LOGGING FROM USER-DEFINED FUNCTIONS
The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Fur...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Kunen, Isaac Cruanes, Thierry Iyer, Ganeshan Ramachandran |
description | The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022350880A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022350880A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022350880A13</originalsourceid><addsrcrecordid>eNrjZFD28Xd39_RzV3AL8vdVCA12DdJ1cXXz9HN1UXAL9XMO8fT3C-ZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkbGpgYWFgaOhsbEqQIA5acjqQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>LOGGING FROM USER-DEFINED FUNCTIONS</title><source>esp@cenet</source><creator>Kunen, Isaac ; Cruanes, Thierry ; Iyer, Ganeshan Ramachandran</creator><creatorcontrib>Kunen, Isaac ; Cruanes, Thierry ; Iyer, Ganeshan Ramachandran</creatorcontrib><description>The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221103&DB=EPODOC&CC=US&NR=2022350880A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20221103&DB=EPODOC&CC=US&NR=2022350880A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Kunen, Isaac</creatorcontrib><creatorcontrib>Cruanes, Thierry</creatorcontrib><creatorcontrib>Iyer, Ganeshan Ramachandran</creatorcontrib><title>LOGGING FROM USER-DEFINED FUNCTIONS</title><description>The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFD28Xd39_RzV3AL8vdVCA12DdJ1cXXz9HN1UXAL9XMO8fT3C-ZhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfGhwUYGRkbGpgYWFgaOhsbEqQIA5acjqQ</recordid><startdate>20221103</startdate><enddate>20221103</enddate><creator>Kunen, Isaac</creator><creator>Cruanes, Thierry</creator><creator>Iyer, Ganeshan Ramachandran</creator><scope>EVB</scope></search><sort><creationdate>20221103</creationdate><title>LOGGING FROM USER-DEFINED FUNCTIONS</title><author>Kunen, Isaac ; Cruanes, Thierry ; Iyer, Ganeshan Ramachandran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022350880A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Kunen, Isaac</creatorcontrib><creatorcontrib>Cruanes, Thierry</creatorcontrib><creatorcontrib>Iyer, Ganeshan Ramachandran</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kunen, Isaac</au><au>Cruanes, Thierry</au><au>Iyer, Ganeshan Ramachandran</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>LOGGING FROM USER-DEFINED FUNCTIONS</title><date>2022-11-03</date><risdate>2022</risdate><abstract>The logging techniques described herein can enable using logging tools without having to use different methods for sandbox implementations and push out the log data to storage without problems. The log data is treated as sensitive data and is protected according to the defined security policies. Further, the results may be compressed and encrypted.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2022350880A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | LOGGING FROM USER-DEFINED FUNCTIONS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T14%3A53%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Kunen,%20Isaac&rft.date=2022-11-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022350880A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |