Demoted data retention via a tiered ordered event stream data storage system

    公开(公告)号:US11971850B2

    公开(公告)日:2024-04-30

    申请号:US17503024

    申请日:2021-10-15

    CPC classification number: G06F16/125 G06F16/1805 G06F16/185

    Abstract: Data retention for a tiered ordered event stream (OES) data storage system is disclosed. Data retention can be applied to demoted data, e.g., data demoted from a first tier to a second tier of data storage devices. The data retention disclosed can avoid demoted events, generally aggregated via a chunk object, file object, etc., from being subject to both a stream-cut operation and a retention period. In embodiments, where a stream-cut instance corresponds to events occurring later in time than a retention end time (RET), all demoted events, e.g., as aggregated by a chunk, file, etc., can be affiliated with the RET. However, where the stream-cut instance corresponds to events occurring earlier in time than the RET, then a portion of the events, e.g., those that will be truncated by performing the stream-cut instance, can be demoted and affiliated with the RET.

    Automated orchestration of large-scale flow log transformation

    公开(公告)号:US11947965B2

    公开(公告)日:2024-04-02

    申请号:US17816449

    申请日:2022-08-01

    Abstract: When a transformation job of flow logs generated for a cloud environment is triggered, a security service determines a parameterized template for batch data processing operations offered by the cloud service provider (CSP) to use based on the type of transformation job. The security service communicates an indication of the template and the corresponding parameter values to a data processing service/pipeline offered by the CSP. The provisioned processing resources retrieve the flow logs from a designated location in cloud storage, complete the transformation, and store the transformed flow logs in a new storage location. If the CSP does not provide a data processing service/pipeline which can perform bulk data transformation, the security service uses a generic parameterized template specifying a transformation job to be run on a cluster. Upon completion, the security service retrieves and analyzes the transformed flow logs as part of threat detection performed for securing the cloud environment.

    Automatic geological formations tops picking using dynamic time warping (DTW)

    公开(公告)号:US11914099B2

    公开(公告)日:2024-02-27

    申请号:US16671516

    申请日:2019-11-01

    CPC classification number: G01V5/12 E21B49/003 G06F16/116 G06F16/1805

    Abstract: Systems and methods include a method for predicting geological formation tops. First well log data associated with a key master well is received. Formation data identifying tops of formations confirmed in the key master well is received. Merged key master well and formation data is generated in a dynamic time warping (DTW)-readable format by merging the first well log data with the formation data. Second well log data associated with a training well located in geographic proximity to the key master well is received. The second well log data is formatted into the DTW-readable format. A DTW function is executed to generate indices associated with the formation tops. The DTW function uses the merged key master well and formation data and the formatted second well log data as DTW function inputs. Predicted geological formation tops for the training well are predicted using the generated indexes.

    DISTRIBUTED TRANSACTION-BASED SECURITY AND TRACKING OF MACHINE AND AGRONOMIC DATA

    公开(公告)号:US20240064155A1

    公开(公告)日:2024-02-22

    申请号:US18497706

    申请日:2023-10-30

    Abstract: Embodiments provide for distributed transaction-based provenance tracking of agricultural data, secured access to authorized user accounts, auditability of the data, and transactional oversight of the data when exchanged between user accounts. A distributed ledger network including a primary node and a plurality of secondary nodes can store transactions generated based on various operations on or associated with agricultural data, including the certification of select portions of agricultural data collected by a data collection device, commands received from client devices associated with user accounts purchasing or licensing the agricultural data, and detected attempts to access the agricultural data, among other things. The primary node provides a variety of security features that can ensure that the agricultural data is protected, remains auditable by tracking the provenance of the agricultural data, and cannot be subjected to unauthorized sale, each feature having ironclad reliability based on immutable transactions stored on a distributed ledger.

Patent Agency Ranking