Abstract: A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid).
Abstract: Described herein are techniques for facilitating push provisioning of a user payment source into a user's digital wallet without the user having a physical card. The techniques allow an issuer to provide a button in an issuer's application for the user to simply push the button to request that the payment source be imported into a pay wallet or a merchant. In this way, the payment source information is “pushed” into the pay wallet. Using push provisioning, the user need not enter any physical card information. The described techniques generate a chain of trust that can be used to ensure that a user, through an issuer and using a gateway, authorizes a token service provider to provision the payment source into the pay wallet or merchant.
Abstract: A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid).
Abstract: A system and method for using free space for recovering erasure coding data sets. The method includes segmenting at least one erasure coding data set into at least one stripe based on an erasure coding scheme, wherein each erasure coding data set includes chunks, wherein the chunks include chunks of systematic data and chunks of parity data; distributing the at least one stripe across non-volatile memory nodes based on the erasure coding scheme, wherein each non-volatile memory node is a unit of a non-volatile storage device; and upon a first failure of one of the non-volatile memory nodes: detecting that at least one of the non-volatile memory nodes that is not failed includes a first free space that does not currently store user data; and performing a first recovery process for recovering a first portion of the at least one erasure coding data set, based on the first free space.
Abstract: A method for changing an activation state of an interruption module for selectively interrupting at least one passive cathodic protection unit from a metallic structure. The method includes enabling a global positioning system (GPS) receiver in data communication with a controller of the interruption module, receiving GPS time via the GPS receiver from at least one global positioning system satellite in data communication therewith, synchronizing a real-time clock time of a real-time clock in data communication with the controller to GPS time, disabling the GPS receiver and changing the activation state of the interruption module if a predetermined activation state change time of the interruption module is between the local real-time clock time and the GPS time.
Type:
Grant
Filed:
November 8, 2022
Date of Patent:
January 30, 2024
Assignee:
Mobiltax Data Ltd.
Inventors:
Antonio Laranjo da Costa, Lucas Kiese Holzen, Philip James Daum
Abstract: Techniques and systems are provided for identifying a video segment displayed on a screen of a remote television system, and providing an option to switch to an alternative or related version of the video program that includes the video segment. For example, video segments displayed on a screen of a television system can be identified, and contextually-targeted content or contextually-related alternative content can be provided to a television system based on the identification of a video segment. The alternative or related version of the video program can include the currently displayed program in an on-demand format that can be viewed off-line and can be started over from a beginning portion of the program.
Abstract: A method for cache management in a hyperconverged infrastructure (HCI). The HCI includes a plurality of physical nodes (PNs). The method includes receiving a primary plurality of input/output (I/O) requests at a plurality of virtual machines (VMs), allocating a plurality of local caches (LCs) and a plurality of remote caches (RCs) to the plurality of VMs, receiving a secondary plurality of I/O requests at the plurality of VMs, and serving the secondary plurality of I/O requests. Each of the plurality of VMs runs on a respective corresponding PN of the plurality of PNs. The plurality of LCs and the plurality of RCs are allocated based on the primary plurality of I/O requests. The secondary plurality of I/O requests is served based on the plurality of LCs and the plurality of RCs.
Type:
Application
Filed:
July 25, 2023
Publication date:
January 25, 2024
Applicants:
High Performance Data Storage, Sharif University of Technology
Inventors:
Hossein Asadi, Mostafa Kishani Farahani, Saba Ahmadian Khameneh, Sina Ahmadi
Abstract: Provided are methods, devices, and computer-program products for determining an accuracy score for a device mapping system. In some examples, the accuracy score can be based on a device map of the device mapping system and viewing data from an automated content recognition component. In such examples, the accuracy score can indicate whether the device mapping system is assigning similar categories to devices that have similar player of media content. In some examples, a device map can be determined to be random, indicating that the device mapping system is inaccurate. In contrast, if the device map is determined to have a sufficiently low probability of being merely random in nature, the device mapping system can be determined to be accurate.
Abstract: A computer-implemented method of continuous restore for containerized applications includes initiating a continuous restore process for a containerized application having an application template and application data, where the containerized application executes on a first cluster. A backup plan for the containerized application is generated. A persistent volume containing the application data in the first cluster is identified and some of the application data is moved from the persistent volume to a backup target based on the backup plan schedule. The backup plan is received at a data synch process executing on a second cluster. A persistent volume is created on the second cluster. Some of the application data is moved from the backup target to the created persistent volume on the second cluster based on the backup plan schedule.
Type:
Grant
Filed:
September 15, 2021
Date of Patent:
January 23, 2024
Assignee:
Trilio Data, Inc.
Inventors:
Muralidhara R. Balcha, Prashanto Jairaj Kochavara, David Safaii
Abstract: Implementations described and claimed herein provide systems and methods for isolation detection. In one implementation, a radial acoustic log is obtained. The radial acoustic log is captured using a radial sensor of an acoustic logging tool deployed within a first structure. The first structure disposed within a second structure in a subterranean environment. A radial symmetry is determined using the radial acoustic log. An eccentricity of the first structure relative to the second structure is determined based on the radial symmetry.
Type:
Grant
Filed:
October 26, 2020
Date of Patent:
January 23, 2024
Assignees:
CONOCOPHILLIPS COMPANY, PIPELINES 2 DATA (P2D) LIMITED
Inventors:
Geoff Steel, Mark Walsh, Stephen John Mayo
Abstract: The invention relates to a method for storage of information and to an information storage medium with increased storage density by multi-bit coding.
Abstract: Various embodiments comprise systems and methods to indicate when errors occur in a data pipeline. In some examples, data monitoring circuitry monitors the operations of a data pipeline. The data monitoring circuitry ingests an output data set generated by the pipeline, compares the output data set to an expected output, identifies differences between the output data set and the expected output, and determines when the magnitude of the difference exceeds an error threshold. When the error threshold is exceeded, the data monitoring circuitry generates a graphical representation of the output data set, a graphical representation of the expected pipeline output, and an animated transition from the graphical representation of the expected pipeline output to the graphical representation of the output data.
Abstract: A system and method checks packetized data retrieved from a bus that is ordinarily considered reliable that was already error checked and/or corrected before being placed on the bus by applying a hash or checksum or other function to each packet to produce a packet checksum and then applying another function to the ordered packet checksums and comparing the result to one sent by the device that checked and/or corrected, and sent, the data packets.
Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Abstract: Disclosed embodiments include determining whether the insurance claim comprises an anomaly based on whether the claim violates a rule in a Rules Engine or is scored by an Artificial Intelligence/Machine Learning engine below a threshold. When the claim comprises an anomaly, (i) for each feature of the claim, (a) determining a sensitivity value of the feature relative to each other feature of the claim, and (b) determining a saliency value of the feature relative categories relevant to the claim, and (ii) estimating a value of the claim based on a multi-variate linear regression model. And based on the sensitivity values, saliency values, and estimated value, recommending one or more ways to cure the anomaly based on (i) a Local Interpretable Model-Agnostic Explanations based recommendation and/or (ii) a Global Surrogate Model based recommendation.
Abstract: A system designed for increasing network communication speed for users, while lowering network congestion for content owners and ISPs. The system employs network elements including an acceleration server, clients, agents, and peers, where communication requests generated by applications are intercepted by the client on the same machine. The IP address of the server in the communication request is transmitted to the acceleration server, which provides a list of agents to use for this IP address. The communication request is sent to the agents. One or more of the agents respond with a list of peers that have previously seen some or all of the content which is the response to this request (after checking whether this data is still valid).
Abstract: There is provided a distance measurement system in which a plurality of distance measurement sensors are installed to detect an object in a measurement area, the system including: a detection intensity distribution display device that performs quantification according to light intensities of light which reaches the object after being emitted from the distance measurement sensors, or point cloud numbers, and displays colors or lights and shades according to magnitudes of numerical values to perform visualization and a display. The detection intensity distribution display device regards a space in front of the distance measurement sensors as one cube, divides the cube into a plurality of small cubes (voxels), and quantifies a detection intensity according to the light intensity of the light that reaches each of the voxels after being emitted from the distance measurement sensors, or the point cloud number of each of the voxels.
Abstract: A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both.
Abstract: A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set of trusted devices. A device programmer can install a security kernel on the trusted devices and reboot the trusted devices using the security kernel to validate the proper operation of the security kernel. The target payload can then be securely installed on the trusted devices and validated.
Type:
Grant
Filed:
June 28, 2022
Date of Patent:
January 9, 2024
Assignee:
Data I/O Corporation
Inventors:
Rajeev Gulati, David R. Christie, Edwin R. Musch, Benjamin M. Deagen