Oracle Patent Applications

Oracle patent applications that are pending before the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240061855
    Abstract: In various embodiments, a data integration system is disclosed which enables incremental loads into a data warehouse by developing a data partitioning plan and selectively disabling and enabling indexes to facilitate incremental loads into fact tables.
    Type: Application
    Filed: November 2, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Justin Hyde, Jeff Titmas
  • Publication number: 20240061733
    Abstract: A parametric constant resolves to different values in different contexts, but a single value within a particular context. An anchor constant is a parametric constant that allows for a degree of parametricity for an API point. The context for the anchor constant is provided by a caller to the API point. The anchor constant resolves to an anchor value that records specialization decisions for the API point within the provided context. Specialization decisions may include type restrictions, memory layout, and/or memory size. The anchor value together with an unspecialized type of the API point result in a specialized type of the API point. A class object representing the specialized type is created. The class object may be accessible to the caller, but the full value of the anchor value is not accessible to the caller. The API point is executed based on the specialization decisions embodied in the anchor value.
    Type: Application
    Filed: October 30, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: John Robert Rose, Brian Goetz
  • Publication number: 20240061989
    Abstract: Techniques for generating text content arranged in a consistent read order from a source document including text corresponding to different read orders are disclosed. A system parses a binary file representing an electronic document to identify characters and metadata associated with the characters. The system pre-sorts a character order of characters in each line of the electronic document to generate an ordered list of characters arranged according to the right-to-left reading order. The system performs a layout-mirroring operation to change a position of characters within the modified document relative to a right edge of the document and a left edge of the document. Subsequent to performing layout-mirroring, the system identifies native left-to-right reading-order text in-line with the native right-to-left reading-order text.
    Type: Application
    Filed: February 15, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Xu Zhong, Vishank Bhatia, Thanh Long Duong, Mark Johnson, Srinivasa Phani Kumar Gadde, Vishal Vishnoi
  • Publication number: 20240061814
    Abstract: Techniques are described for enabling concurrent cross-region replications and garbage collection while maintaining consistency and data integrity among file systems. In some embodiments, techniques for garbage collection fencing utilize a system-level garbage fencing key (GC fencing key) and one or more job-level GC fencing keys in a source file system that perform one or more cross-region replications with one or more target file systems, one replication and one job-level GC fencing key per target file system. In some embodiments, one job-level GC fencing key in a source file system and one job-level GC fencing key in a source file system together provide garbage fencing for a cross-region replication. In certain embodiments, the metadata information in a GC fencing key can inform, instruct, or be used to configure garbage collectors to skip garbage collection for a range of snapshots in a file system.
    Type: Application
    Filed: October 30, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Satish Kumar Kashi Visvanathan, Viggenesh Venugopal, Stephen Anthony Fridella, Ashwin Vijayavel
  • Publication number: 20240061833
    Abstract: Techniques are disclosed for augmenting training data for training a machine learning model to generate database queries. Training data comprising a first training example comprising a first natural language utterance, a logical form for the first natural language utterance, and associated first metadata is obtained. From the first training example, a template utterance is generated. A second natural language utterance is generated by filling slots in the template utterance based on a database schema and database values. Updated metadata is produced based on the first metadata and the second natural language utterance. A second training example is generated, comprising the second natural language utterance, the logical form for the first natural language utterance, and the updated metadata. The training data is augmented by adding the second training example. A machine learning model is trained to generate a database query comprising the database operation using the augmented training data set.
    Type: Application
    Filed: July 5, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Gioacchino Tangari, Nitika Mathur, Philip Arthur, Cong Duy Vu Hoang, Aashna Devang Kanuga, Steve Wai-Chun Siu, Syed Najam Abbas Zaidi, Poorya Zaremoodi, Thanh Long Duong, Mark Edward Johnson
  • Publication number: 20240062011
    Abstract: Techniques are disclosed herein for using named entity recognition to resolve entity expression while transforming natural language to a meaning representation language. In one aspect, a method includes accessing natural language text, predicting, by a first machine learning model, a class label for a token in the natural language text, predicting, by a second machine-learning model, operators for a meaning representation language and a value or value span for each attribute of the operators, in response to determining that the value or value span for a particular attribute matches the class label, converting a portion of the natural language text for the value or value span into a resolved format, and outputting syntax for the meaning representation language. The syntax comprises the operators with the portion of the natural language text for the value or value span in the resolved format.
    Type: Application
    Filed: July 13, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Aashna Devang Kanuga, Cong Duy Vu Hoang, Mark Edward Johnson, Vasisht Raghavendra, Yuanxu Wu, Steve Wai-Chun Siu, Nitika Mathur, Gioacchino Tangari, Shubham Pawankumar Shah, Vanshika Sridharan, Zikai Li, Diego Andres Cornejo Barra, Stephen Andrew McRitchie, Christopher Mark Broadbent, Vishal Vishnoi, Srinivasa Phani Kumar Gadde, Poorya Zaremoodi, Thanh Long Duong, Bhagya Gayathri Hettige, Tuyen Quang Pham, Arash Shamaei, Thanh Tien Vu, Yakupitiyage Don Thanuja Samodhve Dharmasiri
  • Publication number: 20240062112
    Abstract: Techniques are disclosed herein for adaptive training data augmentation to facilitate training named entity recognition (NER) models. Adaptive augmentation techniques are disclosed herein that take into consideration the distribution of different entity types within training data. The adaptive augmentation techniques generate adaptive numbers of augmented examples (e.g., utterances) based on the distribution of entities to make sure enough numbers of examples for minority class entities are generated during augmentation of the training data.
    Type: Application
    Filed: August 16, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Omid Mohamad Nezami, Thanh Tien Vu, Budhaditya Saha, Shubham Pawankumar Shah
  • Publication number: 20240061939
    Abstract: A system for analyzing security threat changes of proposed changes to an infrastructure environment. For example, system and approaches for determining actions to be performed based on security threat changes corresponding to proposed changes to the infrastructure environment is disclosed.
    Type: Application
    Filed: August 19, 2022
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Anusha Gururaja Manur, Tasneem Singh
  • Publication number: 20240061992
    Abstract: Techniques for generating formatting tags for textual content obtained from a source electronic document are disclosed. A system parses a digital file to obtain information about characters in an electronic document. The system applies tags to text generated based on the textual content of the electronic document by creating segments of textually-consecutive characters and applying corresponding text formatting style tags to the segments. The system further identifies segments of text overlapping bounding boxes in the electronic document. The system generates textual content including a segment of text and a corresponding hyperlink associated with the segment of text. The system further generates textual content by selectively applying line breaks from the source electronic document in the textual content.
    Type: Application
    Filed: January 6, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Vishank Bhatia, Xu Zhong, Thanh Long Duong, Mark Johnson, Srinivasa Phani Kumar Gadde, Vishal Vishnoi, King-Hwa Lee, Christopher Kennewick
  • Publication number: 20240062021
    Abstract: Techniques are disclosed herein for calibrating confidence scores of a machine learning model trained to translate natural language to a meaning representation language. The techniques include obtaining one or more raw beam scores generated from one or more beam levels of a decoder of a machine learning model trained to translate natural language to a logical form, where each of the one or more raw beam scores is a conditional probability of a sub-tree determined by a heuristic search algorithm of the decoder at one of the one or more beam levels, classifying, by a calibration model, a logical form output by the machine learning model as correct or incorrect based on the one or more raw beam scores, and providing the logical form with a confidence score that is determined based on the classifying of the logical form.
    Type: Application
    Filed: February 9, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Gioacchino Tangari, Cong Duy Vu Hoang, Mark Edward Johnson, Poorya Zaremoodi, Nitika Mathur, Aashna Devang Kanuga, Thanh Long Duong
  • Publication number: 20240061834
    Abstract: Systems and methods identify whether an input utterance is suitable for providing to a machine learning model configured to generate a query for a database. Techniques include generating an input string by concatenating a natural language utterance with a database schema representation for a database; providing the input string to a first machine learning model; based on the input string, generating, by the first machine learning model, a score indicating whether the natural language utterance is translatable to a database query for the database and should be routed to a second machine learning model, the second machine learning model configured to generate a query for the database based on the natural language utterance; comparing the score to a threshold value; and responsive to determining that the score exceeds the threshold value, providing the natural language utterance or the input string to the second machine learning model.
    Type: Application
    Filed: August 21, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Gioacchino Tangari, Cong Duy Vu Hoang, Poorya Zaremoodi, Philip Arthur, Nitika Mathur, Mark Edward Johnson, Thanh Long Duong
  • Publication number: 20240061832
    Abstract: Techniques are disclosed herein for converting a natural language utterance to an intermediate database query representation. An input string is generated by concatenating a natural language utterance with a database schema representation for a database. Based on the input string, a first encoder generates one or more embeddings of the natural language utterance and the database schema representation. A second encoder encodes relations between elements in the database schema representation and words in the natural language utterance based on the one or more embeddings. A grammar-based decoder generates an intermediate database query representation based on the encoded relations and the one or more embeddings. Based on the intermediate database query representation and an interface specification, a database query is generated in a database query language.
    Type: Application
    Filed: June 14, 2023
    Publication date: February 22, 2024
    Applicant: Oracle International Corporation
    Inventors: Cong Duy Vu Hoang, Stephen Andrew McRitchie, Mark Edward Johnson, Shivashankar Subramanian, Aashna Devang Kanuga, Nitika Mathur, Gioacchino Tangari, Steve Wai-Chun Siu, Poorya Zaremoodi, Vasisht Raghavendra, Thanh Long Duong, Srinivasa Phani Kumar Gadde, Vishal Vishnoi, Christopher Mark Broadbent, Philip Arthur, Syed Najam Abbas Zaidi
  • Publication number: 20240054063
    Abstract: Techniques are disclosed for managing aspects of a dedicated region cloud at a customer location (a “DRCC”). A DRCC may comprise cloud infrastructure components provided by a cloud provider and hosted by computing devices located at the customer's (a “cloud owner's”) location. Services of the central cloud-computing environment may be similarly executed at the DRCC. The DRCC may include a service configured to collect, store, and/or present data corresponding to the cloud infrastructure components via one or more interfaces (e.g., interfaces provided to the cloud provider and/or the cloud owner). Data collected within the DRCC (e.g., capacity and usage data, etc.) may be provided and accessible to the central cloud at any suitable time. Obtaining such data enables the user to ascertain various operational aspects of the DRCC, while enabling the system and/or user to execute various DRCC-specific operations regarding capacity planning, health and performance, change management, and the like.
    Type: Application
    Filed: August 14, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: James Walter Wichelman, Eric J. Lundy, Chandramohan Krishnamoorthy, Andreas Lemos, Travis Lauren Anderson, Alyssa Wachs Augsburger, Sidney Lorenzo Bowen, Jagwinder Singh Brar
  • Publication number: 20240054232
    Abstract: A method includes receiving multiple security framework requirements, mapping the security framework requirements to a predicate, mapping the predicate to a system-specific implementation, evaluating, using a runtime system, the target system by analyzing a multitude of build files using the system-specific implementation, and presenting a report indicating whether the security framework requirements are satisfied.
    Type: Application
    Filed: August 15, 2022
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Trong Nhan MAI, Behnaz HASSANSHAHI, Padmanabhan KRISHNAN
  • Publication number: 20240054004
    Abstract: A method for providing a dedicated region cloud at customer is provided. A first physical port of a network virtualization device (NVD) included in a datacenter is communicatively coupled to a first top-of-rack (TOR) switch and a second TOR switch. A second physical port of the NVD is communicatively coupled to a network interface card (NIC) associated with a host machine. The NVD receives a packet from the host machine via the second physical port of the NVD. The NVD further determines a particular TOR, from a group including the first TOR and the second TOR, for communicating the packet, and transmits the packet to the particular TOR to facilitate communication of the packet to a destination host machine.
    Type: Application
    Filed: July 27, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Syed Waqqas Ahmed
  • Publication number: 20240054005
    Abstract: Disclosed herein is a method of providing fault domains within a rack. An availability domain comprising a rack is provided, where the rack comprising a plurality of top-of-rack (TOR) switches and a plurality of host machines. A first fault domain is created within the availability domain. The first fault domain comprised a first TOR switch from the plurality of TOR switches and a first subset of host machines from the plurality of host machines. The first subset of host machines is communicatively coupled to the first TOR. A second fault domain is created within the availability domain, where the second fault domain comprised a second TOR switch from the plurality of TOR switches and a second subset of host machines from the plurality of host machines. The second subset of host machines is communicatively coupled to the second TOR.
    Type: Application
    Filed: July 27, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Syed Waqqas Ahmed
  • Publication number: 20240053906
    Abstract: A degree of fragmentation is determined based on a number of holes present in a storage system layout or a portion of a layout. Edges between the holes and used portions of the storage system are tabulated by scanning a storage space. The occurrences of a pattern of used/available allocation units and/or the occurrences of another pattern available/used allocation units are recognized. A fragmentation value is calculated based on occurrences of the patterns in view of the total storage space. The present fragmentation measurement system utilizes the number of occurrences of the holes in assessing fragmentation.
    Type: Application
    Filed: October 24, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Tao Mao, Yanfei Fan
  • Publication number: 20240056335
    Abstract: A method for providing a dedicated region cloud at customer is provided. A first physical port of a network virtualization device (NVD) included in a datacenter is communicatively coupled to a first top-of-rack (TOR) switch and a second TOR switch. A second physical port of the NVD is communicatively coupled with a network interface card (NIC) associated with a host machine. The second physical port provided a first logical port and a second logical port for communications between the NVD and the NIC. The NVD receives a packet from the host machine via the first logical port or the second logical port. Upon receiving the packet, the NVD determines a particular TOR, from a group including the first TOR and the second TOR, for communicating the packet. The NVD transmits the packet to the particular TOR to facilitate communication of the packet to a destination host machine.
    Type: Application
    Filed: July 27, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Syed Waqqas Ahmed
  • Publication number: 20240056402
    Abstract: Described herein is a network fabric architecture for DRCC. The fabric includes a plurality of blocks of switches. A compute fabric (CFAB) block is provided that is communicatively coupled to the plurality of blocks of switches. The CFAB block includes: (i) a set of one or more racks, where each rack comprised one or more servers configured to execute one or more workloads of a customer, and (ii) a first plurality of switches organized into a first plurality of levels. The first plurality of switches is communicatively couples the set of one or more racks to the plurality of blocks of switches. A network fabric block is provided that is communicatively coupled to the plurality of blocks of switches and includes (i) one or more edge devices including a first edge device providing connectivity (to a workload) to a first external resource, and (ii) a second plurality of switches organized into a second plurality of levels.
    Type: Application
    Filed: July 27, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Syed Waqqas Ahmed
  • Publication number: 20240053994
    Abstract: Plugins that are independently written are executed in a collaborative manner to analysis a log. A plugin executing with respect to a particular node of a hierarchical data structure determines values for a set of keys based on information of the particular node and/or any ancestor nodes, and information stored in a shared repository. The plugin stores the values for the keys as additional information of the particular hierarchical node and/or into the shared repository. The plugin does not access information of non-ancestor nodes when executing with respect to the particular hierarchical node. Each plugin writes into and retrieves from the shared repository using the shared naming convention, thereby sharing information. The sequence of execution of the plugins is not dependent on dependencies amongst the plugins. If a dependent plugin requiring an output from a requisite plugin is first executed, the dependent plugin is flagged as pending and subsequently re-executed.
    Type: Application
    Filed: October 26, 2023
    Publication date: February 15, 2024
    Applicant: Oracle International Corporation
    Inventors: Nagarajan Muthukrishnan, Ravi Shankar Thammaiah, Sumanta Kumar Chatterjee, Binoy Sukumaran
  • Publication number: 20240046275
    Abstract: Techniques for displaying a stage-specific pipeline view with a prediction engine are disclosed. A system displays a plurality of regions representing various stages of completion for a plurality of transactions. The system determines a stage of completion for each of the plurality of transactions at a first point-in-time, and generates and displays visualizations representing each of the plurality of transactions in one of the plurality of regions based on the respective current stage of completion. Generating a visualization representing a first transaction includes determining a likelihood of the first transaction completing a stage associated with the first transaction. The likelihood may be determined by selecting attributes associated with the first transaction and identifying prior transactions with similar attributes.
    Type: Application
    Filed: October 23, 2023
    Publication date: February 8, 2024
    Applicant: Oracle International Corporation
    Inventors: Mark Pearson, Jinwon Lee, Gregory Nerpouni, Charles Wardin Stabb
  • Publication number: 20240046200
    Abstract: Techniques disclosed herein may include receiving a request to transfer an asset. The techniques may include accessing an asset record comprising an asset type, an asset location, and a location history for the asset. The techniques may include determining whether the asset is a volatile asset using the asset type. The techniques may include determining whether the location history is a complete location history for the asset. The techniques may include determining whether the asset is an unused asset using the location history. The techniques may include determining whether the asset is listed in an inventory list using the asset location. The techniques may include approving the request based at least in part on a determination that the asset is the volatile asset, the location history is the complete location history, the asset is unused, and the asset is in the inventory list.
    Type: Application
    Filed: August 3, 2022
    Publication date: February 8, 2024
    Applicant: Oracle International Corporation
    Inventors: Jennifer Bus, Jaime Ismael Rangel Martinez, Vijayan Radhakrishnan, Pamela Marie Simpson
  • Publication number: 20240048445
    Abstract: A configuration helper system (CHS) is described that simplifies the task of generating configuration information for a customer premises equipment (CPE) in a customer's on-premise network to enable the CPE to communicate with the customer's cloud network over a particular communication channel. The CHS is configured to generate configuration information that is customized for the particular CPE and communication channel. Given information about the CPE and the communication channel, the CHS automatically identifies a particular set of configuration parameters to be included in the customized configuration information and determines values for the set of parameters, where some of the values may be provided by the customer. A particular CPE-specific format is determined for the configuration information.
    Type: Application
    Filed: October 20, 2023
    Publication date: February 8, 2024
    Applicant: Oracle International Corporation
    Inventors: Peter John Hill, Jincheng Liu, Zhao Wang, Pingbo Zhang
  • Publication number: 20240045842
    Abstract: Systems, methods, and machine-readable media to migrate data from source databases to target databases are disclosed. Data may be received, relating to the source databases and the target databases. For each source database, a migration assessment may be generated based on analyzing the data, and a migration method may be selected. A migration plan that specifies a parallel migration of a set of databases to the target databases may be created, with a first migration method to migrate a first subset of the set of databases and a second migration method to migrate a second subset of the set of databases. The parallel migration may be executed according to the migration plan may be caused so that the first subset of the set of databases is migrated with the first migration method while the second subset of the set of databases is migrated with the second migration method.
    Type: Application
    Filed: October 19, 2023
    Publication date: February 8, 2024
    Applicant: Oracle International Corporation
    Inventors: Stephan Buehne, Elmar Spiegelberg
  • Publication number: 20240045771
    Abstract: Techniques discussed herein manage backups of a service cell (SC). Each SC may include a data plane that is isolated from other SCs and comprises a distributed computing cluster (a cluster). A manifest that specifies one or more backup policies may be used to generate a full backup or a partial backup of a data set stored by the cluster. In accordance with the manifest, a signal may be sent to nodes of the cluster. In response, the nodes may transmit locally-stored data (e.g., data segments) to specified locations at a remote storage. The system may maintain a mapping of which segments correspond to data that was stored in the cluster at a time corresponding to a full or partial backup.
    Type: Application
    Filed: October 23, 2023
    Publication date: February 8, 2024
    Applicant: Oracle International Corporation
    Inventors: Shmuel Herman, Gabriel Thomas Hurley
  • Publication number: 20240039847
    Abstract: Systems and methods for highly-available host networking with active-active or active-backup traffic load-balancing are disclosed herein. The method can include selecting a compute instance from an overlay network residing on a substrate network, identifying a plurality of Network Virtualization Devices (“NVD”) for association with the compute instance, creating a loopback interface on each of the NVDs, each of which loopback interfaces can include a shared IP address that can be in the substrate layer, prepopulating a table in each of the NVDs, the table linking the shared IP address to the compute instance, and each of the plurality of NVDs advertising a unique route to the compute instance via the shared IP address.
    Type: Application
    Filed: October 6, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Bryce Eugene Bockman, Santosh Narayan Shilimkar
  • Publication number: 20240039999
    Abstract: A Representational State Transfer (REST)-Simple Message Transfer Protocol (SMTP) protocol gateway (RSPG) is disclosed that includes capabilities for accessing and processing REST Application Programming Interfaces (APIs) using SMTP. The RSPG receives a first email message, extracts information from the received first email message and constructs a REST API call based on the extracted information. The RSPG invokes the REST API call against a REST endpoint and receives a response generated from execution of the REST API call. The RSPG generates a second email message based on the response and causes the second email message to be communicated to an intended recipient of the response of the REST API call.
    Type: Application
    Filed: October 13, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventor: Bryan James Phillippe
  • Publication number: 20240036924
    Abstract: A method for managing cloud resource dependencies is described. The method may include receiving a resource configuration of a first resource. The method may include identifying a dependency of a first stage of a first resource on a second resource and performing a topological sort of a plurality of resources, based at least in part on the dependency of the first stage of the first resource. The method may include constructing a dependency graph including the plurality of resources, including the first stage of the first resource in a subordinate rank and the second resource in a superior rank, corresponding to the topological sort. The method may include generating an execution queue including the second resource in a priority execution position in the execution queue. The method may include executing the plurality of resources according to the execution queue.
    Type: Application
    Filed: October 12, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Abishek Murali Mohan, Alaa Shaker
  • Publication number: 20240037074
    Abstract: Disclosed is an improved approach to access the contents of database file system. The contents of the database file system can be acquired and stored in a directory buffer. A parallel tree structure is used to retrieve directory contents quickly and in a consistent fashion.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Margaret Susairaj, Jose Antonio Lasa Gutierrez, Sumanta Chatterjee
  • Publication number: 20240037340
    Abstract: Disclosed techniques relate to managing a dialogue between a user device and an autonomous agent. For instance, a computing device creates a discourse tree from a body of text that includes fragments. The discourse tree includes a root node, nonterminal nodes, and terminal nodes. Each nonterminal node represents a rhetorical relationship between two of the fragments and each terminal node is associated with one of the fragments. The computing device determines a main topic of the body of text from the discourse tree. The computing device provides the main topic to the user device, and in response, receives a user utterance. The computing device determines an intent from the user utterance and navigates the discourse tree to locate relevant information consistent with the intent.
    Type: Application
    Filed: September 29, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventor: Boris Galitsky
  • Publication number: 20240039963
    Abstract: A framework for determining capabilities for execution of a system call a container and/or process within a computing system. For example, techniques for determining capabilities prerequisite for execution of a system call and determining whether the system call has been assigned the capabilities prerequisite for execution of the system call.
    Type: Application
    Filed: July 29, 2022
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Olgierd Stanislaw Pieczul, Shrey Arora
  • Publication number: 20240037325
    Abstract: Example embodiments facilitate augmenting a client-side worksheet of a spreadsheet with context information retrieved from non-direct ancestor worksheets of the client-side worksheet. A spreadsheet plug-in enables retrieval of the context information from a server system, e.g., cloud-based database, via one or more web services. In a specific embodiment, the context information represents one or more data dimensions, e.g., worksheet columns, retrieved via the server system form one or more remote databases and populated into one or more non-direct ancestor worksheets (e.g., grandparent worksheets, great grandparent worksheets, etc.). Then those data dimensions are displayed in the client-side descendant worksheet. The user can now efficiently edit the worksheet while viewing relevant context information in the worksheet.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Xiameng Chen, Shaun Logan
  • Publication number: 20240036934
    Abstract: Techniques discussed herein relate to provisioning one or more virtual cloud-computing edge devices at a physical cloud-computing edge device. A manifest may be generated/utilized to specify various attributes of the virtual cloud-computing edge devices to be executed at a physical cloud-computing edge device. A first set of resources corresponding to a first virtual cloud-computing edge device may be obtained from memory of a centralized cloud-environment and provisioned at the first virtual cloud-computing edge device. Similar operations may be performed with respect to a second virtual cloud-computing edge device. The techniques described herein split the physical edge device into multiple virtual device resources that can be utilized in combination or separately to extend the functionality and versatility of the physical edge device.
    Type: Application
    Filed: July 27, 2022
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Naren Shivashankar Vasanad, Pradeep Kumar Vijay
  • Publication number: 20240037973
    Abstract: A computing device may access visually rich documents comprising an image and metadata. A graph, based on the image or metadata, can be generated for a visually rich document. The graph's nodes can correspond to words from the visually rich document. Features for nodes can be determined by the device. The device may generate model labeled graphs by assigning a pseudo-label to nodes using a pretrained model. The device may generate a plurality of graph labeled graphs by assigning a pseudo-label to nodes by matching a first node from a first graph to at least a second node from a second graph. The device may generate a plurality of updated graphs by cross referencing labels from the model labeled graphs and the graph labeled graphs. Until a change in labels is below a threshold, a model can be trained to perform key-value extraction using the updated graphs.
    Type: Application
    Filed: October 11, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventors: Amit Agarwal, Kulbhushan Pachauri
  • Publication number: 20240037071
    Abstract: Techniques may include receiving an asynchronous event message at an inbound adapter of a document-based monitoring system. In addition, the techniques may include accessing a document containing a hierarchical log of event entries. The techniques may include adding an event entry to the hierarchical log based at least in part on the asynchronous event message, and where the event entry may include information identifying the asynchronous event message. Moreover, the techniques may include identifying a corrupted event entry in the hierarchical log. Also, the techniques may include comparing the timestamp fields of the event entries in the hierarchical log to the timestamp field of the corrupted event entry. The techniques may include determining a parent entry of the corrupted event entry based at least in part on the comparison. In addition, the techniques may include updating the parent ID field of the corrupted event entry to identify the parent entry.
    Type: Application
    Filed: July 18, 2023
    Publication date: February 1, 2024
    Applicant: Oracle International Corporation
    Inventor: Philippe Maurice Le Mouel
  • Publication number: 20240031282
    Abstract: Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Span port information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.
    Type: Application
    Filed: July 31, 2023
    Publication date: January 25, 2024
    Applicant: Oracle International Corporation
    Inventors: Jagwinder Singh Brar, Lucas Michael Kreger-Stickles, Bryce Eugene Bockman, Peter Croft Jones, Shane Baker
  • Publication number: 20240031373
    Abstract: Techniques are described through which groups of individuals and/or other entities may interface with a data cloud blockchain network and/or cloud-based platform to collectively share data in a secure, controlled manner. Decentralized groups that are connected to the data cloud network may be registered and listed in a searchable directory. Entities that are interested in accessing data associated with a group may browse the directory, execute smart contracts within a blockchain, and track online content interactions of a group in a manner that does not compromise the anonymity of individual group members. Data usage and performance metrics may be tracked on the blockchain network using data cloud services, and the metrics may be written to distributed ledgers within the blockchain network. Smart contracts and chaincode within the network may initiate blockchain transactions based on performance metrics and/or other aspects associated with accessing information about a group.
    Type: Application
    Filed: January 24, 2023
    Publication date: January 25, 2024
    Applicant: Oracle International Corporation
    Inventor: Siddharth Gupta
  • Publication number: 20240028414
    Abstract: Techniques discussed herein relate to managing aspects of provisioning cloud-computing edge devices. In some embodiments, a user request specifying one or more resources to be provisioned at a cloud-computing edge device may be received by a cloud-computing device operated by a cloud-computing provider. An ephemeral credential may be generated for the edge device and used to determine whether access control policies exist that enable the edge device to access the resource(s). If the resource(s) are accessible, a manifest may be generated in accordance with the user request. The manifest may specify a configuration for the cloud-computing edge device and includes information related to the resource. Operations may be subsequently executed to provision the cloud-computing edge device in accordance with the manifest. However, if the resource(s) are not accessible, the user request may be denied.
    Type: Application
    Filed: July 22, 2022
    Publication date: January 25, 2024
    Applicant: Oracle International Corporation
    Inventors: Naren Shivashankar Vasanad, Alok Shankar
  • Publication number: 20240028963
    Abstract: An augmentation and feature caching subsystem is described for training AI/ML models. In one particular aspect, a method is provided that includes receiving data comprising training examples, one or more augmentation configuration hyperparameters and one or more feature extraction configuration hyperparameters; generating a first key based on one of the training examples and the one or more augmentation configuration hyperparameters; searching a first key-value storage based on the first key; obtaining one or more augmentations based on the search of the first key-value storage; applying the obtained one or more augmentations to the training examples to result in augmented training examples; generating a second key based on one of the augmented training examples and the one or more feature extraction configuration hyperparameters; searching a second key-value storage based on the second key; obtaining one or more features based on the search of the second key-value storage.
    Type: Application
    Filed: July 11, 2023
    Publication date: January 25, 2024
    Applicant: Oracle International Corporation
    Inventors: Vladislav Blinov, Vishal Vishnoi, Thanh Long Duong, Mark Edward Johnson, Xin Xu, Elias Luqman Jalaluddin, Ying Xu, Ahmed Ataallah Ataallah Abobakr, Umanga Bista, Thanh Tien Vu
  • Publication number: 20240020175
    Abstract: Techniques for implementing an infrastructure orchestration service are described. A configuration file for a deployment to a first execution target and a second execution target can be received. A first safety plan can be generated for the first execution target that comprises a first list of resources and operations associated with deployment at the first execution target. Approval of the first safety plan can be received. A second safety plan can be generated for the second execution target that comprises a second list of resources and operations associated with deployment at the second execution target. A determination can be made whether the second safety plan is a subset of the first safety plan. If the determination is that the second safety plan is a subset of the first safety plan, the second safety plan can automatically be approved and transmitted to the second execution target for deployment.
    Type: Application
    Filed: September 27, 2023
    Publication date: January 18, 2024
    Applicant: Oracle International Corporation
    Inventors: Eric Tyler Barsalou, Nathaniel Martin Glass
  • Publication number: 20240020188
    Abstract: Techniques are described for tuning a Java Virtual Machine (JVM) in an automated manner. The automated tuning may be performed to improve a JVM's performance including to prevent it from failing. An auto-tuning system is described that can auto-detect one or more anomalous conditions for a JVM, and in response, take one or more corrective actions to auto-tune the JVM to avoid or reduce/mitigate any adverse impacts of the detected anomalous conditions. A corrective action taken for a JVM may include changing one or more parameters associated with the JVM.
    Type: Application
    Filed: July 14, 2022
    Publication date: January 18, 2024
    Applicant: Oracle International Corporation
    Inventor: Sujay Ranjan Sinha
  • Publication number: 20240013780
    Abstract: Techniques for data augmentation for training chatbot systems in natural language processing. In one particular aspect, a method is provided that includes generating a list of values to cover for an entity, selecting utterances from a set of data that have context for the entity, converting the utterances into templates, where each template of the templates comprises a slot that maps to the list of values for the entity, selecting a template from the templates, selecting a value from the list of values based on the mapping between the slot within the selected template and the list of values for the entity; and creating an artificial utterance based on the selected template and the selected value, where the creating the artificial utterance comprises inserting the selected value into the slot of the selected template that maps to the list of values for the entity.
    Type: Application
    Filed: September 21, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Srinivasa Phani Kumar Gadde, Yuanxu Wu, Aashna Devang Kanuga, Elias Luqman Jalaluddin, Vishal Vishnoi, Mark Edward Johnson
  • Publication number: 20240012764
    Abstract: Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the first memory segment view to the second memory segment view; terminating the first memory segment view, to prevent access to the memory segment via the first memory segment view.
    Type: Application
    Filed: September 22, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Maurizio Cimadamore, James Malcolm Laskey, Jorn Bender Vernee
  • Publication number: 20240012837
    Abstract: Techniques for initiating system actions based on text content are disclosed. A system applies a semantic analysis model at run-time to human-understandable text to identify actionable content within the human-understandable text. The system analyzes metadata associated with the text to identify a mapping between one or more data objects associated and the semantic content in the text. The system identifies one or more contact lists associated, respectively, with the one or more data objects. Using a database schema, the system analyzes the contact lists to determine whether to modify the contact lists.
    Type: Application
    Filed: February 13, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Qian Rui Chow, Donald Creig Humes, Kaarthik Balasubrahmanian, Sridhar Tadepalli, Saravanan Anandan, Kartik Raghavan
  • Publication number: 20240015071
    Abstract: The present is directed to systems, methods, and devices for holistic rendering of cloud network configuration. The method can include receiving data characterizing a plurality of devices in a computing network. The method can include generating with the inventory processor a data file characterizing each of the plurality of devices in the computing network. This data file can be generated based on the received data and on a set of static overrides. The method can include generating a configuration file for each of the plurality of devices in the computing network via iterative selection and application of templates to portions of the data file.
    Type: Application
    Filed: September 20, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Rishi Kaundinya Mutnuru, Iain Roger Cadd
  • Publication number: 20240012700
    Abstract: Techniques for governing access to third-party application programming interfaces (API's) are disclosed. A proxy service exposes an API configured to receive requests, from user-facing services, to perform functions of backend services. The proxy service stores a usage policy that defines a criterion that is (a) different from any authorization criterion and (b) associated with using a function of a backend service. The proxy service receives a request to perform the function of the first backend service for a user-facing service and determines that the request does not satisfy the usage policy. Based on determining that the request does not satisfy the usage policy, the proxy service refrains from accessing the backend service to perform the function responsive to the request, and transmits an alert to the user-facing service indicating that the request does not satisfy the usage policy.
    Type: Application
    Filed: September 25, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Tuck Chang, Zhengming Zhang
  • Publication number: 20240015143
    Abstract: Discussed herein is a technique for replication of keys across regions of a cloud infrastructure. A first vault is created in a first region. The first vault stores a plurality of records, each of which is associated with a key and corresponding metadata. A second region, different from the first region, is selected where replication of the plurality of records is desired. A second vault is created in the second region. The plurality of records are relayed from the first vault to the second vault, so that each of the plurality of records is replicated in the second vault based on an entropy value of the record. A mutation operation executed with respect to the first vault is stored as a new record in the first vault. The new record is transmitted to the second vault, which is updated to reflect the mutation operation performed on the first vault.
    Type: Application
    Filed: September 22, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Suryanarayanan Balasubramanian, Augustine Varun Mathew
  • Publication number: 20240012765
    Abstract: Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the first memory segment view to the second memory segment view; terminating the first memory segment view, to prevent access to the memory segment via the first memory segment view.
    Type: Application
    Filed: September 22, 2023
    Publication date: January 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Maurizio Cimadamore, James Malcolm Laskey, Jorn Bender Vernee
  • Publication number: 20240005200
    Abstract: A system is disclosed that includes capabilities for generating a Machine Learning (ML) inference pipeline for deploying an ML model using artifacts received from one or more training stages in an ML training pipeline. The system receives one or more artifacts for one or more training stages in a set of training stages in a ML training pipeline associated with an ML process. The system then identifies one or more inference stages in an ML inference pipeline that correspond to the one or more training stages in the ML training pipeline. For each inference stage that corresponds to a training stage, the system associates the artifact received for the training stage with the inference stage. The system then generates the ML inference pipeline comprising the inference stages and their associated artifacts, where the artifacts include the artifacts received for the training stages in the ML training pipeline.
    Type: Application
    Filed: June 29, 2022
    Publication date: January 4, 2024
    Applicant: Oracle International Corporation
    Inventors: Kripa Kanchana Sivakumar, Andrew Ioannou, John James Backof, II, Tzvi Keisar
  • Publication number: 20240004844
    Abstract: Client data corresponding to a single client can be stored. A decision to proceed with a defragmentation of two or more particular core groups can be determined. A destination core group to receive client data can be identified. At least one additional core group can be initiated to manage interim data write requests from the single client. Each of the two or more particular core groups can be closed to data write requests. A defragmentation of the two or more particular core groups can be performed by merging into the destination core group. The destination core group can be availed to data read and delete requests. The two or more fragmented core groups can be reallocated for other uses. The additional core groups continue to receive read and write requests. The destination core groups further can be merged and defragmented further.
    Type: Application
    Filed: September 28, 2022
    Publication date: January 4, 2024
    Applicant: Oracle International Corporation
    Inventors: Shushuai Zhu, Bo Zou, Yueying Yang, Nagarajan Muthupandian