Patent application number | Description | Published |
20130232248 | METHOD AND SYSTEM FOR SIMPLIFYING DISTRIBUTED SERVER MANAGEMENT - A method and system for managing a large number of servers and their server components distributed throughout a heterogeneous computing environment is provided. In one embodiment, an authenticated user, such as a IT system administrator, can securely and simultaneously control and configure multiple servers, supporting different operating systems, through a “virtual server.” A virtual server is an abstract model representing a collection of actual target servers. To represent multiple physical servers as one virtual server, abstract system calls that extend execution of operating-system-specific system calls to multiple servers, regardless of their supported operating systems, are used. A virtual server is implemented by a virtual server client and a collection of virtual server agents associated with a collection of actual servers. | 09-05-2013 |
20150326423 | METHOD AND SYSTEM FOR SIMPLIFYING DISTRIBUTED SERVER MANAGEMENT - A method and system for managing a large number of servers and their server components distributed throughout a heterogeneous computing environment is provided. In one embodiment, an authenticated user, such as a IT system administrator, can securely and simultaneously control and configure multiple servers, supporting different operating systems, through a “virtual server.” A virtual server is an abstract model representing a collection of actual target servers. To represent multiple physical servers as one virtual server, abstract system calls that extend execution of operating-system-specific system calls to multiple servers, regardless of their supported operating systems, are used. A virtual server is implemented by a virtual server client and a collection of virtual server agents associated with a collection of actual servers. | 11-12-2015 |
Patent application number | Description | Published |
20140013452 | DATA PROTECTION HUB - Embodiments of the invention broadly described, introduce systems and methods for protecting data at a data protection hub using a data protection policy. One embodiment of the invention discloses a method for protecting unprotected data. The method comprises receiving a data protection request message comprising unprotected data and one or more policy parameters, determining a data protection transformation using the policy parameters, performing the data protection transformation on the unprotected data to generate protected data, and sending the protected data | 01-09-2014 |
20140047551 | PRIVACY FIREWALL - Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data. | 02-13-2014 |
20140052999 | Searchable Encrypted Data - Embodiments of the invention broadly described, introduce systems and methods for enabling the searching of encrypted data. One embodiment of the invention discloses a method for generating a searchable encrypted database. The method comprises receiving a plurality of sensitive data records comprising personal information of different users, identifying one or more searchable fields for the sensitive data records, wherein each searchable field is associated with a subset of the personal information for a user, generating a searchable field index for each of the one or more searchable fields, and encrypting the sensitive data records using a database encryption key. | 02-20-2014 |
Patent application number | Description | Published |
20140207403 | INSPECTION INSTRUMENT AUTO-CONFIGURATION - A method includes obtaining, via an inspection instrument, identifying information relating to an object that is to be inspected; querying, via the inspection instrument, a data source for relevant inspection information using at least the identifying information; receiving, via the inspection instrument, the relevant inspection information; and configuring the inspection instrument, via changes automatically implemented by the inspection instrument, based upon the received relevant inspection information. | 07-24-2014 |
20140207406 | SELF-DIRECTED INSPECTION PLAN - In one embodiment, a method is provided. The method includes determining a current state within an inspection process, and determining a first portion of an inspection process that corresponds to the current state within the inspection process, wherein the inspection process comprises a plurality of steps that correspond to an inspection process. The method further includes presenting a first instructional aide associated with the first portion, and automatically presenting a second instructional aide that corresponds to a second portion of the inspection process when the current state corresponds to the second portion. | 07-24-2014 |
20140207417 | REALTIME INSPECTION MANAGEMENT - An inspection management system is provided. The inspection management system includes an inspection data provider that receives inspection data relating to an inspector, one or more devices used to complete an inspection, one or more assets associated with an inspection, an inspection plan, etc. A display of the inspection management system presents one or more graphical user interfaces based upon the inspection data. The graphical user interfaces may facilitate inspection planning, execution, preparation, and/or real-time inspection monitoring. | 07-24-2014 |
20140207419 | INSPECTION DATA GRAPHICAL FILTER - A system is provided that includes computer-readable storage configured to store non-destructive testing inspection data relating to a portion of an object that has been inspected. Further, a processor presents a model associated with the object, associates the inspection data with the related portion of the object; and presents an indication of availability of the inspection data on a portion of the presented model. The portion of the presented model relates to the portion of the object associated with the inspection data. | 07-24-2014 |
20140207514 | INSPECTION DATA PROVISION - A method provides identification information configured to identify a particular step or portion of an inspection process. Supplemental data relating to the particular step or portion is received based at least in part upon the identification information. This supplemental data is presented to an inspector or other operator. | 07-24-2014 |
20140207601 | SYSTEMS AND METHODS FOR A NON-DESTRUCTIVE TESTING ECOSYSTEM - A non-transitory computer readable medium may include executable instructions which, when executed by a processor, cause the processor to provide for a non-destructive testing (NDT) ecosystem. The NDT ecosystem includes a repository of digital content, and a store configured to sell the digital content to a customer, wherein the digital content is executable by a NDT device and wherein the digital content is created by a plurality of entities. | 07-24-2014 |
20140207862 | SYSTEMS AND METHODS FOR COLLABORATING IN A NON-DESTRUCTIVE TESTING SYSTEM USING LOCATION INFORMATION - A collaboration system for sharing data in a non-destructive testing (NDT) system may include a first computing device that may receive data that has been acquired using one or more NDT inspection devices. The first computing device may then establish a communication connection between itself and some other computing device such that the communication connection may enable the first computing device to share data with the other computing device. After establishing the communication connection, the first computing device may determine location information that corresponds to the data. Using the location information, the first computing device may then determine one or more assets that correspond to the data. The first computing device may then identify information associated with the assets and display the information. | 07-24-2014 |
20140207874 | SYSTEMS AND METHODS FOR COLLABORATING IN A NON-DESTRUCTIVE TESTING SYSTEM - A collaboration system may include a computing device that may communicate with the at least one other computing device via a computing network network. The computing device may receive data that has been acquired using one or more non-destructive testing (NDT) inspection devices, receive an input that may cause a list of one or more experts indicated as available to collaborate to be derived. The computing device may also receive a selection of at least one expert from the list of experts. After receiving the expert selection, the computing device may establish a communication connection between the computing device and the at least one other computing device that corresponds to the at least one expert. Here, the communication connection may share data depicted on the computing device with the at least one other computing device. | 07-24-2014 |
20140207875 | SYSTEMS AND METHODS FOR SHARING DATA IN A NON-DESTRUCTIVE TESTING SYSTEM - A method for sharing data in a non-destructive testing (NDT) system may include receiving, using a microprocessor, an indication of data to be shared such that the data has been acquired using one or more non-destructive testing (NDT) inspection devices. The method may also include receiving a format in which to send the data, receiving one or more recipients designated to receive the data to be shared; and automatically modifying the data into the format and sending the modified data to the recipients once the data has been acquired by the NDT inspection devices. | 07-24-2014 |
20140208159 | SYSTEMS AND METHODS FOR IMPLEMENTING DATA ANALYSIS WORKFLOWS IN A NON-DESTRUCTIVE TESTING SYSTEM - A collaboration system may include a first computing device that may communicate with at least one other computing device via a computing network. The computing network may communicatively couple to a number of computing devices and the first computing device may receive inspection data acquired by one or more non-destructive testing (NDT) devices. After receiving the inspection data, the first computing device may determine at least one of a workflow for analyzing the inspection data based on the inspection data, a layout configured to display the inspection data, or a set of tools configured to analyze the inspection data. The first computing device may then implement the workflow, display the inspection data according to the layout, and/or display the set of tools. The workflow may include one or more processes that may be used to analyze the inspection data. | 07-24-2014 |
20140208163 | SYSTEMS AND METHODS FOR ANALYZING DATA IN A NON-DESTRUCTIVE TESTING SYSTEM - A collaboration system may include a non-destructive testing (NDT) inspection device that may communicate with at least one other computing device via a computing network. The computing network may communicatively couple a plurality of computing devices and the NDT inspection device may acquire inspection data, establish a communication connection to the at least one other computing device, and send the data to the at least one other computing device. There, the at least one other computing device may analyze the data. After the data is analyzed, the NDT inspection device may receive the analyzed data from the at least one other computing device. | 07-24-2014 |