Abstract: A batch process operates on structured data in multiple tables, including a first and a second source table, and a first and a second processing table. An additional key is added within each natural key to at least the second source and processing table for identifying a sequence of rows for updating.
Abstract: A system, method, device, and platform. The system includes electronic devices that execute a data application. The data application determines investment information associated with the user. A data platform accessible by the electronic devices through one or more networks executes the data application to receive the investment information for the user, tokenize the investment information in one or more blockchain tokens, reconcile the investment information with the available advertising data, create targeted advertisements based on the one or more blockchain tokens and available advertising content, and communicate the targeted advertisements to the user through one ore more consumer electronic devices.
Type:
Application
Filed:
March 25, 2022
Publication date:
July 7, 2022
Applicant:
Data Vault Holdings, Inc.
Inventors:
Alfred Blair Blaikie, III, Nathaniel T. Bradley, Joshua S. Paugh
Abstract: A computing system can be configured to perform operations in a define phase including receiving a component specification including a transformation function; inputting the component specification into a define function; receiving, as an output of the define function, the factory function; and receive data describing a second software component that satisfies the component specification of the first software component. In an assembly phase after the define phase, the computing system can input, into the factory function, the first software component and the second software component; and receiving, as an output of the factory function, the assembled software system including the first software component connected with the second software component according to the component specification of the first software component.
Abstract: A system and method for replicating a file system. The method includes: copying a portion of the file system from a first storage, wherein the at least a portion of the file system includes underlying data and metadata, wherein the metadata includes pointers to the underlying data and metadata defining a file system hierarchy; partitioning the copied data of the file system into a plurality of blobs, wherein the plurality of blobs includes a plurality of data blobs and a plurality of metadata blobs, wherein each data blob includes at least one portion of the underlying data; generating a plurality of filter objects based on the copied data, wherein each filter object includes a list of metadata blobs; and storing the plurality of blobs and the plurality of filter objects in a second storage.
Type:
Grant
Filed:
October 27, 2020
Date of Patent:
July 5, 2022
Assignee:
Vast Data Ltd.
Inventors:
Vladimir Zdornov, Asaf Levy, Asaf Weissman, Or Dahan, Hillel Costeff
Abstract: A method of performing block generation may include receiving a request from one or more sources that includes task data associated with one or more tasks for an economy, context information, and an indication of a blockchain of a blockchain matrix to which the task data pertains. The method includes determining whether the task data corresponds to a qualifying transaction for the economy for recording in the blockchain and, if so, determining whether to approve recordation of the qualifying transaction to the blockchain. In response to approving recordation of the transaction, generating a new block for the blockchain that includes the qualifying transaction, and adding the new block to the blockchain.
Abstract: A threat detection system for industrial controllers, comprising: at least one Programmable Logic Controller (PLC); at least one physical device connected with the PLC; a Deterministic Fictitious Programmable Logic Controller (DFPLC) deterministically programmed to respond with at least one predetermined signal to at least one input signal received; and a monitoring unit connected with the DFPLC; the DFPLC disguised as a PLC; and the monitoring unit configured to send at least one input signal to the DFPLC, receive at least one response from the DFPLC and communicate at least one alert upon the at least one response being other than an expected response according to the deterministic programming of the DFPLC.
Abstract: Techniques are disclosed relating to data management. A computer system may evaluate network traffic to extract and group data objects based on their content satisfying similarity criteria, and to identify baseline behavior with respect to those data objects. The computer system may generate data-defined network (DDN) data structures that include a content class and one or more behavioral classes. The content class may be indicative of one or more of the data objects that have been grouped based on them satisfying the similarity criteria. The one or more behavioral classes may indicate baseline behavior of those data objects within the content class as determined from evaluation of the network traffic. The computer system may detect, using the DDN data structures, anomalous data behavior within network traffic. In response to detecting anomalous data behavior, the computer system may prevent network traffic corresponding to the anomalous data behavior from being communicated.
Abstract: A method for testing medical data is provided. Each medical datum includes a plurality of information units and a plurality of separators, and the method includes the following steps: a. matching the medical data against a standard library including a plurality of patterns, a matching expression being: [\s\S][number/sequence/relation]&[\b|\B] (S101); and b. determining, based on a matching result of the step a, whether the medical datum is qualified (S102). A standardized standard library is first established, a matching result is obtained by matching the medical datum and the standard library for a non-initial boundary, an initial boundary, an information quantity, information sequences, a semantic relationship quantity, a character boundary, and a non-character boundary, and whether the medical datum meets a requirement is further determined according to the matching result.
Type:
Application
Filed:
July 17, 2020
Publication date:
June 30, 2022
Applicant:
SHANGHAI MINGPIN MEDICAL DATA TECHNOLOGY CO., LTD.
Abstract: A secure programming system can receive a job control package having a security kernel and a target payload of content for programming into a pre-defined set of trusted devices. A device programmer can install a security kernel on the trusted devices and reboot the trusted devices using the security kernel to validate the proper operation of the security kernel. The target payload can then be securely installed on the trusted devices and validated.
Type:
Grant
Filed:
June 2, 2020
Date of Patent:
June 28, 2022
Assignee:
Data I/O Corporation
Inventors:
Rajeev Gulati, David R. Christie, Edwin R. Musch, Benjamin M. Deagen
Abstract: Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a respective rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the respective rack. A request is received, from a client device via a portal of the data center, to provide IP connectivity to one or more computing devices mounted in a rack. IP addresses are assigned that correspond to the IP connectivity. A virtual network is created in a network fabric of the data center. The created virtual network is associated with the assigned IP addresses. One or more of the TOR switches are configured to connect one or more ports of each respective TOR switch to the created virtual network.
Type:
Grant
Filed:
November 26, 2019
Date of Patent:
June 28, 2022
Assignee:
Cyxtera Data Centers, Inc.
Inventors:
Jason Anthony Lochhead, Manikandan Subramanian, David Hess, Michael Andra Ballard, Adam Scott Wayne
Abstract: Top-of-rack (TOR) switches are connected to a network fabric of a data center. Each TOR switch corresponds to a respective rack of the data center, and is configured to provide access to the network fabric for computing devices mounted in the respective rack. A request is received, from a client device via a portal, to configure a first rack of the data center. Configuration data is received, from the client device, for a first virtual network to be accessed by a first computing device mounted in the first rack. In response to receiving the configuration data, a first TOR switch of the first rack is configured, which includes associating the first virtual network with the first TOR switch.
Abstract: A method and system for scanning claims data, the method comprising receiving, by a computing system, contract details associated with claims, receiving, by the computer system, prescription transactions data associated with the claims, parsing, by the computer system, the transactions data into column values, and executing, by the computer system, analytics on the parsed transactions. The analytics include comparing the parsed transactions against the contract details for accurate pricing, fees, and accepted treatment protocols concerning dose and quantity, comparing the parsed transactions with independent pricing data that is based on third-party pricing data and drug information, identifying material errors in the parsed transactions, determining withholdings from payment of the claims for a portion above a tolerance level based on the identified material errors. The method further comprising presenting, by the computer system, results of the execution of the analytics to a portal.
Type:
Grant
Filed:
March 27, 2018
Date of Patent:
June 28, 2022
Assignee:
HEALTHPLAN DATA SOLUTIONS LLC
Inventors:
Gary Rutherford, Michael Blevins, Jarrod Grossman, Douglas Bell, Detlef Sarbok, Jeff Rabe
Abstract: Techniques are disclosed relating to data management. A computer system may evaluate network traffic to extract and group data objects based on their content satisfying similarity criteria, and to identify baseline behavior with respect to those data objects. The computer system may generate data-defined network (DDN) data structures that include a content class and one or more behavioral classes. The content class may be indicative of one or more of the data objects that have been grouped based on them satisfying the similarity criteria. The one or more behavioral classes may indicate baseline behavior of those data objects within the content class as determined from evaluation of the network traffic. The computer system may detect, using the DDN data structures, anomalous data behavior within network traffic. In response to detecting anomalous data behavior, the computer system may prevent network traffic corresponding to the anomalous data behavior from being communicated.
Abstract: A method for hierarchical workload allocation in a storage system, the method may include determining to reallocate a compute workload of a current compute core of the storage system; wherein the current compute core is responsible for executing a workload allocation unit that comprises one or more first type shards; and reallocating the compute workload by (a) maintaining the responsibility of the current compute core for executing the workload allocation unit, and (b) reallocating at least one first type shard of the one or more first type shards to a new workload allocation unit that is allocated to a new compute core of new compute cores.
Type:
Grant
Filed:
June 16, 2021
Date of Patent:
June 21, 2022
Assignee:
VAST DATA LTD.
Inventors:
Avi Goren, Yogev Vaknin, Asaf Levy, Oded Sonin
Abstract: A system, method, and platform for performing transactions for data. The data is grouped. The data is associated with a platform. Transaction information for the data is received. One or more transactions are performed based on the transaction information. The verification of the transaction is provided.
Type:
Application
Filed:
March 27, 2020
Publication date:
June 16, 2022
Applicant:
Data Donate Technologies, Inc.
Inventors:
Alfred Blair Blaikie, III, Nathaniel T. Bradley, Joshua S. Paugh
Abstract: The present disclosure relates to the electronic document review field and, more particularly, to various apparatuses and methods of implementing batch-mode active learning for technology-assisted review (TAR) of documents (e.g., legal documents).
Type:
Grant
Filed:
January 10, 2020
Date of Patent:
June 14, 2022
Assignee:
LEGILITY DATA SOLUTIONS, LLC
Inventors:
Jeffrey A. Johnson, Md Ahsan Habib, Chandler L. Burgess, Tanay Kumar Saha, Mohammad Al Hasan
Abstract: When a first member transmits information on a network, a converted first hash code which includes a member ID of the first member is given. When a second member further transmits and diffuses the information transmitted from the first member, the converted previous first hash code which includes the member ID of the first member is associated with a converted second hash code which includes a member ID of the second member. When the still other member accesses the information transmitted by the second member, the second member is specified from the second hash code and the first member is specified from the first hash code associated with the second hash code.
Abstract: Described are methods, systems and computer readable media for computer data distribution architecture connecting an update propagation graph through multiple remote query processors.
Type:
Application
Filed:
September 20, 2021
Publication date:
June 9, 2022
Applicant:
Deephaven Data Labs LLC
Inventors:
Ryan Caudy, David R. Kent, IV, Charles Wright, Brian Ries, Radu Teodorescu
Abstract: Techniques are disclosed relating to sharing data. A first computer system may receive data shared by a second computer system to permit the first computer system to perform processing of the data according to a set of policies. The first computer system may instantiate a verification environment in which to process the shared data. The first computer system may process a portion of the shared data by executing a set of processing routines to generate a result based on the shared data. The verification environment may verify whether the result is in accordance with the set of policies. The verification environment may determine whether to output the result based on the verifying and may send an indication of an outcome of the determining to the second computer system. The indication may be usable to determine whether to provide the first computer system with continued access to the shared data.
Abstract: A system and method stores a database file into Flash memory or other write-constrained storage. The system and method can decompress the data to use to process a request by only decompressing data it determines, via metadata, might correspond to a criteria in the request.