|
2026
|
P/S
|
Cloud computing services providing software for database management; providing on-line non-downlo... |
|
|
P/S
|
Arranging, organizing, and conducting trade shows, exhibitions, and business networking events in... |
|
2025
|
Invention
|
Methods and systems for conflict detection and mitigation between services in an autonomous datab... |
|
|
Invention
|
Techniques for resource discovery while building data centers.
Techniques are described for iden... |
|
|
Invention
|
System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in ... |
|
|
Invention
|
System and method for supporting target groups for congestion control in a private fabric in a hi... |
|
|
Invention
|
System selected fungible configurable attributes for a compute instance.
Techniques for configur... |
|
|
Invention
|
5g interface handler for legacy systems.
Various embodiments of the present technology generally... |
|
|
Invention
|
System integrations based on intelligent monitoring.
Techniques for facilitating efficient polli... |
|
|
Invention
|
System and method for reactive messaging client for use with a microservices environment.
In acc... |
|
|
Invention
|
Workload identity resource principle.
Techniques are described herein for authenticating a pod. ... |
|
|
Invention
|
Methods, systems, and computer readable media for adjusting and using priorities of service/notif... |
|
|
Invention
|
Techniques for efficient encryption and decryption during file system cross-region replication.
... |
|
|
Invention
|
Managing content items to fill a content slot on a webpage.
Present invention describes a comput... |
|
|
P/S
|
Network interface cards and data processing units for use in improving operational efficiency, se... |
|
|
Invention
|
Multi-region login.
A system for providing login to a network of a cloud service provider via mo... |
|
|
Invention
|
Proxy-based techniques for authorizing cross-realm requests.
Techniques are disclosed for using ... |
|
|
Invention
|
Policy enforcement across identity boundaries.
Disclosed techniques relate to utilizing a resour... |
|
|
Invention
|
Cross-realm authorization techniques.
Cross-realm authorization techniques are disclosed. The id... |
|
|
Invention
|
Zero trust packet routing aggregation and log ingestion. Techniques are described for visualizing... |
|
|
Invention
|
Obtaining a domain certificate utilizing a proxy server.
According to certain implementations, a... |
|
|
Invention
|
Delayed on-behalf-of authorization scheme. Techniques for facilitating a connection between a gov... |
|
|
Invention
|
Methods, systems, and computer readable media for providing stream control transmission protocol ... |
|
|
Invention
|
Verifying assignment of initial values to instance fields of class instances.
A system encounter... |
|
|
Invention
|
Reciprocating locks.
One or more processors and memory may implement threads that perform alloca... |
|
2024
|
Invention
|
Techniques for optimizing change tracking of a file system.
A change tracking and delta generati... |
|
|
Invention
|
Dynamically enabling/disabling change tracking on running replication for a multi-client file sys... |
|
|
P/S
|
computer services, namely, providing access to a computer server being a global computer network ... |
|
|
Invention
|
Repository-based state diffing system and migration script generating system for databases.
Syst... |
|
|
P/S
|
Computer services, namely, providing computer software as a service (SaaS) to collect, manage, an... |
|
|
Invention
|
Assessing security risk at scale for a computing environment. Techniques for assessing security r... |
|
|
P/S
|
Cloud computing featuring computer software in the nature of software compilers and virtual machi... |
|
|
P/S
|
Cloud computing featuring computer software in the nature of
software compilers and virtual mach... |
|
|
Invention
|
Identity collection membership auditing.
Techniques for identity collection (IC) membership audi... |
|
|
Invention
|
Webhook registration using a rapid application building platform.
Techniques for webhook registr... |
|
|
Invention
|
Detecting suspicious activity using bayesian networks.
Method includes: configuring ML model to ... |
|
|
Invention
|
In-memory result set rebalancing for distributed graph queries.
Two modes of result set rebalanc... |
|
|
Invention
|
One-shot, automated, multi-seasonal autoregressive tabular-forecaster.
For machine learning of t... |
|
|
P/S
|
Downloadable computer software for use in the healthcare
field, namely, software for managing, s... |
|
|
Invention
|
Intermittent failure handling for network functions.
Various embodiments herein relate to system... |
|
|
Invention
|
Reconciler engine(s) for managing external resources within a cloud-based environment.
Various e... |
|
|
Invention
|
Ranked reciprocal mutuality as a precision mechanism for large sets of similarities.
Systems, me... |
|
|
Invention
|
Dynamic access token generation for visitor consumers within a 5g network.
Various embodiments o... |
|
|
Invention
|
Attack detection with application-aware system call analysis.
The operations include obtaining a... |
|
|
Invention
|
Selective passage of software packages, based on signed software bill of materials (sbom).
Techn... |
|
|
Invention
|
Audit indication for session validation request.
Various embodiments herein relate to systems, m... |
|
|
Invention
|
Process improvements for region builds for cloud networks. Techniques disclosed herein pertain to... |
|
|
Invention
|
Core distribution optimizer for multi-core cpu.
Systems, methods, and other embodiments associat... |
|
|
Invention
|
Assessing security risk at scale for a computing environment.
Techniques for assessing security ... |
|
|
Invention
|
Private smart contract events in a permissioned blockchain.
Herein is privacy for a smart contra... |
|
|
Invention
|
Execution and semantic error correction capabilities for natural language to logical form model. ... |
|
|
Invention
|
Dynamic signature identification from handwritten elements.
A method can include identifying han... |
|
|
Invention
|
Methods, systems, and computer readable media for increasing resilience of network topology hidin... |
|
|
Invention
|
Key reuse in a cloud environment.
Techniques for detected reuse of a public key of a public/priv... |
|
|
Invention
|
Artifact source code identification.
Artifact source code identification includes obtaining an a... |
|
|
P/S
|
Computer services, namely, providing computer software as a service (SaaS) services featuring com... |
|
|
P/S
|
Downloadable computer software for use in the healthcare field, namely, software for managing, st... |
|
2023
|
P/S
|
Software as a service (SAAS) services featuring software for use in development, automation, and ... |
|
|
P/S
|
Software as a Service (SaaS) services featuring software for creating user interfaces and user ex... |
|
|
P/S
|
Downloadable computer software applications for data management, security, integration, analytics... |
|
|
P/S
|
Downloadable computer software applications for data
management, security, integration, analytic... |
|
|
P/S
|
Clothing, namely, shirts, sweatshirts, jackets and caps. |
|
|
P/S
|
clothing, namely, shirts, sweatshirts, jackets, and caps being headwear |
|
|
P/S
|
Clothing, namely, shirts, sweatshirts, jackets and caps. |
|
|
P/S
|
downloadable computer software applications for data management and security in the fields of nat... |
|
|
P/S
|
Software as a Service (SaaS) services featuring non-downloadable computer software for creating a... |
|
|
P/S
|
Software as a Service (SaaS) services featuring
non-downloadable computer software for software ... |
|
|
P/S
|
Infrastructure as a Service (IaaS) provider services, namely cloud computing services featuring b... |
|
|
P/S
|
Infrastructure as a Service (IaaS) services, namely, cloud
computing services featuring computer... |
|
|
P/S
|
Downloadable computer software for use in processing, analyzing, reporting, and validating clinic... |
|
|
P/S
|
Downloadable computer software for use in processing,
analyzing, reporting, and validating healt... |
|
2022
|
P/S
|
Software as a Service (SaaS) services featuring non-downloadable computer software for software p... |
|
|
P/S
|
Software as a Service (SaaS) services featuring software for use in development, automation, and ... |
|
|
P/S
|
Infrastructure as a Service (IaaS) services, namely, cloud computing services featuring computer ... |
|
|
P/S
|
Downloadable computer software for use in processing, analyzing, reporting, and validating health... |
|
|
P/S
|
Software as a service, for use in connection with compiling administrative and analytical safety ... |
|
|
P/S
|
Arranging and conducting trade shows and exhibitions in the fields of computer software, computer... |
|
|
P/S
|
Arranging and conducting trade shows and exhibitions in the
fields of computer software, compute... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for
project management, scheduling, ris... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for project management, risk analysis, o... |
|
|
P/S
|
Software as a service (SAAS) services featuring software for project management, scheduling, risk... |
|
|
P/S
|
Software as a Service. |
|
|
P/S
|
Computer programs for use in project plan management
applications. |
|
|
P/S
|
Arranging and conducting educational conferences, seminars,
speeches, and entertainment, namely ... |
|
|
P/S
|
Arranging and conducting educational conferences, seminars, speeches, and entertainment, namely, ... |
|
|
P/S
|
Computer software in the nature of compiler software and downloadable computer software that assi... |
|
|
P/S
|
Computer software in the form of software compilers and virtual machines for providing peak perfo... |
|
|
P/S
|
Computer software in the nature of software compilers and virtual machines for providing peak per... |