Patents Assigned to ENTIT Software LLC
-
Publication number: 20190266140Abstract: A database having multiple data columns is disclosed. Whether metadata for the multiple data columns resides in multiple different metadata columns may be determined. If so, the metadata may be consolidated into a single consolidated metadata column.Type: ApplicationFiled: April 30, 2015Publication date: August 29, 2019Applicant: ENTIT Software LLCInventors: Eli Revach, Mordechai Lehrer, Amos Nesher, Elad Levi
-
Publication number: 20190222988Abstract: According to an example, a system may include an instance controller to manage service instances deployed on an infrastructure that facilitates data segregation and performance level compliance. The instance controller deploys a service instance of the service instances in a container and terminates the service instances in response to determining the service suite instance is idle based on the notification. Additionally, the system may deploy a component from the service instance from outside the container.Type: ApplicationFiled: January 17, 2018Publication date: July 18, 2019Applicant: EntIT Software LLCInventors: Stephane Herman MAES, Ulrich FEYER, Srikanth NATARAJAN
-
Publication number: 20190182167Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions executable by the processor to: access network traffic data pertaining to data flows among nodes in a network; partition the network traffic data into a plurality of windows; for each of the plurality of windows, aggregate data flows between pairs of nodes; compute a data distribution of each of the aggregated data flows; select a summary structure for each of the aggregated data flows based on the computed data distributions of the aggregated data flows; generate a summary of each of the aggregated data flows using the selected summary structures for the aggregated data flows; and store the generated summaries.Type: ApplicationFiled: December 13, 2017Publication date: June 13, 2019Applicant: EntIT Software LLCInventors: Abdul WASAY, Alkiviadis SIMITSIS, Martin ARLITT
-
Publication number: 20190103963Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Applicant: EntIT Software LLCInventors: Cheryl HE, Timothy ROAKE, Luther MARTIN
-
Publication number: 20190103959Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Applicant: EntIT Software LLCInventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
-
Patent number: 10242199Abstract: Example embodiments disclosed herein relate to a security test. A crawl of an application under test (AUT) is performed to determine an attack surface using crawl sessions. One or more parameters of the attack surface are probed during the respective crawl sessions. A trace is requested from an observer for the probe of the one or more parameters. Attack suggestions are received from the observer based on the trace of the one or more parameters.Type: GrantFiled: January 31, 2014Date of Patent: March 26, 2019Assignee: EntiT Software, LLCInventors: Sasi Siddharth Muthurajan, Matias Madou, Prajakta Jagdale, Jeremy Brooks
-
Patent number: 10228936Abstract: Examples described relate to managing a software delivery pipeline. In an example, a modified software may be identified. Further, a modification in the modified software may be identified. Further, a type of the modification may be identified. Further, a stage of a software delivery pipeline management system may be identified based on the type of the modification. Further, the modified software may be placed in the identified stage of the software delivery pipeline management system.Type: GrantFiled: December 16, 2016Date of Patent: March 12, 2019Assignee: EntIT Software, LLCInventors: Adarsh Suparna, Gajanan Rameshwar More, Paramjot Singh
-
Publication number: 20190065354Abstract: In some examples, a method includes accessing a test script configured to test an application at a target screen resolution and testing the application using the test script when a current screen resolution of the test system is different from the target screen resolution. The testing may include initializing a system web browser to run the application and overwriting a size parameter of the system web browser to cause a content window of the system web browser to display application content at the target screen resolution instead of the current screen resolution.Type: ApplicationFiled: February 24, 2016Publication date: February 28, 2019Applicant: Entit Software LLCInventors: Eyal JAKOV, Moshe Eran KRAUS, Shlomi NISSIM
-
Publication number: 20190068357Abstract: In some examples, floating point cohort based encryption may include determining an exponent of a floating point cohort.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Cheryl HE, Timothy ROAKE, Luther MARTIN
-
Publication number: 20190068736Abstract: In some examples, push control may include generation of a learning-based decision model based on analysis of data associated with historical usage of an application. For a request for content associated with usage of the application, the learning-based decision model may be analyzed to determine a next request for additional content expected to occur after the request for content. Further, a push operation may be performed to push the additional content associated with the next request to a source of the request for content.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Hashem NAARA, Michael RODOV, Amir DAVID
-
Publication number: 20190065465Abstract: According to an example, a system may receive a conversation with a first chatbot version through a messaging application, generate a first conversation file from the conversation, execute the first conversation file with a second chatbot version to generate a second conversation file, and compare the first conversation file with the second conversation file.Type: ApplicationFiled: March 13, 2018Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Mihai CRISTIAN, Paul DAMIAN
-
Publication number: 20190065758Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Timothy ROAKE, Cheryl HE, Luther MARTIN
-
Publication number: 20190065357Abstract: In some examples, continuous integration and continuous deployment (CI/CD) system failure analysis and resolution may include analyzing data for a CI/CD system to identify anomalous tests related to the CI/CD system. A plurality of hypotheses on a cause of failure associated with the CI/CD system may be determined based on a further analysis of the analyzed data. The determined hypotheses may be prioritized based on a confidence level analysis. Failure resolution to prevent failure associated with the CI/CD system may be determine based on a response to one of the prioritized hypotheses. Further, the determined failure resolution may be implemented.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Gali BRAFMAN, Gil Baruch, Miroslav NOVAK
-
Publication number: 20190065626Abstract: According to examples, an apparatus may identify a first viewpoint that an entity expressed in a first media file, identify a second viewpoint expressed in a second media file that is attributed to the entity, determine that the second viewpoint is dissimilar to the first viewpoint and in response to the determination that the second viewpoint is dissimilar to the first viewpoint, may output a message.Type: ApplicationFiled: August 31, 2017Publication date: February 28, 2019Applicant: EntIT Software LLCInventors: Pashmina CAMERON, Sean BLANCHFLOWER
-
Patent number: 10216776Abstract: An example process for aligning time-series datasets includes receiving a first time-series dataset and a second time-series dataset. The first time-series dataset can include a first set of values associated with respective time stamps and the second time-series dataset can include a second set of values associated with respective time stamps. The process also includes determining degrees of variance of the first and second sets of values, and comparing each degree of variance with a threshold. The process also includes selecting among multiple time alignment processes based on the comparisons, and processing the time-series datasets according to the selected process to thereby generate an aligned time-series dataset.Type: GrantFiled: July 9, 2015Date of Patent: February 26, 2019Assignee: Entit Software LLCInventors: Luba Tsirulnik, Gabriel Dayan, Pavel Danichev
-
Patent number: 10210335Abstract: Example embodiments disclosed herein relate to actively modify execution at runtime of an application under test (AUT). The AUT is executed using a real-time modifier. A security test is performed on the AUT. Execution of the AUT is modified at a decision point.Type: GrantFiled: July 26, 2012Date of Patent: February 19, 2019Assignee: Entit Software LLCInventors: Matias Madou, Kirill Mendelev, Sam Ng Ming Sum
-
Publication number: 20190050399Abstract: According to examples, an index of entries may be retrieved, in which each of the entries may correspond to phrases that are analogous to other phrases in content on a network. A plurality of phrases that are similar to the entries in the index may be identified in a content accessed on the apparatus and a determination may be made, based on a user interaction with the accessed content via a user interface, that the user has read a first phrase in the plurality of phrases. The index may be updated to indicate that the user has read the first phrase and, based on the updated index, a second phrase in a subsequently accessed content that is similar to the first phrase may be determined. In addition, the second phrase in the subsequently accessed content may be displayed differently from other displayed phrases in the subsequently accessed content.Type: ApplicationFiled: August 11, 2017Publication date: February 14, 2019Applicant: EntIT Software LLCInventors: Pashmina CAMERON, Sean BLANCHFLOWER
-
Publication number: 20190050739Abstract: Example embodiments relate to generating sets of recommended inputs for changing predicted results of a predictive model. The examples disclosed herein access, from a database, a historical set of inputs and results of a predictive model. A function is approximated based on the historical set of inputs and results, and a gradient of the function is computed using a result of the function with respect to a local maximum value of the function. A set of recommended inputs is generated based on the gradient of the function, where a recommended input produces a positive result of the function.Type: ApplicationFiled: February 8, 2016Publication date: February 14, 2019Applicant: Entit Software LLCInventors: Efrat EGOZI-LEVI, Ohad ASSULIN, Boaz SHOR, Mor GELBERG
-
Publication number: 20190034517Abstract: A log event cluster analytics management method may involve storing a first portion of an entire cluster dictionary in a transient memory, storing at least a second portion of the entire cluster dictionary in a persistent database and comparing a new log event message to the first portion of the overall cluster dictionary. In response to not assigning the new log event message to any cluster in the first portion of the entire cluster dictionary in the transient memory, selecting a subset of clusters of the at least second portion of the cluster dictionary in the persistent database, comparing the new log event message to a cluster of the selected subset of clusters and assigning the new log event message to the cluster of the selected subset of clusters based upon the comparison.Type: ApplicationFiled: January 30, 2016Publication date: January 31, 2019Applicant: Entit Software LLCInventor: Christopher BYRD
-
Patent number: 10187492Abstract: A change in an information technology system may be monitored. The information technology system may include a computing resource, a computing service that is to utilize the computing resource, a resource policy including a rule that is to be matched to the computing resource. A compliance operation may be performed on the computing resource in accordance with the rule. A schedule may be changed for a maintenance window in which the compliance operation is to be performed. The change of the schedule may be based on the monitored change in the information technology system and on a priority of the compliance operation or of the computing service.Type: GrantFiled: May 31, 2016Date of Patent: January 22, 2019Assignee: Entit Software LLCInventors: Kishan Thomas, Michele Yoshikawa, Dongye Pan, Jeffrey Russell Roecks, Stephen Lee Kirkendall