Nitya Narasimhan - Lake Zurich IL, US Tzvetan T. Horozov - Hoffman Estates IL, US Danesh S. Irani - Atlanta GA, US Swapnil E. Mhatre - Atlanta GA, US Clayton W. Shepard - Albuquerque NM, US Venugopal Vasudevan - Palatine IL, US Joseph W. Wodka - Hoffman Estates IL, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
H04N 7/173
US Classification:
725112
Abstract:
A network element () can receive () (from an end user () and via a data network ()) a message as regards an aggregation of multiple different renderable content items. By one approach this message comprises, at least in part, selection criteria as have been selected by the end user. This network element can then automatically use () this selection criteria to select a plurality of specific renderable content items from amongst a plurality of candidate different renderable content items. These teachings will then support automatically combining () the plurality of specific renderable content items to form the requested aggregation of multiple different renderable content items.
Method And Apparatus Regarding Receipt Of Audio-Visual Content Information And Use Of Such Information To Automatically Infer A Relative Popularity Of That Content
Tzvetan T. Horozov - Hoffman Estates IL, US Danesh S. Irani - Atlanta GA, US Swapnil E. Mhatre - Atlanta GA, US Nitya Narasimhan - Lake Zurich IL, US Venugopal Vasudevan - Palatine IL, US Joseph F. Wodka - Hoffman Estates IL, US
Assignee:
MOTOROLA, INC. - Schaumburg IL
International Classification:
G06F 3/00
US Classification:
725 61
Abstract:
A network element () receives (), from a plurality of different end users (), information regarding content clips as pertain to audio-visual content and uses () that information to automatically infer a relative popularity of audio-visual content as corresponds to the content clips to provide popularity information. Such audio-visual content can comprise, for example, televised content. The aforementioned information can comprise, for example, such items as a start time and a stop time for a given one of the content clips, at least a portion of a given one of the content clips, a content identifier of some kind, and so forth.
Locating Shadow Vulnerable Datastores For Cloud Data Table/Api/Data Lake Stores
SUPREETH HOSUR NAGESH RAO - CUPERTINO CA, US NAVINDRA YADAV - CUPERTINO CA, US RAVI SANKURATRI - CUPERTINO CA, US ALOK LALIT WADHWA - milipitas CA, US ARIA RAHADIAN - SAN JOSE CA, US BRADY SCHULMAN - MILFORN NH, US RAVI SHANKER PRASAD - san jose CA, US VASIL DOCHKOV YORDANOV - san jose CA, US YIWEI WANG - san jose CA, US ZHIWEN ZHANG - san jose CA, US UDAYAN JOSHI - san diego CA, US SOUMYADEEP CHOUDHURY - san jose CA, US MUHAMMADA FURQAN - lowell MA, US DANESH IRANI - san jose CA, US
International Classification:
H04L 9/40
Abstract:
In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
Methods And Systems For Locating Anomalous Query Activity On Data Stores
SUPREETH HOSUR NAGESH RAO - CUPERTINO CA, US NAVINDRA YADAV - CUPERTINO CA, US RAVI SANKURATRI - CUPERTINO CA, US ALOK LALIT WADHWA - milipitas CA, US ARIA RAHADIAN - SAN JOSE CA, US BRADY SCHULMAN - MILFORD NH, US RAVI SHANKER PRASAD - FREMONT CA, US VASIL DOCHKOV YORDANOV - SAN JOSE CA, US YIWEI WANG - SAN JOSE CA, US ZHIWEN ZHANG - SAN JOSE CA, US UDAYAN JOSHI - SAN DIEGO CA, US SOUMYADEEP CHOUDHURY - SAN JOSE CA, US MUHAMMADA FURQAN - LOWELL MA, US DANESH IRANI - SAN CARLOS CA, US
International Classification:
H04L 9/40
Abstract:
In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
Google - San Francisco Bay Area since Jun 2012
Software Engineer
Georgia Institute of Technology - Greater Atlanta Area Aug 2006 - Jun 2012
PhD Candidate and Graduate Research Assistant
Symantec - Greater Los Angeles Area May 2011 - Aug 2011
Core Research Team Intern
EURECOM - Sophia Antipolis, Côte d'Azur, France May 2010 - Aug 2010
Visiting Researcher
Amazon.com - Greater Seattle Area May 2009 - Aug 2009
Software Development Engineering Intern
Education:
Georgia Institute of Technology 2006 - 2011
University of Toronto at Scarborough 2000 - 2004
Skills:
Team Building Ibm Level 1 Windows Undergraduate Perl Computing N Tier Anti Phishing Students Marathon Machinery Programming Symposium Network Security Natural Resources Co Authored Scholarships Prediction Canadian Management Ibm Certified Computer Science Science Machine Learning Security Db2 Patents Mysql Data Mining Mapreduce Circumstances Security Research Boston Publications Linux Exams Websphere Georgia Doi Web Applications Languages Rock Climbing Atlanta Lin Engineering Reports Artificial Intelligence Postgresql Xml Rowing Information Quality Weka Training Workload Characterization Modifying Solaris Solution Ieee Research Ibm Certified Database Associate Jboss Application Server Shell Scripting Rational Software Architect Add Ons Information Retrieval Concepts Information Technology Information Security Cha Bravo C Motorola Implications Applications Xslt Soap Privacy Law Characterization Html Interactive Advertising Repository Wsdl Social Networking Phishing Toronto Software Engineering Project Sql Paper Pattern Recognition Computer Proficiency Websites Responsibility Internal Audit Council International Software Design Trust Data Management Teaching Forms Investments Computer Security Trust Management Software Eclipse Compliance Acm Spam Java Canada Watson Proposal Writing Weaknesses C++ Javascript Platforms Product Demonstration Python Software Development Television Summit Research Projects Delivery Sceptre Evaluation Automation Vulnerability Scanning Prototype Sigint
Interests:
Marathon Running Competitive Rowing Rock Climbing Sailing