Info
Artikel von Didier Durand
Aktivitäten
-
Interesting numbers: they depict the leading AI companies from the perspective of financial markets. It seems that some of those companies benefit…
Interesting numbers: they depict the leading AI companies from the perspective of financial markets. It seems that some of those companies benefit…
Geteilt von Didier Durand
-
The AI hype cycle is moving faster than we can process. How do we separate actionable data from the noise? Enter the Stanford 2026 AI Index. 📊 [Link…
The AI hype cycle is moving faster than we can process. How do we separate actionable data from the noise? Enter the Stanford 2026 AI Index. 📊 [Link…
Geteilt von Didier Durand
-
We are officially moving past the era of autocomplete and entering the age of autonomous agents. 🚀 Tools like Claude Code aren’t just predicting…
We are officially moving past the era of autocomplete and entering the age of autonomous agents. 🚀 Tools like Claude Code aren’t just predicting…
Beliebt bei Didier Durand
Berufserfahrung und Ausbildung
Bescheinigungen und Zertifikate
Patente
-
Amazon Tech - Verifying Translated Access Controls for Application Modernization
Ausgestellt am US 12,368,716
Computer-implemented techniques for verifying translated access controls for application modernization include an application modernization service of a provider network obtaining a source access control. The service translates the source access control to a target access control. The service compiles the source access control and the target access control into respective automated reasoning solver encodings. The service uses the automated reasoning solver coding to query an automated reasoning…
Computer-implemented techniques for verifying translated access controls for application modernization include an application modernization service of a provider network obtaining a source access control. The service translates the source access control to a target access control. The service compiles the source access control and the target access control into respective automated reasoning solver encodings. The service uses the automated reasoning solver coding to query an automated reasoning solver such as Satisfiability Modulo Theories (SMT) solver to determine whether the source access control is less or more permissive than the target access control representing a security issue or an availability issue with the target access control, respectively.
Andere Erfinder:innenPatent anzeigen -
Amazon Tech - Decomposition of Monoliths into Multi-Account Provider Network Structure
Ausgestellt am US 12,184,504
Remapping mainframe functional components from a mainframe computing environment onto a network of distinct but communicating accounts of a provider network. The mainframe computer (or network of such computers) is analyzed hierarchically through one or more of physical separation between logical partitions (LPARs), LPARs within the mainframe computer(s), separation of batch and transactional workloads, separation of batch and transactional accounts, or security of the mainframe architecture…
Remapping mainframe functional components from a mainframe computing environment onto a network of distinct but communicating accounts of a provider network. The mainframe computer (or network of such computers) is analyzed hierarchically through one or more of physical separation between logical partitions (LPARs), LPARs within the mainframe computer(s), separation of batch and transactional workloads, separation of batch and transactional accounts, or security of the mainframe architecture. Mainframe application artifacts obtained through the analyzing are used to generate a graph model representing relationships among the mainframe application artifacts. The graph model includes nodes representing the mainframe application artifacts and edges connecting pairs of the mainframe application artifacts, where the edges represent use relationships between the pairs of mainframe application artifacts. The nodes are then clustered, where the clusters represent sets of mainframe artifacts having high density of use relationships, and the clusters correspond to the distinct accounts in the provider network.
Andere Erfinder:innenPatent anzeigen -
Amazon Tech - Cloud-Based Mainframe Service
Ausgestellt am US 12,143,398 B1
Systems, devices, and methods are provided for implementing a cloud-based mainframe service. A cloud-based mainframe service may utilize various resources, including an operating system that is provisioned with an authorization interceptor that uses a first set of security policies stored in a policy database to determine whether to grant or deny access to resources managed by the operating system. The authorization interceptor may use the security policies of the policy database to determine…
Systems, devices, and methods are provided for implementing a cloud-based mainframe service. A cloud-based mainframe service may utilize various resources, including an operating system that is provisioned with an authorization interceptor that uses a first set of security policies stored in a policy database to determine whether to grant or deny access to resources managed by the operating system. The authorization interceptor may use the security policies of the policy database to determine whether to grant access to operating system resources. A database management system may use a second set of security policies stored in the policy database to determine whether to grant or deny access to resources managed by the database system. Security policies for a mainframe service may be centrally stored in a policy database managed by a policy management service.
Andere Erfinder:innenPatent anzeigen -
Amazon Tech - Authorizing Access to Operating System Resources Using Security Policies Managed by Service External to the Operating System
Ausgestellt am US 12,111,940
Systems, devices, and methods are provided for authorizing access to operating system resources using security policies managed by a service external to the operating system. An operating system may be provisioned with a kernel-mode component that intercepts system calls from applications, determines a request context for the system call, and sends a request to an external policy management service.
The policy management service may be used to perform a policy evaluation to determine…Systems, devices, and methods are provided for authorizing access to operating system resources using security policies managed by a service external to the operating system. An operating system may be provisioned with a kernel-mode component that intercepts system calls from applications, determines a request context for the system call, and sends a request to an external policy management service.
The policy management service may be used to perform a policy evaluation to determine whether to grant access to operating system resources. In some cases, policies are cached by the operating system. In various examples, the operating system and policy management service are both hosted on resources managed by a computing resource service provider on behalf of a customer to run mainframe workloads.Andere Erfinder:innenPatent anzeigen -
Amazon Tech Inc - Cloud-Based Security Service for Improved Compliance of Mainframe Workloads
Ausgestellt am US 11,943,261 B1
Systems, devices, and methods are provided for determining whether security assurances are satisfied by security policies that are used to control access to resources used by a mainframe application. A system may use a database ot store a plurality of security policies that may comprise security polices of various resources used by mainframes, including resources managed by operating systems and database sys- tems. A reference policy that corresponds to the security assurance being sought may…
Systems, devices, and methods are provided for determining whether security assurances are satisfied by security policies that are used to control access to resources used by a mainframe application. A system may use a database ot store a plurality of security policies that may comprise security polices of various resources used by mainframes, including resources managed by operating systems and database sys- tems. A reference policy that corresponds to the security assurance being sought may be determined. The security policies may be evaluated using a satisfiability modulo theories (SMT) solver to determine whether the security policies are equally or less permissive than the reference policy.
Andere Erfinder:innenPatent anzeigen -
Amazon Tech Inc - Authorizing Access to Database System Resources Using Security Policies Managed by a Service Extermal to the Database System
Ausgestellt am US 11,880,483 B2
Systems, devices, and methods are provided for authorizing access to database management system (DBMS) resources using security policies managed by a service external to the DBMS. A DB may be provisioned to obtain a database request, identity one or more securable resources that from applications, determines a request context for the system call, and sends a request to an external policy management service. The policy management service may be used to perform a policy evaluation to determine…
Systems, devices, and methods are provided for authorizing access to database management system (DBMS) resources using security policies managed by a service external to the DBMS. A DB may be provisioned to obtain a database request, identity one or more securable resources that from applications, determines a request context for the system call, and sends a request to an external policy management service. The policy management service may be used to perform a policy evaluation to determine whether to grant access to the securable resources.
Andere Erfinder:innenPatent anzeigen -
CONTAINERIZED DEPLOYMENT OF MICROSERVICES BASED ON MONOLITHIC LEGACY APPLICATIONS
Ausgestellt am EU EP3411785
Patent anzeigenThe patent provides a scalable container-based system implemented in computer instructions stored in a non-transitory medium. It further provides a method of creating and operating a scalable container-based system.
-
CONTAINERIZED DEPLOYMENT OF MICROSERVICES BASED ON MONOLITHIC LEGACY APPLICATIONS
Angemeldet am US WO2018197928 (A1)
Patent anzeigen(Patent application currently under examination by various patent offices worldwide: official patent yt to be issued) The present invention relates to techniques and systems for partitioning monolithic legacy applications for deployment as microservices executing in a containerized, scalable and flexible operating environment.
-
Method for transmitting an anonymous request from a consumer to a content or service provider through a telecommunication network
Ausgestellt am US 8,401,867
A method and associated arrangement allows a content or service provider to establish an anonymous profile of a consumer using at least one request sent by the consumer through a communication network. The request sent by the consumer includes identification data of the consumer. The identification data is substituted in the network with an alias so as to anonymize the request. The identification data is not accessible to the content or service provider and there is a one-to-one and immutable…
A method and associated arrangement allows a content or service provider to establish an anonymous profile of a consumer using at least one request sent by the consumer through a communication network. The request sent by the consumer includes identification data of the consumer. The identification data is substituted in the network with an alias so as to anonymize the request. The identification data is not accessible to the content or service provider and there is a one-to-one and immutable correspondence between the identification data and the alias.
Andere Erfinder:innenPatent anzeigen -
Method for transmitting an anonymous request from a consumer to a content or service provider through a telecommunication network
Ausgestellt am US US 7,590,547 B2
A method and associated arrangement allows a content or service provider to establish an anonymous profile of a consumer using at least one request sent by the consumer through a communication network. The request sent by the consumer includes identification data of the consumer. The identification data is substituted in the network with an alias so as to anonymize the request. The identification data is not accessible to the content or service provider and there is a one-to-one and immutable…
A method and associated arrangement allows a content or service provider to establish an anonymous profile of a consumer using at least one request sent by the consumer through a communication network. The request sent by the consumer includes identification data of the consumer. The identification data is substituted in the network with an alias so as to anonymize the request. The identification data is not accessible to the content or service provider and there is a one-to-one and immutable correspondence between the identification data and the alias.
Andere Erfinder:innenPatent anzeigen -
Method Allowing a consumer to interact with a service provider
Ausgestellt am EU EP 1 433 275 B1
Method allowing a consumer (1) to interact with a service provider (4, 5, 6), comprising: broadcasting a label to a plurality of consumers (1) over a television system, manually entering said label on the keypad of a mobile equipment (11) of said consumer (1), sending with a synchronous or quasi-synchronous communication protocol a message based on said label over a mobile network (30) to a logic unit (5), removing or replacing consumer identification in said message with an alias.
Andere Erfinder:innenPatent anzeigen -
Method for supervising the publication of items in published media and for preparing automated proof of publications
Angemeldet am EU WO 2004/051506 A2
A method for preparing automated proof of publications and for supervising the publication of items in printed media, said method comprising: preparing a database including specifications for a plurality of items to publish, publishing said items on printed media using said specifications, scanning printed media pages or capturing an electronic file from a pre-press system including the published items, automatically extracting from the digitized pages identifying metadata characterizing said…
A method for preparing automated proof of publications and for supervising the publication of items in printed media, said method comprising: preparing a database including specifications for a plurality of items to publish, publishing said items on printed media using said specifications, scanning printed media pages or capturing an electronic file from a pre-press system including the published items, automatically extracting from the digitized pages identifying metadata characterizing said published items, using said identifying metadata to retrieve from a database the address to which said proof of publication should be sent, performing a quality control for controlling the quality of said published item by confronting the published item with said specifications, sending a proof of publication including at least the portion of said page including said published item to said address.
Andere Erfinder:innenPatent anzeigen -
Method allowing an advertisement publisher to compute the price billed to an advertising customer for publishing an advertisement or information in an offline media
Angemeldet am EU EP 1 490 812 A2
Method allowing an advertisement publisher to compute the price billed to an advertising customer for publishing an interactive advertisement in an offline media. The number of answers to the advertisement received over an electronic return channel is used as a metric for determining the effectiveness of said advertisement. At least one component of said price depends on said number of answers received.
Andere Erfinder:innenPatent anzeigen
Sprachen
-
English
Muttersprache oder zweisprachig
-
French
Muttersprache oder zweisprachig
-
German
Fließend
Erhaltene Empfehlungen
4 Personen haben Didier Durand empfohlen
Jetzt anmelden und ansehenWeitere Aktivitäten von Didier Durand
-
We are officially moving past the era of autocomplete and entering the age of autonomous agents. 🚀 Tools like Claude Code aren’t just predicting…
We are officially moving past the era of autocomplete and entering the age of autonomous agents. 🚀 Tools like Claude Code aren’t just predicting…
Geteilt von Didier Durand
-
DeepSeek v4 is out ! Goodbye, "context window claustrophobia." 👋 DeepSeek-V4 is here, and it's fundamentally re-engineering how we handle massive AI…
DeepSeek v4 is out ! Goodbye, "context window claustrophobia." 👋 DeepSeek-V4 is here, and it's fundamentally re-engineering how we handle massive AI…
Geteilt von Didier Durand
-
Did you know the #1 GitHub trending repo (68k+ stars) is literally just a CLAUDE.md file 🤯 It uses Andrej Karpathy's 4 LLM principles to keep AI…
Did you know the #1 GitHub trending repo (68k+ stars) is literally just a CLAUDE.md file 🤯 It uses Andrej Karpathy's 4 LLM principles to keep AI…
Beliebt bei Didier Durand
-
If you are in "vibe coding", this is the video (link in comments) you can't miss! Boris Cherny, father of Claude Code provides all insights about his…
If you are in "vibe coding", this is the video (link in comments) you can't miss! Boris Cherny, father of Claude Code provides all insights about his…
Geteilt von Didier Durand
-
AI acceleration in security breaches is a fact! if you need yet to be convinced, see the details of the breach that just happened at Vercel. #ai…
AI acceleration in security breaches is a fact! if you need yet to be convinced, see the details of the breach that just happened at Vercel. #ai…
Geteilt von Didier Durand
-
THE TED talk to watch if you're interested in Personal AI assistants in general and in OpenClaw in particular. 🦄 Peter Steinberger provides all…
THE TED talk to watch if you're interested in Personal AI assistants in general and in OpenClaw in particular. 🦄 Peter Steinberger provides all…
Geteilt von Didier Durand
-
It is sometimes very important to get back to ground truth and objective facts! Especially to erase fake (pseudo-)reputation of AI trolls (usually…
It is sometimes very important to get back to ground truth and objective facts! Especially to erase fake (pseudo-)reputation of AI trolls (usually…
Geteilt von Didier Durand
-
🚀 AI in Open-Source: The Linux Kernel Sets the Rules! 🐧 Is AI-generated code a developer’s best friend or a liability? The project behind one of…
🚀 AI in Open-Source: The Linux Kernel Sets the Rules! 🐧 Is AI-generated code a developer’s best friend or a liability? The project behind one of…
Geteilt von Didier Durand
-
The place to go (i.e. the book to read 😉 ) to understand the deep internals of Claude Code without diving into - leaked - source code ! #claude…
The place to go (i.e. the book to read 😉 ) to understand the deep internals of Claude Code without diving into - leaked - source code ! #claude…
Geteilt von Didier Durand
-
"Software has eaten the (physical) world" as per Mark Andreessen, father of our web browsers. AI is now devouring our digital world! Thanks Linas…
"Software has eaten the (physical) world" as per Mark Andreessen, father of our web browsers. AI is now devouring our digital world! Thanks Linas…
Geteilt von Didier Durand
Weitere ähnliche Profile
Entwickeln Sie mit diesen Kursen neue Kenntnisse und Fähigkeiten
-
52 Min.
Enterprise AI Solutions with AWS: Amazon Q Business, Bedrock Knowledge Bases, and SageMaker MLOps
-
1 Std. 57 Min.
Create Your Own Code Assistant with Llama 2, Node.js, and React.js
-
1 Std. 56 Min.
Deep Learning and Generative AI: Data Prep, Analysis, and Visualization with Python
