Big Data

Tecnologías Asociadas
Subtecnologías

Big Data

Información big data.

METHOD FOR PREPARING THE AUTOMATED PRODUCTION OF AN ELECTRONIC COMPONENT, METHOD FOR AUTOMATED PRODUCTION AND/OR FOR AUTOMATED POST-PROCESSING OF AN ELECTRONIC COMPONENT, COMPUTING DEVICE, COMPUTER PROGRAM AND ELECTRONICALLY READABLE DATA STORAGE DEVICE
- A method for preparing the automated production of an electronic component, in which an SMD component and/or a conductor track are arranged on a substrate, for production by 3D printing....
METHOD FOR PRODUCING AT LEAST ONE SOLID-BODY LAYER IN ACCORDANCE WITH PREDETERMINED GEOMETRY DATA
- An emitter arrangement (11) is provided within the scope of a method for producing a solid layer. A base (1) is rotationally positioned relative to the emitter arrangement about an axis of...
METHOD AND APPARATUS FOR HIGH-THROUGHPUT MASKLESS FABRICATION OF POLYMER SCAFFOLDS AND BIOLOGICAL TISSUES IN MULTI-WELL PLATES
- Disclosed are methods and apparatuses for fabrication of polymer scaffolds and biological tissues in the multi-well plates in a rapid, high-throughput, controllable and reproducible manner by...
DETERMINING AND EVALUATING DATA REPRESENTING AN ACTION TO BE PERFORMED BY A ROBOT
- In one embodiment, a processor accesses sensor input data received from one or more sensors. The sensor input data represents one or more gestures. The processor determines, based on the sensor...
Modular Mobile Inspection Vehicle
- A modular inspection vehicle having at least first and second motion modules is provided. The first and second motion modules are connected to a chassis. The first motion module includes a first...
MEDICAL DEVICE CYBERSECURITY PLATFORM
- Systems and methods for the management of cybersecurity risks for medical devices are disclosed. A system may streamline and automate the process of generating a cybersecurity bill of materials...
Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
- The present disclosure describes a self-learning system, method, and computer program for detecting cybersecurity threats in a computer network based on anomalous user behavior and multi-domain...
CYBERSECURITY RESILIENCE BY INTEGRATING ADVERSARY AND DEFENDER ACTIONS, DEEP LEARNING, AND GRAPH THINKING
- A technique for providing cyber resilience by integrating autonomous adversary and defender agents, deep learning, and graph thinking. An automated competitive environment of autonomous adversary...
Visualizing Cybersecurity Incidents Using Knowledge Graph Data
- Information for a knowledge graph is accessed. The knowledge graph has nodes and edges of a network and has information about security incident(s) in the network. Related entities from the...
Cybersecurity System Having Digital Certificate Reputation System
- A system, method, and computer-readable medium are disclosed for implementing a cybersecurity system having a digital certificate reputation system. At least one embodiment is directed to a...
METHOD AND SYSTEM FOR ASSESSING EFFECTIVENESS OF CYBERSECURITY CONTROLS IN AN OT ENVIRONMENT
- A cybersecurity solution for monitoring and assessing an overall cybersecurity posture level of an operation technology environment to increase the level when it is determined to be below a...
Context-aware cybersecurity training systems, apparatuses, and methods
- A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a...
ADDITIVELY MANUFACTURED SATELLITE
- A satellite is disclosed, including a body and a communication device attached to the body. The body has an additively manufactured external wall structure at least partially forming an enclosed...
LOGIC CIRCUITRY PACKAGE
- A logic circuitry package includes an interface to communicate with a print apparatus logic circuit and at least one logic circuit including at least one heater and a temperature sensor. The at...
Inorganic polymers and compositions for improved 3D printing of larger scale ceramic materials and components
- Methods, processes, systems, devices and apparatus are provided for additive manufacture resulting in the 3D printing of ceramic materials and components with a thickness greater than three...
CYBERSECURITY MATURITY DETERMINATION
- An example operation may include one or more of receiving data from a plurality of sources associated with an entity, clustering the data into security-related topics, determining, via one or more...
Defect detection in three-dimensional printed constructs
- According to one or more embodiments, a system for detecting defects in a printed construct includes one or more processors, one or more image sensors, and one or more memory modules. The one or...
A SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATION
- A system and method for self-adjusting cybersecurity analysis and score generation, wherein a reconnaissance engine gathers data about a client's computer network from the client, from devices and...
Cybersecurity investigation tools utilizing information graphs
- Example apparatus disclosed herein to perform a cybersecurity investigation include a graph generator to iteratively generate an information graph based on investigative data in response to...
CHURN-AWARE MACHINE LEARNING FOR CYBERSECURITY THREAT DETECTION
- Churn-aware training of a classifier which reduces the difference between predictions of two different models, such as a prior generation of a classification model and a subsequent generation. A...
SYSTEM AND METHOD FOR IDENTIFYING CYBERSECURITY THREATS
- The invention relates to a computer-implemented system and method for automatic collection, analysis and reporting of data relating to a cybersecurity threat. The method may comprise the steps of:...