[ { "title": "Pluggable extension of software applications", "publication_date": "2015/18/12", "number": "09652214", "url": "/2015/12/18/pluggable-extension-of-software-applications2/", "abstract": "Various embodiments of systems and methods to provide pluggable extensions of software applications are provided herein. In one aspect, plugin application package is received for deployment. The plugin application package includes configuration data to comprising various definitions for the deployment of the plugin application. In another aspect, configuration data of a host software application is updated with at least a part of the configuration data of the plugin application. The host application is reconfigured based on the updated host configuration data to refer to the plugin application. In yet another aspect, one or more plugin services provided by the plugin application are exposed through the reconfigured host application, to handle corresponding user requests.", "owner": "SAP SE", "owner_city": "Walldorf", "owner_country": "DE" }, { "title": "Systems and methods for contextualized data protection", "publication_date": "2015/04/09", "number": "09361481", "url": "/2015/09/04/systems-and-methods-for-contextualized-data-protection/", "abstract": "Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity, and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. This concept is also referred to herein as Just-In-Time-Identity, or “JITI.” Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity and security—thereby facilitating the availability of more qualified information—via the use of temporally unique, dynamically changing de-identifiers (“DDIDs”). In some embodiments, specialized JITI keys may be used to “unlock” different views of the same DDID (or its underlying value), thereby providing granular control over the level of detail or obfuscation visible to each user based on the context of said user's authorized use of data, e.g., authorized purpose(s), place(s), time(s), or other attributes of the use.", "owner": "Anonos Inc.", "owner_city": "New York", "owner_country": "US" }, { "title": "Microsegmented networks that implement vulnerability scanning", "publication_date": "2015/28/08", "number": "09438634", "url": "/2015/08/28/microsegmented-networks-that-implement-vulnerability-scanning/", "abstract": "Systems for providing vulnerability scanning within distributed microservices are provided herein. In some embodiments, a system includes a plurality of microsegmented environments that each includes a hypervisor, an enforcement point that has an active probe device, and a plurality of virtual machines that each implements at least one microservice. The system also has a cloud data center server coupled with the plurality of microsegmented environments over a network. The cloud data center server has a security controller configured to provide a security policy to each of the plurality of microsegmented environments and an active probe controller configured to cause the active probe device of the plurality of microsegmented environments to execute a vulnerability scan.", "owner": "vArmour Networks, Inc.", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Context aware microsegmentation", "publication_date": "2015/28/08", "number": "09467476", "url": "/2015/08/28/context-aware-microsegmentation/", "abstract": "Context aware microservice networks and contextual security policies for microservice networks are provided herein. In some embodiments, a system includes a plurality of microservices, each of the plurality of microservices having a plurality of distributed microservice components. At least a portion of the distributed microservice components execute on different physical or virtual servers in a data center or a cloud. The system also includes a plurality of logical security boundaries, with each of the plurality of logical security boundaries being created by a plurality of enforcement points positioned in association with the plurality of distributed microservice components. Each of plurality of microservices is bounded by one of the plurality of logical security boundaries.", "owner": "vArmour Networks, Inc.", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Resource server providing a rapidly changing resource", "publication_date": "2015/02/07", "number": "09369406", "url": "/2015/07/02/resource-server-providing-a-rapidly-changing-resource/", "abstract": "A computer-readable medium is provided that causes a computing device to serve data resources. A nozzle is instantiated for a resource based on a media type associated with both the nozzle and the resource and starts a subscriber thread and a rendering thread. The subscriber thread receives a block of streamed data from a publishing device, stores the block in a queue, and receives a request to drain the queue. The block includes a unique identifier of an event associated with the media type. The rendering thread reads the block from the queue, renders the block, and stores the rendered block in a pre-allocated block of memory based on the unique identifier. A reference to the pre-allocated block of memory is stored in a tree map based on the unique identifier. The instantiated nozzle sends the rendered block to a requesting event client system.", "owner": "SAS Institute Inc.", "owner_city": "Cary", "owner_country": "US" } ]