CLOUD COMPUTING SOFTWARE UTILIZING DECEPTION

Brand Owner Address Description
ADVERSARY ENGAGEMENT ZSCALER, INC. 129 Holger Way San Jose CA 95134 Cloud computing software utilizing deception and active defense technology to detect targeted attacks, ransomware, lateral movement attempts, and provide threat intelligence telemetry;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An intermittent computing system state and intermittent computing module is described for a power-constrained personal computer. In the intermittent computing system state, the power-constrained personal computer may transition between sub-states of the intermittent computing system state according to an intermittent computing schedule. Each intermittent computing sub-state may be associated with hardware power sets and software power sets. Altering power supply to hardware components referenced by hardware power sets may alter power consumed in associated intermittent computing sub-states. A caching mechanism may be configured to make it likely that software components referenced by software power sets are loaded into powered storage types during associated intermittent computing sub-states. In the intermittent computing system state, periods of high functionality may be available over extended periods without the high power consumption associated with a continuous working system state. Average power consumption may be adjusted by varying the intermittent computing schedule.