会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Managing distributed execution of programs
    • 管理程序的分布式执行
    • US08819106B1
    • 2014-08-26
    • US12415649
    • 2009-03-31
    • Peter SirotaRichendra KhannaIan P. NowlandRichard J. ColeJai VasanthAndrew J. HitchcockLuis Felipe Cabrera
    • Peter SirotaRichendra KhannaIan P. NowlandRichard J. ColeJai VasanthAndrew J. HitchcockLuis Felipe Cabrera
    • G06F15/16
    • H04L67/1008G06F9/485H04L29/08135H04L67/16
    • Techniques are described for managing distributed execution of programs. In some situations, the techniques include determining configuration information to be used for executing a particular program in a distributed manner on multiple computing nodes and/or include providing information and associated controls to a user regarding ongoing distributed execution of one or more programs to enable the user to modify the ongoing distributed execution in various manners. Determined configuration information may include, for example, configuration parameters such as a quantity of computing nodes and/or other measures of computing resources to be used for the executing, and may be determined in various manners, including by interactively gathering values for at least some types of configuration information from an associated user (e.g., via a GUI that is displayed to the user) and/or by automatically determining values for at least some types of configuration information (e.g., for use as recommendations to a user).
    • 描述了用于管理程序的分布式执行的技术。 在某些情况下,技术包括确定用于在多个计算节点上以分布式方式执行特定程序的配置信息和/或包括向用户提供关于一个或多个程序的正在进行的分布式执行的信息和相关控制,以使能 用户以各种方式修改正在进行的分布式执行。 确定的配置信息可以包括例如诸如计算节点的数量的配置参数和/或要用于执行的计算资源的其他度量,并且可以以各种方式来确定,包括通过交互地收集至少一些 来自相关用户的配置信息的类型(例如,经由显示给用户的GUI)和/或通过自动确定至少一些类型的配置信息(例如,用作对用户的建议)的值。
    • 6. 发明授权
    • Managing program execution based on data storage location
    • 根据数据存储位置管理程序执行
    • US08418181B1
    • 2013-04-09
    • US12476561
    • 2009-06-02
    • Peter SirotaRichendra Khanna
    • Peter SirotaRichendra Khanna
    • G06F9/46G06F15/16G06F15/173
    • H04L67/00G06F9/5033
    • Techniques are described for managing execution of programs, such as for distributed execution of a program on multiple computing nodes. In some situations, the techniques include selecting a cluster of computing nodes to use for executing a program based at least in part on data to be used during the program execution. For example, the computing node selection for a particular program may be performed so as to attempt to identify and use computing nodes that already locally store some or all of the input data that will be used by those computing nodes as part of the executing of that program on those nodes. Such techniques may provide benefits in a variety of situations, including when the size of input datasets to be used by a program are large, and the transferring of data to and/or from computing nodes may impose large delays and/or monetary costs.
    • 描述了用于管理程序的执行的技术,例如用于在多个计算节点上的程序的分布式执行。 在一些情况下,这些技术包括至少部分地基于要在程序执行期间使用的数据来选择用于执行程序的计算节点的集群。 例如,可以执行特定程序的计算节点选择,以便尝试识别和使用已经本地存储将被这些计算节点使用的一些或全部输入数据的计算节点,作为该执行的一部分 程序在这些节点上。 这种技术可以在各种情况下提供益处,包括当程序使用的输入数据集的大小较大时,以及向计算节点和/或从计算节点传输数据可能会施加大的延迟和/或货币成本。
    • 8. 发明授权
    • Detecting fraudulent activity by analysis of information requests
    • 通过分析信息请求来检测欺诈活动
    • US07984500B1
    • 2011-07-19
    • US11539076
    • 2006-10-05
    • Richendra KhannaSean C. Harding
    • Richendra KhannaSean C. Harding
    • G06F12/14
    • H04L63/1483G06F21/552G06F21/60H04L63/101H04L63/1416
    • Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.
    • 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。