Patents Assigned to Unisys
-
Publication number: 20220300405Abstract: A method for testing commits from a third-party product into a dependent product includes receiving a first commit from a third-party product; waiting for additional commits from the third-party product; receiving a second commit from the third-party product; testing the first and second commit using a pre-trained learning model; determining if the first commit is problematic, and if the first commit is problematic, sending the first commit for review before implementation; and determining if the second commit is problematic, and if the second commit is problematic, sending the second commit for review before implementation. Accumulating the first and second commits for testing at once reduces system resources.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Applicant: Unisys CorporationInventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
-
Publication number: 20220300275Abstract: A method for creating a learning model that evaluates risks of applying commits in a third-party product to a dependent product is disclosed. The method includes collecting data on past commits; training the learning model using the collected data; and using the learning model to determine if future commits are problematic.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Applicant: Unisys CorporationInventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L Bruso
-
Publication number: 20220300404Abstract: A method for creating a learning model that evaluates risks of applying commits in a third-party product to a dependent product is disclosed. The method includes collecting data on past commits; training the learning model using the collected data; and using the learning model to determine if future commits are problematic.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Applicant: Unisys CorporationInventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
-
Publication number: 20220300406Abstract: A method for alerting a community to potential problematic commits includes receiving a commit submitted by an author in a project; testing the commit using a pre-trained learning model; and determining if the commit is problematic, and if the commit is problematic, sending a report in the project outlining the level of risk of implementing the commit and a reason for the level or risk. Users of the project will be alerted to potential risk of particular commits.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Applicant: Unisys CorporationInventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
-
Publication number: 20220292055Abstract: A computing system includes a database, an operating system and a database management system. The computing system also includes an instruction processor in communication with the database management system; the database management system having a bank, a RDMS data expanse and a view mechanism; the operating system having a data expanse view control in communication with the hank and a data expanse view control in communication with the RDMS data expanse; wherein the database management system can request a data expanse file be created at the operating system and can request a view of the data expanse file using a view instruction from the instruction processor.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Applicant: Unisys CorporationInventors: Michael J. Rieschl, David Schroth, Matthew Trautman, Charles R. Caldarale
-
Publication number: 20220292104Abstract: A method includes receiving, from a database management system, a view instruction, using a single band descriptor able to describe 2**60 words of space, defined as a data expanse; creating, by an operating system, the data expanse in response to the view instruction; and allowing an activity to access a subset of the data expanse with a postern; wherein fast access to data whose size exceeds the available virtual address space is available.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Applicant: Unisys CorporationInventors: Michael J. Rieschl, David Schroth, Matthew Trautman, Charles R. Caldarale
-
Publication number: 20220292084Abstract: A method for processing an operand by an operating system includes receiving, at the operating system, a set of interrupts from a view operand; wherein a first interrupt causes the operating system to create a postern, a second interrupt causes the operating system to delete a specified postern and the remaining interrupts are transformed into a user status that is placed in the operand. A non-transitory machine readable memory medium including instructions when executed to cause a processor to perform the following actions: receiving, at the operating system, a set of interrupts from a view operand; wherein a first interrupt causes the operating system to create a postern, a second interrupt causes the operating system to delete a specified postern and the remaining interrupts are transformed into a user status that is placed in the operand.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Applicant: Unisys CorporationInventors: Michael J. Rieschl, David Schroth, Matthew Trautman, Charles R. Caldarale
-
Patent number: 11442714Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method further includes determining a code level supported by a processor executable at a computing system, the processor executable supporting a hosted computing environment. The method also includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution based on the code level supported by the processor executable. The method includes executing the machine-readable code within the hosted computing environment.Type: GrantFiled: October 5, 2020Date of Patent: September 13, 2022Assignee: Unisys CorporationInventors: Matthew Miller, David Strong, Anthony Matyok
-
Publication number: 20220284093Abstract: A system and method for the storage within one or more virtual execution context registers private code representative of processes or other information requiring an enhanced degree of security. The storage of the private code can be performed as a function of the type of code or in response to one or more markers embedded within the code. The time-variant nature of the virtual execution context registers affords a high degree of inherent security for the private code data stored within.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorportionInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283808Abstract: A system and method for the storage, within one or more virtual execution context registers, tracing information indicative of process/code flow within a processor system. This stored information can include a time stamp, information indicative of where the instruction pointer of the system was pointing prior to any process discontinuity, information indicative of where the instruction pointer of the system was pointing after any process discontinuity, and the number of times a specific instruction or sub-process is executed during a particular process. The data collected and stored can be utilized within such a system for the identification and analysis of processing hot-spots.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283807Abstract: A system and method for the storage, within one or more virtual execution context registers, execution tracing information indicative of process/code flow within a processor system. This stored information can include a time stamp, information indicative of where the instruction pointer of the system was pointing prior to any process discontinuity, information indicative of where the instruction pointer of the system was pointing after any process discontinuity, and the number of times a specific instruction or sub-process is executed during a particular process. The data collected and stored can be utilized within such a system for the identification and analysis of code interrupts and profile-guided optimization.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283812Abstract: A system and method for the provision of a shared register within a virtual processor base/virtual execution context arrangement. The disclosed arrangement utilizes chiplets comprising core logic and defined instruction sets. The chiplets are adapted to operate in conjunction with one or more active execution contexts to enable the execution of particular processes. In particular, the shared register space is created within the same physical memory utilized to supports execution contexts.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283815Abstract: A system and method for a virtual processor base/virtual execution context arrangement. The disclosed arrangement utilizes chiplets comprising core logic and defined instruction sets. The chiplets are adapted to operate in conjunction with one or more active execution contexts to enable the execution of particular processes. In particular, the defined instruction sets includes a instructions for processor debugging. The system and method support the compartmentalization of such debugging instructions so as to provide enhanced processor and process security.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283838Abstract: A system and method for virtual processor customization based upon the particular workload placed upon the virtual processor by one or more execution contexts within a given program or process. The customization serves to optimize the virtual processor architecture based upon a determination as to the size and/or type or virtual execution registers optimally suited for supporting a given execution context. This results in a time-variant processor architecture which not only provides optimized computational attributes, but also affords a high degree of inherent process security.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220283817Abstract: A system and method for virtual processor customization based upon the particular workload placed upon the virtual processor by one or more execution contexts within a given program or process. The customization serves to optimize the virtual processor architecture based upon a determination as to the size and/or type or virtual execution registers optimally suited for supporting a given execution context. This results in a time-variant processor architecture comprised of a virtual processor base and a virtual execution context.Type: ApplicationFiled: March 8, 2021Publication date: September 8, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20220247725Abstract: A host computing device for use in a network architecture having at least one client computing device or network, at least one server computing device or network and a gateway coupled between the at least one client computing device or network and the at least one server computing device or network. The host computing device includes at least one application container and at least one sidecar container coupled to the application container. The sidecar container provides supporting features to the application container. The sidecar container is a virtual private network (VPN) sidecar that performs at least one sidecar function on behalf of the application container.Type: ApplicationFiled: March 23, 2021Publication date: August 4, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Amith K K, H P Pranaav, Kanupriya Pandey
-
Publication number: 20220245898Abstract: A computer implemented method of training a user to perform a task includes receiving task data from a user device; identifying a task associated with the task data; querying a knowledgebase for data associated with the task; generating an AR pattern for training the user to perform the task; and transmitting the AR pattern to the user device. An augmented reality training system includes a computer device connected to a user device having a video camera. The computer device receives the video data from the video camera and identifies a task from the digital video data. A knowledgebase is connected to the computer device. The knowledgebase contains resources related to the task. The system identifies a task to be performed, queries the knowledgebase for resources and creates an augmented reality pattern with an avatar from the resources for training a user.Type: ApplicationFiled: February 2, 2021Publication date: August 4, 2022Applicant: Unisys CorporationInventors: Kelsey L. Bruso, James M. Plasek
-
Patent number: 11386084Abstract: An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish secondary semantic information; and establishing, by the processor, ontologies from the primary, secondary, and additional secondary semantic information.Type: GrantFiled: September 8, 2016Date of Patent: July 12, 2022Assignee: Unisys CorporationInventors: Kelsey L Bruso, James M Plasek
-
Patent number: 11386213Abstract: An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.Type: GrantFiled: June 21, 2016Date of Patent: July 12, 2022Assignee: Unisys CorporationInventor: Adam Gallagher
-
Publication number: 20220121694Abstract: An approach to information retrieval is contemplated for facilitating semantic search and response over a large domain of technical documents is disclosed. First, the grammar and morphology of the statements and instructions expressed in the technical documents is used to filter training data to extract the text that is most information-rich, that is the text that contains domain-specific jargon, in context. This training data is then vectorized and fed as input to an SBERT neural network model that learns an embedding of related words and terms in the text, i.e. the relationship between a given set of words contained in a user's query and the instructions from the technical documentation text most likely to assist in the user's operations. There are two parsing tasks. The first is to select a minimal sample of sentences from the document corpus that capture the domain-specific terminology (jargon). The result is set of sentences used to train BERT and SBERT.Type: ApplicationFiled: September 19, 2021Publication date: April 21, 2022Applicant: Unisys CorporationInventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek