Patents by Inventor Dayang Shi
Dayang Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146758Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: December 21, 2023Publication date: May 2, 2024Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Patent number: 11882145Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: GrantFiled: June 21, 2022Date of Patent: January 23, 2024Assignee: Palantir Technologies Inc.Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Publication number: 20230306382Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.Type: ApplicationFiled: June 2, 2023Publication date: September 28, 2023Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
-
Patent number: 11710104Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.Type: GrantFiled: October 21, 2021Date of Patent: July 25, 2023Assignee: Palantir Technologies Inc.Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
-
Publication number: 20230031440Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.Type: ApplicationFiled: October 7, 2022Publication date: February 2, 2023Inventors: Robert Speare, Dayang Shi, Spencer Lake
-
Patent number: 11494068Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.Type: GrantFiled: November 25, 2020Date of Patent: November 8, 2022Assignee: Palantir Technologies Inc.Inventors: Robert Speare, Dayang Shi, Spencer Lake
-
Publication number: 20220321595Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: June 21, 2022Publication date: October 6, 2022Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Patent number: 11418529Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: GrantFiled: March 6, 2019Date of Patent: August 16, 2022Assignee: Palantir Technologies Inc.Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Publication number: 20220044173Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.Type: ApplicationFiled: October 21, 2021Publication date: February 10, 2022Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
-
Patent number: 11182710Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.Type: GrantFiled: November 20, 2019Date of Patent: November 23, 2021Assignee: Palantir Technologies Inc.Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
-
Publication number: 20210081101Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.Type: ApplicationFiled: November 25, 2020Publication date: March 18, 2021Inventors: Robert Speare, Dayang Shi, Spencer Lake
-
Publication number: 20210004742Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.Type: ApplicationFiled: November 20, 2019Publication date: January 7, 2021Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
-
Patent number: 10877654Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.Type: GrantFiled: September 27, 2018Date of Patent: December 29, 2020Assignee: Palantir Technologies Inc.Inventors: Robert Speare, Dayang Shi, Spencer Lake
-
Publication number: 20200204578Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: March 6, 2019Publication date: June 25, 2020Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi