[ { "title": "", "publication_date": "2018/02/06", "number": "", "url": "/2018/06/02/2014-06-01-system-and-method-for-providing-an-actively-invalidated-clientside-network-resource-cache2/", "abstract": "", "owner": "", "owner_city": "", "owner_country": "" }, { "title": "Systems and methods for large-scale system log analysis, deduplication and management", "publication_date": "2014/27/10", "number": "09195674", "url": "/2014/10/27/systems-and-methods-for-largescale-system-log-analysis-deduplication-and-management/", "abstract": "System and methods for parsing raw log data into structured log data, and removing duplicate entries, storing the deduplicated log data into binary format, and managing system events. The subject matter can increase speed of log data analysis and storage, reduce data storage for log data, and easily manage system events.", "owner": "LOGZILLA CORPORATION", "owner_city": "Austin", "owner_country": "US" }, { "title": "Systems and methods for highly scalable system log analysis, deduplication and management", "publication_date": "2014/27/10", "number": "09122694", "url": "/2014/10/27/systems-and-methods-for-highly-scalable-system-log-analysis-deduplication-and-management/", "abstract": "Systems and methods for parsing raw log data into structured log data, and removing duplicate entries, storing the deduplicated log data into binary format, and managing system events. The subject matter can increase speed of log data analysis and storage, reduce data storage for log data, and manage easily system events.", "owner": "LOGZILLA CORPORATION", "owner_city": "Austin", "owner_country": "US" }, { "title": "Data source-independent search system architecture", "publication_date": "2014/24/10", "number": "09454609", "url": "/2014/10/24/data-sourceindependent-search-system-architecture/", "abstract": "A search system architecture is disclosed. The search system architecture includes a search server, which in turn includes a search services module and a search engine adapter. The search services module and the search engine adapter are communicatively coupled to one another. The search services module is configured to communicate with a user interface. The search engine adapter is configured to communicate with a search engine.", "owner": "Oracle International Corporation", "owner_city": "Redwood Shores", "owner_country": "US" }, { "title": "Supporting RMA API over active message", "publication_date": "2014/02/09", "number": "09632973", "url": "/2014/09/02/supporting-rma-api-over-active-message2/", "abstract": "Methods, apparatus, and software for implementing RMA application programming interfaces (APIs) over Active Message (AM). AM write and AM read requests are sent from a local node to a remote node to write data to or read data from memory on the remote node using Remote Memory Access (RMA) techniques. The AM requests are handled by corresponding AM handlers, which automatically perform operations associated with the requests. For example, for AM write requests an AM write request handler may write data contained in an AM write request to a remote address space in memory on the remote node, or generate a corresponding RMA write request that is enqueued into an RMA queue used in accordance with a tagged message scheme. Similar operations are performed by AM read requests handlers. RMA reads and writes using AM are further facilitated through use of associated read, write, and RMA progress modules.", "owner": "Intel Corporation", "owner_city": "Santa Clara", "owner_country": "US" }, { "title": "Discovering resources of a distributed computing environment", "publication_date": "2014/17/06", "number": "09590859", "url": "/2014/06/17/discovering-resources-of-a-distributed-computing-environment2/", "abstract": "Methods, apparatuses, and computer program products for discovering resources of a distributed computing environment are provided. Embodiments include a management system transmitting an application program interface (API) message to the distributed computing environment. Embodiments also include the management system receiving from the distributed computing environment, a response to the API message and based on the response, identifying a resource of the distributed computing environment.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "API notebook tool", "publication_date": "2014/10/06", "number": "09442700", "url": "/2014/06/10/api-notebook-tool/", "abstract": "Techniques for an application programming interface (API) notebook tool are disclosed. In some implementations, an API notebook is a tool, framework, and ecosystem that enables easy exploration of services that expose APIs, creation and documentation of examples, use cases and workflows, and publishing and collaboration of APIs. In some embodiments, systems, processes, and computer program products for an API notebook tool include receiving a request for a client for calling an API for a service, and dynamically generating the client for the API for the service.", "owner": "MuleSoft, Inc.", "owner_city": "San Francisco", "owner_country": "US" }, { "title": "Rejuvenation of legacy code into resources-oriented architectures", "publication_date": "2014/29/04", "number": "09405512", "url": "/2014/04/29/rejuvenation-of-legacy-code-into-resourcesoriented-architectures/", "abstract": "A method for building a web-based application may include defining a scope of the web-based application, via a programming module, based on a plurality of parameters of a non-web-based application, and defining an error-handling mechanism based on an error-handling mechanism of the non-web-based application. The method may further include defining a plurality of resources for the web-based application, defining the mechanism of function for each resource of the plurality of resources, and generating the web-based application.", "owner": "CA, Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "Generating fault tolerant connectivity API", "publication_date": "2014/25/03", "number": "09081729", "url": "/2014/03/25/generating-fault-tolerant-connectivity-api/", "abstract": "To make a connection between a user application and a data source fault tolerant, a user may use a wrapper generator to create an API wrapper that retries request that may have failed due to a service disruption. Generally, the wrapper manages a cache and contains the necessary information for retrying a connection after a service disruption. To create the wrapper, the wrapper generator may identify the different commands used by the user application to access the data source. The wrapper generator presents these commands to the user who organizes the commands to generate usage patterns for the different requests the user application may send to the data source. The user may also define a caching preference associated the commands in the usage patterns. To restart the connection, the wrapper may use the cache data to generate a new request to complete the original failed request.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" }, { "title": "Detection of vulnerabilities in computer systems", "publication_date": "2014/11/02", "number": "09268945", "url": "/2014/02/11/detection-of-vulnerabilities-in-computer-systems/", "abstract": "Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is provided that includes modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability.", "owner": "Contrast Security, LLC", "owner_city": "Columbia", "owner_country": "US" }, { "title": "Scalable bootstrap method for assessing the quality of machine learning algorithms over massive time series", "publication_date": "2014/07/02", "number": "09530104", "url": "/2014/02/07/scalable-bootstrap-method-for-assessing-the-quality-of-machine-learning-algorithms-over-massive-time-series/", "abstract": "Described is a system for assessing the quality of machine learning algorithms over massive time series. A set of random blocks of a time series data sample of size n is selected in parallel. Then, r resamples are generated, in parallel, by applying a bootstrapping method to each block in the set of random blocks to obtain a resample of size n, where r is not fixed. Errors are estimated on the r resamples, and a final accuracy estimate is produced by averaging the errors estimated on the r resamples.", "owner": "HRL Laboratories, LLC", "owner_city": "Malibu", "owner_country": "US" }, { "title": "Discovering resources of a distributed computing environment", "publication_date": "2014/07/01", "number": "09584372", "url": "/2014/01/07/discovering-resources-of-a-distributed-computing-environment2/", "abstract": "Methods, apparatuses, and computer program products for discovering resources of a distributed computing environment are provided. Embodiments include a management system transmitting an application program interface (API) message to the distributed computing environment. Embodiments also include the management system receiving from the distributed computing environment, a response to the API message and based on the response, identifying a resource of the distributed computing environment.", "owner": "International Business Machines Corporation", "owner_city": "Armonk", "owner_country": "US" } ]