of heterogeneous devices

The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems.
Quest Software

Mobile scanner via private data on cloud

An apparatus comprises a segmenter and a pre-processor. The segmenter segments a first stream of data into p-1 substreams, p being an integer greater than 1.
Spatial Digital Systems, Inc.

Prefetching with a dynamic cloud packager

Provided is an intelligent prefetcher for prefetching media content segments following a non-sequential naming convention. The prefetching is initiated in response to a server receiving a user request for a particular segment that is not cached.
Verizon Digital Media Services Inc.

Establishing secure sessions for stateful cloud services

Aspects of the present disclosure relate to establishing a secure session between a client device and a stateful backend server or host. The system described herein uses an identity token and an authorization token to generate a globally unique identifier that is associated with the client device.
Microsoft Technology Licensing, Llc

Method for cloud based mobile application virtualization

A system and method for mobile application virtualization. The method includes creating a plurality of user sessions each comprising a unique session id and allocating server resources to each user session.
Sierraware, Llc

Device and system for cloud based mobile application virtualization

A system and method for mobile application virtualization. The system includes a server based architecture for mobile application virtualization.
Sierraware, Llc

Efficient un-allocation of cloud resources

Cloud services require the outward appearance of unlimited resources with flexible availability for varying demand. However, while on-demand allocation and deallocation of resources may seem efficient, there are significant cases where simply allocating and deallocating resources just in response to demand results in inefficiencies.
At&t Intellectual Property I. L. P.

Hybrid cloud network monitoring system for tenant use

Network traffic in a cloud computing system is monitored in response to a request to capture network traffic of a tenant port of a first virtual machine (vm) executing in the cloud computing system, wherein the first vm is associated with a first tenant organization different from a second organization managing the cloud computing system. A decapsulating vm having a first network interface and a second network interface is instantiated, wherein the decapsulating vm is inaccessible to the first tenant organization.
Vmware, Inc.

Method for managing user information of application, device, and system

The present invention discloses a method for managing user information of an application. The method is applied to a user management device of a cloud platform, where the cloud platform is configured to bear an application registered by a user with the cloud platform.
Huawei Technologies Co., Ltd.

Hub and agent communication through a firewall

Hub and agent techniques allow safe command execution and data retrieval through firewall(s). In an example, cloud-based server of a company communicates with a plurality of agent applications operating on a remote customer's site.
Itron, Inc.

Method for generating an authenticating document

A method for generating an authenticating document for verifying whether a password is inputted by a genuine holder of the password is to be implemented by a network server communicable with a mobile device. The method includes: receiving, by the network server from the mobile device, a password inputted by a user via an input unit of the mobile device, and a dynamic image that is captured by an image capture module of the mobile device and that is associated with a motion of the user during input of the password; and compiling, by the network server, the authenticating document based on the password and the dynamic image when the password is verified by the network server to be correct..
Thinkcloud Digital Technology Co., Ltd.

Systems and methods for improving https security

Systems and methods for hypertext transfer protocol (http) http strict transport (hsts), are implemented by one or more servers associated with a gateway in a cloud based proxy. A method includes managing a preloaded list of http security (https) support of a plurality of domains; receiving a domain request from an hsts application executed on a user device, wherein the hsts application is configured to detect the domain request from a browser or application executed on the user device; and transmitting a response to the user device with header information related to support of https the domain..
Zscaler, Inc.

Apparatus, method, and manufacture for cloud network updating

The present technology is generally directed to updating a cloud network. This technology may include generating a set is inequalities based network topology information, shared risk link group information, demand information, and traffic solver parameters.
Microsoft Technology Licensing, Llc

Portable power charger with two-way charging interface

A portable power charger having an internal rechargeable battery is provided with a power connection port than can act in a power input mode when the charger is connected with an external power source via the power connection port and in a power output mode when at least one electronic device is connected to the charger via the power connection port. The power charger may be connected with both an external power source and an electronic device via the power connection port at the same time, wherein the charge supplied from the external power source recharges the charger and any electronic device connected to the charger.
Halo2cloud, Llc

Device specific multi-channel data compression

A sensor device may include a computing device in communication with multiple microphones. A neural network executing on the computing device may receive audio signals from each microphone.
Google Llc

Cloud-based user interface augmentation

In a general aspect, a computer-implemented method can include storing, on one or more remote servers, preferences specific to a user for augmented user interface (aui) functionality on a local computer and receiving, at the one or more remote servers via a web browser running on the local computer, a request to login the user. The computer-implemented method can also include, in response to the request, providing from the one or more remote servers to the local computer, one or more application programming interface (api) plug-ins to provide, in the web browser, the aui functionality on the local computer, wherein the provided aui functionality conforms to the user's preferences stored on the one or more remote servers..
Google Llc

Method and annotating point cloud data

The present application discloses a method and apparatus for annotating point cloud data. A specific implementation of the method includes: collecting data in a given scenario by using a laser radar and a non-laser radar sensor to respectively obtain point cloud data and sensor data; segmenting and tracking the point cloud data to obtain point cloud segmentation and tracking results; recognizing and tracking feature objects in the sensor data to obtain feature object recognition and tracking results; correcting the point cloud segmentation and tracking results by using the feature object recognition and tracking results, to obtain confidence levels of the point cloud recognition and tracking results; and determining a point cloud segmentation and tracking result whose confidence level is greater than a confidence level threshold as a point cloud annotation result.
Beijing Baidu Netcom Science And Technology Co., Ltd.

System and distributing imperative services and products

An imperative service system includes at least one server computer that is adapted to communicate with resident electronic devices and property owner systems over internet. The imperative service system receives an imperative service licensing request with input data entered via an imperative service licensing web page, and generates an individualized property web address for a property or a set of properties.

Method and system for determining market estimates with market based measures

A method and system for determining market estimates with market based measures. Market estimates for a set of time periods are received from plural qualified institutions that have agreed to a pre-determined set of regulations to participate in establishing, conducting business and processing transactions based on calculated market term estimates.

Method for generating a signed electronic document with an anti-tamper function

A method is to be implemented by a network server, and includes: receiving input information associated with a handwritten signature inputted on an original document, and a dynamic image associated with a motion of a signer during input of the handwritten signature; compiling a signed document based on the original document, the input information and the dynamic image; generating an authentication value based on a location where the handwritten signature is rendered on the signed document and a location where the dynamic image is rendered on the signed document; and incorporating the authentication value into the signed document to result in an anti-tamper document.. .
Thinkcloud Digital Technology Co., Ltd.

Methods and sharing, transferring and removing previously owned digital media

The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (dmo) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors..
Redigi, Inc.

Apparatus and determining key performance indicators

A data processing apparatus is deployed at a cloud network, and includes a plurality of data nodes, a receiver circuit, and an aggregation circuit. The receiver circuit is coupled to the plurality of data nodes and is configured to receive downtime records from a plurality of industrial machines, and to selectively route the downtime records to selected ones of the plurality of data nodes based upon a predetermined criteria.
General Electric Company

Dynamic cleanse configurations for cloud

A computer-implemented method, system, and computer program product are described for initiating and displaying, at a user interface, an editor adapted to generate a plurality of configuration models, receiving a selection of at least one country from a plurality of countries. The method can include retrieving a data model and reference data associated with the at least one country, populate a plurality of attributes from the data model in the user interface and populating a plurality of selectable input mappings in the user interface.
Sap Se

System, organizing photographs stored on a mobile computing device

An image organizing system for organizing and retrieving images from an image repository residing on a mobile device is disclosed. The image organizing system includes a mobile computing device including an image repository.
Amazon Technologies, Inc.

Automatic back-up scheduling

Techniques are disclosed herein for a cloud computing system for backing up a device. The system includes a scheduling manager to schedule a back-up for the device to occur at a time based on a time zone in which the device is located and based on workday customs local to the device.
Hewlett-packard Indigo B.v.

Methods and systems for quantum ready and quantum enabled computations

The present disclosure provides methods, systems, and media for allowing access to quantum ready and/or quantum enabled computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services on the cloud.
1qb Information Technologies Inc.

Methods and systems that share resources among multiple, interdependent release pipelines

The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks.
Vmware, Inc.

Preprocessing tensor operations for optimal compilation

Techniques to preprocess tensor operations prior to code generation to optimize compilation are disclosed. A computer readable representation of a linear algebra or tensor operation is received.
1026 Labs, Inc.

Distributed computing with cloud computed feedback to process sensors

A process control system for controlling an industrial process includes a cloud-computing dependent (c2d) radar level gauge or ultrasonic flow meter (c2d sensor device) including a sensor, transducer, communications unit, with limited hardware/software incapable of calculating an accurate level calculation or high accuracy gas flow rate. A bus couples the sensed data from the c2d sensor device to an ip communications unit that outputs ip protocol data.
Honeywell International Inc.

Apparatus and calibrating and validating micro rain radar

Disclosed is an apparatus for calibrating and validating an mrr, the apparatus including a correlation calculation unit configured to determine a correlation between a precipitation strength value and a precipitation measurement value, a regression equation calculation unit configured to calculate a regression equation for the precipitation strength value and to calculate a result value of the regression equation, an optimum accumulation time determination unit configured to determine an optimum accumulation time based on the correlation and the result value, a rain cloud vertical sampling unit configured to sample a rain cloud example, a vertical reflectance comparison unit configured to compare a calibrated mrr at a shortest range distance with a vertical reflectance according to a wind system, and a radar constant correction unit configured to correct a constant of an mrr based on the optimum value or the sampling and a result value of the comparison.. .
Korea Meteorological Administration

Machine learning coordinated wireless networking

The disclosed methods and systems use artificial intelligence (ai) and machine learning (ml) technologies to model the usage and interference on each channel. For example, units of the system can measure channel interference regularly over the time of day on all radios.
Netgear, Inc.

Determining a threshold value for determining whether to steer a particular node from associating with one node to another node in a wireless environment

Techniques are disclosed for determining a threshold value for determining whether to steer a particular node (such as, a client device) from one node (such as, an access point ((ap)) to another node (such as, another ap). A particular node associated with a current node in a wireless environment is identified.
Kodacloud Inc.

Physical security system and method

Systems (100) and methods (110) for operating a physical security surveillance system. The methods involve: detecting the constant unencrypted radio transmissions of mobile phones in order to capture in a cloud-based archive the identities, geographical trails, speeds and motions of most people nearby deployed units.

Transcoder enabled cloud of remotely controlled devices

Various embodiments are directed to one or more transcoder devices in communication with an input device such as a remote control device and multiple destination devices in which the transcoder device(s) facilitate communication between the remote control and the various destination devices in the vicinity. The transcoder device(s) can also provide the user with an environmental awareness of conditions and events surrounding the user.
Intel Corporation

Camera system and object recognition method thereof

A camera system for object recognition is disclosed. In one aspect, the system includes an active three-dimensional (3d) sensor configured to obtain a 3d point cloud which corresponds to 3d position values of an object, and a controller configured to generate control data for controlling a zoom value, a pan value, and a tilt value which correspond to the 3d position values.
Korea Electronics Technology Institute

Cloud data storage location monitoring

Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers.
Intel Corporation

System and synchronizing data objects in a cloud based social networking environment

Methods and systems are provided for synchronizing and sharing a file. A set of access privileges is configured within a cloud collaboration site to define a sharing configuration to allow sharing of the file between a group of computing devices comprising a first computing device and one or more second computing devices.
Salesforce.com, Inc.

Method and system for cloud storage of video, and previewing cloud-stored video

Disclosed are a method and system for cloud storage of a video, and method and system for previewing a cloud-stored video. The method for the cloud storage of the video includes: after receiving a video recording plan issued by a platform, a management server determines a target storage device according to a load balancing policy, and issues the video recording plan to the target storage device; the target storage device obtains and stores, according to the video recording plan, a video stream from a front-end device corresponding to the video recording plan; when the target storage device is not able to obtain the video stream from the front-end device, the target storage device sends an alarm to the management server; and after receiving the alarm, the management server issues the video recording plan to other storage devices according to the load balancing policy..
Hangzhou Hikvision Digital Technology Co., Ltd.

Context-based cloud security assurance system

A cloud infrastructure is enhanced to provide a context-based security assurance service to enable secure application deployment. The service inspects network and cloud topologies to identify potential security capabilities and needs.
International Business Machines Corporation

Protecting from unintentional malware download

Protection from malware download is provided. A first input is received to access one of an email attachment or a web site link using an application.
International Business Machines Corporation

Systems to implement security in computer systems

Systems, methods, and non-transitory computer-readable medium are provided to secure data centers and cloud computing. A method receives network identifiers for functions, requests a network key for each function, allocates network interfaces, requests a virtual network interface controller allocation, requests a network key for each cloud function, receives storage identifiers for functions, requests a storage key for each cloud function, allocates virtual storage disks, requests a storage interface controller allocation, requests a storage key for each cloud function.

Edge server, encryption communication control method thereof, and terminal

An edge server disposed on an edge of a cloud network, includes: a processor, wherein when encryption key information relating to a terminal which requests a connection to the edge server and the encryption key information generated before the request, is included in shared information shared between a cloud server and another edge server in the cloud network, the processor is configured to start encryption communication with the terminal using the encryption key information of the shared information.. .
Fujitsu Limited

Proxy-based access to remote database

Proxy-based access occurs between a cloud database and analytical client tool, without requiring a separate intervening application server. A client proxy (tool side) communicates exclusively with a server proxy (database side).
Sap Se

Machine learning coordinated wireless networking

The disclosed methods and systems use artificial intelligence (ai) and machine learning (ml) technologies to model the usage and interference on each channel. For example, units of the system can measure channel interference regularly over the time of day on all radios.
Netgear, Inc.

Integration of cloud services for consumption in cloud applications

An integration service layer is provided for interaction between applications and platform services. The platform services may be cloud services deployed on one or more cloud platforms.
Sap Se

Data defined infrastructure

A system for managing the operation of different components within a cloud system to accomplish various tasks, including the implementation of build features within the cloud system to achieve specific operational goals. The system may include a data defined infrastructure (ddi) tool installed within a data defined infrastructure (ddi) to manage certain features or tasks within the cloud system.
Accenture Global Solutions Limited

Decorative and portable power charger with motion light

A compact, decorative portable charger is provided for charging an electronic device on-the-go. The portable charger has a charger housing having a rechargeable battery internally disposed therein for connecting to and recharging an electronic device, as necessary, via a power connection female port, a power connection male interface, and/or a wireless transmitter disposed within the charger housing.
Halo2cloud, Llc

Decorative and portable power charger with motion light

A compact, decorative portable charger is provided for charging an electronic device on-the-go. The portable charger has a charger housing having a rechargeable battery internally disposed therein for connecting to and recharging an electronic device, as necessary, via a power connection female port, a power connection male interface, and/or a wireless transmitter disposed within the charger housing.
Halo2cloud, Llc

Monitoring system

A monitoring system has sensors for monitoring a comfort of a user. For example, a motion sensor may detect movements as the user lies or plays in the monitoring system.
Enfant Terrible Design Ab

System and upsampling of sparse point cloud for 3d registration

A method for three-dimensional point cloud registration includes generating a first upsampled three-dimensional point cloud by identifying at least one missing point in the three-dimensional point cloud, determining an intensity of neighboring pixels filling the at least one missing point in the three-dimensional point cloud with a filler point using depth information from depth values in the three-dimensional point cloud that correspond with the neighboring pixels, generating a second upsampled three-dimensional point cloud by determining at least one local area of the first upsampled three-dimensional point cloud, determining entropies of pixels in the two-dimensional image that correspond with the at least one local area, adding at least one point to the at least one local area based on the entropies of pixels in the two-dimensional image and a scaled entropy threshold, and registering the second upsampled three-dimensional point cloud with a predetermined three-dimensional model.. .
The Boeing Company

Cloud-based broker service for digital assistants

A cloud-based broker service may be provided for computing devices in a distributed computing environment. The broker service may aggregate user accounts and user account credentials utilized for accessing online services by the computing devices.
Microsoft Technology Licensing, Llc

Organizing images associated with a user

A method includes identifying images associated with a user, where the image is identified as at least one of captured by a user device associated with the user, stored on the user device associated with the user, and stored in cloud storage associated with the user. The method also includes for each of the images, determining one or more labels, wherein the one or more labels are based on at least one of metadata and a primary annotation.
Google Llc

Sharing video footage from audio/video recording and communication devices

Video footage captured by a/v recording and communication devices may be readily uploaded to the cloud and shared with a requesting party, such as a law enforcement agency. When a request is received from a requesting party for video footage, videos meeting the criteria specified by the requesting party may be determined.
Ring Inc.

Sharing video footage from audio/video recording and communication devices

Video footage captured by a/v recording and communication devices may be readily uploaded to the cloud and shared with a requesting party, such as a law enforcement agency. When a request is received from a requesting party for video footage, videos meeting the criteria specified by the requesting party may be determined.
Ring Inc.

Data relocation in global storage cloud environments

Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user.
International Business Machines Corporation

Data relocation in global storage cloud environments

Methods and systems for data relocation in global storage cloud environments are provided. A method includes locating a data server near a travel location of a user based on one or more travel plans of the user.
International Business Machines Corporation

Node selection for a new application in a multi-tenant cloud hosting environment

A method includes instantiating a first web application for a first application owner on a virtual machine and instantiating a second web application for a second application owner. The second application owner is different than the first application owner.
Red Hat, Inc.

Secure application packaging in the cloud

Compiling a software application on a cloud computer system. An indication is received from a client at a cloud computer system.
Microsoft Technology Licensing, Llc

Deployment manager

An application platform in a cloud environment includes a portal to provide user access to a deployment manager. The deployment manager includes a user interface, a template library, a template editor, and a deployment mechanism.
Microsoft Technology Licensing, Llc

Designer tool for managing cloud computing services

Embodiments of facilitating creation of cloud computing applications are disclosed therein. In one embodiment, a method includes receiving user input of a plurality of workflow items as a sequence of graphical objects on a graphical user interface.
Microsoft Technology Licensing, Llc

Method for extending life expectancy of disks in cloud-based service system and system using the same

A system for extending life expectancy of disks in a cloud-based service system and the system using the method are disclosed. The present invention uses lstm modeling and the k-means clustering algorithms to find out performance limit and target lifespan for a cluster of disks assigned for a specific workload running over the cloud-based service system.
Prophetstor Data Services, Inc.

Apparatus and sharing and learning driving environment data to improve decision intelligence of autonomous vehicle

Provided are an apparatus and method for sharing and learning driving environment data to improve the decision intelligence of an autonomous vehicle. The apparatus for sharing and learning driving environment data to improve the decision intelligence of an autonomous vehicle includes a sensing section which senses surrounding vehicles traveling within a preset distance from the autonomous vehicle, a communicator which transmits and receives data between the autonomous vehicle and another vehicle or a cloud server, a storage which stores precise lane-level map data, and a learning section which generates mapping data centered on the autonomous vehicle by mapping driving environment data of a sensing result of the sensing section to the precise map data, transmits the mapping data to the other vehicle or the cloud server through the communicator, and performs learning for autonomous driving using the mapping data and data received from the other vehicle or the cloud server..
Electronics And Telecommunications Research Institute

Systems and methods for evaluating sensor data of internet-of-things (iot) devices and responsively controlling control devices

Storing a plurality of cloud-bots, each of the plurality of cloud-bots including a respective service. Gathering first data over a communication network, the first data being associated with a first internet-of-things (iot) device.
People Power Company

Flying sensor

A flying sensor comprising an unmanned aerial vehicle (uav) and at least one profiler mounted on the uav, the profiler comprising a base, a scanning unit for providing (lidar) data, the scanning unit mounted on the base and comprising a shaft carrying a deflector and being mounted in the scanning unit and rotatable, a transmitter transmitting a transmission beam, a first receiver configured for receiving a first reception beam reflected from the setting via the deflector, and an electric port configured for connecting the profiler to the uav, and comprising a data interface and a power interface, and wherein the uav comprises a visual sensor providing visual data, and comprising one or more cameras, a pose sensor for providing pose data, and a computer to compute a 3d point cloud based on the lidar data and a simultaneous localisation and mapping (slam) algorithm using the visual and pose data.. .
Leica Geosystems Ag

Antiglare film-coated substrate, antiglare film forming liquid composition, and producing antiglare film-coated substrate

To provide an antiglare film-coated substrate that has an excellent antiglare property and reduced haze and through which cloudiness is not easily recognized visually on a black printed layer when the black printed layer is seen therethrough, for example, an antiglare film forming liquid composition for forming the antiglare film, and a method of producing an antiglare film-coated substrate. An antiglare film-coated substrate 1 includes a transparent substrate 2; and an antiglare film 3 provided on the transparent substrate 2, in which the antiglare film 3 contains silica as its main component and a cf3(ch2)n-group where n is an integer of 1 to 6, and the antiglare film 3 has surface roughness curve skewness rsk of 1.3 or less and has arithmetic mean roughness ra of 0.01 μm or more..
Asahi Glass Company, Limited

Game execution environments

Systems and methods for executing multiple video games, or other sources of video, include a cloud game execution environment in which each game application is executed on the same operating system but within a virtual i/o shell. The virtual i/o shell includes virtual video, audio and input channels that allow each game application to operate as if it had dedicated drivers.
Sony Interactive Entertainment America Llc

Non-invasive monitoring lusitropic myocardial function in relation to inotropic myocardial function

A system and method for non-invasively monitoring the hemodynamic state of a patient by determining on a beat-by-beat basis the ratio of lusitropic function to inotropic function as an index of myocardial well-being or pathology for use by clinicians in the hospital or by the patient at home. In one embodiment of the system a smartphone running an application program that is connected through the internet to the cloud processes electronic signals, first, from an electrocardiogram device monitoring electrical cardiac activity, and second, from a seismocardiogram device monitoring mechanical cardiac activity in order to determine such ratio as an instantaneous measurement of the hemodynamic state of the patient, including such states as sepsis, myocardial ischemia, and heart failure..
The Cooper Health System

Methods, system and apparatus to improve motivation and control when taking meals and to automate the process of monitoring nutrition

A meal consumption monitoring and control system is disclosed. The system includes a flat profile scale serving as a coaster for a plate, a cup, or a glass enabled with bluetooth or other type of wireless connectivity.

Devices, systems, and methods for maintaining luminaire color temperature levels in a gateway based system

The disclosure relates to devices, systems, and methods for adjusting and/or maintaining color temperature levels of luminaires. The luminaires may be light emitting diode (led)-based luminaires which are part of a smart illumination system.
Gooee Limited

Techniques and architectures for managing disparate heterogeneous cloud-based resources

Techniques and architectures for data modeling and management. Data modeling services are provided to agents within multiple different operating environments of a computing environment having at least one database stored on one or more physical memory devices communicatively coupled with one or more hardware processors the one or physical memory devices.
Salesforce.com, Inc.

Protection from malicious and/or harmful content in cloud-based service scenarios

There are provided measures for protection from malicious and/or harmful content in cloud-based service scenarios. Such measures exemplarily include detecting a transmission attempt of a file between a file service cloud entity and a remote accessing entity, identifying said file, checking for presence of a security threat scan result for said file in a scan result memory based on a result of said identifying, and transmitting, based on a result of said checking, a security threat scan task for said file to a security cloud entity connected to said file service cloud entity..
F-secure Corporation

Generating short-term signatures for accessing cloud storage

Securely storing assets in a cloud computer storage service. Preparation to store assets for a user may comprise determining a location to store the assets, generating a write access signature, and sending the determined location and the signature to the user.
Microsoft Technology Licensing, Llc

Securing access to cloud components

Particular embodiments described herein provide for receiving a request from a first cloud component in a cloud network, wherein the request is to access a key and the key allows the first cloud component to access located trusted execution environment of a second cloud component in the cloud network and allow the request on the condition that the first cloud component is authenticated. A more specific example includes determining a type for the first cloud component, and comparing the determined type of the first cloud component with a component type associated with the key.
Intel Corporation

Microservices based multi-tenant identity and data security management cloud service

A system provides cloud-based identity and access management. The system receives a request for performing an identity management service, where the request includes a call to an application programming interface (“api”) that identifies the identity management service and a microservice configured to perform the identity management service.
Oracle International Corporation

Method and system for securely transmitting volumes into cloud

A first computing device is provided for transmitting one or more volumes via a secured connection. The first computing device includes a controller that is executable by one or more processors and is configured to instruct a cloud computing device to generate a worker virtual machine.
Citrix Systems, Inc.

Multi-perimeter firewall in the cloud

Systems and methods for providing multi-perimeter firewalls via a virtual global network are disclosed. In one embodiment the network system may comprise an egress ingress point in communication with a first access point server, a second access point server in communication with the first access point server, an endpoint device in communication with the second access point server, a first firewall in communication with the first access point server, and a second firewall in communication with the second access point server.
Umbra Technologies Ltd.

Cloud resource provisioning for large-scale big data platform

A method implemented in a cloud-based data system includes a central controller receiving time-stamped reports from a plurality of agents including a server status and a server resource usage, calculating a number of active servers and a sum of resource usage on each server per interval based on each time-stamped report, generating a prediction model based on data results generated from calculating the number of active servers and the sum of resource usage per interval, predicting a number of servers needed in the cloud-based system based on the prediction model, generating a forecasting model to forecast an amount of resource usage at a future date, based on time series data associated with calculating the sum of resource usage over multiple intervals, and using the prediction model to predict whether a different number of servers is needed at the future date based on the forecasted amount of resource usage.. .
Futurewei Technologies, Inc.

Network proxy for control and normalization of tagging data

Provisioning resources into the cloud is a constantly increasing technical challenge as more cloud service providers emerge, each offering disparate computing platforms, services, assets, supported technical components, and other features. A network proxy controls and normalizes the tagging data applicable across the multiple cloud service providers.
Accenture Global Services Limited

Exchange service management contents with a cloud entity via a self-contained cloud content package

This disclosure relates to a method, system, and medium to exchange service management contents with a cloud entity via a self-contained cloud content package. The device retrieves a plurality of service management contents for a first cloud controller that offers a cloud service.
Hewlett Packard Enterprise Development Lp

Public cloud interface for tranceiving corresponding requests and responses to multiple networks

A public cloud can host a multi-network service for transceiving common requests and responses for multiple networks. The public cloud can receive requests from the networks to join the service via an application programming interface (api).
Ebay Inc.

Multi-user conferencing system

The present invention discloses a multi-user conferencing system, where the multi-user conferencing system includes an infrared device and a cloud server, where the infrared device having no display screen is communicatively connected to the cloud server and creates a conference; the infrared device determines, according to a distribution situation of infrared rays blocked by a writing object operated by a user in the conference, coordinate information of the writing object, and sends the coordinate information to the cloud server; and a terminal participating in the conference acquires data from the cloud server, and reproduces writing content during the conference. A multi-user conferencing system in embodiments of the present invention may save data traffic generated by a conference, and enhance data processing speed..

Method and system for signaling and processing control information in a mobile broadband network environment

A method and a system for signaling and processing control information in a cloud cell environment are provided. According to an embodiment, in a cloud cell, a master base station (bs) coordinates with other bss to determine resources available for use on communication links between a mobile station in the cloud cell and one or all the bss during a scheduling interval.
Samsung Electronics Co., Ltd.

Long range wireless notification electronic rodent traps

A long range wireless notification electronic rodent trapping system and method is provided having a plurality of rodent trapping devices configured to wirelessly communicate trap information to a gateway that can be in communication with a cloud server. The system uses frequencies of less than 1 ghz and data packets with a payload of not more than 256 bytes to enable the status of the traps to be remotely monitored over a wide geographical area with the traps being capable of reporting their status directly to a gateway located up to about 10 miles away..
Woodstream Corporation

Cloud-based connectivity tool and method

A method for conducting a survey or poll includes receiving authentication data from a plurality of users. The received authentication data is evaluated for each user to determine if the authentication data is valid.
Pollmole Corporation

Spheres of knowledge

A service for rating a statement or proposition on a server, for example a cloud server, includes receiving from a user using a zero-knowledge protocol, each of a unique token associated with the user, an identifier of a statement to be rated, a vote related to the statement; and a pledged quantity tied to a reputation of the user and the vote. The vote either supports or opposes a veracity of the statement.
International Business Machines Corporation

Facial feature views of user viewing into virtual reality scenes and integration of facial features into virtual reality views into scenes

A method, system, computer readable media and cloud systems are provided for rendering virtual reality (vr) views into vr scenes for presentation to a head mounted display (hmd). One method includes sensing a position of a nose of the user when the hmd is worn by the user.
Sony Interactive Entertainment Inc.

Method for generating an ordered point cloud using mobile scanning data

Methods for generating a set of ordered point clouds using a mobile scanning device are presented, the method including: causing the mobile scanning device to perform a walkthrough scan of an interior building space; storing data scanned during the walkthrough; creating a 3-dimensional (3d) mesh from the scanned data; and creating the set of ordered point clouds aligned to the 3d mesh, where the creating the set of ordered point clouds aligned to the 3d mesh includes, aligning a number of scanned points with the 3d mesh, performing in parallel the steps of, coloring each of a number of scanned points, calculating a depth of each of the number of scanned points, and calculating a normal of each of the number of scanned points.. .
Indoor Reality Inc.

Point cloud noise and outlier removal for image-based 3d reconstruction

Enhanced removing of noise and outliers from one or more point sets generated by image-based 3d reconstruction techniques is provided. In accordance with the disclosure, input images and corresponding depth maps can be used to remove pixels that are geometrically and/or photometrically inconsistent with the colored surface implied by the input images.
Eth Zürich (eidgenössische Technische Hochschule Zürich)

Online bargaining system and online goods promotion system

The invention provides an online bargaining system, which includes an online bargaining platform for allowing a client to send a bargaining service request on goods for sale in a near-end physical store to a cloud server, such that the cloud server may interact with the client through the online bargaining platform to process the bargaining service request. The invention further provides an online goods promotion system for allowing the client to interact with the cloud server through an online goods promotion platform and take part in goods promotions in the near-end physical store.
Paking Technology, Inc.

System and point of sale transaction logging

The present disclosure generally relates to a method and a hardware and software system for collecting data from retail point of sale. The hardware connects to a wide variety of barcode scanners and receipt printers.
Pomo Search Ltd.

Static and dynamic device profile reputation using cloud-based machine learning

Disclosed herein are cloud-based machine learning systems and methods for monitoring networked devices to identify and classify characteristics, to infer typical or atypical behavior and assign reputation profiles across various networked devices, and to make remediation recommendations. In some embodiments, a cloud-based machine learning system may learn the typical operation and interfacing of a plurality of reputable devices that are known to be free from malicious software and other threats.
Mcafee, Llc

Cloud-based secure printing system and processing same

The present invention relates to a cloud-based secure printing system and a method of processing same. When requesting printing of a desired printed matter by using a communication network of a mobile terminal of a user and a personal computer, the cloud-based secure printing system of the present invention uses a print management server and a print agent to authenticate and confirm the user and document security authority, and prints the printed matter through a desired printer.
Mwstory Co., Ltd.

Topic profile query creation

A topic profile may be generated based on several words/phrases. The topic profile may include social media content items such as a social media post from a variety of social media sources.
Salesforce.com, Inc.

Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, using ping monitoring of target virtual machines

An illustrative “vm heartbeat monitoring network” of heartbeat monitor nodes monitors target vms in a data storage management system. Accordingly, target vms are distributed and re-distributed among illustrative worker monitor nodes according to preferences in an illustrative vm distribution logic.
Commvault Systems, Inc.

Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including operations by a master monitor node

An illustrative “vm heartbeat monitoring network” of heartbeat monitor nodes monitors target vms in a data storage management system. Accordingly, target vms are distributed and re-distributed among illustrative worker monitor nodes according to preferences in an illustrative vm distribution logic.
Commvault Systems, Inc.

Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including virtual machine distribution logic

An illustrative “vm heartbeat monitoring network” of heartbeat monitor nodes monitors target vms in a data storage management system. Accordingly, target vms are distributed and re-distributed among illustrative worker monitor nodes according to preferences in an illustrative vm distribution logic.
Commvault Systems, Inc.

Online backup to an object service using bulk export

A system and method for improving storage system performance by maintaining data integrity during bulk export to a cloud system is provided. A backup host reads a selected volume from the storage system via an i/o channel.
Netapp, Inc.

Incident analysis program, incident analysis method, information processing device, service identification program, service identification method, and service identification device

A non-transitory computer-readable storage medium storing an incident analysis program having: generating a new incident-related request database by extracting, from a request management database including request data in which requests issued from first service systems of a first cloud service vendor to second service systems of a second cloud service vendor, response times to the requests, and timings of the requests, new incident-related request data of requests issued at the new incident occurred from an issuing source first service system to an issuing destination second service system; extracting, from a plurality of past incident-related request databases generated at incidents in the past, a past incident-related request database whose transition tendency of the response time has a correlation with the new incident-related request database: and identifying a second service system estimated to be responsible for the past incident, as a second service system estimated to be responsible for the new incident.. .
Fujitsu Limited

Systems and methods for metric driven deployments to cloud service providers

Systems and methods are shown for providing metric driven deployments to cloud server services that are adapted to interface with each provider. In some implementations, there is insight and control over network, disk, cpu, and other activity giving the ability to do performance metrics analysis for a given application or service between different cloud server services as each application or service is run in a container within an instance running on the respective cloud server service.
Uchicago Argonne, Llc

Remote provisioning of hosts in public clouds

Examples provide for automatically provisioning hosts in a cloud environment. A cloud daemon generates a cloud host-state configuration, for a given cloud instance of a host, stored on a cloud metadata service prior to first boot of the given cloud instance of the host.
Vmware, Inc.

Updating electronic controller through telematics

Systems and methods to update the calibration data of a control system includes a calibration system. The calibration system includes a first cloud connected application system structured to communicatively couple to a second cloud connected application system, determine, via at least one of the first cloud connected application system or the second cloud connected application system, a calibration update request corresponding to a control system, generate custom calibration data including preference data based on at least one of the calibration update request or the preference data, and provide the custom calibration data during at least one of an active engine state or an inactive engine state, wherein the custom calibration data is transmitted from the second memory portion to the first memory portion in response to the inactive engine state..
Cummins Inc.

Web application system and method to dynamically select between local installed and cloud-based resources

The embodiments herein are directed to collecting information from multiple sources about platform capabilities and evaluating the platform capabilities of at least a requesting computer system and a server. A portal can automatically and dynamically select a proper client/application to handle communication based on availability, connectivity and more characteristics and provide a communication recommendation when requesting a function.
Avaya Inc.

Secure deployment of applications in a cloud computing platform

A method of securely deploying an application in a cloud computing platform includes receiving component composition files that define configurations of application components included the application, and receiving an application composition file that defines a connection scheme between the application components. The method further includes retrieving default component configuration files that satisfy requirements of the application components.
International Business Machines Corporation

Declustered array of storage devices with chunk groups and support for multiple erasure schemes

Embodiments of a declustered, fault-tolerant array of storage devices for use with computer, networked, cloud-based, and other data storage applications are described. In some embodiments, the array generates a chunk group mapping with a high utilization of storage device space, provides evenly distributed hot spares, supports multiple erasure schemes including reed-solomon codes and local reconstruction codes, and provides high storage device rebuild speed after storage device failure.
Western Digital Technologies, Inc.

Virtual reality head-mounted device

The present invention provides a virtual reality display apparatus including a wireless transmitting module coupled to a control unit for receiving a virtual reality image sent by a cloud server, wherein the virtual reality display apparatus includes an eye control module and iris recognition module.. .

Three-dimensional measuring system and measuring method with multiple measuring modes

The present invention relates to the field of three-dimensional digital imaging, and more particularly to a three-dimensional measuring system and a measuring method with multiple measuring modes. The measuring system includes a control unit, a variable digital pattern generation unit, an image processing unit, a calculating unit and at least one image sensor; the control unit is used for controlling the cooperative work of the whole measuring system; the variable digital pattern generation unit includes a memory and a projector, and the memory stores a plurality of light template digital patterns; the image sensors are used for acquiring patterns which are projected onto a surface of a measured object; the image processing unit is a multi-mode digital image processor; and the calculating unit is a multi-mode three-dimensional point cloud calculator.
Hangzhou Shining 3d Tech. Co., Ltd.

Telemedical wearable sensing system for management of chronic venous disorders

A telemedical interface pressure monitoring system is provided for intermittent or continuous monitoring of the pressure that occurs at the interface between the body and a support surface such as with a compression device, cast or resting surface. The system simultaneously measures interface pressure at multiple compression positions as well as provide real-time measurement data to both patients and clinicians.
The Regents Of The University Of California

Systems and methods for vehicle access and management

Various embodiments of vehicle access and management systems and methods are disclosed herein for providing added functionality and connected-vehicle services to vehicles. The frontend of the system may include an in-vehicle infotainment unit running a custom application which may communicate with the various electronic systems of the vehicle in order to issue commands, perform actions, and obtain data.
Mobilogix, Inc.

System and recording streamed media

A system for recording fitness sessions including one or more internet-protocol (ip) cameras positioned proximate an exercise location, and a media control appliance in communication with each of the ip cameras. The media control appliance includes a computer processor and a computer-readable storage medium storing instructions which when executed by the computer processor: configures a scheduler module receiving data from a user including a specified exercise location and start and end times of a fitness session, initiates recording video from an ip camera at the specified exercise location at the start time, ends the recording video from the ip camera at the end time; and, stores the recorded video on a media storage medium in communication with the media control appliance..
Fitcloudconnect Inc.

Image processing apparatus, image processing method, and image processing program

An image processing apparatus is provided to display an image on a screen, the image facilitating visual ascertainment of relationships between each of a plurality of items of point cloud data and point cloud data arising from combining the plurality of items of point cloud data. The image processing apparatus includes a display controlling section configured to 3d display combination point cloud data combining a plurality of items of point cloud data obtained from a plurality of viewpoints and allow 3d display of one item out of the plurality of items of point cloud data obtained from the plurality of viewpoints..
Topcon Corporation

Cloud based personal services system

A personal identification, tracking, entertainment and communication system is provided that is sufficiently flexible and intelligent to address a variety of applications and needs. In one embodiment, an electronic accessory such as an electronic bracelet or the like is provided.

Staging and deployment to multiple service clouds

The technology disclosed describes staging and deploying major releases, updates and hot fixes to service clouds spanning data centers that include hardware stacks. User-specified builds of deployable installations are received as file sets, and the installations are staged to local storage at the data centers.
Salesforce.com, Inc.

Quick relay traffic management for cloud messaging

A quick relay communication protocol is used by an initiating communication device (such as a wearable electronic device, e.g., a smart watch) and/or a recipient communication device (such as a companion electronic device to the wearable electronic device, e.g., a smart phone, a tablet computer or a laptop computer) to selectively communicate messages via different communication channels. Based on available connections and a communication constraint associated with a message, a processor executing a program module in an application layer in the initiating communication device provides transmission instructions to an interface circuit in the initiating communication device, which transmits a message to the recipient communication device based on the transmission instructions.
Apple Inc.

Quick relay session management protocol

When direct communication between devices, such as via bluetooth, is unavailable, a communication protocol is used by an initiating communication device and/or a recipient communication device to establish a communication session via a cloud-based relay server. This communication protocol efficiently allocates (or binds) the initiating communication device, the recipient communication device, and the relay server together for the communication session.
Apple Inc.

Method and equipment for coordinated control in intelligent traffic cloud control system

The invention relates to the field of controlling road traffic, and particularly to a method for coordinated control in an intelligent traffic cloud control system, and in the method, a central system can perform global coordinated control, or a control server can perform local coordinated control, and if the control server performs local coordinated control, then the control server can distribute a pertinent coordinated control strategy for a particular condition in a service area, thus alleviating the burden on the central system, and reducing the overall amount of data information to be transmitted in the intelligent traffic system, and also shortening the period of time for transmitting the data information so as to improve the efficiency of generating and enforcing the coordinated control strategy, and to address the problem of a traffic jam at a crossing effectively in a real-time manner.. .
Kyland Technology Co.,ltd.

Systems, methods and computer-readable storage media facilitating mobile device guest network access

Mobile device access to a guest network is facilitated. A method comprises: detecting a home network having an associated access point based on the device being within a first defined proximity of the associated access point; and transmitting information indicative of a request to establish a guest network via the associated access point of the home network and providing authentication information for an entity associated with the device.
Network Performance Research Group Llc

Methods and systems for quantum computing

The present disclosure provides methods, systems, and media for quantum computing, including allowing access to quantum ready and/or quantum enabled computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services.
1qb Information Technologies Inc.

Central system in intelligent traffic cloud control system

This application relates to an intelligent traffic cloud control system based central system so as to address the problems of the central system in the relevant art being overloaded, and operating at a low rate. An intelligent traffic cloud control system according to an embodiment of this application at least includes a central system, a plurality of control servers, and a plurality of field devices, wherein the central system is connected with the control servers over a network, and the field devices are connected with the control servers over ip address based broadband buses; and the central system is configured to collect data in one or more of the following data collecting modes: monitoring state data of the control servers in real time, inquiring about data from the control servers in non-real time, and subscribing to data from the control servers as needed..
Kyland Technology Co., Ltd.

Method and equipment for processing information in intelligent traffic cloud control system

The invention relates to the field of controlling road traffic, and particularly to a method and equipment for processing information in an intelligent traffic cloud control system. In the method, a first node distributes subscription messages to control servers, the control servers return information acquired by ip-enabled field devices, and corresponding processing results to the first node upon determining that a preset condition indicated by the subscription messages is satisfied, and the first node generates a corresponding coordinated control strategy or local control strategy according to the returned information acquired by the ip-enabled field devices, and corresponding processing results..
Kyland Technology Co., Ltd.

Electronic apparatus and non-transitory computer readable recording medium suitable for acquiring status information

Provided is an electronic apparatus that, even when extensions increase, acquires status information in a short time, and suppresses an increase in capacity of a storage device that stores firmware. A status-information-acquisition unit executes applications that are stored in an hdd (storage device) and downloaded from a cloud server (application-providing server), and acquires status information of each of the extensions.
Kyocera Document Solutions Inc.

Virtual circuits in cloud networks

A network provisioning device comprises an administrative interface for instantiating a virtual circuit definition to communicatively couple a set of endpoint devices in a network fabric, and a virtual circuit constructor. The virtual circuit constructor converts the virtual circuit definition into layer-2 provisioning commands, selects a target set of networking nodes that connect to the endpoint devices, and transmits the layer-2 provisioning commands to the target set of networking nodes.
Packetfabric, Llc

System for deployment of communication terminals in a cloud computing system

A communication system includes a redirect server and a deployment server configured to configure different terminal devices so that those devices are able to access a network of a service provider. A terminal device, computer readable medium and method are also disclosed that helps deploy such a service.
Unify Gmbh & Co. Kg

Quick relay interface and transport selection

When direct communication, such as via bluetooth, is unavailable, a communication protocol is used by an initiating communication device and/or a recipient communication device to establish a communication session via a cloud-based relay server. Establishing the communication session, such as a phone call or video streaming, includes setting up at least a first connection or link between the initiating communication device and the relay server, and at least a second connection or link between the relay server and the recipient communication device.
Apple Inc.

Automated continuous and adaptive health monitoring

A non-invasive health monitoring system comprises a wearable central sensor and at least one wearable remote sensor in wireless communication, a portable device readily accessible to the user, and a cloud platform. Each sensor collects batches of data indicative of one or more physiological parameters of the user at a physiological parameter-specific frequency, for a pre-defined time window.

Intelligent traffic cloud control system

The application relates to an intelligent traffic cloud control system configured to acquire and centrally analyze a large amount of field data in a traffic system, and to control the traffic system. Unlike a traditional traffic directing and controlling system in such an operating mode that data are acquired and transmitted respectively by different sensing devices, and then collected, analyzed, and processed by a central system, the intelligent traffic cloud control system according to the invention analyzes and processes centrally a large amount of data through field control servers communicating over ip address based broadband buses, and performs adaptive traffic control, traffic regulation enforcement, position tracking, coordinated control, and other service functions through integrating edge computing and cloud computing at a plurality of adjacent field control servers..
Kyland Technology Co.,ltd.

Intelligent traffic cloud control server

This application relates to the field of intelligent traffic technology, and particularly to an intelligent traffic cloud control server, so as to address the problem of a poor ability of the control server to manage and control the traffic. The control server according to an embodiment of this application includes: a first cpu configured to receive traffic data, which is provided by at least one of the plurality of field devices and transmitted by a second cpu, to store, analyze, and process the traffic data, and to generate the first control instruction; and the second cpu configured to receive the traffic data provided by the at least one of the plurality of field devices and to transmit the traffic data to the first cpu; and to receive the first control instruction generated by the first cpu, and to control and manage the field device according to the first control instruction..
Kyland Technology Co.,ltd.

Systems for interfacing vehicles and cloud systems for providing remote diagnostics information

A system of a vehicle is provided. The system includes a wireless communication device for providing the vehicle with access to a network for exchanging vehicle condition information with a server.
Emerging Automotive, Llc

Adaptive vehicle augmented reality display using stereographic imagery

An ar system that leverages a pre-generated 3d model of the world to improve rendering of 3d graphics content for ar views of a scene, for example an ar view of the world in front of a moving vehicle. By leveraging the pre-generated 3d model, the ar system may use a variety of techniques to enhance the rendering capabilities of the system.
Apple Inc.

Three-dimentional plane panorama creation through hough-based line detection

A method for creating a plane panorama from point cloud data using hough transformations is disclosed. The method involves converting the three-dimensional point cloud into a two-dimensional histogram with bins grouping neighboring points, and performing a hough transformation on the histogram.
Here Global B.v.

Techniques for sharing electronic calendars between mailboxes in an online application and collaboration service

The techniques described herein facilitate sharing electronic cloud-based calendars via online application and collaboration services, e.g., microsoft office 365®. In an implementation, a method of operating an online application and collaboration service for sharing electronic calendars between mailboxes is disclosed.
Microsoft Technology Licensing, Llc

Method and processing point cloud data

The present application discloses a method and an apparatus for processing point cloud data. The method in an embodiment comprises: presenting a to-be-labeled point cloud frame and a camera image formed by photographing an identical scene at an identical moment as the point cloud frame; determining, in response to an operation of selecting an object in the point cloud frame by a user, an area encompassing the selected object in the point cloud frame; projecting the area from the point cloud frame to the camera image, to obtain a projected area in the camera image; and adding a mark in the projected area, for labeling, by the user, the selected object in the point cloud frame according to the mark indicating an object in the camera image.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Pallet localization systems and methods

Systems and methods for localizing pallets using images based on point cloud data are disclosed. In one embodiment, a method for localizing a pallet includes acquiring, by a 3d camera, a first image of point cloud data, the first image being representative of the pallet.

Information delivery system based on packing box image recognition

The present invention discloses an information delivery system based on packing box image recognition. The system comprises: a packing box body, wherein a display layer is arranged on a surface of the packing box body, a pixel density of the display layer is different from that of an adjacent region of the display layer, and the display layer is formed by a plurality of regularly arranged pixel particles; a hand-held mobile terminal, used for scanning the display layer to acquire image information, uploading the image information after decoding to a cloud server to acquire, push information, and displaying the information to consumers through a display module; and a cloud server, used for receiving decoded information after the image information is decoded and outputting the push information to the hand-held mobile terminal, so that a code scanning module of the hand-held mobile terminal is easier to automatically focus a code layer to fetch the image information by adjusting a pixel difference between the display layer and surrounding panels thereof on the packing box, and that commodity information is pushed without affecting the aesthetics of the packing box by using pixel particles arranged by specific rules to encode images of the display layer..
Hangzhou Yonghua Printing & Packing Co.,ltd.

Patient-centered vehicle emergency application and web interface that provides emergency personnel with vehicle data and personalized occupant health information

A mobile device stores medical credentials for one or more occupants of a vehicle. Responsive to receipt of an indication of an emergency event at the vehicle, the mobile device sends the credentials, an authentication code, and vehicle information to a cloud server to cause the cloud server to construct web content including the vehicle information and medical information accessible using the credentials.
Ford Global Technologies, Llc

Method and system for transferring mammograms with blockchain verification

A method and system comprise communicating with a webserver. The webserver is in communication with a cloud management service.

Selective simulation of virtualized hardware inputs

Methods and apparatus are described herein emulating, by one or more servers on behalf of a mobile computing device, a cloud-based virtual machine. The cloud-based virtual machine may include a virtualized hardware component that provides, as virtual hardware input for a software application executing on the cloud-based virtual machine, either “genuine” virtual hardware input or “simulated” virtual hardware input.
Google Inc.

Tiering data blocks to cloud storage systems

Examples include, in response to fulfilment of a tiering policy, dividing, by a cloud provider engine of a computing device, data blocks of a filesystem object into data chunks. Some examples comprise generating, by the cloud provider engine, a current manifest file in a local memory and causing the cloud storage system to generate a current pseudo folder in the cloud storage system corresponding to a particular epoch of the filesystem object.
Hewlett Packard Enterprise Development Lp

Apparatus that provides generation service of document file incloud system, method, and storage medium

In the case where services of generation and saving of a document file are provided on a cloud system, suppression of the number of document files to be generated and maintenance of display performance are caused to coexist. A server apparatus that provides a generation service of a document file, the apparatus including: a communication unit configured to receive source data, which is a source of a document file, from a client apparatus; a file generation unit configured to generate a document file based on a plurality of resources included in the source data; and a saving unit configured to save a generated document file in a storage, and the file generation unit determines which of an in-line method and an external reference method is applied to each of a plurality of resources included in the source data in accordance with a situation of access to the storage and generate the document file based on results of the determination..
Canon Kabushiki Kaisha

Cloud container resource binding and tasking using keys

Cloud container resource binding and tasking using keys is generally described herein. An example device to bind and perform tasks using cloud-based resource may include a container to claim tasks to be performed and to select and bind to a resource based on capabilities of the resource and requirements of the tasks..
Intel Corporation

Optimized migration of virtual objects across environments in a cloud computing environment

An appliance migration mechanism (amm) optimizes migration of a live virtual appliance with virtual objects between cloud environments to minimize temporary connections that use significant cloud resources during the migration. The amm determines a cost of connections of each virtual object in the virtual appliance and produces an order of migration for the virtual objects.
International Business Machines Corporation

Hypervisor-hosted virtual machine forensics

A computer system acquires forensics data from running virtual machines in a hypervisor-hosted virtualization environment. The computer system provides a forensics partition as an additional root virtual machine partition or child virtual machine partition.
Microsoft Technology Licensing, Llc

Image forming apparatus using cloud services, image communication method therefor, and storage medium

An image forming apparatus which eliminates a need for a user to operate a mobile terminal each time he or she sends an image file from the image forming apparatus using a cloud service and therefore enhances ease of operation. First user authentication of the user is performed for the image forming apparatus.
Canon Kabushiki Kaisha

Obstacle detection vehicle-mounted radar system

An obstacle detection method and apparatus for a vehicle-mounted radar system. The method includes: detecting a first point cloud data set of calibration objects located at a plurality of preset positions and detecting a first two-dimensional data set of the calibration objects; calibrating a vehicle-mounted radar system based on preset mounting positions, the first point cloud data set, and the first two-dimensional data set, to obtain a calibrated turning angle difference, a calibrated displacement difference, and a calibrated vertical coordinate; detecting a second point cloud data set of an obstacle and detecting a second two-dimensional data set of the obstacle; converting the second two-dimensional data set into a laser radar coordinate system based on the calibrated turning angle difference, the calibrated displacement difference, and the calibrated vertical coordinate, to obtain converted two-dimensional coordinates; and integrating the second point cloud data set and the converted two-dimensional coordinates to determine a position of the obstacle..
Baidu Online Network Technology (beijing) Co., Ltd.

System, method, and condition monitoring of food and other perishable products as well as environmentally sensitive industrial supply chains

The present invention relates to a system, method, and apparatus for monitoring food products. The system includes an integrated modular sensing device for monitoring food and environmentally sensitive industrial products, including a processor, at least two interfaces in communication with the processor and adapted to receive an electronic connection of at least two temperature sensor probes, at least one sensor in communication with the processor, the at least one sensor including at least one of the following: a motion sensor, a proximity sensor, a light sensor, or any combination thereof, and a wireless communication device programmed or configured to transmit food and environmentally sensitive industrial product data to at least one of a remote server and a remote device, and act as a gateway to receive sensory data from distributed sensors wirelessly and upload to cloud databases..
Inteligistics, Inc.

Food doneness monitor

Measuring and/or monitoring food doneness using ultrasound. The present invention provides a method, system, computer program product and sensor for measuring and/or monitoring the degree of food doneness.
International Business Machines Corporation

Food doneness monitor

Measuring and/or monitoring food doneness using ultrasound. The present invention provides a method, system, computer program product and sensor for measuring and/or monitoring the degree of food doneness.
International Business Machines Corporation

Laser scanner system and registration point cloud data

The invention provides a laser scanner system, which comprises a laser scanner which includes a distance measuring unit for receiving a reflection light of a distance measuring light from an object to be measured and performing a distance measurement, a scanning unit for rotatably irradiating the distance measuring light, a directional angle detecting unit for detecting an irradiating direction of the distance measuring light, a gnss device, and a control arithmetic unit, wherein the laser scanner is installed at two points, and wherein the control arithmetic unit obtains global coordinates of installation positions of the laser scanner from the gnss device respectively, scans the distance measuring light over a total circumference at each of the installation positions, acquires point cloud data of the total circumference, performs a shape matching of the two point cloud data and combines the two point cloud data.. .
Topcon Corporation

Robot control device, robot, and robot system

A robot control device calculates an evaluation value, based on a partial point cloud included in a plurality of areas corresponding to a gripping unit of a robot for gripping a target object, of a three-dimensional point cloud representing a three-dimensional shape of a surface of the target object. The robot control device calculates a position and an attitude of the gripping unit taken when the gripping unit is made to grip the target object, based on the calculated evaluation value.
Seiko Epson Corporation

Telemedical wearable sensing management of chronic venous disorders

A telemedical interface pressure monitoring system is provided for intermittent or continuous monitoring of the pressure that occurs at the interface between the body and a support surface such as with a compression device, cast or resting surface. The system simultaneously measures interface pressure at multiple compression positions as well as provide real-time measurement data to both patients and clinicians.
The Regents Of The University Of California

System for controlled heating and ventilation of livestock structures

Disclosed is a system and method for controlling the environment of a broiler poultry structure interior utilizing a transpired solar collector and controllable vents, fans and sensors. In an embodiment, the incident angle of the transpired collector is adjusted to provide additional heat or shade as needed.
Geosolarheat Llc

Soil sensor grid

A system and method for providing optimal irrigation or watering, and more specifically providing a soil sensor grid placed in the ground of a landscaped property, in commercial, residential or even agricultural areas. The soil sensor grid can allow for optimal water usage in a specified irrigation area by providing real time data to an irrigation system and a user to optimize water usage.
Smart Rain Systems, Llc

Cloud-connected off-grid lighting and video system

A cloud-connected off-grid lighting and video system may include one or more wireless lighting modules and a bridge device to transmit a video stream or images to external devices such as a remote device, a cellular phone, a home automation system, or a security system. The cloud-connected off-grid lighting and video system may operate over the cloud via an internet connection allowing the bridge device to communicate with a server on the internet that may implement software for the interface to capture data regarding activity detected by-the wireless lighting module..
Wireless Environment, Llc.

Scheduler-managed routing of information in cloud-ran data centers

A method of managing radio access network (ran) processing within a data center of a centralized radio access network (cran), wherein the data center comprises a plurality of compute resources that perform at least part of the ran processing of a plurality of connected remote radio access points, includes assigning, to packets from the plurality of remote radio access points, an identification information that originates from the ran; deciding, by schedulers based on a scheduling algorithm, on which of the compute resources processing of the packets is to take place; and using the identification information to route the packets within the data center. The compute resources are implicitly addressed through the identification information..
Nec Europe Ltd.

Self contained gps tracking device

The present invention is a tiny, self-powered gps unit with the ability to track any property for up to 5 years on a single battery. A user simply attaches the unit to any valuable property and immediately find it location through a computer application.

Cross platform device virtualization for an iot system

Methods and systems disclosed herein utilize virtual native technology to allow for the fluid interoperability of incompatible internet of things (iot) cloud platforms and the services and devices administrated thereby. Virtual native technology allows a platform to function just as if the virtual native devices it serves were native to the platform.
Arrayent, Inc.

Cloud operation reservation system

In one or more embodiments, a cloud operation reservation system is provided through which cloud operations may be scheduled and managed. The cloud operation reservation system includes logic for defining a set of time windows that are available to perform one or more cloud operations on cloud targets and presenting the set of time windows to one or more tenants of a cloud service.
Oracle International Corporation

Activity driven smart home system

A cloud computing server includes a memory, a processor, and a communication unit. The memory is configured to store a plurality of activities, a plurality of actions, and an association model that associates the plurality of activities with the plurality of actions.
Samsung Electronics Co., Ltd

Centralized monitoring of cloud operations

In one or more embodiments, a system comprises logic for aggregating and analyzing cloud targets based on a variety of attributes. Responsive at least to receiving a selection of one or more attributes, the system: (a) aggregates, from a plurality of cloud targets, a set of cloud targets that includes a first cloud target supporting at least a first cloud service for a first tenant and a second cloud target supporting at least a second cloud service for a second tenant; (b) presents, through a display interface, the set of cloud targets that includes the first cloud target and the second cloud target; and (c) receiving, through the display interface, a second selection of an action to perform on at least one cloud target in the set of cloud targets.
Oracle International Corporation

Data retrieval in a hybrid cloud

A cloud environment is provided generally having at least one private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database containing policy decisions and metadata of the plurality of data objects.
Spectra Logic Corporation

Data object input in a hybrid cloud

A cloud environment is provided generally having at least one private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database containing policy decisions and metadata of the plurality of data objects.
Spectra Logic Corporation

Hybrid cloud

A cloud environment is provided generally having at least one private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database containing policy decisions and metadata of the plurality of data objects.
Spectra Logic Corporation

Dynamic storage management in cloud storage synchronization

Dynamic storage management in cloud storage synchronization is provided. A limit may be specified for amount of data associated with hydrated content in local storage.
Microsoft Technology Licensing, Llc

Policy based hydration behavior in cloud storage synchronization

Policy based hydration behavior in cloud storage synchronization is provided. In some examples, user intent and defined policy or policies may be examined by a synchronization engine to determine when a synchronization should be aborted and instead redirected to viewing the requested file from the cloud, thereby avoiding the download.
Microsoft Technology Licensing, Llc

Method and scheduling cloud server

The present disclosure provides a method and apparatus for scheduling a cloud server. A specific implementation mode of the method comprises: monitoring whether current time is in a first pre-set time period; in response to the monitoring that the current time is in the first pre-set time period, scheduling a cloud server in a first cloud server cluster having a running state being an idle state, as a target cloud server, to a second cloud sever cluster, so that the target cloud server executes a task obtained by the second cloud server cluster; monitoring whether the current time is in a second pre-set time period; in response to the monitoring that the current time is in the second pre-set time period, rescheduling the target cloud server to the first cloud sever cluster, so that the target cloud server executes a task obtained by the first cloud server cluster..
Beijing Baidu Netcom Science And Technology Co., Ltd.

Service location management in computing systems

Techniques for facilitating allocation of cloud services in cloud computing systems are disclosed herein. In one embodiment, a method can include transmitting a request to service controllers configured to manage corresponding cloud services deployable in the cloud computing system, the request including a set of cloud services to be deployed in the cloud computing system.
Microsoft Technology Licensing, Llc

Cloud-based analytics to mitigate abuse from internet trolls

An approach is provided in which an information handling system creates a first language profile corresponding to a first user account in response to determining that the first user account generated a first offensive message. The information handling system computes an accumulated risk score of the first user account based on correlating the first language profile to a second language profile corresponding to a second user account that generated a second offensive post.
International Business Machines Corporation

Verification of computer system prior to and subsequent to computer program installation

Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains.
Steelcloud, Llc

Secure command execution from a cloud monitoring system to a remote cloud agent

An industrial control system that includes a cloud platform facilitates secure execution of command data for an industrial device in communication with the cloud platform. The system includes an interface component, a validation component and an execution component.
Rockwell Automation Technologies, Inc.

Sharing dynamically changing units of cloud-based content

Systems for managing multiple shared content objects using access tokens that cover the multiple shared content objects are disclosed. A method commences upon assigning the shared content objects to have individual permissions grantable to two or more users.
Box, Inc.

Distributed high availability agent architecture

A high availability (ha) identity bridge (idbridge) between an on-premises active directory (ad) and a cloud-based identity cloud service (idcs) is provided. A connection to an ad, coupled to a first network, is established.
Oracle International Corporation

Tenant and service management for a multi-tenant identity and data security management cloud service

Tenant and service management for an identity cloud service (idcs) is provided. A request is received, from a tenant automation system (tas) over a network, to create an idcs service instance for a tenant.
Oracle International Corporation

Method, system, login device, and application software unit for logging into docbase management system

The present invention provides a method, system and login device for logging into a docbase management system. The method includes: establishing a login device which has a unified invocation interface; invoking, by a user, the login device via an application software unit, wherein the application software unit invokes the login device via the unified invocation interface; returning, by the login device, to the application software unit, access information of a role corresponding to the user achieved after successfully logging in the docbase management system; accessing, by the application software unit, the docbase management system by using the access information..
Surcloud Corp.

System to resolve multiple identity crisis in indentity-as-a-service application environment

According to a non-limiting embodiment, a multiple identity crisis resolution system includes an idaas integrated with a paas. The idaas is integrated with a cloud-based network, and an application module installed in the cloud-based network.
International Business Machines Corporation

Credential management in cloud-based application deployment

Systems, methods, and computer program products for credential management. An application deployment system receives a deployment manifest for deploying an application in a cloud computing environment.
Pivotal Software, Inc.

Methods and systems for securing data in the public cloud

Computer implemented systems and methods are provided for securing data. In some embodiments, a system for securing data may comprise one or more processors configured to receive a request for data over a network.
Capital One Services, Llc

Internet cloud-hosted natural language interactive messaging system with entity-based communication

Provided are methods, systems, and computer-program products for responding to a natural language communication, sending a response to request additional information from a user, and exposing an invocable method for accessing a virtual database. Some examples relate to a bot server that can respond to natural-language messages (e.g., questions or comments) through a messaging application using natural-language messages.
Oracle International Corporation

Internet cloud-hosted natural language interactive messaging system with intent determination

Provided are methods, systems, and computer-program products for responding to a natural language communication, sending a response to request additional information from a user, and exposing an invocable method for accessing a virtual database. Some examples relate to a bot server that can respond to natural-language messages (e.g., questions or comments) through a messaging application using natural-language messages.
Oracle International Corporation

Systems and methodologies for defining and scheduling custom actions as cloud operations

In one or more embodiments, a system defines a plurality of waves for performing a set of scheduled operations on a set of cloud targets within a particular time window, where the plurality of waves includes a first wave for performing scheduled operations on a first subset of cloud target and a second wave for performing scheduled operations on a second subset of cloud targets. During the first wave, a first subset of scheduled operations within the particular time window are performed on two or more target resources from the first subset of target resources.
Oracle International Corporation

Software defined infrastructures that encapsulate physical server resources into logical resource pools

A software defined infrastructure (sdi) makes available a subset of a computer server's resources to a cloud solution or workload. Multiple subsets of resources can be combined in a sdi to provide a logical resource pool.
International Business Machines Corporation

Conflict resolution design for importing template package in sites cloud service

A computer-implemented method can include receiving an indication of a template package to be imported in a sites cloud service and further determining whether there is a potential conflict in connection with the template package to be imported in the sites cloud service. The method can also include issuing a notification concerning the potential conflict in connection with the template package to be imported in the sites cloud service responsive to an indication that there is a potential conflict in connection with the template package to be imported in the sites cloud service..
Oracle International Corporation

Cloud service notifications

Techniques are disclosed for providing notifications to a user. A user can configure the types of notifications they would like to receive.
Oracle International Corporation

Reliable transfer of numerous geographically distributed large files to a centralized store

Techniques to manage the transfer of a large number of large files, such as image files, to a centralized location in a reliable fashion, sufficient to enable an object recognition based horticultural feedback loop are disclosed. An image capture device is generally assigned to each plant, where images of each plant are captured frequently and periodically.
Iunu, Llc

Application management for a multi-tenant identity cloud service

Embodiments provide application management functionality in a multi-tenant identity cloud service. Embodiments define a plurality of facets for the application, each facet describing a behavior of the application.
Oracle International Corporation

Composite event handler for a multi-tenant identity cloud service

One embodiment provides event handling in a cloud based multi-tenant identity management system. Embodiments receive a plurality of individual events and a request to create a group from the individual events.
Oracle International Corporation

Method for verifying information

A method for verifying information in a cloud computing system includes generating, by one or more computation devices, an evaluation key and a verification key in a memory available to at least one of the one or more computation devices based on a security parameter and a function to be evaluated; computing, by the one or more computation devices, an output of the function to be evaluated in a memory available to at least one of the one or more computation devices using an input; computing, by the one or more computation devices, a proof for an outcome using the evaluation key in a memory available to at least one of the computation devices; and verifying, by the one or more computation devices, if the proof is valid based on the verification key in a memory available to at least one of the one or more computation devices.. .
Nec Europe Ltd.

Packet-aware fault-tolerance method and system of virtual machines applied to cloud service, computer readable record medium and computer program product

A packet-aware fault-tolerance method of a virtual machine applied to cloud services, the method including the following steps: receiving, by a primary input processing unit, an uploaded packet; replicating, by the primary input processing unit, the uploaded packet to a backup input processing unit; operating, by a primary execution unit, the uploaded packet to generate a primary output packet, and transmitting the primary output packet to a primary output processing unit, and operating, by a backup execution unit, the uploaded packet to generate a backup output packet, and transmitting the backup output packet to a backup output processing unit; receiving, by a primary fault-tolerance control component, the primary output packet transmitted by the primary output processing unit, and receiving a backup packet checksum of the backup output packet transmitted by the backup output processing unit; and comparing, by the primary fault-tolerance control component, whether a primary packet checksum of the primary output packet is consistent with the backup packet checksum.. .
National Central University

Decorative and wearable power charger with flashlight feature and wireless charging capabilities

A portable power charger having an internal rechargeable battery includes a charger housing having at least one power connection port and a flashlight feature having at least one light source. The power connection port is operatively connected to the rechargeable battery and used for connecting the charger with an external power source, an electronic device, or both.
Halo2cloud, Llc

Internet-of-things-based safety system

Building safety system architecture, methods, and mediums. A method includes receiving substantially-continuous heartbeat communications from a plurality of safety control devices over a packet data network.
Siemens Industry, Inc.

Image processing device, image processing method, and image processing program

A technique for facilitating understanding of a stereoscopic structure of an object in a 3-d image of point cloud data is provided. An image processing device includes a point cloud data display controlling unit, a marker display controlling unit, and a specified point cloud display controlling unit.
Topcon Corporation

Single-tree segmentation method and apparatus

Embodiments of the present disclosure disclose a single-tree segmentation method and apparatus. The method includes: acquiring point cloud data in a region to be segmented, classifying a highest point in the point cloud data into a target tree point cloud, setting an infinite point, and classifying the set point into a non-target tree point cloud; comparing similarity between a current point to be classified and a current target tree point cloud with similarity between the current point to be classified and a current non-target tree point cloud for each point to be classified in the point cloud data, and classifying the current point to be classified into corresponding point cloud according to a comparison result; and segmenting a final target tree point cloud into point cloud data corresponding to a target tree after all points to be classified are completely classified..
Beijing Greenvalley Technology Co., Ltd.

Updateable electronic digital assets will or trust method and systems with real time access for updated designated will or trust elements

A method and systems that provide for a updateable electronic digital assets will or trust that has all the standard features of a digital assets will or trust and allows a user to “real time” access said updateable electronic digital assets will or trust to update specific elements designated for update through online access or through phone applications or other electronic applications access. Said specific elements include: designating and/or giving power of attorney to an agent and/or executor of each device, email account, social networking account, online banking/financial account, online media account, and other digital accounts; updating information specific to each account such as account name/number, user name, password, pins, beneficiaries; instructions as to specifics of the account and instructions as to how the assets should be handled; and/or include any other said updateable electronic digital assets will or trust specific elements identified for “real time” access and/or update capability.

Radio frequency identification tray systems and methods

A radio frequency identification (rfid) tray for use with a cloud application platform is described. A cloud application, operatively coupled to the rfid tray via the cloud application platform, issues a command to the rfid tray.
Promega Corporation

Moving a portion of a streaming application to a public cloud based on sensitive data

A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be increased, selects based on the sensitive data which portion(s) of the streaming application can be moved to a public cloud. The streams manager then interacts with the public cloud manager to move the selected portion(s) of the streaming application to the public cloud.
International Business Machines Corporation

Cloud storage encryption

Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud.
Zettaset, Inc.

Administration over a hybrid cloud

A cloud environment is provided generally having a private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database logically set up by an administrator to contain policy decisions and metadata of the plurality of data objects.
Spectra Logic Corporation

Scanning device, cloud management device, checking and killing malicious programs

The disclosure includes a scanning device, a cloud management device, a method and system for checking and killing a malicious program. Therein, a cloud management device for checking and killing a malicious program comprises: a processor, a transmission interface; a first indicator to generate, by the processor, a first scanning content indication according to characteristics of a newborn malicious program and system environment information transmitted by a client device; a first matcher to obtain, by the processor via the transmission interface, feature data of the unknown program file transmitted by the client device, and perform matching in known records of feature data of malicious programs; and a second indicator to generate, by the processor, a second scanning content indication when the first matcher fails to match to a known record, the generating the second scanning content indication comprising scanning a specified attribute of the unknown program file and/or a specified attribute of contextual environment of the unknown program file, and transmit the same to the client device through the transmission interface..
Beijing Qihoo Technology Company Limited

Patient monitoring system mobile software applicaiton

This patent is a follow-on to u.s. Pat.

System and method providing a scalable and efficient space filling curve approach to point cloud feature generation

Systems, methods, and other embodiments are disclosed for identifying features within point cloud data. In one embodiment, point cloud data is read which represents multiple points of at least one point cloud in a multi-dimensional space.
Oracle International Corporation

Automatically mapping data while designing process flows

An example method facilitates associating data objects with elements of a process to be implemented via a process-based software application. The example method includes determining that a developer has added a particular software element to a software application being developed by the developer; accessing metadata describing the software element; and using the metadata to automatically associate the software element to one or more data objects to be used by the software element during running of the software application.
Oracle International Corporation

Cookie based state propagation for a multi-tenant identity cloud service

A system that provides cloud based identity management, at a first microservice, saves a current state on a cookie that is stored on a browser, where the current state is saved in a format specific to the first microservice. The system performs an operation on the first microservice that generates a first portion of information and a second portion of information.
Oracle International Corporation

Filtering and processing data related to internet of things

Various embodiments of systems and methods for filtering and processing data related to internet of things are described herein. The method includes reading data from a sensor coupled to a device.
Sap Se

Internet cloud-hosted natural language interactive messaging system with virtual database

Provided are methods, systems, and computer-program products for responding to a natural language communication, sending a response to request additional information from a user, and exposing an invocable method for accessing a virtual database. Some examples relate to a bot server that can respond to natural-language messages (e.g., questions or comments) through a messaging application using natural-language messages.
Oracle International Corporation

Temporary shared storage

Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices.
At&t Intellectual Property I, L.p.

Historical data representation in cloud service

Techniques are disclosed for collecting and visualizing historical data. Messages can be generated in response to user requests to make changes to activities in an integration flow.
Oracle International Corporation

Stage file objects in a visual design tool for integration development

Described herein are systems and methods for providing stage file objects in a visual design tool for integration development. The integration can be developed on a cloud based integration service that can receive, via a visual development tool interface, selection of a stage file object for insertion into an integration flow.
Oracle International Corporation

Method and clearing data in cloud storage system

An object of the present invention is to provide a method and apparatus for clearing data in a cloud storage system. The method according to the present invention comprises the following steps: deleting meta information of a data slice corresponding to the file upon detecting that a user is deleting a file; wherein the method comprises the following steps: exporting all data slices to be processed when data needs to be cleared; by traversing each file in the meta information, determining each data slice that may be accessed through the meta information and thereby obtaining corresponding access data information; based on the access data information, determining the data to be cleared in said all data slices to perform data clearing operation for the data to be cleared.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Cloud service integration flow

Techniques are disclosed for identifying, applying and validating changes to activities in an integration flow. A user may make a change to an activity in an integration flow.
Oracle International Corporation

Optimizing tail latency via workload and resource redundancy in cloud

A plurality of requests are received for computing processing. At least some of the plurality of requests are replicated.
International Business Machines Corporation

Temporary or partial offloading of mobile application functions to a cloud-based environment

Techniques for temporarily and/or partially offloading mobile applications to one or more remote virtual machines in a server include establishing an application copy of a mobile application installed on a mobile device at a remote virtual machine, suspending the mobile application on the mobile device and offloading operations of the mobile application to the application copy at the remote virtual machine for a period of time. Suspending the mobile application and offloading its operations to the remote virtual machine for the period of time reduces consumption of resources on the mobile device.
Seven Networks, Llc

System and partition administrative targeting in an application server environment

A system and method for partition administrative (admin) targeting in an application server, cloud, or other computing environment. An application server can include one or more partitions, wherein each partition provides an administrative and runtime subdivision of a domain.
Oracle International Corporation

Controlled availability of objects in a visual design tool for integration development

Techniques are described for controlling availability of objects in a visual design tool for integration development. An integration developer may select a node to add to an integration and, in response, the integration cloud system can analyze the structure of the integration flow, query other nodes within the structure of the integration flow for configuration data, and generate available configuration options for the selected node.
Oracle International Corporation

Integrating cloud service functionality by using document metadata

An example system and method for facilitating integrating functionality of different cloud computing environments. A particular example embodiment includes mechanisms for integrating a document cloud service with a process cloud service, such that components, e.g., documents, of software processes developed and/or implemented via the process cloud service can leverage the document cloud service and be maintained thereby.
Oracle International Corporation

Cloud storage system

Methods, systems, and computer readable media for execution by a cloud storage system are provided. One example method is for storage processing on a cloud system.
Hewlett Packard Enterprise Development Lp

Osn/pcs collaboration mechanism integration

An example method facilitates collaborative participation in a process-based software application. The example method includes employing a process cloud integrated with a social network and document cloud to enable social network conversation-based collaboration during running of processes of the process-based software application.
Oracle International Corporation

Data acquiring method and apparatus applied to driverless vehicle

The present application discloses a data acquiring method and apparatus applied to a driverless vehicle. A specific implementation of the method includes: selecting, from at least one laser radar of the driverless vehicle, a laser radar having a highest importance level as a first laser radar; acquiring a start time of a current time window and executing following data processing steps: executing a real-time acquisition and storage operation on point cloud data packets collected by the each of the at least one laser radar after the start time of the current time window; and determining whether any condition in a group of conditions is satisfied; and setting the start time of the current time window to be the current time and continuing to execute the data processing steps, in response to determining that any of the group of conditions is satisfied.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Method and device for filtering point cloud data

Embodiments of the present invention disclose a method and device for filtering point cloud data. The method includes: transforming point cloud data into raster data, and acquiring a lowest point in each grid to serve as an initial point; performing a morphological opening operation on the raster data, to obtain an initial terrain surface; determining, for each initial point, a current initial point as a potential ground seed point when a difference between an elevation value of the current initial point and a value of a target grid into which the current initial point falls is smaller than a preset difference threshold value; constructing an initial triangular irregular network model according to the potential ground seed point; determining a ground point based on an triangular irregular network filtering algorithm according to the initial triangular irregular network model..
Beijing Greenvalley Technology Co., Ltd.

Method and device for constructing spatial index of massive point cloud data

Embodiments of the present invention disclose a method and device for constructing a spatial index of massive point cloud data. The method includes: partitioning acquired original point cloud data to obtain a plurality of point cloud data blocks; constructing an octree index of a current point cloud data block for each point cloud data block; and merging the octree indexes of the plurality of point cloud data blocks to obtain a spatial index structure of the original point cloud data..
Beijing Greenvalley Technology Co., Ltd.

Non-visual precision spatial awareness device.

This invention described a spatial recognition device (srd) based on a mounted high precision measurement sensor that enables the user to detect and navigate around objects and obstacles like traditional white cane would, but without contact, and also allow the user to identify the location and shape of objects to enable identifying such obstacles and objects. The device can also provide route guidance through a gps and collision avoidance through onboard and/or cloud based or hybrid computational systems, accelerometers and other sensors.

Method and system for enabling the creation and maintenance of proximity-related user groups

Techniques are described for providing location-based information and functionality to people and computing devices in various ways. In at least some situations, the techniques include enabling multiple people in a common geographic area to interact in various ways, such as via devices capable of communications (e.g., cellular telephones, computing devices with wired and/or wireless communications capabilities, etc.), while in other situations at least some users who are remote from a particular geographic area may be allowed to intercommunicate with one or more other users or other entities in or related to that geographic area.
Groupon, Inc.

Intelligent subscriber profile control and management

A system for dynamic profile and persona management, comprising a profile and persona management server that receives device event information from a user device, and compares the event information to a feature bundle, the feature bundle corresponding to a set of feature configurations, and directs the operation of connected user services of a telephony control system, whether for the user device, for another subscribed user device, or in the cloud, based on the feature configurations. The system also comprises a database for storing feature configurations, feature configuration bundles and feature policies made up of multiple feature bundles..
Broadsource Group Pty Ltd

Dynamic configuration of inter-chip and on-chip networks in cloud computing system

A server includes a plurality of nodes that are connected by a network that includes an on-chip network or an inter-chip network that connects the nodes. The server also includes a controller to configure the network based on relative priorities of workloads that are executing on the nodes.
Advanced Micro Devices, Inc.

Application monitoring for cloud-based architectures

An example system may include one or more collectors and an analyzer. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes.
Bmc Software, Inc.

Using cloud storage as temporary cache for backup

Systems and methods are described to transfer content from a first computing device to a second computing that is not directly accessible from the first computing device. The transfer may be carried out using an application operating on the first computing device that uploads the content to the cloud storage service.
Dell Software, Inc.

Moving a portion of a streaming application to a public cloud based on sensitive data

A streams manager determines which portions of a streaming application process sensitive data, and when performance of the streaming application needs to be increased, selects based on the sensitive data which portion(s) of the streaming application can be moved to a public cloud. The streams manager then interacts with the public cloud manager to move the selected portion(s) of the streaming application to the public cloud.
International Business Machines Corporation

Cloud-based security policy configuration

Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters associated with a first network appliance of an enterprise, physically located at a first site, are shared by the first network appliance with multiple network appliances of the enterprise by logging into an shared enterprise cloud account.
Fortinet, Inc.

Cloud-based threat observation system and methods of use

A computer program that is executable on a user device and operable to display information on a user display, the computer program being configured to transmit a threat data request, receive formatted data, parse the formatted data, defining parsed formatted data, create display information from the parsed formatted data, create at least one of a graph and a widget comprising a datum of the parsed formatted data, create a threat observing world map comprising a datum of the parsed formatted data, and display the threat observing world map on the user display.. .
Whoa Networks, Inc.

Task segregation in a multi-tenant identity and data security management cloud service

Embodiments provide cloud-based identity management by receiving a request to perform an identity management service that includes real-time tasks and near-real-time tasks. Embodiments synchronously execute the real-time tasks by accessing at least one microservice using a corresponding application programming interface (“api”).
Oracle International Corporation

Single logout functionality for a multi-tenant identity and data security management cloud service

A cloud-based identity and access management system that implements single sign-on (“sso”) receives a first request for an identity management service configured to allow for accessing applications. Embodiments send the first request to a first microservice, where the first microservice performs the identity management service by generating a token.
Oracle International Corporation

Generating derived credentials for a multi-tenant identity cloud service

A multi-tenant system that provides cloud-based identity management receives a request to execute a job, where the job has a scheduled start time, or a timeframe to complete, that exceeds the validity time of a request access token. The system generates the request access token corresponding to the job, where the request access token has access privileges.
Oracle International Corporation

Multi-tenant aware dynamic host configuration protocol (dhcp) mechanism for cloud networking

An approach includes providing support multi-tenancy support on a dhcp protocol. The approach includes receiving a dynamic host configuration protocol (dhcp) packet, inserting a tenant-specific option information within the dhcp packet, and transmitting the dhcp packet with the tenant-specific option information..
International Business Machines Corporation

Semantic interface definition language for action discovery in cloud services and smart devices

Embodiments of the present invention are directed to computer-implemented methods and systems for representing human or machine-controllable sources, including, but not limited to, cloud services and smart devices, with a semantic interface definition language (sidl) so that such resources can be listened to and eventually remote-controlled by discovering and performing situationally suitable actions (ssa). Embodiments of the present invention are further directed to a novel user experience that allows sources to augment each other, removing the need to switch back and forth from different user interfaces (uis) and overall facilitating or automating the execution of chains of commands..
Gluru Limited

Methods and systems for portably deploying applications on one or more cloud systems

Methods and systems for provisioning services or resources on a cloud service for successful execution of an application includes detecting a request for executing an application on a cloud service. In response to the request, a descriptor record for the application is retrieved from a descriptor file.
Sony Interactive Entertainment America Llc

Adjusting cloud resource allocation

In a multi-tiered simulation configuration, a combination of predictive models is executed such that each tier in the multi-tiered simulation configuration executes at least one predictive model to produce a corresponding set of predicted events, and a predicted event from a first tier in the configuration forms an input to a next tier in the configuration. Using a subset of a selected set of predicted events outputted from a corresponding selected tier in the multi-tiered simulation configuration, a set of features is extracted, each feature in the set of features having an effect on an outcome of the simulated process.
International Business Machines Corporation

Software defined infrastructures that encapsulate physical server resources into logical resource pools

A software defined infrastructure (sdi) makes available a subset of a computer server's resources to a cloud solution or workload. Multiple subsets of resources can be combined in a sdi to provide a logical resource pool.
International Business Machines Corporation

Cloud-based network tool optimizers for server cloud networks

Network tool optimizers for server cloud networks and related methods are disclosed. In part, master filters are defined to segregate and control user traffic, and user filters are defined to forward the user traffic to cloud-based network tools or tool instances.
Keysight Technologies Singapore (holdings) Pte. Ltd.

Managing cost related to usage of cloud resources

Some examples describe managing cost related to usage of cloud resources. In an example, usage of a cloud resource by a user may be determined.
Hewlett Packard Enterprise Development Lp

Application deployment and management in a cloud computing environment

Methods, devices, and systems for management of a cloud computing environment for use by a software application. The cloud computing environment may be an n-tier environment.
Kaavo, Inc.

Redundant storage solution

Method and apparatus for switching between a first server and a second server, each located within a virtual private cloud and the first server being located within a first zone and the second server being located within a second zone that is physically separate from the first zone. The method and apparatus further configured to determine that the first server has experienced a failure to send or receive data.
Softnas Operating Inc.

Software defined network based cpri switch for improved availability in cloud-based ran

A system includes a software defined common public radio interface (cpri) switch, a plurality of enobebs connected to the cpri switch using cpri protocol, a plurality of baseband units (bbus) connected to the cpri switch using cpri protocol and wherein the cpri switch is configured to connect a first one of the plurality of bbus to a first one of the plurality of enobebs.. .
At&t Mobility Ii

Tenant-specific log for events related to a cloud-based service

A method, system, and/or computer program product establishes and utilizes a tenant-specific log for events related to a cloud-based service. A metamodel is created for a cloud-based service provided to a specific tenant of a cloud.
International Business Machines Corporation

Method and processing point cloud data

The present application discloses a method and an apparatus for processing point cloud data. The method of an embodiment comprises: recognizing an object in a to-be-labeled point cloud frame by using an obstacle recognition algorithm, to obtain a recognition result; presenting the recognition result as an initial labeling result of the point cloud frame; and updating the labeling result in response to a correction operation by a user on the labeling result.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Point cloud data hierarchy

One method embodiment comprises storing data on a storage system that is representative of a point cloud comprising a very large number of associated points; organizing the data into an octree hierarchy of data sectors, each of which is representative of one or more of the points at a given octree mesh resolution; receiving a command from a user of a user interface to present an image based at least in part upon a selected viewing perspective origin and vector; and assembling the image based at least in part upon the selected origin and vector, the image comprising a plurality of data sectors pulled from the octree hierarchy, the plurality of data sectors being assembled such that sectors representative of points closer to the selected viewing origin have a higher octree mesh resolution than that of sectors representative of points farther away from the selected viewing origin.. .
Willow Garage, Inc.

Point cloud data hierarchy

One embodiment is directed to a method for presenting views of a very large point data set, comprising: storing data on a storage system that is representative of a point cloud comprising a very large number of associated points; automatically and deterministically organizing the data into an octree hierarchy of data sectors, each of which is representative of one or more of the points at a given octree mesh resolution; receiving a command from a user of a user interface to present an image based at least in part upon a selected viewing perspective origin and vector; and assembling the image based at least in part upon the selected origin and vector, the image comprising a plurality of data sectors pulled from the octree hierarchy.. .
Willow Garage, Inc.

Providing visualization data to a co-located plurality of mobile devices

A computer-implemented method according to one embodiment includes identifying, utilizing a hardware camera of a mobile device, vision code data from a plurality of additional devices, identifying an orientation of the mobile device, utilizing one or more sensors of the mobile device, calculating local observations utilizing the vision code data and the orientation, sending the local observations to a cloud-side service, receiving a timed tile sequence from the cloud-side service, in response to the sending of the local observations, and outputting the timed tile sequence, utilizing a display of the mobile device.. .
International Business Machines Corporation

Providing visualization data to a co-located plurality of mobile devices

According to another embodiment, a computer program product for implementing visualization data at a mobile device comprises a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, and where the program instructions are executable by a processor to cause the processor to perform a method comprising identifying, utilizing the processor and a hardware camera of the mobile device, vision code data from a plurality of additional devices, identifying an orientation of the mobile device, utilizing the processor and one or more sensors of the mobile device, calculating local observations utilizing the processor, the vision code data, and the orientation, sending the local observations to a cloud-side service, utilizing the processor, receiving, utilizing the processor, timed tile sequences from the cloud-side service, in response to the sending of the local observations, and outputting the timed tile sequences, utilizing the processor and a display of the mobile device.. .
International Business Machines Corporation

Transaction method and transaction system

A transaction method includes a first electronic device sending a transaction request to a cloud server; the cloud server sending a key information to the first electronic device; the first electronic device performing an identity verification according to the key information and generating a verification result; the cloud server sending a token to the first electronic device when the verification result indicates the identity verification is successful, wherein the token includes an expiry period; and the first electronic device being allowed to perform a transaction within the expiry period.. .
Inventec Corporation

Building datum extraction from laser scanning data

A method, apparatus, system, and computer program product provide the ability to extract level information and reference grid information from point cloud data. Point cloud data is obtained and organized into a three-dimensional structure of voxels.
Autodesk, Inc.

Single sign-on functionality for a multi-tenant identity and data security management cloud service

A cloud-based identity and access management system that implements single sign-on (“sso”) receives a first request for an identity management service configured to allow for accessing an application. Embodiments send the first request to a first microservice which performs the identity management service by generating a token.
Oracle International Corporation

Containerization of network services

Techniques, described herein, may enable network services to be efficiently and effectively implemented as containers by computing devices operating in a cloud computing environment. Container images may be built and tested locally by an operator device and pushed to the computing devices for deployment of containers defined by the container images.
Verizon Patent And Licensing Inc.

Self-serve appliances for cloud services platform

Methods, systems, apparatuses, and computer program products are described herein that enable a vendor to publish a template to a network-accessible marketplace and that enable a customer to selectively utilize the templates to deploy an appliance to a customer account associated with the customer within a cloud services platform. In an embodiment, deploying the appliance to the customer account comprises deploying resources specified by the template as part of an appliance resource group within the customer account, the specified resources including an appliance management resource that is configured to expose control features of the appliance to the customer.
Microsoft Technology Licensing, Llc

Information processing apparatus and non-transitory computer readable medium

An information processing apparatus includes an extraction unit, a generation unit, a building unit, and a presentation unit. The extraction unit extracts, in accordance with similarity in a use condition for a first application that is a target application to be used by a user, a cloud service including a second application that has been used under a use condition similar to the use condition for the first application.
Fuji Xerox Co., Ltd.

Intelligent listening system for agile delivery of cloud services

A support data generation system detects an indication of a problem within a flighted infrastructure. Based on the detected indication, a feature undergoing implementation within the flighted infrastructure is identified.
Microsoft Technology Licensing, Llc

Processing cloud services and intelligence cloud services integration

Various embodiments provide for integrating process cloud services (pcs) with intelligence cloud service (ics). Pcs analytics data is obtained using one or more pcs analytics data export application programming interfaces (apis).
Oracle International Corporation

Automatic virtual machine termination in a cloud

Managing a cloud computing environment including a plurality of resources adapted to host at least one virtual machine includes, in a virtual machine, determining a period of inactivity of the operating system for a user of the virtual machine and comparing, using a processor, the period with a defined threshold. From the virtual machine, a virtual machine termination request is sent to the cloud computing environment responsive to the period exceeding the defined threshold..
International Business Machines Corporation

Optimized migration of virtual objects across environments in a cloud computing environment

An appliance migration mechanism (amm) optimizes migration of a live virtual appliance with virtual objects between cloud environments to minimize temporary connections that use significant cloud resources during the migration. The amm determines a cost of connections of each virtual object in the virtual appliance and produces an order of migration for the virtual objects.
International Business Machines Corporation

System for managing software versions in multitenant cloud ip video-telephony services

Disclosed embodiments relate to a shared computing system for use in telecommunications between end-point telecommunication devices comprising a plurality of instances of a telecommunications service component and a version control gateway configured to route a communication connection from an end-point telecommunication device to an appropriate instance, of the plurality of instances, of the service component. In some embodiments, different end-point telecommunication devices may use different instances of the service component.
Starleaf Ltd

Portable electronic device and data updating method

A portable electronic device includes a transmission interface, a wireless communication circuit and microprocessor. The wireless communication circuit connects to a cloud server through the internet.
Acer Incorporated

Integrated obstacle detection and payload centering sensor system

Disclosed are various embodiments for an integrated obstacle detection and payload centering sensor system. A robotic drive unit (rdu) captures, with a downward facing camera mounted to itself, an image of fiducial located on the ground.
Amazon Technologies, Inc.

Optical assemblies that are both brightly backlit and transparent for use in costumed characters

An apparatus worn as headgear providing visual effects and vision to the wearer. The apparatus includes a shell or helmet.
Disney Enterprises, Inc.

Weather prediction apparatus and method using weather radar

According to one embodiment, a weather prediction apparatus includes a storage configured to store weather data of a rain cloud observed by a weather radar; and a processor configured to predict a torrential rain. The processor is configured to detect a core of the rain cloud, based on the weather data; to acquire position information of the core, based on a detection result of the core; to determine a movement direction of the core, based on the position information; and to calculate information for predicting, as an area of occurrence of the torrential rain, an area on a ground, the area on the ground corresponding to the movement direction of the core..
Kabushiki Kaisha Toshiba

Lidar object detection system for automated vehicles

An object-detection system suitable for an automated vehicle includes a lidar and a controller. The lidar is used to detect a point-cloud that is organized into a plurality of scan-lines.
Delphi Technologies, Inc.

Motion compensation method and apparatus applicable to laser point cloud data

A motion compensation method and apparatus applicable to laser point cloud data includes acquiring laser point cloud data of a frame; using an acquisition time of a start point as a target time; interpolating coordinate transformation relations and an end laser point, to obtain coordinate transformation relations of other laser points, and transforming coordinates of the other laser points to the coordinates at the target time. During motion compensation on each frame of laser point cloud data, the coordinate transformation relations corresponding to only the start and end laser points are obtained, and the coordinate transformation relations corresponding to the two points are interpolated to obtain transformation relations corresponding to other laser points, thus performing motion compensation.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Method and processing laser point cloud data

A method and an apparatus for processing laser point cloud data includes obtaining laser point data to be used by a data receiver comprising an acquisition time; determining a timestamp for representing the acquisition time, and splitting the timestamp into a base timestamp and an offset timestamp; and storing the base timestamp and compressed laser point cloud data. Laser point cloud data output by a laser radar is compressed and comprises only offset timestamps corresponding to respective laser points.
Beijing Baidu Netcom Science And Technology Co., Ltd.

Systems, devices, and/or methods for evaporating high vapor pressure materials

Certain exemplary embodiments can provide a method, which can comprise via a transonic gas jet, depositing a thin film of lipon on a substrate via a directed vapor deposition process. The transonic gas jet transports a thermally evaporated vapor cloud comprising the lipon, wherein, the transonic gas jet comprises one of (a) substantially entirely nitrogen (n2) gas; or (b) nitrogen (n2) gas as a dopant in a concentration greater than 10% by volume in an inert carrier gas..
Directed Vapor Technologies International, Inc.

Ebpvd columnated vapor stream

An electron beam vapor deposition process for depositing coatings includes placing a source coating material in a crucible of a vapor deposition apparatus; energizing the source coating with an electron beam raster pattern that delivers a controlled power density to the material in the crucible forming a vapor cloud from the source coating material; and depositing the source coating material onto a surface of a work piece.. .
United Technologies Corporation

Non-invasive nanosensor system to determine analyte concentration in blood and/or bodily fluids.

The device is an ultra-low power, non-invasive in-vivo blood analyte sensor system incorporating multiple sensors including a carbon base and/or carbon base material coated with metallic nanoparticles and/or metallic nanoparticle nanoprobes, as a modified clark electrode sensor system, that detects hydrogen peroxide concentrations, ph, and/or glucose concentrations (and other analytes) in bodily secretions (e.g. Tears, saliva, sweat).

Wireless registry as an address book for registering and classifying wifi names

The present disclosure describes systems and methods for providing differentiated actions associated with predetermined types of ssids, as determined by a registry computing service. Embodiments include registry databases, ssid transmitters, and wed's connected through the cloud, having a hardware configuration suitable for communicating wirelessly.
Gbl Systems Corporation

Photonic switches, photonic switching fabrics and methods for data centers

Data center interconnections, which encompass wscs as well as traditional data centers, have become both a bottleneck and a cost/power issue for cloud computing providers, cloud service providers and the users of the cloud generally. Fiber optic technologies already play critical roles in data center operations and will increasingly in the future.
Aeponyx Inc.

Application dependency monitoring for cloud applications

Methods and apparatus, including computer program products, are provided for monitoring cloud applications. The method may include receiving an indication to monitor a cloud application; obtaining metadata regarding the cloud application, the metadata comprising at least one path to at least one dependent service; selecting, based on the obtained metadata, a plugin to enable creation of a test version of the cloud application; causing, based on the plugin and the obtained metadata, the creation of the test version to enable monitoring the at least one path to the at least one dependent service; and providing to a user interface an indication regarding a status of the monitored at least one path to the at least one dependent service.
Sap Se

Hierarchical caching and analytics

A system includes at least one end-node, at least one edge node, and an edge cloud video headend. The at least one end node generally implements a first stage of a multi-stage hierarchical analytics and caching technique.
Integrated Device Technology, Inc.

Iot gateway for weakly connected settings

A gateway that may be implemented in a local network and that communicates with a cloud network to provide efficient services in a weakly connected setting is disclosed. The gateway may be configured to enable services that efficiently utilize resources in both of the gateway and the cloud network, and provide a desired quality of service while operating in a weakly connected setting.
Microsoft Technology Licensing, Llc

Cloud-based virtual local networks

Systems and methods are described for providing cloud-based virtual local networks. A computerized method for providing cloud-based virtual local networks includes receiving at a network gateway a request for a network address from a network switch, communicating with a user device management entity (udme) server to authorize the network switch, receiving an authorization response from the udme server for the network switch, receiving a network address pool at the network gateway from the udme server, and creating at the network gateway a virtual home router containing a virtual home router context that is unique to the virtual home router and associated with the network address pool..
Benu Networks, Inc.

Data transmission using dynamically rendered message content prestidigitation

A communication method and system according to the present invention generates a unique cryptographically secure uri in response to receiving a user post. The user post and uri are stored temporarily.
Blink.cloud Llc

Zero knowledge reputation service

A reputation service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The reputation management for both internet services and service providers, as well as the individuals who provide reputation feedback on those services and providers and each other.
International Business Machines Corporation

Regional firewall clustering in a networked computing environment

An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server.
International Business Machines Corporation

Data acquisition using remote platform gateways

A device network communicates with a remote platform such as a cloud service via a gateway. A network monitor device monitors network health and may adjust the amount of data collected by the gateway, reducing the amount of data collected in case of poor network health..

Link clouds and user/community-driven dynamic interlinking of resources

A network-based communication and information discovery solution that pertains to network-accessible resources and the use of interlinks among resources. In one embodiment, dynamic interlinking of resources is proposed, wherein the resources reside in a web-based system and are accessible via web-clients.
International Business Machines Corporation

Systems and methods of providing an edge cloud storage and caching system operating over a local area network

In an example embodiment, a device includes a memory having computer-readable instructions stored therein and a processor. The processor is configured to execute the computer-readable instructions to configure a device as a node in a cloud storage structure formed over a local area network and exchange a file available on the cloud storage structure without obtaining the file from a remote server outside of the cloud storage structure..
Alcatel-lucent Usa Inc.

System and managing cwsn with gui

A system and method for managing cwsn with gui are disclosed. The system comprises a cloud server to managing sensor data and operation status of a wireless sensor network.
Gti International Semiconductor Technology Co., Ltd.

Attachable portable power charger with wireless and direct charging connectivity

A portable power charger is provided for wirelessly charging an electronic device from a rechargeable battery internally disposed within the charger. An attachment system is also provided for connecting the electronic device to the portable charger so that the respective wireless transmission components therein are properly aligned for optimal and efficient wireless charging.
Halo2cloud, Llc

Image processing device, image processing method, and image processing program

A three dimensional display of point cloud data on a screen is rotated at improved working efficiency. An image processing device includes a point cloud data display controlling unit and a marker display controlling unit.
Topcon Corporation

Hybrid cloud-based measurement automation in medical imagery

Measurement of medical images as a hybrid cloud service is provided. In various embodiments, pre-trained parameters are received at a client from a remote server.
International Business Machines Corporation

Apparatus and rejecting erroneous objects of extrusion in point cloud data

A method of rejecting the presence of an object of extrusion within a point cloud. The method comprising receiving, through a data interface, data describing a set of measurements of observed portions of the one or more objects in the scene.
Clearedge3d, Inc.

Secure cloud storage distribution and aggregation

Methods and systems for secure cloud storage are provided. According to one embodiment, file storage policies are maintained for users of an enterprise network by a trusted gateway device interposed between the network and multiple third-party cloud storage services.
Fortinet, Inc.

Event-based user state synchronization in a local cloud of a cloud storage system

Cloud storage systems and methods are described for providing event-based user state synchronization among the various cloud elements. A global user directory is maintained on a remote cloud storage system.
Egnyte, Inc.

Modeling and designing system and method

Improved modeling and imaging systems and methods for designing scaffolding systems for a project site. A multi-dimensional spatial model of the project site is obtained.
Brand Shared Services Llc

Translatable texts in cloud applications

A method for internationalization of a computer application being designed and developed as cloud application in a platform-as-a-service (paas) environment includes disposing a translatable texts table in a data layer of the computer application as a common source of translatable texts for all layers of the computer application. The method further includes disposing a text string translation service in a logic layer of the computer application.
Sap Se

Generation of collateral object representations in collaboration environments

Systems for online collaboration. Exemplary embodiments are implemented within cloud-based service platforms.
Box, Inc.

Multicast apparatuses and methods for distributing data to multiple receivers in high-performance computing and cloud-based networks

An originating host device in a distribution chain is provided upstream from multiple host devices including intermediary and terminating host devices. The originating host device includes a core with a generation application and a first rdma nic.
Microsoft Technology Licensing, Llc

Method for determining data in cache memory of cloud storage architecture and cloud storage system using the same

A method for determining data in cache memory of a cloud storage architecture and a cloud storage system using the method are disclosed. The method includes the steps of: a.
Prophetstor Data Services, Inc.

Healing cloud services during upgrades

Embodiments described herein are directed to migrating affected services away from a faulted cloud node and to handling faults during an upgrade. In one scenario, a computer system determines that virtual machines running on a first cloud node are in a faulted state.
Microsoft Technology Licensing, Llc

Efficient scheduling of backups for cloud computing systems

A system and method for backing up virtual machines are disclosed. To better use the backup resources, an optimal set of virtual machines needing backup during a time window is generated.
Vmware, Inc.

Heterogeneous auto-scaling big-data clusters in the cloud

The present invention is generally directed to systems and methods of provisioning and using heterogeneous clusters in a cloud-based big data system, the heterogeneous clusters made up of primary instance types and different types of instances, the method including: determining if there are composition requirements of any heterogeneous cluster, the composition requirements defining instance types permitted for use; determining if any of the permitted different types of instances are required or advantageous for use; determining an amount of different types of instances to utilize, this determination based at least in part on an instance weight; provisioning the heterogeneous cluster comprising both primary instances and permitted different types of instances.. .
Qubole Inc.

Elasticity for highly availabile applications

Cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Dynamic relocation of applications in a cloud application service model

Software that performs the following steps is provided: (i) running an application on a first virtual machine on a first physical server, with the application including a first plurality of independently migratable elements, including a first independently migratable element that utilizes a first resource on the first virtual machine and a second independently migratable element that utilizes a second resource on the first virtual machine; and (ii) on condition that a first migration condition exists, migrating the first independently migratable element to a second virtual machine on a second physical server, such that the first independently migratable element is able to utilize a resource that is similar to the first resource on the second virtual machine on the second physical server while the second independently migratable element remains able to utilize the second resource on the first virtual machine on the first physical server.. .
International Business Machines Corporation

Outdated resource handling and multiple-version upgrade of cloud software

A system and method for seamlessly and automatically handling outdated resources in a cloud and/or performing a multiple-version upgrade within the cloud with little visibility of interim operations to end users are presented. Mechanisms ensure that outdated resources do not communicate with the rest of the cloud (for example, via distributed data models and application programming interfaces (apis) before they are upgraded to a target software level.
Amplidata N.v.

Information processing apparatus, control method therefor, and storage medium

By executing parallel processing while keeping a certain parallel number with respect to one user according to a status of processing for converting print data, an information processing apparatus controls the job order and monopolization of computing resources while effectively utilizing scalability of a cloud service.. .
Canon Kabushiki Kaisha

Automated-vehicle 3d road-model and lane-marking definition system

A road-model-definition system suitable for an automated-vehicle includes a camera, a lidar-unit, and a controller. The camera used is to provide an image of an area proximate to a host-vehicle.
Delphi Technologies, Inc.

Liquid leak detection in a liquid distribution system

Systems and methods relate to monitoring liquid pressure to detect liquid leaks based on a global sequence alignment technique. A monitoring device in a liquid distribution obtains periodic samples at regular time intervals from a representative node of a liquid distribution system.

Fully reciprocal atomic interferometric gyroscope

A fully reciprocal atomic interferometric gyroscope is provided. The fully reciprocal atomic interferometric gyroscope includes an atomic chamber, a plurality of lasers, a controller and measurement sensor.
Honeywell International Inc.

Welding process

A method and apparatus for welding a first component to a second component. A scanning head is positionally calibrated within a localised work envelope including the components, the positional calibration being referenced to at least one datum feature within the work envelope.
Rolls-royce Plc

Tamper resistant pharmaceutical composition

Tamper resistant pharmaceutical composition and a process for the production of tamper resistant pharmaceutical composition are described herein. Tamper resistant pharmaceutical composition comprising drug substance and water soluble ingredient having cloud point greater than about 90° c., wherein the cloud point of the water soluble ingredient inhibit extraction of the drug substance from the pharmaceutical composition by hot water having temperature greater than about 90° c.

Smartphone based peak flow meter

Peak flow meters are often used by asthma patients to monitor their physical condition. It is imperative that a peak flow meter is conducive to patient usage and recording.

Cloud-based autonomous aquaculture system

A system and method for remote monitoring and command and control of one or many offshore aquafarms is provided. Operators are able to securely access web applications and services hosted in the cloud through which husbandry functions such as feeding fish, cleaning the cage and removing mortalities can be automatically scheduled and executed.
Forever Oceans Corporation

Microsoft Technology Licensing, Llc

. .

Creation and usage of radio maps for cloud-based control of self organizing networks

The present application is directed to wireless communication networks. More specifically, the present application is directed to creation and usage of radio maps for cloud-based control of self-organizing networks..
Xcellair, Inc.

Delaying execution of a corrective action in a wireless environment

Techniques are disclosed for delaying execution of a corrective action in a wireless environment. During a first time period, a performance level is detected.
Kodacloud Inc.

System and cloud-based manifest processing

Systems, methods, architectures, mechanisms or apparatus for using provider equipment based resources such as cloud or data center resources to implement various stb functions entirely at the head end, such as changing channels presented via the stb using pe actions only.. .
Charter Communications Operating, Llc

Cloud data storing of property and setting data of image data

An image processing apparatus includes a scanner, a communication interface, and a controller. The controller is configured to generate property and setting data of image data that is generated based on image scanning by the scanner, and control the communication interface to transmit the image data and the property and setting data thereof to a server connected to the image processing apparatus through a network, so that the image data and the property and setting data thereof are stored therein in association with each other..
Toshiba Tec Kabushiki Kaisha

On-premise data collection and ingestion using industrial cloud agents

A cloud agent facilitates collection of industrial data from one or more data sources on the plant floor and migration of the collected data to a cloud platform for storage and processing. Collection services associated with the cloud agent perform on-premise data collection of historical, live, and/or alarm data directly from industrial devices networked to the agent or from intermediate data concentrators that gather the data from the devices.
Rockwell Automation Technologies, Inc.

Method and operating infrastructure layer in cloud computing architecture

The present disclosure provides a method and apparatus for operating an infrastructure layer of cloud computing architecture. A specific implementation of the method comprises: determining, in response to receiving an operation request sent by a user via a user terminal for the infrastructure layer, whether to execute an operation indicated by the operation request; sending, in response to determining to execute the operation, the operation request to the infrastructure layer; updating, after the infrastructure layer successfully executing the operation and updating the resources related to the infrastructure layer, a state of the resources related to the infrastructure layer stored in the intermediate layer database; acquiring changed data in the resources related to the infrastructure layer, and storing the data in the infrastructure layer database; and synchronizing the data in the infrastructure layer database to the intermediate layer database..
Beijing Baidu Netcom Science And Technology Co., Ltd.

Distributed network encryption for logical network implemented in public cloud

Some embodiments provide a method for a first data compute node (dcn) operating in a public datacenter. The method receives an encryption rule from a centralized network controller.

System and using a virtual honeypot in an industrial automation system and cloud connector

A system includes a first network including a network device, a second network including a cloud-computing infrastructure, a module including a first interface and a second interface. The first interface is in communication with the first network and the second interface is in communication with the second network.
Siemens Aktiengesellschaft

Clustering approach for detecting ddos botnets on the cloud from ipfix data

Use machine learning to train a classifier to classify entities to increase confidence with respect to an entity being part of a distributed denial of service attack. The method includes training a classifier to use a first classification method, to identify probabilities that entities from a set of entities are performing denial of service attacks.
Microsoft Technology Licensing, Llc

Identifying and handling threats to data compute nodes in public cloud

Some embodiments provide a method for a public cloud manager that interacts with a management system of a public datacenter. The method receives a notification from a network controller that a second data compute node is compromised.
Nicira, Inc.

Rootkit detection system and method

A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the first data for known malware, and generating a first alert if known malware is detected. The drive may include a public key, the first data may include a digital signature based on the key, and checking the first data may include validating the signature.
Dell Products L.p.

Data management for a multi-tenant identity cloud service

Cloud based identity management is provided by receiving a request from an application by a web gate for a resource, where the request includes an operation on a resource type out of a plurality of resource types and the request specifies a tenant out of a plurality of tenants. Embodiments access a microservice based on the request, resolve the resource type, and validate that the operation is supported by the resource type based on metadata.
Oracle International Corporation

System and delegation of cloud computing processes

The disclosed systems and methods allow cloud services to delegate processing of sensitive data to trusted user devices. In an exemplary method, a cloud service stores data, some of which is encrypted and cannot be decrypted by the service.
Pcms Holdings, Inc.

Cross-tenant data leakage isolation

A method and proxy device for cross-tenant data leakage isolation in a multi-tenant database are provided. The method includes monitoring, by a proxy device, traffic flows between a server executing at least one cloud-based application and the multi-tenant database, wherein the proxy device is communicatively connected between the server and the multi-tenant database; capturing, by the proxy device, at least a request to access the multi-tenant database, wherein the request is communicated using a database-specific protocol; analyzing the request to determine if the request is legitimate; upon determining that the request is not legitimate, modifying the request to point to a global-tenant table and to designate a unique tenant identifier, wherein the unique tenant identifier corresponds to a tenant-specific table name designated in the global-tenant table; and sending the modified request to the multi-tenant database using the database-specific protocol..
Microsoft Technology Licensing, Llc.

Managed forwarding element executing in separate namespace of public cloud data compute node than workload application

Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter having forwarding elements to which the network controller does not have access. The method identifies a data compute node (dcn) operating on a host machine in the datacenter, to attach to the logical network.
Nicira, Inc.

Managed forwarding element executing in public cloud data compute node without overlay network

Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter having forwarding elements to which the network controller does not have access. The method identifies a data compute node (dcn), that operates on a host machine in the datacenter, to attach to the logical network.
Nicira, Inc.

Automatic firewall configuration based on aggregated cloud managed information

Disclosed are systems, methods, and computer-readable storage media for automatic firewall configuration based on aggregated cloud managed information. A cloud management device can determine, based on security event data received from a first set of client computing environments, that a security attack detected on at least one client computing environment from the first set of client computing environments is likely to occur on other client computing environments.
Cisco Technology, Inc.

Secure tunnels for the internet of things

A system for the maintenance and creation of security tunnels between iot devices and iot cloud servers, comprising the steps of receiving one or more packets from one or more iot devices in a smart router, routing the one or more packets to an agent within the router, the agent performing one or more services on the one or more packets, routing the one or more packets to a wan port of the router, and sending the one or more packets by a cloud secure tunnel to one or more iot cloud servers. The system may have secure tunnels that are formed between the iot devices using a unique password for each iot device.
Zitovault, Inc.

Low downtime software-defined wide area network service upgrade

Techniques for upgrading virtual appliances in a hybrid cloud computing system are provided. In one embodiment, virtual appliances are upgraded by deploying the upgraded appliances in both a data center and a cloud, configuring the upgraded appliances to have the same ip addresses as original appliances, and disconnecting the original appliances from networks to which they are connected and connecting the upgraded appliances to those networks via the same ports previously used by the original appliances.
Vmware, Inc.

Distributed processing of north-south traffic for logical network in public cloud

Some embodiments provide a method for a managed first forwarding element executing on a first data compute node (dcn) that operates on a first host machine within a public datacenter. The managed first forwarding element is configured to implement a logical network.

Stateful connection optimization over stretched networks using packet introspection

Techniques for stateful connection optimization over stretched networks are disclosed. In one embodiment, hypervisor filtering modules in a cloud computing system are configured to modify packets sent by virtual computing instances (e.g., virtual machines (vms)) in the cloud to local destinations in the cloud such that those packets have the destination media access control (mac) address of a local router that is also in the cloud.
Vmware, Inc.

Stateful connection optimization over stretched networks using specific prefix routes

Techniques for stateful connection optimization over stretched networks are disclosed. Such stretched networks may extend across both a data center and a cloud.
Vmware, Inc.

Stateful connection optimization over stretched networks with temporary tromboning

Techniques for stateful connection optimization over stretched networks are disclosed. In one embodiment, traffic of virtual machines (vms) that are live-migrated from a data center to a cloud is temporarily tromboned back to the data center to preserve active sessions.
Vmware, Inc.

Identifying resources for purging in a cloud based on inter-dependency graph analysis

A method and system are provided. The method includes constructing a dependency graph of cloud resources based on interdependencies between the cloud resources.
International Business Machines Corporation

Api rate limiting for cloud native application

A method is described and in one embodiment includes intercepting an api call destined for an application executing on a host server; accessing a service level agreement (“sla”) profile for the application, wherein the sla indicates performance guarantees for the application; determining resource utilization for the host server and resource utilization for the current application and other applications running on that server; comparing the performance guarantees with the host server and application resource utilization to determine whether performance guarantees can be met if the api call is forwarded to the application based on the host server resource utilization; and, if it determined that the performance guarantees cannot be met if the api call is forwarded to the application, refraining from forwarding the api call to the application.. .
Cisco Technology, Inc.

Managed forwarding element executing in public cloud data compute node with different internal and external network addresses

Some embodiments provide a method for a network controller that manages a logical network implemented in a datacenter comprising forwarding elements to which the network controller does not have access. The method identifies a data compute node (dcn), that operates on a host machine in the datacenter, to attach to the logical network.
Nicira, Inc.

Learning and deploying datacenter landscapes

Techniques disclosed herein permit logical topologies of datacenters to be automatically learned and re-created in the cloud. In one embodiment, a datacenter landscape is determined based on numbers of hops from nodes in a datacenter to a wide area network (wan)-facing node.
Vmware, Inc.

Recommending configurations for client networking environment based on aggregated cloud managed information

Disclosed are systems, methods, and computer-readable storage media for recommending configurations for a client networking environment based on aggregated cloud managed information. A cloud network management device can receive a first set of infrastructure specifications describing a first client networking environment.
Cisco Technology, Inc.

Use of public cloud inventory tags to configure data compute node for logical network

Some embodiments provide a method for a public cloud manager operating within a first data compute node of a public cloud. The method receives, through a set of public cloud provider apis, information regarding a new second data compute node created within the public cloud.
Nicira, Inc.

Creating layer 2 extension networks in a hybrid cloud computing system

Techniques for creating layer 2 (l2) extension networks are disclosed. One embodiment permits an l2 extension network to be created by deploying, configuring, and connecting a pair of virtual appliances in the data center and the cloud so that the appliances communicate via secure tunnels and bridge networks in the data center and the cloud.
Vmware, Inc.

Extension of network control system into public cloud

Some embodiments provide a method for a first network controller that manages a logical network implemented in a datacenter including forwarding elements to which the first network controller does not have access. The method identifies a first data compute node (dcn) in the datacenter configured to execute a second network controller.
Nicira, Inc.

System for cloud-based service outage detection and verification

An embodiment provides a system for cloud-based service outage detection and verification, including: a network link that receives, over a data communications network, cloud service provider outage information according to a predetermined retrieval policy; a processor that generates, using text data derived from the cloud service provider outage information, outage data comprising a third party cloud service provider identification and an outage characteristic; and a database that stores the outage data indexed according to cloud service provider identification and outage characteristic; the processor receiving, over the data communications network, data of a requesting entity; the processor thereafter identifying that the requesting entity subscribes to a cloud-based service of the third party cloud service provider based on a query using the database; and in response to the processor determining that the requesting entity subscribes to a cloud-based service of the third party cloud service provider, confirming that the-cloud based service has experienced an outage based on the outage data stored in the database and providing a verification indication to the requesting entity. Other embodiments are described and claimed..

Centralized processing of north-south traffic for logical network in public cloud

Some embodiments provide a method for a first data compute node (dcn) configured to execute a gateway forwarding element (fe) for a logical network within a datacenter. The method receives a packet from a second fe configured by an administrator of the datacenter.

System and providing network security

A nic is provided in a cloud infrastructure. The nic has a first information which receives least one application message from an application supported by the infrastructure.
Solarflare Communications, Inc.

Cloud mask data acquisition and distribution using geosynchronous communications or broadcast satellites

Cloud mask image data is obtained by a secondary imaging payload disposed on a communications or broadcast satellite operating in geosynchronous orbit. The obtained cloud mask image data is provisioned for use, in near real time, by one or more low earth orbit imaging satellite systems.
Space Systems/loral, Llc

System and method to assist building automation system end user based on alarm parameters

Disclosed are systems and methods for operating a building automation system (bas) that communicates with end devices via a master-slave token passing network (mstp), e.g., bacnet, a local operating network (lon), or any other suitable communications protocol to receive alarm messages. The bac enables a user to rapidly and effectively respond to an alarm by providing an alarm assistance message that provides the user with detailed remediation procedures concerning the current alarm.
Trane International Inc.

Method for establishing location-based space object, displaying space object, and application system thereof

The disclosure is related to a method for creating location-based space object data, a method for displaying space object, and a system thereof. A cloud-based server is to receive a space object created by a user using a mobile device.

Intelligent dresser and corresponding cloud expert system

An embodiment of the present disclosure provides an intelligent dresser and a corresponding cloud expert device. The intelligent dresser introduces the cloud expert device on the basis of a conventional dresser to implement a customized recommendation of cosmetic product.
Boe Technology Group Co., Ltd.

System and real time deal notification to people nearby

This invention is about computer software and mobile-device-implemented methods, services and user interfaces for allowing a set of user or users to notify of special offers to other set of user or users. Utilizing this method and location based gps technology, a set of user creates data which is stored in a middle layer such as a cloud system or database and then displayed on the other set of user's device.

Methods and systems that generated resource-provision bids in an automated resource-exchange system

The current document is directed a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search-based auction methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing facilities.
Vmware, Inc.

System and managing applications in the cloud

This disclosure provides a method for application management including identifying a list of applications, inserting one or more automation schedules for one or more applications of the list of applications into a database, running the one or more automation schedules, identifying one or more instance activity, scheduling a time for the one or more instance activity to occur, and sending a notification to an application user, wherein the notification alerts a user to the scheduled time for the one or more instance activity and a user may choose to change the scheduled time. A system is also provided including an application management module, wherein the application management module includes a dashboard comprising one or more selectable elements for management of one or more applications, wherein application management comprises scheduling and notifying a user of one or more instance activity..
General Electric Company

Employee referral system

A web-based employee referral computer-implemented system for targeting specific group of employees, and providing rewards based on the action or events participated by the employee in various steps of the recruiting process is disclosed. The system comprises an employer module, an employee module and an administrator module.

Methods and cloud processing systems for processing data streams from data producing objects of vehicles, location entities and personal devices

Methods and systems are provided for cloud processing data streamed from a vehicle and a home (e.g., any location) associated with a user account. One method includes receiving a data stream from the vehicle entity, where the data stream from the vehicle entity includes metadata from one or more data producing objects of the vehicle entity.
Emerging Automotive, Llc

Detecting malware by monitoring execution of a configured process

Upon detecting malware, a detection report, and a copy of the computer file, can be sent to a service (e.g., cloud-based). The service can independently verify that the reported file is malicious, and can protect other machines from executing or loading the same malicious file..

Method and server for vendor-independent acquisition of medical data

The present disclosure relates to server and a method for vendor-independent acquisition of medical data by healthcare units. The method comprises transmitting request to a cloud database by the server at predefined intervals of time.
Wipro Limited

Managing software asset environment using cognitive distributed cloud infrastructure

A method and system are provided for performing an extract-transform-load (etl) process. The method includes collecting load information about a volume and a complexity of raw data to be processed during the etl process.
International Business Machines Corporation

Storage virtualization for directories

Storage virtualization techniques allow directories to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the directories are stored locally—even though the data of those directories may not be resident on the local computing device. That is, the contents of directories that may exist in the cloud look and behave as if they were stored locally on a computing device..
Microsoft Technology Licensing, Llc

Method for replication of objects in a cloud object store

A data replication system and process is disclosed. A device receives files respectively via a network from a remotely disposed computing device and partitions the received files into data objects.
Storereduce

Preventing excessive hydration in a storage virtualization system

Storage virtualization techniques allow files and directories to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the files are stored locally—even though the data of those files and directories may not be resident on the local computing device. That is, the contents of files and directories that may exist in the cloud look and behave as if they were stored locally on a computing device.
Microsoft Technology Licensing, Llc

Cloud file transmission method, terminal, and cloud server

The present disclosure discloses a cloud file transmission method, a terminal, and a server. The method includes receiving a request for obtaining a file, where the request includes a file identifier of the file; obtaining saved first information by using the file identifier and an established first association relationship between the file identifier and the first information, where the first information is generated by performing calculation on raw data of the file, and the raw data is data that can distinguish the file from another file; sending the first information to cloud, so that the cloud finds a saved file according to the first information and an established second association relationship between the file and the first information; and receiving the file sent by the cloud.
Huawei Technologies Co., Ltd.

Interactive multiple user playlist sharing

A system and method for providing multiple user access to a playlist is described. A master user device and a guest user device are connected to the same network.

Avionics system for creating a data cloud and for interacting with the data cloud and associated method

An avionics system comprises an analysis system for analysing the data input, arranged so as to ensure the following functionalities: recognition of the characteristics of each datum and creation of a raw alphanumeric datum; decomposition of the raw alphanumeric datum into numerical values and into referenced parameters or into unreferenced information or into unutilizable information; verification of the consistency of the information emanating from the raw alphanumeric datum; transformation of the raw alphanumeric datum into utilizable alphanumeric datum; the alphanumeric data being displayed in a data “cloud” on the viewing device, the data being able to be selected, modified or moved by the interaction means.. .
Thales

Cloud programming sensor interface architecture

An integrated circuit for interfacing with one or more sensors, including a wireless interface configured to connect to a network, an i/o interface configured to connect to sensors; and a microprocessor and memory that are programmed to: connect to a server via the network; wherein the server executes an application for controlling the sensors; transmit identification information and/or location information of the integrated circuit to the application executed by the server; receive commands for the sensors from the application executed by the server; and transfer the commands to the i/o interface for relaying to the sensors; and wherein the integrated circuit is configured to control any sensor that can connect electronically to the i/o interface without changing the programming of the microprocessor and memory.. .
Origin Gps Ltd.

Cloud collaboration and management application

Cloud storage solutions are provided, in which different cloud storage spaces are aggregated together from the viewpoint of a user. Embodiments of the cloud storage space monitoring and management application provide systems for effective cloud storage management and monitoring, including uploading files to a cloud storage space, downloading files to a user's personal computing device, and migrating/sorting files between different cloud storage spaces.

Determining an availability score based on available resources of different resource types in a cloud computing environment of storage servers providing cloud services to customers in the cloud computing environment to determine whether to perform a failure operation for one of the storage servers

Provided are a computer program product, system, and method for a computer program product, system, and method for determining an availability score based on available resources of different resource types in a distributed computing environment of storage servers to determine whether to perform a failure operation for one of the storage servers. A health status monitor program deployed in the storage servers performs: maintaining information indicating availability of a plurality of storage server resources for a plurality of resource types; calculating an availability score as a function of a number of available resources of the resource types; and transmitting information on the availability score to a management program.
International Business Machines Corporation

Off-site backup of workloads for multi-tenant cloud computing system

A system and method for backing up workloads for multiple tenants of a cloud computing system are disclosed. A method of backing up workloads for multiple tenants of a computing system, includes determining that a first tenant has elected to maintain a copy of backups in an off-site location and a second tenant has elected to not maintain a copy of backups in an off-site location, directing first backup data of the first tenant to a backup storage device within the computing system and to a backup storage device at the off-site location, and directing second backup data of the second tenant to the backup storage device within the computing system, and not to the backup storage device at the off-site location..
Vmware, Inc.

Efficient queueing and scheduling of backups in a multi-tenant cloud computing environment

Backups of workloads in a multi-tenant cloud computing environment are efficiently queued and scheduled. A method of backing up workloads for multiple tenants of a cloud computing system, includes the steps of determining a pool of workloads to be backed up during a time window, the workloads including workloads for a first tenant and workloads for a second tenant, placing a backup task for backing up each of the workloads in the pool in a scheduling queue and prioritizing the backup tasks according to backup parameters specified by the tenants, sizes of workload data to be backed up, and hardware constraints of a backup storage device executing the backups, and instructing the backup storage device to execute the backup tasks according to an order of the backup tasks in the scheduling queue..
Vmware, Inc.

Tiered backup archival in multi-tenant cloud computing system

A system and method for backing up workloads for multiple tenants of a cloud computing system are disclosed. A method of backing up workloads for multiple tenants of a computing system includes triggering an archival process according to an archival policy set by a tenant, and executing the archival process by reading backup data of the tenant stored in a backup storage device of the computer system and transmitting the backup data to an archival store designated in the archival policy, and then deleting or invalidating the backup data stored in the backup storage device..
Vmware, Inc.

Techniques for dynamically benchmarking cloud data store systems

In various embodiments, a benchmarking engine automatically tests a data store to assess functionality and/or performance of the data store. The benchmarking engine generates data store operations based on dynamically adjustable configuration data.
Netflix, Inc.

Termination policies for scaling compute resources

Approaches are described for enabling a user to specify one or more termination policies that can be used to select which instances in a group of virtual machines (or other compute resources) allocated to the user should be terminated first when scaling down the group of virtual machine instances. The termination policies can be utilized by an automatic scaling service when managing the resources in a multitenant shared resource computing environment, such as a cloud computing environment..
Amazon Technologies, Inc.

Method for migrating a virtual machine between a local virtualization infrastructure and a cloud-based virtualization infrastructure

In a computer-implemented method for migrating a virtual machine between a local virtualization infrastructure and a cloud-based virtualization infrastructure, within a graphical user interface for managing the local virtualization infrastructure, a first view comprising a control for migrating a virtual machine between the local virtualization infrastructure to the cloud-based virtualization infrastructure is displayed. Responsive to a receiving a user selection to migrate a virtual machine between the local virtualization infrastructure and the cloud-based virtualization infrastructure, a workflow for effectuating a migration of the virtual machine between the local virtualization infrastructure and the cloud-based virtualization infrastructure is displayed.
Vmware, Inc.

Method for connecting a local virtualization infrastructure with a cloud-based virtualization infrastructure

In a computer-implemented method for connecting a local virtualization infrastructure with a cloud-based virtualization infrastructure, a first view comprising a control for connecting the local virtualization infrastructure to the cloud-based virtualization infrastructure is displayed within a graphical user interface for managing the local virtualization infrastructure. Responsive to a receiving a user selection to connect the local virtualization infrastructure to the cloud-based virtualization infrastructure, at least one workflow for effectuating a connection between the local virtualization infrastructure and the cloud-based virtualization infrastructure is displayed.
Vmware, Inc.

Application centric continuous integration and delivery with automated service assurance

An application-centric continuous delivery (accid) architecture provides a service that automates the configuration and management of end-to-end application lifecycle management (alm) tools, through an innovative application-centric metadata model that can be customized through a self-service portal. With the accid architecture, it organizations can provide version management, build automation, test automation, artifact management, infrastructure build, and automated application deployment that is consistent with global it policy and governance and delivered as a service to organizations.
Accenture Global Solutions Limited

Management system and methodology for disturbance monitoring equipment known as usi m9kadmin

A computer-implemented system and method of providing utility service network information for a utility service disturbance monitoring equipment (dme) management network and system. The system includes six components: an operating system with mirrors/feedback point, a local provider/usi dme application repositories, working snapshots, published snapshots, a quality control test system; and a dedicated usi portion of the cloud.

Cloud-based application resource files

A cloud computing system can be used to transparently reduce the storage space of an application on a client device. An application can be installed with a minimal set of application resource files.
Apple Inc.

Intelligent switch and intelligent home system using the same

Disclosed is an intelligent switch and an intelligent home system using the same. The intelligent switch includes a main control chip, a relay, a wi-fi communication module, an ac-dc power module, a sound collection module and an audio playback module.
Shenzhen Xinguodu Technology Co., Ltd

Storage virtualization for files

Storage virtualization techniques allow files to be stored remotely, for example, by a cloud storage provider, but in a manner that appears to a user or application running on a local computing device as if the files are stored locally—even though the data of those files may not be resident on the local computing device. That is, the contents of files that may exist in the cloud look and behave as if they were stored locally on a computing device..
Microsoft Technology Licensing, Llc

Automated vehicle road model definition system

A road-model-definition system suitable for an automated-vehicle includes a lidar-unit and a controller. The lidar-unit is suitable to mount on a host-vehicle.
Delphi Technologies, Inc.

Cloud-based control platform with connectivity to remote embedded devices in distributed control system

A method includes transmitting, over a virtual private network (vpn) to a remotely-located control platform, a request for first information associated with a bootp protocol synchronization process. The method also includes receiving, from the control platform, a first response comprising the requested first information.
Honeywell International Inc.

High-voltage circuit breaker opening and closing time online monitoring apparatus, smart multi-dimensional big data analyzing expert system for high-voltage circuit breaker in power grid and method therefor

Provided are a high-voltage circuit breaker opening and closing time online monitoring apparatus, a smart multi-dimensional big data analyzing expert system for a high-voltage circuit breaker in a power grid, and methods therefor. The opening and closing time online monitoring apparatus includes a circuit breaker opening and closing events database, a circuit breaker opening and closing time online monitoring module, and a human machine interaction interface.

Personal liquid analysis system

A personal liquid analysis system includes a portable liquid analyzer device, a mobile application as a user interface, and a cloud server for data analysis. The compact and portable liquid analyzer device is integrated by miniaturized near-infrared (nir) optical sensors setup for spectroscopy measurement from a sample cell, control circuits, i/o user interface modules and wireless communication modules.
Sensii, Inc.

Energy-optimized vehicle route selection

A method for generating energy-optimized travel routes with a vehicle navigation system includes generating candidate travel routes between a route origin and one or more route destinations, and then dividing each candidate travel route into a plurality of route segments. The method includes estimating expected travel speeds along each segment using cloud information and calculating an expected energy efficiency over each of the candidate travel routes using one or more vehicle-specific energy efficiency models.
Gm Global Technology Operations Llc

Automatic localization geometry detection

Embodiments include apparatus and methods for generating a localization geometry or occupancy grid for a geographic location. Point cloud that describes a vicinity of a pathway is collected by a distance sensor and describing a vicinity of the pathway.
Here Global B.v.

Real time machine vision and point-cloud analysis for remote sensing and vehicle control

Methods and apparatus for real time machine vision and point-cloud data analysis are provided, for remote sensing and vehicle control. Point cloud data can be analyzed via scalable, centralized, cloud computing systems for extraction of asset information and generation of semantic maps.
Solfice Research, Inc.

Settings manager - distributed management of equipment and display settings via centralized software application

A method and system for managing settings on a single vehicle/implement system and across a fleet of vehicle/implement systems. Each vehicle/implement system includes a plurality of embedded systems having configurable settings, a precision agriculture server having configurable settings, and a telematics server having configurable settings.
Deere & Company

Robotic charger alignment

A system and method for robotic charger alignment comprises receiving at a robotic charger, a device identification of a receiving device; retrieving a reference object (ro) of the receiving device from a database indexed by the device identification; imaging the receiving device to form at least two images having an angle therebetween with respect to a common location on the receiving device; calculating, by an alignment processing device, a stereo disparity depth map from the at least two images; acquiring an acquired point cloud (apc) from the stereo disparity depth map; generating, by the alignment processing device, rotation and translation data by aligning the ro to the apc; inferring an inlet port location from the ro; and moving the robotic charger proximal to the inlet port using the ro, rot and t data.. .
Powerhydrant Llc

Methods and systems for generating instructions for a robotic system to carry out a task

Example embodiments may relate to robot-cloud interaction. In particular, a cloud-based service may receive a query from a first robotic system including sensor data, a request for instructions to carry out a task, and information associated with a configuration of the first robotic system.
X Development Llc

Workout sensing system

A workout sensing system for collecting and transmitting strength training related data from components embedded within a sleeve of a strength training device such as a barbell, lat bar, or close grip seated row bar. The strength training device tracks metrics including load, repetitions, sets, power, velocity, force, and form.

Wireless communication device and wireless communication method

Provided is a wireless communication device, comprising: a verifying module, configured to perform identity verification on user of the wireless communication device; a first accessing module, configured to establish, when the verifying module verifies the user successfully, a cloud service connection with cloud server end of the user via a wireless communication network; a second accessing module, configured to establish a short-range wireless connection with one or more external terminal device(s); and a transmitting module, configured to relay data between the external terminal device and the cloud server end via the short-range wireless connection and the cloud service connection. One wireless communication device provides a uniform access and verification processing of a cloud service for one user, so that lower design requirement is required from various terminal devices of the user, and costs of the terminal devices can be reduced..
Isoft Power Technology Ltd.

System and automated document translation during transmission

A system and method for document translation during transmission includes digital device, such as a multifunction peripheral, that includes an input for electronic document data, such as with a scanner or facsimile machine input interface. A user interface receives destination address data corresponding to a plurality of document delivery destinations as specified by a user.
Toshiba Tec Kabushiki Kaisha

Interrupt synchronization of content between client device and cloud-based storage service

Technologies may be provided to interrupt a synchronization of content between a client device and a cloud-based storage service. A usage pattern associated with a user in conjunction with the content may be identified.
Microsoft Technology Licensing, Llc

Statistical resource balancing of constrained microservices in cloud paas environments

A resource balancer for a cluster of nodes in a cloud computing system includes a load calculation module that receives load reports for respective load metrics associated with the nodes, wherein the load reports are indicative of respective loads on a plurality of resources provided by the nodes, calculates, based on the received load reports, an expected distribution of loads across the nodes for each load metric, and calculates, based on the expected distribution of loads, probabilities that each of the load metrics will exceed a respective predetermined capacity for each node. A load balancing module selectively balances, based on the calculated probabilities, the loads on the resources provided by the nodes..
Microsoft Technology Licensing, Llc

Load balancing cloud-based network appliances

A load balancing system is provided including: one or more virtual machines implemented in a cloud-based network and including a processor; and a load balancing application implemented in the virtual machines and executed by the processor. The load balancing application is configured such that the processor: receives one or more health messages indicating states of health of network appliances implemented in an appliance layer of the cloud-based network; receives a forwarding packet from a network device for an application server; based on the health messages, determines whether to perform a failover process or select a network appliance; performs a first iteration of a symmetric conversion to route the forwarding packet to the application server via the selected network appliance; receives a return packet from the application server based on the forwarding packet; and performs a second iteration of the symmetric conversion to route the return packet to the network device..
Microsoft Technology Licensing, Llc

System and mitigating distributed denial of service attacks in a cloud environment

A data network includes a data processor, a network device, and a ddos protection system (dps). The data processor provides an application to a user system.
Ddos Net, Inc.

Cloud computing environment activity monitoring

A computer-implemented method according to one embodiment includes identifying a cloud computing environment, establishing a baseline associated with input and output requests within the cloud computing environment, monitoring activity associated with the cloud computing environment, comparing the activity to the baseline, and performing one or more actions, based on the comparing.. .
International Business Machines Corporation

Protection feature for data stored at storage service

Cloud-based storage services are provided for storing data across multiple devices, where access to the data is subject to a first authentication process. Embodiments are directed to a data protection feature to prevent accidental deletion or modification of the data stored at the cloud via unintended user actions on the clients or actions by nefarious software or hackers.
Microsoft Technology Licensing, Llc

Vertical cloud service

A system for securely provided content to a user hides the identity of the user and/or the content from an outside observer by utilizing a plurality of virtual private networks (vpns) and virtual machines (vms) to obfuscate transmission sources. A key is used to generate and control access to a first vpn between a user device and a server that has access to the content.
Mintsoft, Llc

Resource allocation in high availability (ha) systems

Methods, computer program products, and systems are presented. The methods include, for instance: designating virtual machines including resources as respective node to service computational tasks directed to a high availability cloud architecture system; a primary node suffering from a lack of resources gets more resources as borrowed from other nodes that are present as a fail-safe of the primary node; and a resource usage log is kept to determine whether or not the primary node needs resources from other nodes later..
International Business Machines Corporation

System and extending cloud services into the customer premise

A cloud extension agent can be provided on a customer premise for interfacing, via an outbound secure connection, cloud based services. The cloud extension agent can reach the cloud based services through existing firewall infrastructure, thereby providing simple, secure deployment.
International Business Machines Corporation

Enhanced security for industrial automation gateways

An industrial automation gateway providing an extended web of trust is provided. The industrial automation gateway includes a cloud communication interface coupled with a cloud automation facility, a hardware memory, and a processor coupled with the cloud communication interface and the hardware memory.
Rockwell Automation Technologies, Inc.

Multiple secrets in quorum based data processing

Methods are described for constructing a secret key by multiple participants such that any quorum combination of participants can generate a fixed number of key components that can be combined by a recipient to generate the secret key. The methods permit an identical secret key to be generated by a different sized quorum from different participants if required.
Pq Solutions Limited

Method and system for providing energy services

The present document relates to a system for providing energy services in an energy grid using a cloud environment. The system comprises at least one control entity adapted to receive information from at least one of a plurality of energy grid elements and to operate the energy grid elements based on operational policies.
Alcatel Lucent

Vehicle communication system for cloud-hosting sensor-data

A vehicle communication system for cloud-hosting sensor-data from a plurality of vehicles where each of the vehicles is equipped with one or more sensors used to detect objects proximate to each of the vehicles includes a transceiver and a controller. The transceiver is used to communicate sensor-data from a first-sensor on a first-vehicle and from a second-sensor on a second-vehicle.
Delphi Technologies, Inc.

Secured integrated building access

An integrated secured building access system is presented that allows an authorized person to remotely grant or deny a visitor building access. The system provides audiovisual communication between a visitor and the access controller via a cloud service operating with the internet or a cellular network and remote devices such as smart phones, personal computers, and/or tablets.

Method for sharing real-time recording

This invention provides a system for sharing real-time recording and the method thereof. The system in this invention transmits the traffic image from the traffic recording device to the cloud server database for storage by the hand-held communication device.
Sanjet Technology Corp.

Methods and systems for wireframes of a structure or element of interest and wireframes generated therefrom

The disclosure relates to systems and processes for generating verified wireframes corresponding to at least part of a structure or element of interest can be generated from 2d images, 3d representations (e.g., a point cloud), or a combination thereof. The wireframe can include one or more features that correspond to a structural aspect of the structure or element of interest.
Pointivo, Inc.

Method for predictive coding of point cloud geometries

A method for encoding a point cloud representing a scene using an encoder including a processor in communication with a memory includes steps of fitting a parameterized surface onto the point cloud having input points representing locations in a three-dimensional space, generating model parameters from the parameterized surface, computing corresponding points from the parameterized surface, wherein the corresponding points correspond to the input points, computing residual data based on the corresponding points and the input points of the point cloud, compressing the model parameters and residual data to yield coded model parameters and coded residual data, respectively, and producing a bit-stream from the coded model parameters of the parameterized surface and the coded residual data.. .
Mitsubishi Electric Research Laboratories, Inc.

System for storing and safekeeping a document

A user requests safekeeping of an important document, such as a will, a trust instrument or an insurance policy, via a cloud-based system. The system maintains information relating to storage of the document.

Cloud computed data service for automated reporting of vehicle trip data

In some embodiments, a method may include receiving, at a server, onboard diagnostic data associated with an operational state of a vehicle of a user; calculating vehicle-related trip expense data based on the vehicle trip distance data included in the onboard diagnostic data; generating a message including the vehicle-related trip expense data and wirelessly transmitting the message to a mobile device having an interface to present the vehicle-related trip expense data. The onboard diagnostic data may include vehicle trip distance data for a vehicle trip.
Left Lane Network, Inc.

Digital health ecosystem

An aspect of the present disclosure relates to an integrated digital health system that includes a smart dosage delivery device connected to a smart appliance and/or a cloud/server. The integrated digital health system primarily includes a smart dosage delivery device that can offer dosing and/or patient interactivity and can connect to a smart appliance and/or a cloud/server to transmit information pertaining to dosage and various health related parameters.
Resolve Digital Health Inc.

A system, content editing server, audio recording slave device and content editing interface for distributed live performance scheduled audio recording, cloud-based audio content editing and online content distribution of audio track and associated metadata

There is provided system for distributed live performance scheduled audio recording, cloud-based audio content editing and online content distribution of audio track and associated metadata. The system comprise a content editing server and a plurality of audio recording slave devices and at least one artist client computing device configure to display a content editing interface in communication with the content editing server via the internet.
Openhd Pty Ltd

Database management using a matrix-assisted laser desorption/ionization time-of-flight mass spectrometer

An apparatus, method, or computer program. Spectrometer test data of a sample may be received.

System status visualization method and system status visualization device

From among the communication packets captured by a capturing unit, the communication packets of the applications for which the response time holds importance from the performance perspective are used by a response time calculating unit to calculate the response time on an application-by-application basis. Then, a normalizing unit calculates the average response time and normalizes the average response time using the representative response time to calculate the normalized response time on an application-by-application basis.
Fujitsu Limited

Tiered cloud storage for different availability and performance requirements

A system and method for a tiered cloud storage for different availability and performance requirements includes a gateway, a block store configured to cache data, and an object store configured to persistently store data. The gateway, the block store, and the object store are in a compute zone.
Red Hat, Inc.

Information processing apparatus and information processing system

An information processing apparatus includes a memory and a processor coupled to the memory. The processor is configured to collect charge information on electric power for running a virtual machine in respective cloud services provided by respective data centers located in different regions.
Fujitsu Limited

System and method to control hybrid deployment of an application

The system and method to control hybrid deployment of an application is disclosed. The method comprises receiving an application developed utilizing an application archetype and further deploying the application in a hybrid deployment.
Hcl Technologies Limited

Remote industrial automation site operation in a cloud platform

A cloud-based remote industrial automation site operation system leverages a wide array of configuration and operational data generated by industrial assets of an industrial enterprise to facilitate remote control of automation systems from a cloud platform. Status and operational data generated by industrial assets on the plant floor is migrated to the cloud platform where the remote site operation system resides.
Rockwell Automation Technologies, Inc.

Measuring cloud metrics using diverging quasi-optical radar

Apparatus and associated methods relate to determining, based on a detected portion of a projected pulse of quasi-optical energy backscattered by water particles within a divergent projection volume of a cloud atmosphere, properties of the backscattering water particles. The pulse of quasi-optical energy is projected into the divergent projection volume of the cloud atmosphere.
Rosemount Aerospace Inc.

Measuring method and laser scanner

A measuring method, wherein point cloud data of a building is acquired by a laser scanner, wherein the laser scanner has an attitude detector for detecting a tilting with respect to a horizontality or a verticality, converts the point cloud data into a horizontal distance and a height or a difference of a height based on the tilting detected by the attitude detector, sets a height line at a predetermined height on a wall surface, averages a horizontal distance information of the point cloud data included in a predetermined width with the height line as a center in a height direction, further develops the horizontal distance information along the height line in a horizontal direction, and measures a horizontal cross section at the predetermined height.. .
Topcon Corporation

Object-point three-dimensional measuring system using multi-camera array, and measuring method

A system for measuring object points on a three-dimensional object using a planar array of a multi-camera group, and a measuring method, are provided. The system is useful in the field of optical measuring technologies.

Mobile artificial cloud

A mobile artificial cloud system comprising a mobile formation of horizontally extending panels which are elevated above the ground for providing shade. The panels can take the form of gas-filled, flattened, large balloons, or sheets of material that may be elevated by balloons or releasably connected to fixed structures.

Method and system for virtual fitness training and tracking service

A machine implemented method and system, including: transmitting one or more credentials of a user account from a user device to an exercise management system (ems) having a processor and one or more sensors where the ems is disposed on an exercise equipment disposed in a selected at least one fitness center and the exercise equipment is part of a selected at least one exercise plan; transmitting the one or more credentials of the user account from the ems to a cloud server having a processor; transmitting the selected at least one exercise plan for the new user account from the cloud server to the ems; transmitting an exercise equipment information from the ems; forming a user exercise data by the ems for the exercise equipment based on data received from the one or more sensors and transmitting an exercise feedback from the ems.. .
Smartweights, Inc.

Cloud-based services for management of cell-based test systems

Cloud-based management of cell-based test systems is described. For example, at a server that is communicatively coupled to a cell-based test system via a network (that is, in the cloud), a test case from a test case library is selected and accessed.
W2bi, Inc.

Cloud-based automated content curation system

A cloud-based automated content curation system includes a content curation platform having a hardware processor and a memory, a master control automation unit stored in the memory, and a web-based affiliate operations portal. The hardware processor is configured to execute the master control automation unit to receive content feeds from and business rules for each of multiple affiliate content providers, and to receive traffic log data and replacement content metadata for each of the affiliate content providers via the web-based affiliate operations portal.
Disney Enterprises, Inc.

High definition camera

A smart camera system is disclosed. The camera can work with cloud data storage systems and compute cloud.

Systems and methods for content transfer

The present invention provides systems and methods for the virtualization, aggregation, and distributed processing of facsimile communications. The remote fax interconnect known as etherfax® is a system and method that allows for the reception and delivery of information based on cloud computing infrastructure to or from one or more facsimile systems using internet/web based communication protocols such as http(s) as the transport between a facsimile capable application or hardware and the remotely accessible etherfax® services..
Etherfax, Llc

Method and reducing network resource transmission size using delta compression

A near end point of presence (pop) of a cloud proxy service receives, from a client device, a request for a network resource. A far end pop from a plurality of pops of the cloud proxy service is identified.
Cloudflare, Inc.

Determination of user reputation regarding data object exposure in cloud computing environments

Embodiments disclosed herein provide systems, methods, and computer readable media for determining user reputation regarding data object exposure in a cloud computing environment. In a particular embodiment, a method provides receiving, from the cloud computing environment, information regarding behavior of a user in the cloud computing environment.
Palo Alto Networks, Inc.

Datapath triggered on-demand nfv service activation

Systems and methods for triggering service activation include starting a vcpe instance in response to a request for a service, instantiating a service container for the requested service and starting the service in the service container, installing a fast path entry for the service container in a local bridge table, detecting an idle timeout of the service and labeling the local bridge table entry for the corresponding service container as inactive, notifying a cloud services manager that the service container is inactive, and removing the service container.. .
Cisco Technology, Inc.

Method for obtaining vetted certificates by microservices in elastic cloud environments

A method and is provided for obtaining a vetted certificate for a microservice in an elastic cloud environment. The microservice receives a one-time authentication credential.
Motorola Solutions, Inc

Single sign on proxy for regulating access to a cloud service

Embodiments disclosed herein provide systems, methods, and computer readable media for using a single sign-on proxy to regulate access to a cloud service. In a particular embodiment, a method provides receiving an authentication request from a user system directed to a sso service and determining whether the authentication request satisfies at least one criterion for allowing access to the cloud service associated with the sso service.
Palo Alto Networks, Inc.

Perception-free authentication method and system, and control method and system based on the same

The present disclosure provides a perception-free authentication method. The method includes the following steps: monitoring an authentication request forwarded by a member wireless access point from the terminal device when a cloud ac establishes a communication link with a plurality of wireless access points; and judging whether the authentication request passes authentication; if the authentication request passes authentication, feeding back a first response packet to the member wireless access point forwarding the authentication request to allow the terminal device to directly access the internet; and otherwise, feeding back a second response packet to the member wireless access point forwarding the authentication request, wherein the second response packet includes an authentication record to be sent to a maser wireless access point, generated by sending the authentication request to the cloud ac via a member wireless access point and passing the cloud ac authentication..
Phicomm (shanghai) Co., Ltd.

Dynamic provisioning of storage in the cloud

A system may dynamically provision an underlying storage implementation for cloud storage, such as cloud block storage services. They system allows for deferral of the storage provisioning process to the time at which a tenant actually requests a storage space..
At&t Intellectual Property I, L.p.

Wireless terminal type identification method and system in router bridge networking mode

The present disclosure provides a wireless terminal type identification method and system in a router bridge networking mode. The method includes: in the router bridge networking mode, capturing all communication data packets forwarded by a router and filtering all the communication data packets to obtain a dhcp request data packet of the communication between a wireless terminal and a dhcp server; parsing the dhcp request data packet to obtain a parsed value; and sending the obtained parsed value and a mac address of the wireless terminal to a cloud-end server for a wireless terminal type query to obtain the type of the wireless terminal.
Phicomm (shanghai) Co., Ltd.

System architecture for cloud-platform infrastructure layouts

A system maintains, generates, and manages infrastructure layouts. The infrastructure layouts interconnect infrastructure components and capture relational aspects between the components within the interconnections.
Accenture Global Services Limited

Instance node management method and management device

An instance node management method is disclosed, which includes: creating a primary instance node for an application hosted on a cloud platform to run an instance of the application; determining, according to running start information of the primary instance node, a minimum resource configuration specification required by a secondary instance node of the application, where the secondary instance node is configured to replace the primary instance node when the primary instance node is faulty; and creating the secondary instance node according to the minimum resource configuration specification. The instance node management method as provided can reduce occupancy of a spare resource and increase an application hosting capability and scale on the cloud platform..
Huawei Technologies Co., Ltd.

Method for handling network partition in cloud computing

Various embodiments relate to a method, an active management node and a standby management node configured to detect and recover from a network partition the method including determining whether the active management node sees the standby management node on less than all of the plurality of token rings, then restarting the standby management node, determining whether a first active management node with a lower node index sees a second active management node with a higher node index on one or more than one of the plurality of token rings, then restarting the second active management node with a higher node index and determining whether the second active management node with a higher node index sees the second active management node with a lower node index on one or more than one of the plurality of token rings, then restarting the active management node with a higher node index.. .
Alcatel-lucent Canada Inc.

Secure processor for multi-tenant cloud workloads

A cpu package includes an encryption and decryption module disposed in a communication path between an instruction path of a processor core and a data register that is externally accessible through a debug port, and a key store accessible to the module. The module is configured to encrypt and store data in the data register for each of a plurality of processes being handled in the instruction path, wherein data owned by each process is encrypted and decrypted by the module using an encryption key assigned to the process.
Lenovo Enterprise Solutions (singapore) Pte. Ltd.

Low density parity check code for terrestrial cloud broadcast

Provided is an ldpc (low density parity check) code for terrestrial cloud broadcast. A method of encoding input information based on an ldpc (low density parity check) includes receiving information and encoding the input information with an ldpc codeword using a parity check matrix, wherein the parity check matrix may have a structure obtained by combining a first parity check matrix for an ldpc code having a higher code rate than a reference value with a second parity check matrix for an ldpc code having a lower code rate than the reference value..
Electronics And Telecommunications Research Institute

Uninterruptible power supply

An uninterruptible power supply contains: a plurality of power control devices, a cloud main controller, and multiple plugs. The plurality of power control devices are in connection with a power source, and the plurality of power control devices include cloud power management controllers, storage batteries, code readers, and sockets, respectively.

Sound event detection

A system and method for the use of sensors and processors of existing, distributed systems, operating individually or in cooperation with other systems, networks or cloud-based services to enhance the detection and classification of sound events in an environment (e.g., a home), while having low computational complexity. The system and method provides functions where the most relevant features that help in discriminating sounds are extracted from an audio signal and then classified depending on whether the extracted features correspond to a sound event that should result in a communication to a user.
Google Llc

Method and providing goal oriented navigational directions

A method or system is able to refine global positioning system (“gps”) information for guiding a vehicle via extracted metadata using a gps refinement (“gr”) model managed by a virtuous cycle containing sensors, machine learning center (“mlc”), and a cloud based network (“cbn”). The gr system includes a set of outward facing cameras, a vehicle onboard computer (“voc”), and gr model.
Surround.io Corporation

Method of solar power prediction

Techniques for estimating direct and diffuse sunlight reaching a location as a function of time using color whole sky images are provided. In one aspect, a method for forecasting solar insolation is provided that includes the steps of: obtaining color whole sky images using a digital camera which are taken at different times, and wherein an image of a solar disk is present in at least one of the color whole sky images; creating sky transparency images from the color whole sky images; determining atmospheric solar scattering based on a width of the solar disk in the color whole sky images; determining cloud motion trajectories from a time series of the sky transparency images; and calculating the solar insolation as a function of time using the sky transparency, the atmospheric solar scattering, and the cloud motion trajectories.
International Business Machines Corporation

Devices and methods for providing depth mapping with scanning laser image projection

Devices and methods are described herein for combining image projection with surface scanning. In general, the devices and methods utilize at least one source of laser light to generate a laser beam, and scanning mirror(s) that reflect the laser beam into a pattern of scan lines.
Microvision, Inc.

Media content rendering method, user equipment, and system

The present disclosure discloses a media content rendering method. The method is applied in a user equipment (ue) in a rendering system.
Huawei Technologies Co., Ltd.

Data collection system and data transfer device thereof

A data collection system includes a data transfer device which is attached between a data transmitter device and a data receiver device, takes a copy of the data instantaneously passing therebetween, sends the same to the cloud platform over the gprs, and provides reporting of the data collected in the cloud platform. In particular, a data transfer device which is positioned to the retail points of sales, can collect sales information of the product instantaneously in the digital media, in the real time, is attached between the barcode reader and the computer/cash register/pos system, characterized by taking a copy of the data while the data read through the barcode reader is being transferred to the computer/cash register/pos system, sending the same to the cloud platform instantaneously and reporting the data collected in the cloud platform..
Trendbox Bulut Bilisim Hizmetleri A.s.

Trackable battery apparatus and tracking same

A trackable battery apparatus (100) is provided with a control module (10); a power supply module (20) including a battery (21) for supplying power to the battery apparatus (100); a battery identification module (30) for generating an identification code (n) for identifying the battery apparatus (100); a battery tracking module (40) including a voltage sampling circuit (41) and a transient current control circuit (42) electrically connected to the battery (21) for generating a transient current wherein the voltage sampling circuit (41) samples an available capacity (h0) of the battery (21) on date of production, and an aging index (ax) is obtained by comparing the available capacity (h0) of the battery (21) on date of production to an available capacity of the battery (21) at a time of use; and an input/output (i/o) module (50) which sends the aging index (ax) and the identification code (n) to a cloud database (70).. .

System, method and recording medium for causality analysis for auto-scaling and auto-configuration

Similar to other cloud service, solution as services over cloud, as single tenant technology, also requires support of agility and flexibility as a fundamental feature of cloud computing. Different from other cloud services, the agility and flexibility typically are not triggered by the typical performance metrics, but at the business level of metrics.
International Business Machines Corporation

Method and providing driver information via audio and video metadata extraction

A method and/or system is able to provide driver fingerprint via metadata extraction managed by a driver rating (“dr”) model trained by a machine learning center (“mlc”) coupled to a cloud based network (“cbn”). In one embodiment, a dr system includes a set of outward facing cameras, a set of inward facing cameras, and a vehicle onboard computer (“voc”).
Surround.io Corporation

Method and providing information via collected and stored metadata using inferred attentional model

A method and/or system is able to improve vehicle safety via metadata extraction by an inferred attentional (“ia”) model trained by a virtuous cycle containing sensors, machine learning center (“mlc”), and cloud based network (“cbn”). In one aspect, the system includes a set of outward facing camera, inward facing cameras, and vehicle onboard computer (“voc”).
Surround.io Corporation

Secure public cloud

A method, system, computer-readable media, and apparatus for ensuring a secure cloud environment is provided, where public cloud services providers can remove their code from the trusted computing base (tcb) of their cloud services consumers. The method for ensuring a secure cloud environment keeps the virtual machine monitor (vmm), devices, firmware and the physical adversary (where a bad administrator/technician attempts to directly access the cloud host hardware) outside of a consumer's virtual machine (vm) tcb.
Intel Corporation

Multi-modal memory hierarchical management for mitigating side-channel attacks in the cloud

Techniques for preventing side-channel attacks on a cache are provided. A method according to these techniques includes executing a software instruction indicating that a portion of software requiring data protection is about to be executed, setting the cache to operate in a randomized mode to de-correlate cache timing and cache miss behavior from data being processed by the portion of software requiring data protection responsive to the instruction indicating that the portion of software requiring data protection is about to be executed, executing the portion of software requiring data protection, storing the data being processed by the portion of software requiring data protection, and setting the cache to operate in a standard operating mode responsive to an instruction indicating that execution of the portion of software requiring data protection has completed..
Qualcomm Incorporated

Automated cloud image processing and routing

Example systems, methods and computer program products for cloud-based, anatomy-specific identification, processing and routing of image data in a cloud infrastructure are disclosed. An example method includes evaluating, automatically by a particularly programmed processor in a cloud infrastructure, image data to identify an anatomy in the image data.
General Electric Company

Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform

Systems and methods for maintaining and updating file system shadows by a synchronization client of a cloud-based platform. In some embodiments, an executor of the synchronization client can execute an action on an item in the local file system which changes the state of the item from an old state to a new state.
Box, Inc.

Secured cloud storage broker with enhanced security

An apparatus includes a memory and a processor of a secured cloud storage broker (scsb) coupled to the memory. The processor is configured to perform the steps of: receiving a request from a user to deposit data; confirming whether the user provides appropriate credentials; authenticating the request; generating a first unique combination of an internet storage provider id, a subscription account, a storage location, a storage account, and a file directory; generating a second unique combination of a file id, an encryption algorithm, and a key; encrypting the data using the encryption algorithm and the key; and sending the encrypted data to the file directory for storage..
Unisys Corporation

Automatically detecting distributed concurrency errors in cloud systems

A method for detecting distributed concurrency errors in a distributed cloud computing system includes tracing operations that access objects in functions involving inter-process messaging, applying a set of happens-before rules to the traced operations. Analyzing the traced operations to identify concurrent operations that access a common object to generate a list of potential distributed concurrency errors (dcbugs).
The University Of Chicago

Cloud rules and alerting framework

Systems, methods, and computer-readable media having computer-executable instructions embodied thereon for providing cloud rules and an alerting framework are provided. In embodiments, one or more rules associated with one or more healthcare information systems are received.
Cerner Innovation, Inc.

Social objectives-based workload resolution in a cloud environment

A content of a social media data is analyzed. The social media data relates to a workload that is to be located on a node.
International Business Machines Corporation

Cloud based platform simulation for management controller development

Certain aspects direct to systems and methods for cloud based platform simulation on virtual machine for development projects of a management controller. The system includes a cloud network, which include necessary computing resources to provide at least one virtual machine (vm), such that the at least one vm is accessible on the cloud network to simulate a management controller and a host computing device for the management controller.
American Megatrends, Inc.

Workload placement in a hybrid cloud environment

An application is deployed on a first cloud from a set of clouds in a hybrid cloud environment. A simulator is deployed on each cloud in the set.
International Business Machines Corporation

Methods for managing the life cycle of a cloud application using a plurality of cloud infrastructures

Some embodiments are directed to a collaborative platform for managing the life cycle of a cloud application, the collaborative platform including means configured to define, in the form of code, a plurality of requirements of the cloud application, in terms of cloud infrastructures.. .
Fastconnect

Interactive keyword cloud

Merchant/consumer calls may be recorded and evaluated according to a variety of criteria. The call recordings and analyses thereof, as well as consumer tracking information, may be displayed in a user interface of a web-based online portal for convenience in evaluating the use and efficacy of marketing channels as well as the quality of merchant/consumer interactions.
Patient Prism Llc

Automated display configuration

Systems, methods and tools for automatically configuring multiple display devices. The systems tools and methods automatically determine the user of the display device, a user's display device preferences, collect feedback, user context and information of the surrounding environment as the display devices are used by the user and continuously adjust the display device settings based on the user's interactions with the display device to better optimize the user's experience with the display device.
International Business Machines Corporation

Printing apparatus, control printing apparatus, and storage medium

A printing apparatus that receives print data from a cloud server providing print service and performs printing transmits a request to register the printing apparatus to the cloud service to the cloud server providing the print service and stores information related to an id of a user who has logged in the printing apparatus in association with information related to a print service account used in the registration after accepting the request for the registration.. .
Canon Kabushiki Kaisha

Devices and methods for adjustable resolution depth mapping

Devices and methods are described that provide for scanning surfaces and generating 3-dimensional point clouds that describe the depth of the measured surface at each point. In general, the devices and methods utilize scanning mirror(s) that reflect a laser beam into a pattern of scan lines.
Microvision, Inc.

System for visual obscuration of an object and dissipating energy of a laser weapon

A visual obscurant system for obscuring object from an observer having a field of view (fov) is disclosed. The system comprises a sensor for detecting characteristics that indicate a presence of the object, a light source for emitting light in an electromagnetic spectrum, a source, and a controller.
The Boeing Company

Pvoh dispersant for vcm polymerization

Dispersing agents useful in a suspension polymerization process may be formed based on polyvinyl alcohols and processes discloses herein. The dispersing agent may include, for example: a polyvinyl alcohol having a degree of hydrolysis in the range from 60 to 80 mol %; an absorbance of not less than 0.3 measured at a wavelength of 320 nm with respect to a 0.1 wt % aqueous solution of the polyvinyl alcohol; a block character of remaining ester groups in the range from 0.4 to 0.5; and a cloud point in the range from 35° c.
Sekisui Specialty Chemicals America, Llc

Method and providing automatic mirror setting via inward facing cameras

A method or system is able to adjust an exterior mirror of a vehicle via an automatic mirror-setting (“am”) model managed by a virtuous cycle containing a cloud based network (“cbn”). The system includes a set of mirrors, a set of inward facing cameras, a vehicle onboard computer (“voc”), and am module.
Surround.io Corporation

Robotic camera system

A robotics camera system includes a camera robot that is in wireless communication with a robot cloud server through a cloud network such as the internet. A user having a mobile device desires to utilize a particular camera robot.
Accel Robotics Corporation

Moisture removal from wet gases

Methods of reducing the water content of a wet gas are presented. In one case, the method includes exposing the gas to an amine-terminated branched polymer solvent to remove a substantial portion of the water from the wet gas, exposing the diluted solvent to carbon dioxide to phase separate the solvent from the water, and regenerating the solvent for reuse by desorbing the carbon dioxide by the application of heat.
Nrgtek, Inc.

Game state save, transfer and resume for cloud gaming

A system and method of pausing a game in a cloud gaming system including playing a game on a first game computer included in the cloud gaming system, pausing the game at a selected point in the game and capturing game state data for the paused game. The paused game can be resumed by retrieving the game state data and applying the game state data to a selected game computer and resuming the game at the selected point in the game on the selected game computer..
Sony Interactive Entertainment America Llc

Smart equipment with bidirectional diagnosis and therapy device

The present invention is a smart equipment with bidirectional diagnosis and therapy device, comprising a power supply unit used for providing each unit with required power, a high-voltage diagnosis and therapy unit provided for diagnosis and therapy as well as electronic acupuncture and sending back a diagnosis and therapy signal, an input and display unit provided for inputting operation commands and displaying related image, a wireless transmission unit provided for connecting to a cloud database wirelessly, a magnetic disk installed with program being loaded with application software for processing the diagnosis and therapy signal correspondingly, and a microprocessor used for processing related operation. Thereby, the present invention enables the user to manipulate the high-voltage diagnosis and therapy unit for diagnosis and therapy via the input and display unit according to suggestion from application software.
Inno Health Technology Co., Ltd.

Method and device for determining user relationship

The present invention relates to a control method for screens and flashlights of multiple mobile phones. The method comprises: transmitting, by an app server, control information to a cloud information push server; afterwards, pushing the control information into mobile phones with an application; after receiving, by the mobile phones, the control information, acquiring activity information of an activity to be attended, and transmitting the information to the push server; after receiving, by the server, the activity information, acknowledging; on the day of the activity, and pushing, by the push server, information to users of the multiple mobile phones to remind the multiple users to open the application, and constantly synchronizing, by the mobile phones, data with the server in the background to control the screens of the mobile phones to display and play images and animation specified by the activity.
Light Up Technology Group Limited

5g cloud ran symbol by symbol bit streaming

An exemplary method includes determining, at a centralized processing apparatus of a wireless network, a first subset of downlink user plane data corresponding to one or more wireless user equipments at least by calculating input data required at each of one or more l1 phy processing stages of a remote processing apparatus, wherein the first subset includes bits required by a remote processing apparatus to select a first symbol for transmission to the one or more user equipments at a first time slot; and streaming, via a fronthaul interface, the bits of the first subset followed by bits of one or more further subset of downlink user plane data, wherein the bits of the further subset of user plane data includes only the bits required to select by the remote processing apparatus a next symbol for transmission to the one or more of the wireless user equipments at a next time slot immediately following the first time slot.. .
Nokia Technologies Oy

Systems and methods for establishing wireless connections based on access conditions

The subject matter described herein includes managing access conditions and determining which access point to use by a wireless device based on terms and conditions (tcs) for allowing access (tcsaa) and terms and conditions for utilizing access (tcsua) provided and updated by various parties in a system for alternative network access provision (anaps) comprising of a cloud based server system and a wireless device and its connection manager software system. The tcs may depend on a number of variables including one or more of the following: price, availability, relative signal strengths and communication speeds of different cellular base pay and or access points and connections through the stations or access points to the internet or other backend systems, the location and possible motion of the device, the time of day, week, month or year as well as the cost of communication alternatives..
Bandwidthx Inc.

Lte gateways for home and commercial sensor data

Aspects of the subject disclosure may include, for example, a device that receives data from a machine-type communication (mtc) device located at a premises, determines an identifier for the mtc device; compares the identifier with a list of identifiers; and, responsive to determining that the mtc device is a listed device, transmits the data to a first network element remote from the premises. The device and the first network element do not receive data from devices at the premises generating human traffic communications (htc).
At&t Mobility Ii Llc

Method and system of multi-terminal mapping to a virtual sim card

A multi-terminal mapping system associated with a virtual sim card and the associated method is disclosed. The disclosed system includes a terminal device, a cloud for storing one or more virtual sim cards, and a server.
Huizhou Tcl Mobile Communication Co.,ltd

Facilitating user interactions based on proximity

Techniques are described for providing location-based information and functionality to people and computing devices in various ways. In at least some situations, the techniques include enabling multiple people in a common geographic area to interact in various ways, such as via devices capable of communications (e.g., cellular telephones, computing devices with wired and/or wireless communications capabilities, etc.).
Groupon, Inc.

Managing user state of cloud desktops

A mechanism is described for provisioning remote desktops in a cloud based infrastructure while maintaining user personalization. In cloud based systems, a user may not always reconnect to the same vm endpoint.
Microsoft Technology Licensing, Llc

Cloud service utilization

Cloud services may be utilized by implementing an i/o hook that can intercept a data access from an application, migrating data accessed by the application to a cloud server that provides a cloud service, receiving, from the i/o hook, a data access intercepted from the application, and redirecting the intercepted data access to the cloud server.. .
International Business Machines Corporation

Cloud data transmission system and dynamic data flow decentralizing method thereof

A cloud data transmission system, comprising a static relay server, a dynamic relay server and a cloud server. The static relay server facilitates a plurality of user devices to conduct peer-to-peer data transmission.
Universal Scientific Industrial ( Shanghai ) Co., Ltd.

Inter-telecommunications edge cloud protocols

A first telecommunications edge cloud (tec) element deployed between a client and a packet network includes a tec hardware layer including storage resources, networking resources, and computing resources, wherein the computing resources include a plurality of processors. The networking resources are configured to transmit a first general update message to a plurality of second tec elements within a federation, transmit a first application-specific update message to the second tec elements within the federation, and receive a plurality of second update messages from the second tec elements that are associated with the federation.
Futurewei Technologies, Inc.

Cloud service utilization

Cloud services may be utilized by implementing an i/o hook that can intercept a data access from an application, migrating data accessed by the application to a cloud server that provides a cloud service, receiving, from the i/o hook, a data access intercepted from the application, and redirecting the intercepted data access to the cloud server.. .
International Business Machines Corporation

Method for detecting abnormal load in cloud computing oriented online service

Disclosed are a method and device for detecting an abnormal load. The method includes: collecting data of each load item in all hosts; pre-processing to obtain a second sequence corresponding to each load item; obtaining a coefficient matrix and a detail vector; computing a weighted mean of abnormal load probabilities of all the coefficient vectors, to obtain an abnormal load probability of each second sequence; comparing the abnormal load probability with a confidence interval, and judging whether there is an abnormal load, and judging that there is no abnormity in the corresponding second sequence if the abnormal load probability of each second sequence is in the confidence interval; judging whether there is an abnormal load according to data of all load items and the abnormal load probability of each second sequence; and finding a bearing host that has the abnormal load from the current online service..
Tsinghua University

Cloud computing for mobile client devices

Apparatuses, methods and storage medium associated with cloud computing for mobile client devices are disclosed herein. In embodiments, a cloud server may include one or more processors, and a mobile computing operating system to host execution of an application.
Intel Corporation

Data access method based on cloud computing platform, and user terminal

A data access method based on a cloud computing platform, and a user terminal, are provided. The method is performed by a user terminal, and the method includes obtaining an access request for a data ciphertext of the cloud computing platform, the access request including a decryption key, and the decryption key including a user precise identity identifier and a user attribute identifier.
Hunan University

Service discovery for a multi-tenant identity and data security management cloud service

A system provides cloud-based identity and access management. The system receives a request for an identity management service, authenticates the request, and forwards the request to a microservice configured to perform the identity management service, where the microservice is implemented by a microservice virtual machine provisioned by a provisioning framework, and the forwarding is according to routing information configured based on metadata information stored in a registry by the provisioning framework.
Oracle International Corporation

Method and system for enhanced validation of cryptograms in cloud-based systems

A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of formatting templates, each template being associated with an account number length; receiving a selection indicating a specific primary account number; identifying a specific formatting template where the associated account number length corresponds to a length of the specific primary account number; receiving an unpredictable number from a point of sale device; generating a cryptogram based on at least the unpredictable number and one or more algorithms; generating a data string, wherein the data string includes at least the generated cryptogram, the specific primary account number, and the unpredictable number, and wherein the data string is formatted based on the identified specific formatting template; and electronically transmitting the generated data string to the point of sale device.. .
Mastercard International Incorporated

Wireless authentication of recyclable logistics apparatus

The present invention relates to wireless authentication method and device of recyclable logistics apparatus, the recyclable logistics apparatus comprises a wireless beacon unit which periodically transmits a broadcast frame, the broadcast frame at least includes a unique identity of the wireless beacon unit, and the method comprises the following steps: first mobile terminal receives the broadcast frame and uploads collected first frame information as first upload information to a cloud server, the cloud server generates authentication information according to an authentication rule; the cloud server associates the first upload information with the authentication information and stores them in a database; and the cloud server transmits the authentication information to second mobile terminal, the second mobile terminal also receives the broadcast frame and through the authentication information, collected second frame information is compared with the first frame information which is associated with the authentication information so as to complete delivery. Through the present invention, a user only needs a mobile terminal to automatically receive a broadcast frame to complete an identification operation, and authentication of a cloud server ensures security, thus it is simple to operate, has low cost and high security..
Shanghai Hongyan Returnable Transit Packagings Co., Ltd

Trust establishment to deploy servers in data centers

In one example, a system is disclosed, which may include a network device, a new server connected to the network device, and a management server communicatively connected to a cloud-based service and the network device. The management server may include a server deployment engine to discover the new server in the system using the network device, obtain an encrypted data blob associated with the new server from the cloud-based service, establish a trust, via a secure protocol, with the new server using the encrypted data blob, and deploy the new server in the system upon establishing the trust with the new server..
Hewlett Packard Enterprise Development Lp

Caching framework for a multi-tenant identity and data security management cloud service

A system provides cloud-based identity and access management. The system receives a request from a client for a resource, authenticates the request, and accesses a microservice based on the request.
Oracle International Corporation

Secure private location based services

Representative embodiments disclose unique mechanisms to use beacons to provide access to cloud services. In order to access the cloud services a user presents a beacon identifier obtained from a beacon in geographic proximity to a user device used by the user.
Microsoft Technology Licensing, Llc

Treatment of cloud-based and local attachments in communication applications

Users of communication applications may be enabled to select from a user-friendly and efficiently provided list of files that may be of interest to them to attach to a correspondence and send to one or more recipients. For example, the communication application may retrieve information from one or more application programming interfaces (apis) associated with applications of the user to determine the list of files.
Microsoft Technology Licensing, Llc

Distributed network address translation for efficient cloud service access

A method for coordinating distributed network address translation (nat) in a network within which several logical networks are implemented. The logical networks include several tenant logical networks and at least one service logical network that include service virtual machines (vms) that are accessed by vms of the tenant logical networks.
Nicira, Inc.

Managing a cloud service

A technique includes providing at least one service blueprint to orchestrate application programming interfaces to manage the lifecycle of at least one cloud service.. .
Hewlett Packard Enterprise Development Lp

System, providing improved performance of aggregated/bonded network connections with cloud provisioning

A network system for improving network communication performance is disclosed. The system includes 1) at least one network bonding/aggregation computer system that includes: (i) at least one client site network component bonding or aggregating one or more diverse network connections; and (ii) at least one network server component configured to interoperate with the client site network component; and 2) a cloud-based network manager that includes: a data collection utility, a network performance analysis utility, and a network configuration utility..
Teloip Inc.

Scope-based certificate deployment

The techniques described herein facilitate scope-based certificate deployment for secure dedicated tenant access in multi-tenant, cloud-based content and collaboration environments. In some embodiments, a method is described that he includes receiving an incoming authentication request from an access system, wherein the authentication request includes metadata, extracting the metadata from the authentication request, and processing the metadata to identify a tenant corresponding to the request.
Microsoft Technology Licensing, Llc

Key store service

A key store microservice is provided for a cloud based identity management system. The key store microservice receives, over a network, a request from a client application to retrieve a key, the request including a tenancy identifier, and determines whether the key is present in a tenant specific memory cache associated with the tenancy identifier.
Oracle International Corporation

Vehicle-to-pedestrian communication systems

Vehicle-to-pedestrian information systems that use directional sound transmission on autonomous vehicles are disclosed. A cloud computing system manages messages for transmission to pedestrians via autonomous vehicles having directional speakers.
Nio Usa, Inc.

Point cloud data hierarchy

A system comprises a storage system comprising data representing a point cloud comprising a very large number of associated points; a controller operatively coupled to the storage cluster and configured to organize the data into an octree hierarchy of data sectors, each of which is representative of one or more of the points at a given octree mesh resolution; and a user interface through which a user may select a viewing perspective origin and vector, which may be utilized to command the controller to assemble an image based at least in part upon the selected origin and vector, the image comprising a plurality of data sectors pulled from the octree hierarchy, the plurality of data sectors being assembled such that sectors representative of points closer to the selected viewing origin have a higher octree mesh resolution than that of sectors representative of points farther away from the selected viewing origin.. .
Willow Garage, Inc.

Method and system for providing inter-cloud services

The present application is directed to a distributed-services component of a distributed system that facilitates multi-cloud aggregation using a cloud-connector server and cloud-connector nodes that cooperate to provide services that are distributed across multiple clouds. These services include the transfer of virtual-machine containers, or workloads, between two different clouds and remote management interfaces..
Vmware, Inc.

Online transaction efficiency improvement system

Embodiments of the invention are directed to a system, method, or computer program product for generating communicable linkages that collectively provide a cloud-based dynamic credential selection and implementation system. The system generates a user profile containing user preferences, historic trends, and user resources based on information collected from a user and user associated accounts.
Bank Of America Corporation

Dynamic credential selection and implementation system

Embodiments of the invention are directed to a system, method, or computer program product for generating communicable linkages that collectively provide a cloud-based dynamic credential selection and implementation system. The system generates a user profile containing user preferences, historic trends, and user resources based on information collected from a user and user associated accounts.
Bank Of America Corporation

Inherent artificial intelligence contactless and self-organizing sensing co-processor system interacting with objects and peripheral units

Disclosed is a contactless powered and operated self-organizing sensing co-processor system for interacting with an object and one or more peripheral units. The system communicates with a communicating device over a communication network.

Solar forecasting using machine learned cloudiness classification

Methods and systems for predicting irradiance include learning a classification model using unsupervised learning based on historical irradiance data. The classification model is updated using supervised learning based on an association between known cloudiness states and historical weather data.
International Business Machines Corporation

Intelligent credential selection system

Embodiments of the invention are directed to a system, method, or computer program product for generating communicable linkages that collectively provide a cloud-based dynamic credential selection and implementation system. The system generates a user profile containing user preferences, historic trends, and user resources based on information collected from a user and user associated accounts.
Bank Of America Corporation

Patient directed data synchronization of electronic health records using a patient controlled health record

A system and method that facilitates the automated replication of electronic medical record information between a patient and a health-care provider (hcp), such as a doctor, pharmacy, drug manufacturer, biologic manufacturer, or medical device manufacturer. The system uses: a cloud-based infrastructure that includes databases, mathematical models, and configuration information; a patient's electronic health record system providing personal data around a patient's individual personal electronic health record (pehr); and a server used to coordinate and authenticate the replication of data between the cloud-based infrastructure, the pehr, and the ehr system, of the hcp.
Umbra Health Corporation

Building scan window detection

Methods for detecting a windows in a building utilizing a building scan using an electronic computing device are presented, the methods including: causing the electronic computing device to receive the building scan; processing the building scan; detecting the windows based on no return transparency of portions of the building scan; and incorporating the detected windows into a 3d model corresponding with the building scan. In some embodiments, processing the building scan generates at least the following: a colored point cloud; a 2d floor plan of the building; and a walked path.
Indoor Reality

Retainment of locally deleted content at storage service by client device

Cloud-based storage services are provided for storing and/or sharing content across multiple devices, where the content is periodically synchronized between the devices and the storage service. Embodiments are directed to retainment of locally deleted content at the storage service to prevent accidental or nefarious deletions of locally stored content on a device from being propagated to the storage service.
Microsoft Technology Licensing, Llc

Detection of bulk operations associated with remotely stored content by client device

Cloud-based storage services are provided for storing and/or sharing content across multiple devices, where the content is periodically synchronized between the devices and the storage service. Embodiments are directed to detection of bulk operations associated with content stored at a storage service to protect users both proactively and remedially from accidental and/or nefarious content alterations propagating to the storage service and/or other devices.