Patents Assigned to ENTIT Software LLC
  • Publication number: 20190266140
    Abstract: A database having multiple data columns is disclosed. Whether metadata for the multiple data columns resides in multiple different metadata columns may be determined. If so, the metadata may be consolidated into a single consolidated metadata column.
    Type: Application
    Filed: April 30, 2015
    Publication date: August 29, 2019
    Applicant: ENTIT Software LLC
    Inventors: Eli Revach, Mordechai Lehrer, Amos Nesher, Elad Levi
  • Publication number: 20190222988
    Abstract: According to an example, a system may include an instance controller to manage service instances deployed on an infrastructure that facilitates data segregation and performance level compliance. The instance controller deploys a service instance of the service instances in a container and terminates the service instances in response to determining the service suite instance is idle based on the notification. Additionally, the system may deploy a component from the service instance from outside the container.
    Type: Application
    Filed: January 17, 2018
    Publication date: July 18, 2019
    Applicant: EntIT Software LLC
    Inventors: Stephane Herman MAES, Ulrich FEYER, Srikanth NATARAJAN
  • Publication number: 20190182167
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions executable by the processor to: access network traffic data pertaining to data flows among nodes in a network; partition the network traffic data into a plurality of windows; for each of the plurality of windows, aggregate data flows between pairs of nodes; compute a data distribution of each of the aggregated data flows; select a summary structure for each of the aggregated data flows based on the computed data distributions of the aggregated data flows; generate a summary of each of the aggregated data flows using the selected summary structures for the aggregated data flows; and store the generated summaries.
    Type: Application
    Filed: December 13, 2017
    Publication date: June 13, 2019
    Applicant: EntIT Software LLC
    Inventors: Abdul WASAY, Alkiviadis SIMITSIS, Martin ARLITT
  • Publication number: 20190103963
    Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Applicant: EntIT Software LLC
    Inventors: Cheryl HE, Timothy ROAKE, Luther MARTIN
  • Publication number: 20190103959
    Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Applicant: EntIT Software LLC
    Inventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
  • Patent number: 10242199
    Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.
    Type: Grant
    Filed: January 31, 2014
    Date of Patent: March 26, 2019
    Assignee: EntiT Software, LLC
    Inventors: Sasi Siddharth Muthurajan, Matias Madou, Prajakta Jagdale, Jeremy Brooks
  • Patent number: 10228936
    Abstract: Examples described relate to managing a software delivery pipeline. In an example, a modified software may be identified. Further, a modification in the modified software may be identified. Further, a type of the modification may be identified. Further, a stage of a software delivery pipeline management system may be identified based on the type of the modification. Further, the modified software may be placed in the identified stage of the software delivery pipeline management system.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: March 12, 2019
    Assignee: EntIT Software, LLC
    Inventors: Adarsh Suparna, Gajanan Rameshwar More, Paramjot Singh
  • Publication number: 20190065354
    Abstract: In some examples, a method includes accessing a test script configured to test an application at a target screen resolution and testing the application using the test script when a current screen resolution of the test system is different from the target screen resolution. The testing may include initializing a system web browser to run the application and overwriting a size parameter of the system web browser to cause a content window of the system web browser to display application content at the target screen resolution instead of the current screen resolution.
    Type: Application
    Filed: February 24, 2016
    Publication date: February 28, 2019
    Applicant: Entit Software LLC
    Inventors: Eyal JAKOV, Moshe Eran KRAUS, Shlomi NISSIM
  • Publication number: 20190068357
    Abstract: In some examples, floating point cohort based encryption may include determining an exponent of a floating point cohort.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Cheryl HE, Timothy ROAKE, Luther MARTIN
  • Publication number: 20190068736
    Abstract: In some examples, push control may include generation of a learning-based decision model based on analysis of data associated with historical usage of an application. For a request for content associated with usage of the application, the learning-based decision model may be analyzed to determine a next request for additional content expected to occur after the request for content. Further, a push operation may be performed to push the additional content associated with the next request to a source of the request for content.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Hashem NAARA, Michael RODOV, Amir DAVID
  • Publication number: 20190065465
    Abstract: According to an example, a system may receive a conversation with a first chatbot version through a messaging application, generate a first conversation file from the conversation, execute the first conversation file with a second chatbot version to generate a second conversation file, and compare the first conversation file with the second conversation file.
    Type: Application
    Filed: March 13, 2018
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Mihai CRISTIAN, Paul DAMIAN
  • Publication number: 20190065758
    Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
  • Publication number: 20190065357
    Abstract: In some examples, continuous integration and continuous deployment (CI/CD) system failure analysis and resolution may include analyzing data for a CI/CD system to identify anomalous tests related to the CI/CD system. A plurality of hypotheses on a cause of failure associated with the CI/CD system may be determined based on a further analysis of the analyzed data. The determined hypotheses may be prioritized based on a confidence level analysis. Failure resolution to prevent failure associated with the CI/CD system may be determine based on a response to one of the prioritized hypotheses. Further, the determined failure resolution may be implemented.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Gali BRAFMAN, Gil Baruch, Miroslav NOVAK
  • Publication number: 20190065626
    Abstract: According to examples, an apparatus may identify a first viewpoint that an entity expressed in a first media file, identify a second viewpoint expressed in a second media file that is attributed to the entity, determine that the second viewpoint is dissimilar to the first viewpoint and in response to the determination that the second viewpoint is dissimilar to the first viewpoint, may output a message.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Applicant: EntIT Software LLC
    Inventors: Pashmina CAMERON, Sean BLANCHFLOWER
  • Patent number: 10216776
    Abstract: An example process for aligning time-series datasets includes receiving a first time-series dataset and a second time-series dataset. The first time-series dataset can include a first set of values associated with respective time stamps and the second time-series dataset can include a second set of values associated with respective time stamps. The process also includes determining degrees of variance of the first and second sets of values, and comparing each degree of variance with a threshold. The process also includes selecting among multiple time alignment processes based on the comparisons, and processing the time-series datasets according to the selected process to thereby generate an aligned time-series dataset.
    Type: Grant
    Filed: July 9, 2015
    Date of Patent: February 26, 2019
    Assignee: Entit Software LLC
    Inventors: Luba Tsirulnik, Gabriel Dayan, Pavel Danichev
  • Patent number: 10210335
    Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: February 19, 2019
    Assignee: Entit Software LLC
    Inventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
  • Publication number: 20190050399
    Abstract: According to examples, an index of entries may be retrieved, in which each of the entries may correspond to phrases that are analogous to other phrases in content on a network. A plurality of phrases that are similar to the entries in the index may be identified in a content accessed on the apparatus and a determination may be made, based on a user interaction with the accessed content via a user interface, that the user has read a first phrase in the plurality of phrases. The index may be updated to indicate that the user has read the first phrase and, based on the updated index, a second phrase in a subsequently accessed content that is similar to the first phrase may be determined. In addition, the second phrase in the subsequently accessed content may be displayed differently from other displayed phrases in the subsequently accessed content.
    Type: Application
    Filed: August 11, 2017
    Publication date: February 14, 2019
    Applicant: EntIT Software LLC
    Inventors: Pashmina CAMERON, Sean BLANCHFLOWER
  • Publication number: 20190050739
    Abstract: Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model. The examples disclosed herein access, from a database, a historical set of inputs and results of a predictive model. A function is approximated based on the historical set of inputs and results, and a gradient of the function is computed using a result of the function with respect to a local maximum value of the function. A set of recommended inputs is generated based on the gradient of the function, where a recommended input produces a positive result of the function.
    Type: Application
    Filed: February 8, 2016
    Publication date: February 14, 2019
    Applicant: Entit Software LLC
    Inventors: Efrat EGOZI-LEVI, Ohad ASSULIN, Boaz SHOR, Mor GELBERG
  • Publication number: 20190034517
    Abstract: A log event cluster analytics management method may involve storing a first portion of an entire cluster dictionary in a transient memory, storing at least a second portion of the entire cluster dictionary in a persistent database and comparing a new log event message to the first portion of the overall cluster dictionary. In response to not assigning the new log event message to any cluster in the first portion of the entire cluster dictionary in the transient memory, selecting a subset of clusters of the at least second portion of the cluster dictionary in the persistent database, comparing the new log event message to a cluster of the selected subset of clusters and assigning the new log event message to the cluster of the selected subset of clusters based upon the comparison.
    Type: Application
    Filed: January 30, 2016
    Publication date: January 31, 2019
    Applicant: Entit Software LLC
    Inventor: Christopher BYRD
  • Patent number: 10187492
    Abstract: A change in an information technology system may be monitored. The information technology system may include a computing resource, a computing service that is to utilize the computing resource, a resource policy including a rule that is to be matched to the computing resource. A compliance operation may be performed on the computing resource in accordance with the rule. A schedule may be changed for a maintenance window in which the compliance operation is to be performed. The change of the schedule may be based on the monitored change in the information technology system and on a priority of the compliance operation or of the computing service.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: January 22, 2019
    Assignee: Entit Software LLC
    Inventors: Kishan Thomas, Michele Yoshikawa, Dongye Pan, Jeffrey Russell Roecks, Stephen Lee Kirkendall