会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明申请
    • VOICE-BASED IDENTIFICATION OF RELATED PRODUCTS
    • WO2019028175A1
    • 2019-02-07
    • PCT/US2018/044870
    • 2018-08-01
    • UPSELL DIRECT LLC
    • LEVY, Avery
    • G10L15/00H04M3/493
    • Methods and systems for voice-based identification of related products/services are provided. Exemplary systems may include a wireless communication-based tag reader that polls for a wireless transmission-based tag and reads information associated with the wireless transmission-based tag and a processor that executes instructions to identify a product/service associated with the wireless transmission-based tag, identify a plurality of products/services stored in a product/service database identified as related to the product/service associated with the wireless transmission-based tag, filter through the plurality of related products/services based on at least one voice-based parameter to identify a set of one or more related products/services, and generate a voice-based utterance based on the identified set of one or more related products/services. Such systems may further include a speaker that plays the generated voice-based utterance resulting in presentation of an offer regarding the identified set of one or more related products/services and a microphone that is activated to capture any voice-based response after the generated voice- based utterance is played.
    • 62. 发明申请
    • EDGE PROTECTION FOR INTERNAL IDENTITY PROVIDERS
    • 内部身份提供商的边缘保护
    • WO2018081126A1
    • 2018-05-03
    • PCT/US2017/058094
    • 2017-10-24
    • SONICWALL US HOLDINGS INC.
    • PETERSON, ChristopherKUMAR, Abhishek
    • H04L29/06H04L29/00H04L29/08
    • Systems and methods for edge protection for internal identity providers are provided. A first claimed embodiment of the present disclosure involves a method for edge protection for internal identity providers. The method includes receiving a service authentication request at a virtual private networking (VPN) appliance on an edge of a secure network. A client device external to the secure network can send the service authentication request. The VPN appliance can then send a synthetic service authentication request to an identity provider in the secure network. This synthetic service authentication request can be based on the service authentication request. The VPN can then receive an authenticated credential from the identity provider. The authenticated credential is responsive to the synthetic service authentication request. The VPN appliance can then send the authenticated credential from the VPN appliance to the client device.
    • 提供了用于内部身份提供者的边缘保护的系统和方法。 本公开的第一要求保护的实施例涉及用于内部身份提供者的边缘保护的方法。 该方法包括在安全网络的边缘上的虚拟专用网络(VPN)设备处接收服务认证请求。 安全网络外部的客户端设备可以发送服务认证请求。 然后,VPN设备可以将合成服务认证请求发送到安全网络中的身份提供者。 该合成服务认证请求可以基于服务认证请求。 VPN然后可以从身份提供者接收认证的凭证。 经认证的凭证响应于综合服务认证请求。 然后,VPN设备可以将认证的凭证从VPN设备发送到客户端设备。

    • 63. 发明申请
    • UNIFIED POWER DEVICE MANAGEMENT AND ANALYZER
    • 统一的电源设备管理和分析仪
    • WO2018080556A1
    • 2018-05-03
    • PCT/US2016/062253
    • 2016-11-16
    • SILICON GRAPHICS INTERNATIONAL CORP.
    • DONLIN, Patrick, J.
    • G01D4/00G06F11/00G06F11/22G06F11/273G06F11/30
    • G06F1/28
    • The present disclosure is directed to monitoring power devices in a data center. The present disclosure describes systems, methods, and non-transitory computer readable storage mediums that provide increasing amounts of power monitoring and ultimately comprehensive power monitoring, power control, power failure forecasting, power event alerts, power data collection, and that manages power corrective actions. Systems, methods, and non-transitory computer readable storage mediums of the present disclosure may also gather intelligence by analyzing data trends over time such that design weaknesses can be identified an addressed in next generation data center computing and power distribution system designs.
    • 本公开涉及监视数据中心中的功率设备。 本公开描述了提供增加量的功率监视和最终全面的功率监视,功率控制,功率故障预测,功率事件警报,功率数据收集以及管理功率校正动作的系统,方法和非临时性计算机可读存储介质 。 本公开的系统,方法和非暂时性计算机可读存储介质还可以通过分析随时间推移的数据趋势来收集情报,使得可以识别设计弱点并在下一代数据中心计算和配电系统设计中寻址。
    • 64. 发明申请
    • SINGLE TIER ROUTING
    • 单层路由
    • WO2017180772A1
    • 2017-10-19
    • PCT/US2017/027251
    • 2017-04-12
    • QUEST SOFTWARE INC.
    • DYSZYNSKI, KarlWORK, Steven, C.
    • G06F15/16H04L12/14H04L12/24H04L12/26H04L12/721H04L12/743
    • H04L45/02H04L41/5054H04L41/5058H04L43/04H04L43/08H04L43/0817H04L43/0852H04L43/0876H04L67/1004H04L67/1008H04L67/1097H04L67/18H04L67/42
    • A single global traffic optimizer can be configured to perform the functionality of a global and local traffic manager. For example, the global traffic optimizer can receive a client request from a client device and route the client request to an appropriate service provider from a set of geographically dispersed service providers to service the client request. In addition to the geographic location data of the client device and service providers, the global traffic optimizer can also analyze health metrics describing service quality of the various service providers, such as Central Processing Unit (CPU) usage, bandwidth, memory usage, connectivity, service provider's network status, network latency, user capacity saturation, etc. Based on an analysis of this data, the global traffic optimizer can determine the service provider that is best suited to service the client request and route the client request accordingly without need for a local traffic manager.
    • 单个全局流量优化器可以配置为执行全局和本地流量管理器的功能。 例如,全局流量优化器可以从客户端设备接收客户端请求,并将客户端请求路由到来自一组地理上分散的服务提供者的适当的服务提供者以服务于客户端请求。 除了客户端设备和服务提供商的地理位置数据之外,全局流量优化器还可以分析描述各种服务提供商的服务质量的健康度量,诸如中央处理单元(CPU)使用率,带宽,存储器使用率,连通性, 服务提供商的网络状态,网络延迟,用户容量饱和度等。基于对这些数据的分析,全局流量优化器可以确定最适合于服务客户端请求的服务提供者,并相应地路由客户端请求,而不需要 本地流量管理器。

    • 65. 发明申请
    • METHOD AND SYSTEM FOR SHARED DIRECT ACCESS STORAGE
    • 共享直接访问存储的方法和系统
    • WO2017087544A1
    • 2017-05-26
    • PCT/US2016/062316
    • 2016-11-16
    • SILICON GRAPHICS INTERNATIONAL CORP.
    • MALKIN, KirillDEAN, SteveWOODACRE, MichaelGOH, Eng, Lim
    • G06F9/50G06F11/07H04L12/24H04L29/06
    • G06F3/0607G06F3/0635G06F3/0685G06F3/0688G06F9/5027G06F2209/509Y02D10/22Y02D10/36
    • In high performance computing, the potential compute power in a data center will scale to and beyond a billion-billion calculations per second ("Exascale" computing levels). Limitations caused by hierarchical memory architectures where data is temporarily stored in slower or less available memories will increasingly limit high performance computing systems from approaching their maximum potential processing capabilities. Furthermore, time spent and power consumed copying data into and out of a slower tier memory will increase costs associated with high performance computing at an accelerating rate. New technologies, such as the novel Zero Copy Architecture disclosed herein, where each compute node writes locally for performance, yet can quickly access data globally with low latency will be required. The result is the ability to perform burst buffer operations and in situ analytics, visualization and computational steering without the need for a data copy or movement.
    • 在高性能计算中,数据中心中的潜在计算能力将扩展到并超过每秒十亿次计算(“Exascale”计算水平)。 分层存储器架构造成的限制将数据临时存储在较慢或较少的可用存储器中,这将限制高性能计算系统接近其最大潜在处理能力。 此外,将数据复制到慢速内存中所花费的时间和功耗将以更快的速度增加与高性能计算相关的成本。 新技术,例如这里公开的新颖零复制体系结构,其中每个计算节点为了性能而本地写入,但可以以低等待时间快速访问全局数据。 其结果是能够执行突发缓冲区操作和原位分析,可视化和计算控制,而无需数据复制或移动。