09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
Downloadable educational resources, namely, webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace. Education services, namely, providing live and on-line seminars, discussions, classes, speaking engagements, conferences, and symposia in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace and distribution of educational, training, and enablement materials in connection therewith; providing online non-downloadable information and online non-downloadable resource guides in the field of employment training related to the purpose of promoting inclusion and belonging in the workplace; business education and training services, namely, providing workshops, conferences, business education programs, panel discussions, and fireside chats in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; organization of cultural activities for entertainment purposes; providing a website featuring online, non-downloadable information and educational resources in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; providing non-downloadable educational resources, namely, non-downloadable webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
(1) Downloadable educational resources, namely, webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace (1) Education services, namely, providing live and on-line seminars, discussions, classes, speaking engagements, conferences, and symposia in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace and distribution of educational, training, and enablement materials in connection therewith; providing online non-downloadable information and online non-downloadable resource guides in the field of employment training related to the purpose of promoting inclusion and belonging in the workplace; business education and training services, namely, providing workshops, conferences, business education programs, panel discussions, and fireside chats in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; organization of cultural activities for entertainment purposes; providing a website featuring online, non-downloadable information and educational resources in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; providing non-downloadable educational resources, namely, non-downloadable webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace
A method and apparatus for improving digital transaction using Simple Mail Transfer Protocol (SMTP). The method includes determining to whether an alert related to a task is sent to a registered individual, on a condition that the alert related to the task should be sent, generating an email message, wherein the email includes at least one mailto link and a form for the registered individual to complete, transmitting the email message to the registered individual, receiving a response email from the registered individual, authenticating the email message and decoding a token, and updating an information database.
Systems, apparatuses, and methods for enabling a user to formulate and execute a query against a corpus of documents and do so in a computationally efficient and scalable manner
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
Goods & Services
Downloadable educational resources, namely, webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace Education services, namely, providing live and on-line seminars, discussions, classes, speaking engagements, conferences, and symposia in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace and distribution of educational, training, and enablement materials in connection therewith; providing online non-downloadable information and online non-downloadable resource guides in the field of employment training related to the purpose of promoting inclusion and belonging in the workplace; business education and training services, namely, providing workshops, conferences, business education programs, panel discussions, and fireside chats in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; organization of cultural activities for entertainment purposes; providing a website featuring online, non-downloadable information and educational resources in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace; providing non-downloadable educational resources, namely, non-downloadable webinars, podcasts, videos, and whitepapers in the fields of inclusion, belonging, leadership, and talent philosophy in the workplace
6.
TENANT SECURITY CONTROL OF DATA FOR APPLICATION SERVICES
A system and method for 1) storing, in data stores, data associated with tenants in separated regions, each region corresponding to a tenant; 2) receiving a request from a first tenant to share data associated with the first tenant with other tenants; 3) storing, based on the request, access control data identifying data associated with the first tenant that is subject to sharing with the other tenants; 4) accessing model building data from the tenanted database system, the model building data defined at least in part by the access control data, wherein the model building data is associated with the first tenant and the other tenants; 5) creating a model based on the data associated with the first tenant and, if applicable, other data associated with the other tenants; and 6) providing access to the model to one or more other tenants.
An electronic information system which enables email based transactions comprises an information database storing information regarding a plurality of individuals in a group and selections available to individuals in the group. A first email message with a mailto hyperlink having a plurality of fields including actionable parameter is generated and sent. A reply email message is received in response to selection of the mailto hyperlink. The received email message includes the plurality of fields and the actionable parameter that indicates that a specific selection has been made. A processor performs the action indicated by the actionable parameter in response to the received email message, including updating the information database to indicate the specific selection that has been made.
A system, method, and device for managing updates to a hypercube is provided. The method includes (i) obtaining a tree data structure to represent the data, (ii) receiving a request to change the N-conjoined tree data structure, (iii) enforcing a rule that requires each leaf node to have an associated linkage to each tree in the N-conjoined tree data structure while changing the N-conjoined tree data structure in accordance with the request, and (iv) providing an updated N-conjoined tree data structure. The tree data structure is an N-conjoined tree data structure, and N is a positive integer.
The present application discloses a method, system, and computer system for managing versions of code. The method includes obtaining a first version of a code, determining whether the first version of the code creates a first conflict with respect to an ancestor version of the code, wherein the ancestor version of the code comprises a set of code that has a dependency relationship on another version of the code, in response to determining that the first version of the code creates the first conflict with respect to the ancestor version of the code, cause the first conflict to be resolved.
A document is received from a document provider. A representation of the document provider associated with the document within a document provider space is determined based at least in part on text boxes and corresponding coordinates associated with the text boxes within the document. The document provider associated with the document is determined based on a measure of similarity. A database is updated to associate the document with the determined document provider.
In some implementations, the techniques described herein relate to a method including: receiving, by a processor, a query from a client device; distributing, by the processor, the query to a plurality of shards; receiving, by the processor, a plurality of array provider data structures from the plurality of shards, a given array provider data structure identifying responsive identifiers from a corresponding shard; materializing, by the processor, the plurality of array provider data structures; persisting, by the processor, a portion of responsive data on disk while materializing the plurality of array provider data structures; merging, by the processor, data stored on the disk; and returning, by the processor, a result set based on the data to the client device.
The present application discloses a method, system, and computer system for managing data using keys. The method includes receiving a request to access data stored within a tenant database associated with a tenant, wherein the data is encrypted based at least in part on a tenant service encryption key (TSEK) corresponding to the tenant database, determining a wrapper key used in connection with encrypting the TSEK based at least in part on a TSEK metadata stored in association with the TSEK, determining a top-level key used in connection with encrypting the wrapper key based at least in part on wrapper key metadata stored in association with the encrypted version of the wrapper key, obtaining the data stored within the tenant database, comprising decrypting at least part of the data based at least in part on (i) the TSEK, (ii) the wrapper key, and (iii) the top-level key, and providing the data in response to the request. The TSEK metadata is stored in the tenant database. An encrypted version of the wrapper key is stored in a key management service that is in communication with the tenant database.
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
An information management system may store information related to tasks to be performed by workers in an organization. Workers in the organization may communicate with the information management system using email messages. The information management system may not require a login or authentication procedure, and workers may interact with the information management system without the need to log in to the information management system. The information management system may receive an email message from a worker that indicates a request for a report. The information management system may determine whether to transmit the report to the worker based on whether the worker is appropriately registered with the information management system, and/or whether the worker has administrative privileges. The information management system, in response to a positive determination, may transmit the report to the email address from which the requesting email message was sent.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
A system, method, and device for managing updates to a hypercube is provided. The method includes (i) obtaining a hypercube comprising a plurality of locations, wherein a particular location has an associated anchor object that stores version information for the particular location, (ii) receiving a request to store an updated value for the particular location, and (iii) storing the updated value for the particular location of hypercube, the updated value being stored with associated version information stored in the anchor object for the particular location.
A system, method, and device for managing updates to a hypercube is provided. The method includes (i) obtaining a hypercube comprising a plurality of locations, wherein a particular location has an anchor object that stores version information for the particular location, and the particular location comprises a first formula that is evaluated to return a value for the particular location, (ii) in response to receiving the request for the value, determining that the particular location comprises the first formula, (iii) in response to determining that the particular location comprises the first formula, evaluating the first formula to obtain a result, and (iv) storing the result for the particular location in association with the version information for the particular location.
A system, method, and device for generating a user interface for talent management are provided. The method generates the user interface based at least in part on determining user performance classifications for a set of users. The method includes (i) obtaining feedback data for a set of users, (ii) obtaining one or more characteristics for the set of users, (iii) querying a machine learning model for a predicted performance classification for the set of users, and (iv) generating a user interface comprising the predicted performance classification for at least a subset of the set of users. The predicted performance classification is presented on a user interface, for example, in a visualization such as an evaluation matrix that plots users according to their corresponding performance classifications.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
In some implementations, the techniques described herein relate to a method including: receiving, by a query engine, a database query, the database query including an inner query having inner query conditions and an outer query having outer query conditions; determining, by the query engine, that a number of rows responsive to the outer query exceeds a threshold; determining, by the query engine, that the inner query conditions and the outer query conditions are correlated; rewriting, by the query engine, the inner query conditions to include at least one of the outer query conditions to generate an optimized query; and executing, by the query engine, the optimized query on a database.
The present application discloses a method, system, and computer system for processing queries to sparsely populated datasets. The method includes (i) receiving a query from a client system, (ii) determining, based at least in part on the query, a plurality of partitions of a hypercube that are expected to comprise information used in generating a response for the query, (iii) communicating a set of requests to a data source storing the hypercube, the set of requests comprising one or more requests corresponding to the plurality of partitions of the hypercube, (iv) obtaining, from the data source, a set of results to the set of requests, the set of results comprising data stored in the plurality of partitions of the hypercube, (v) determining a plurality of virtual objects for the set of results, (vi) combining the plurality of virtual objects into a response to the query, and (vii) providing, to the client system, the response to the query.
A system, method, and device for managing dependencies between a hypercube base version and a set of scenario versions for the hypercube are provided. The method includes (i) obtaining a request for a version of a hypercube, and (ii) in response to obtaining the request: (a) obtaining a base version of the hypercube, (b) obtaining an override data structure that indicates a set of scenario values that override corresponding base version values, and (c) providing the version of the hypercube based at least in part on the base version and the override data structure.
A system, method, and device for storing a scenario version as a base version for a hypercube are provided. The method includes (i) obtaining a request to store a scenario version of a hypercube as a base version; (ii) obtaining a set of transactions corresponding to hypercube updates for the scenario version, and (iii) writing the set of transactions to the base version.
A system, method, and device for updating a base version of a hypercube are provided. The method includes (i) obtaining a request for a planning session with respect to a hypercube; and (ii) in response to obtaining the request: (a) determining that the planning session uses a base version of the hypercube, (b) receiving a value input to update a particular location in the hypercube, (c) storing the value for the particular location in the base version of the hypercube, and (d) propagating an update to the particular location of the base version of the hypercube to one or more scenario versions having a dependency on the base version.
A system, method, and device for indexing to a hypercube is provided. The method includes (i) obtaining an index that maps dimensional values to a collection of locations within a hypercube, (ii) determining that one or more tuples of the hypercube is updated along a particular dimension, and (iii) in response to determining that the one or more tuples of hypercube is updated along a particular dimension, creating a new virtual tuple for each updated row and updating the index to store a pointer to the new virtual tuple for a new particular dimension value, the virtual tuple comprising a pointer to a tuple in the index and a validity period for the tuple.
G06F 12/0893 - Caches characterised by their organisation or structure
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
A version of a software application is determined to be analyzed. The states of toggles associated with the version of the software application are analyzed to identify changed states of at least a portion of the toggles. A changed state of the changed states comprises a state of a toggle of the toggles that has changed during execution of the version of the software application. The changed state has a corresponding time frame and a corresponding sequence number. The changed states are logged.
The present application discloses a method, system, and computer system for processing queries to sparsely populated datasets. The method includes (i) receiving a query from a client system, (ii) determining, based at least in part on the query, a plurality of partitions of a hypercube that are expected to comprise information used in generating a response for the query, (iii) communicating a set of requests to a data source storing the hypercube, the set of requests comprising one or more requests corresponding to the plurality of partitions of the hypercube, (iv) obtaining, from the data source, a set of results to the set of requests, the set of results comprising data stored in the plurality of partitions of the hypercube, (v) determining a plurality of virtual objects for the set of results, (vi) combining the plurality of virtual objects into a response to the query, and (vii) providing, to the client system, the response to the query.
In some implementations, the techniques described herein relate to a method including: detecting, by a processor, an interaction with an element of a user interface (UI); identifying, by the processor, a plurality of element properties responsive to the interaction, the plurality of element properties corresponding to the element and at least one ancestor element of the element; generating, by the processor, an identifier of the element based on the plurality of element properties; generating, by the processor, an exploration configuration file including the identifier; and transmitting, by the processor, the exploration configuration file to a processing platform.
The present application discloses a method, system, and computer system for dynamically managing or distributing models across a plurality of shards. The method includes determining that a first model is to be added to a first shard of a plurality of shards, the first shard being determined based at least in part on a predetermined cost function, adding the first model to the first shard, and restarting the first shard. The first model is associated with a first tenant. The first shard comprises at least one second model that is associated with a second tenant.
A system, method, and device for managing updates to a hypercube is provided. The method includes (i) obtaining a hypercube comprising a plurality of locations, wherein a particular location has an anchor object that stores version information for the particular location, and the particular location comprises a first formula that is evaluated to return a value for the particular location, (ii) in response to receiving the request for the value, determining that the particular location comprises the first formula, (iii) in response to determining that the particular location comprises the first formula, evaluating the first formula to obtain a result, and (iv) storing the result for the particular location in association with the version information for the particular location.
Disclosed are techniques for increasing the speed of pairwise comparison operations in a database system. In an embodiment, a method is disclosed comprising receiving a network request identifying a user; identifying a plurality of segments associated with the user; loading a plurality of bitmaps associated with the plurality of segments, each bitmap in the plurality of bitmaps representing a set of users associated with a segment; comparing pairs of bitmaps from the plurality of bitmaps to generate a set of overlaps; filtering the plurality of segments based on the set of overlaps to generate an anonymized set of segments; and returning aggregated data associated with the anonymized set of segments in response to the network request.
In some aspects, the techniques described herein relate to a method including: receiving, by a processor, raw data representing interactions of a set of users stored in a database; analyzing, by the processor, the raw data to identify an aggregate number of binary point anomalies (BPAs) for each user in the set of users; weighting, by the processor, the aggregate number of BPAs for each user in the set of users using a pre-configured weighting vector, generating a set of weighted BPA values for each user; aggregating, by the processor, each set of weighted BPA values for each user to generate corresponding total scores for each user; and displaying, by the processor, the corresponding total scores.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
31.
BLOOM FILTER FOLDING USING AN OPTIMIZED FOLD COUNT
In some aspects, the techniques described herein relate to a method including: receiving a Bloom filter, the Bloom filter having an initial size and a first number of bits set; computing a number of folds for the Bloom filter by simulating a plurality of fold operations using the initial size and the first number of bits set; executing fold operations on the Bloom filter based on the number of folds to generate a folded Bloom filter, the folded Bloom filter having a size smaller than the initial size; and storing the folded Bloom filter.
A system and method for 1) storing, in data stores, data associated with tenants in separated regions, each region corresponding to a tenant; 2) receiving a request from a first tenant to share data associated with the first tenant with other tenants; 3) storing, based on the request, access control data identifying data associated with the first tenant that is subject to sharing with the other tenants; 4) accessing model building data from the tenanted database system, the model building data defined at least in part by the access control data, wherein the model building data is associated with the first tenant and the other tenants; 5) creating a model based on the data associated with the first tenant and, if applicable, other data associated with the other tenants; and 6) providing access to the model to one or more other tenants.
A system includes one or more processors; and at least one non-transitory machine-readable storage media comprising instructions which, when executed by the one or more processors, cause the one or more processors to: generate a set of shift candidates based on labor demand data; determine a cost function including a labor cost, wherein the cost function is expressed at least in part in terms of a set of decision variables; determine a set of constraints based at least in part on the set of decision variables, worker data, and scheduling configuration data; and determine simultaneously, using a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates.
Mapping data from a first computer application to a second computer application by obtaining a second organization's application schema with data, generating a mathematical representation of the field keys and the data in the data fields of the second organization's application, extracting data from a first organization's application; processing the data from the first organization's application and data from the second organization's application, and mapping data from the first organization's application into the second organization's application schema.
A system for data space limitation includes and interface and a processor. The interface is configured to receive a query for a structured data set. The processor is configured to determine an ordered list for calculations to respond to the query; perform the calculations according to the ordered list until an allowed time required for interactivity is reached; and in response to the allowed time being reached, provide results of the calculations.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software. providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services, namely, a web-based system and online portal providing software as a service featuring software using artificial intelligence (AI) that provides users with access to and use of a learning management tool; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software. providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services, namely, a web-based system and online portal providing software as a service featuring software using artificial intelligence (AI) that provides users with access to and use of a learning management tool; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services; computer services featuring software using artificial intelligence (AI); computer services featuring artificial intelligence (AI) software; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services; computer services featuring software using artificial intelligence (AI); computer services featuring artificial intelligence (AI) software; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software (1) Providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services; computer services featuring software using artificial intelligence (AI); computer services featuring artificial intelligence (AI) software; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software; downloadable computer software using artificial intelligence (AI); downloadable artificial intelligence (AI) software (1) Providing on-line non-downloadable software; providing on-line non-downloadable software using artificial intelligence (AI); providing on-line non-downloadable artificial intelligence (AI) software; software as a service (SAAS) services; software as a service (SAAS) services featuring software using artificial intelligence (AI); software as a service (SAAS) services featuring artificial intelligence (AI) software; platform as a service (PAAS) services; platform as a service (PAAS) services featuring software using artificial intelligence (AI); platform as a service (PAAS) services featuring artificial intelligence (AI) software; cloud application service provider; cloud application service provider featuring software using artificial intelligence (AI); cloud application service provider featuring artificial intelligence (AI) software; computer services; computer services featuring software using artificial intelligence (AI); computer services featuring artificial intelligence (AI) software; artificial intelligence as a service (AIAAS) services; providing information by means of non-downloadable software; research and development and consultation related to all of the foregoing
42.
SYSTEM AND METHOD FOR DEVELOPING USER INTERFACE APPLICATIONS
A computer-implemented method for designing a user interface application uses a visual flow language and a model view flow architecture. The visual flow language may include components, where components include blocks and nodes. Call streams and data flows may be defined by a user. An application flow logic graph is generated. The application flow logic graph may be used to generate a user interface application.
The present application discloses a method, system, and computer system for enforcing security with respect to a database. The system includes a database configured to receive a query, wherein the query is modified to comprise one or more security predicates; determine data to return in response to the query by examining the one or more security predicates with respect to security for a field; and return the determined data in response to the query.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for use by enterprise customers to gain visibility and insight into their external workforce. Providing on-line non-downloadable software for use in external workforce recruiting, hiring and management, vendor recruiting, invoicing, worker profile management, workforce tenure management, and workforce distribution; providing on-line non-downloadable software for use in statement of work creation, invoicing, management and tracking; providing on-line non-downloadable software for use by enterprise customers to optimize and streamline external workforce management by supporting end-to-end contingent labor recruiting, invoicing, and statement of work negotiation.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software for use by enterprise customers to gain visibility and insight into their external workforce (1) Providing on-line non-downloadable software for use in external workforce recruiting, hiring and management, vendor recruiting, invoicing, worker profile management, workforce tenure management, and workforce distribution; providing on-line non-downloadable software for use in statement of work creation, invoicing, management and tracking; providing on-line non-downloadable software for use by enterprise customers to optimize and streamline external workforce management by supporting end-to-end contingent labor recruiting, invoicing, and statement of work negotiation
47.
System and method for dynamically retrieving an attribute value of an identity claim from an issuing party using a digitally signed access token
A processor-implemented system and method for dynamically retrieving an attribute value of an identity claim for a user using a digitally signed access token that is digitally signed by a user device, at a relying party device associated with a relying party. The method includes (i) making an API call to retrieve at least one identity claim for the user, (ii) processing each identity claim of the user to identify if at least one by-reference identity claim that includes a URL of an endpoint, (iii) obtaining the digitally signed access token that is digitally signed by the user device, (iv) invoking the URL of the endpoint with the at least one by-reference identity claim and the digitally signed access token, and (v) dynamically retrieving the attribute value from the URL of the endpoint from an issuing party device associated with an issuing party.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present application discloses a method, system, and computer system for enforcing security with respect to a database. The method includes receiving, by one or more processors, a user query from a user, determining one or more user security privileges for the user, configuring a query string, querying a database to return results based at least in part on the query string, obtaining the results, and providing the results to the user. The query string is based at least in part on the user query, and the query string comprises one or more security predicates that are based at least in part on the one or more user security privileges.
Removing bias when matching job candidates to open positions by obtaining candidates' data including information about the job candidates and a likelihood rate that the candidate matches the open position, identifying protected characteristics from the candidates' data, generating a training data set that does not bias within groups of candidates having different protected characteristics, where the training data set includes a portion of the job candidates, training a model based on the training data set, applying the trained model on a test set, where the test set is different from the training data set, and determining a fairness measurement value of the trained model using the results of the model on the test set and protected characteristics of candidates of the test set.
A method for enabling a user to select and interact with text, lines, or paragraphs of a document, in the case where the document is available as a PDF or image. Embodiments enable the representation of a document to go beyond simple extraction of text, including organizing the text into logical groups of benefit to a user, such as paragraph, header, footer, or table (as examples), and labelling them as such. This facilitates subsequent processing, including application of machine learning (ML) algorithms to leverage this explicit information.
A system for validating data includes an interface and a processor. The interface is configured to receive a data set. The processor is configured to calculate a data quality metric for the data set, wherein the data quality metric is based at least in part on a data distribution metric; determine a model to build based at least in part on the data quality metric; build the model; and provide the model for use.
A computerized method performed on digital data stored in a database, the method including obtaining one or more job requirements and a list of candidate resumes, extracting tasks from the resumes in the list of candidate resumes or employee profiles, converting the extracted tasks into a mathematical representation, executing a similarity function between the extracted tasks and tasks in the job requirements, assigning a score to jobs in the list of jobs according to the output of the similarity function, assigning a score to a specific candidate in the list of candidates according to the output of the similarity function.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
downloadable computer software for use by enterprise customers to gain visibility and insight into their external workforce, namely, by viewing profiles, reports, and dashboards that include external workers providing on-line non-downloadable software for use in managing external workforce recruiting and hiring, external workforce management, managing vendor recruiting, invoicing, worker profile management, and workforce tenure management, namely, managing onboarding and offboarding; providing on-line non-downloadable software for use in statement of work creation, invoicing, management and tracking; providing on-line non-downloadable software for use by enterprise customers to optimize and streamline external workforce management by supporting end-to-end contingent labor recruiting, invoicing, and statement of work negotiation
54.
Shift design and assignment system with flexible modeling of constraint and cost function
A system includes one or more processors; and at least one non-transitory machine-readable storage media comprising instructions which, when executed by the one or more processors, cause the one or more processors to: generate a set of shift candidates based on labor demand data; determine a set of decision variables representing whether a particular shift candidate is selected in a final schedule and whether a particular worker is assigned to the particular shift candidate; determine a set of constraints based at least in part on the set of decision variables, the set of shift candidates, the labor demand data, and scheduling configuration data, wherein a constraint of the set of constraints is transformed into linear form in terms of the set of decision variables; and determine simultaneously, using a MIP solver, a subset of the shift candidates selected in the final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates.
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
G06F 17/11 - Complex mathematical operations for solving equations
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/1091 - Recording time for administrative or management purposes
A method and apparatus for improving digital transaction using Simple Mail Transfer Protocol (SMTP). The method includes determining to whether an alert related to a task is sent to a registered individual, on a condition that the alert related to the task should be sent, generating an email message, wherein the email includes at least one mailto link and a form for the registered individual to complete, transmitting the email message to the registered individual, receiving a response email from the registered individual, authenticating the email message and decoding a token, and updating an information database.
The present application discloses a method, system, and computer system for monitoring tasks with respect to information stored in a database system. The method includes receiving a request to execute a task with respect to a database, wherein the request is associated with an identifier corresponding to a user that inputs a query for the request; determining whether the task is authorized for the user; in response to a determination that the task is authorized for the user, obtaining a set of information that is to be returned for the task; determining a subset of the set of information, wherein the subset of the set of information comprises one or more parts of the set of information for which the user has access permission; and storing a record of the request to execute the task, wherein the record comprises an indication of the user, and an indication of subset of the set of information.
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
60.
HORIZONTAL SCALING OF VERSION CACHES IN A DISTRIBUTED HIGH-CONCURRENCY MULTI-USER ENVIRONMENT
Techniques for providing horizontally scaled caching of versioned data are provided. In some aspects, the techniques described herein relate to a method including initializing a first version cache (VC) object based on a version of data stored in a data storage device; replicating the first VC to generate a second VC; receiving a write operation at the first VC; generating a delta for the write operation, the delta representing a change in the version of data; writing the delta to a persistent replication log, the persistent replication log storing an ordered set of deltas including the delta; writing data in the write operation to the data storage device; and applying the ordered set of deltas at the second VC to update data stored by the second VC.
An information management system may store information related to tasks to be performed by workers in an organization. Workers in the organization may communicate with the information management system using email messages. The information management system may not require a login or authentication procedure, and workers may interact with the information management system without the need to log in to the information management system. The information management system may receive an email message from a worker that indicates a request for a report. The information management system may determine whether to transmit the report to the worker based on whether the worker is appropriately registered with the information management system, and/or whether the worker has administrative privileges. The information management system, in response to a positive determination, may transmit the report to the email address from which the requesting email message was sent.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
The disclosure relates to an offline-online question answering system. In some aspects, the techniques described herein relate to a method including: receiving, by a processor, a query from a user; generating, by the processor, a query embedding representing the query; identifying, by the processor, at least one question corresponding to the query by comparing the query embedding to a plurality of embeddings of questions; and transmitting, by the processor, an answer corresponding to the at least one question to the user in response to the query.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing non-downloadable cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software-as-a-Service and/or Platform-as-a-Service; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software-as-a-Service and/or Platform-as-a-Service.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing non-downloadable cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software- as-a-Service and/or Platform-as-a-Service; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software-as-a-Service and/or Platform-as- a-Service.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing non-downloadable cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software- as-a-Service and/or Platform-as-a-Service; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and Software-as-a-Service and/or Platform-as- a-Service.
42 - Scientific, technological and industrial services, research and design
Goods & Services
cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
42 - Scientific, technological and industrial services, research and design
Goods & Services
cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
42 - Scientific, technological and industrial services, research and design
Goods & Services
cloud computing featuring software for use by enterprise customers to automate and streamline the configure, price, quote process for configuring, pricing, and quoting enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications; design and development of computer software for the configuration, pricing and quoting of enterprise services, namely, professional services, managed services, technology subscriptions, educational services and X as a service type applications
69.
GEOGRAPHIC DISTRIBUTION OF RESOURCES USING GENETIC ALGORITHMS
In some aspects, the techniques described herein relate to a method including: initializing a population of hypotheses; computing misfit values for each of the hypotheses, the misfit values computed using a fitness function including a weighted summation, wherein terms of weighted summation include metric functions; generating a plurality of offspring hypotheses based on the population of hypotheses and a crossover bitmask; generating a new population using the plurality of offspring and a subset of the population of hypotheses; mutating at least one hypothesis in the new population; selecting a hypothesis from the new population based on a corresponding misfit value of the hypothesis; and allocating at least one resource based on the hypothesis.
Structured access to volunteered private data disclosed. Access can be based on security and privacy constraint information (SPCI) that can be selected by the party volunteering the private data. The volunteered data can be stored in a protected portion of a public network. The SPCI can be correlated to the volunteered data. In response to receiving a request for access to the volunteered data, an attribute of the request can be determined to satisfy one or more rules related to the SPCI prior to facilitating access to a version of a portion of the volunteered data. The version of the portion of the volunteered data can be a redaction of the portion of the volunteered data. The version of the portion of the volunteered data can be aggregated with other portions of other volunteered data determined to satisfy corresponding SPCI related rules.
A system for updating a hypercube includes an interface and a processor. The interface is configured to receive an indication to update a cell of the hypercube. The processor is configured to determine a primary dimension value associated with the cell; determine a group of dependencies based at least in part on the primary dimension value, wherein a dependency of the group of dependencies comprises one or more primary dimension values and a pattern; for the dependency of the group of dependencies, determine a set of source locations based at least in part on the one or more primary dimension values and the pattern; and mark the set of source locations as invalid.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 9/38 - Concurrent instruction execution, e.g. pipeline or look ahead
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
The present application discloses a method, system, and computer system for running a test in a database system. The method includes obtaining, by one or more processors associated with a server, a template comprising one or more variables, storing, in a cache, a mapping of field definitions for a particular dataset, populating, by the one or more processors, the template to generate a populated template based at least in part on the mapping of field definitions for the particular dataset, performing, by the one or more processors, a query with respect to the particular dataset using values obtained from the populated template, and monitoring, by the one or more processors, one or more performance characteristics associated with the performing the query.
The present application discloses a method, system, and computer system for managing data using keys. The method includes receiving a request to access data, wherein the data is encrypted based on a tenant service encryption key (TSEK) corresponding to the tenant database, determining a wrapper key used in connection with encrypting the TSEK based on a TSEK metadata, determining a top-level key used in connection with encrypting the wrapper key based on wrapper key metadata stored in association with the encrypted version of the wrapper key, obtaining the data stored within the tenant database, comprising decrypting at least part of the data based on (i) the TSEK, (ii) the wrapper key, and (iii) the top-level key, and providing the data in response to the request. The TSEK metadata is stored in the tenant database. An encrypted version of the wrapper key is stored in a key management service.
A system for shift design and assignment comprises an interface configured to receive scheduling input data which includes labor demand data, worker data, and scheduling configuration data, and a processor configured to generate a set of shift candidates, determine a set of decision variables, determine a cost function, determine a set of constraints, and determine simultaneously, using a SAT, a MP solver, or a MIP solver, a subset of the shift candidates selected in a final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of the shift candidates such that the hard constraints are fully respected, violations to the soft constraints are minimized, and the cost function is minimized.
A system for indexing includes an interface and a processor. The interface is configured to receive a metadata amendment. The metadata amendment defines a change to a transactional index schema to a first transactional index. The first transactional index comprises a querying system data. The processor is configured to maintain a first state of the first transactional index. The first transactional index does not incorporate the metadata amendment. The processor is configured to build a second transactional index incorporating the metadata amendment, determine whether an indication to switch from the first transactional index to the second transactional index has been received, and indicate to switch from using the first transactional index to the second transactional index for queries regarding a system data.
A system comprises an interface and a processor. The interface is configured to receive an indication to execute a proposed organization chart. The processor is configured to determine a valid net action queue for the proposed organization chart. Determining the valid net action queue comprises scanning an action queue to add actions to the valid net action queue in response to the actions being valid in relation to an organization chart stored in a database. The processor is further configured to apply the valid net action queue to the organization chart to obtain the proposed organization chart and execute the proposed organization chart to create a new organization chart.
An electronic information system which enables email based transactions comprises an information database storing information regarding a plurality of individuals in a group and selections available to individuals in the group. A first email message with a mailto hyperlink having a plurality of fields including actionable parameter is generated and sent. A reply email message is received in response to selection of the mailto hyperlink. The received email message includes the plurality of fields and the actionable parameter that indicates that a specific selection has been made. A processor performs the action indicated by the actionable parameter in response to the received email message, including updating the information database to indicate the specific selection that has been made.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
H04L 51/48 - Message addressing, e.g. address format or anonymous messages, aliases
The present application discloses a method, system, and computer system for managing data using keys. The method includes receiving a request to access data stored within a tenant database associated with a tenant, wherein the data is encrypted based at least in part on a tenant service encryption key (TSEK) corresponding to the tenant database, determining a wrapper key used in connection with encrypting the TSEK based at least in part on a TSEK metadata stored in association with the TSEK, determining a top-level key used in connection with encrypting the wrapper key based at least in part on wrapper key metadata stored in association with the encrypted version of the wrapper key, obtaining the data stored within the tenant database, comprising decrypting at least part of the data based at least in part on (i) the TSEK, (ii) the wrapper key, and (iii) the top-level key, and providing the data in response to the request. The TSEK metadata is stored in the tenant database. An encrypted version of the wrapper key is stored in a key management service that is in communication with the tenant database.
In some aspects, the techniques described herein relate to a method including receiving, by a processor, raw data representing interactions; generating, by the processor, a feature set based on the raw data, a given feature in the feature set including at least a portion of the raw data and at least one engineered feature; generating, by the processor, a first score for the feature set using a machine learning (ML) model, the first score representing an anomaly score; generating, by the processor, one or more second scores, each score in the one or more second scores generated by performing a linear operation on one or more features in the feature set; aggregating, by the processor, the first score and the one or more second scores to generate a total score; and outputting, by the processor, the total score.
To verify compliance with a data access policy, the system compares electronic data to an electronic data access policy identified by a database; determines whether a portion of the electronic data complies with the electronic data access policy; in response to the portion of the electronic data not complying with the electronic data access policy, indicates that an access to the electronic data by a communication device is not permissible; and declines the access to the portion of the electronic data to the communication device when the access to the electronic data is not permissible. Related methods and computer program products are also discussed.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system for tenant security control includes an interface and a processor. The interface is configured to receive a request to access shared services; provide a user interface for selecting a shared service of the shared services; and receive a selection of the shared service of the shared services. The processor is configured to determine data associated with the shared service of the shared services; store a shared-service tag indicating the data is associated with the shared service of the shared services and a tenant identifier tag indicating the data is associated with a contributing tenant; transfer the data to a model development system; determine a model using the data transferred to the model development system; and store the model.
Disclosed are systems and methods for a semantic search framework that operates to provide a robust search feature of database hosted data. The disclosed framework (or tool) improves and expands how searches can be configured and executed. In some embodiments, the disclosed framework is configured to receive a search request for a term or phrase, contextualize it to a generally understood theme that is not hindered by language barriers, and leverage it in a manner that is able to retrieve the most relevant and accurate results. The disclosed framework can filter search requests in a manner that both expands its breadth while honing in on what is actually being requested. The disclosed framework can be embodied as computerized systems and methods that can topically search for content based on a query string (e.g., term or phrase), and output a results set that embodies the theme of a survey's feedback.
A system includes an interface and a processor. The interface is configured to receive an indication to render a proposed organization chart. The processor is configured to determine a net action queue for the proposed organization chart. Determining the net action queue includes scanning an action queue to consolidate actions for the net action queue, apply the net action queue to an original organization chart to obtain the proposed organization. The processor is further configured to chart and render the proposed organization chart.
The example embodiments relate to matching response data to request data. in an embodiment, a method includes retrieving a request and a plurality of responses; generating packed candidates based on the request and the plurality of responses, a given packed candidate in the packed candidates including the request and a subset of the plurality of responses; generating feature vectors corresponding to the packed candidates, a given feature vector in the feature vectors including at least one aggregated feature computed based on the request and one or more corresponding responses in a respective packed candidate; inputting the feature vectors into a machine learning (ML) model, the ML model configured to output predictions corresponding to the feature vectors; selecting a feature vector from the feature vectors based on the predictions; and storing responses associated with the optimal feature vector and the request in a data storage device.
The techniques described herein relate to a method including: receiving, by a processor, a data record having a plurality of fields; generating, by the processor, a risk score for the data record using a predictive model; determining, by the processor, that the data record is a potential anomaly based on the risk score; identifying, by the processor, an anomalous field from the plurality of fields; generating, by the processor, a plurality of permutations of the data record, the plurality of permutations generated by changing a value of the anomalous field; and outputting, by the processor, a replacement record selected from the plurality of permutations, the replacement record having a field value for the anomalous field that generates a lowest risk score among the plurality of permutations.
A system for incremental solution of the shift design and assignment problem comprises an interface configured to receive an incremental change and an existing schedule. The system comprises a processor to determine whether labor demand has changed; in response to labor demand having been changed, generate an updated set of shift candidates; determine a new cost function; restart a solver using the updated set of shift candidates, the existing schedule, the incremental change, and the new cost function, wherein the solver comprises a mixed integer programming (MIP) solver, and wherein the MIP solver determines simultaneously a subset of the shift candidates selected in the final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of shift candidates.
Disclosed are systems and methods for an assessment framework that operates to dynamically generate customized surveys for recipient-respondent pairs. The customized surveys can have curated questions dynamically selected and/or provided from recipients based on, but not limited to, which recipients a respondent should give feedback to, how many questions the respondent should answer, and which questions in particular, the respondent should answer. The disclosed framework can automatically and dynamically customize surveys for individual respondents, and/or sets of respondents, according to the selected questions included therein and/or from which recipients they are sent from (or on their behalf).
Disclosed are systems and methods for a materialized view matching framework that operates to improve the re-usability of materialized views within a database by, inter alia: i) enabling selection and aggregation of multiple materialized views; ii) generating and using validity filter predicates to exclude invalid data from materialized views; iii) generating and using change summaries to generate validity filter predicates; and iv) enabling on-demand transactional refresh operations. Such operations enable a more computational efficient and accurate usage of database data so as to provide more credible and desirable search results.
Disclosed are systems and methods for an intelligent listening framework that is configured to dynamically generate surveys based at least on predicted answers to questions that may potentially be included in a survey. The disclosed framework is configured to determine which questions will derive disparate answers from a respondent or set of respondents. This enables the solicitation and collection of viable data that can drive an entity’s resource optimization and/or business development. As more and more engaging and viable forms of answers are received, surveys can be customized to types of respondents, which can be based on any form of information that can discern one respondent from another.
A system includes an interface and a processor. The interface is configured to receive a request to access shared services; provide a user interface for selecting a shared service of the shared services; and receive a selection of the shared service of the shared services. The processor is configured to determine data associated with the shared service of the shared services; store a shared-service tag indicating the data is associated with the shared service of the shared services and an identifier tag indicating the data is associated with a source; transfer the data to a model development system; determine a model using the data transferred to the model development system; and store the model.
Disclosed are systems and methods for an intelligent listening framework that is configured to dynamically generate surveys based at least on predicted answers to questions that may potentially be included in a survey. The disclosed framework is configured to determine which questions will derive disparate answers from a respondent or set of respondents. This enables the solicitation and collection of viable data that can drive an entity's resource optimization and/or business development. As more and more engaging and viable forms of answers are received, surveys can be customized to types of respondents, which can be based on any form of information that can discern one respondent from another.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
Techniques for providing horizontally scaled caching of versioned data are provided. In some aspects, the techniques described herein relate to a method including initializing a first version cache (VC) object based on a version of data stored in a data storage device; replicating the first VC to generate a second VC; receiving a write operation at the first VC; generating a delta for the write operation, the delta representing a change in the version of data; writing the delta to a persistent replication log, the persistent replication log storing an ordered set of deltas including the delta; writing data in the write operation to the data storage device; and applying the ordered set of deltas at the second VC to update data stored by the second VC.
The disclosure relates to predicting the future value of a time series. In an embodiment, a method is disclosed which includes generating a feature vector, the feature vector comprising a set of raw features and a plurality of lag features, the plurality of lag features including a current value of a selected feature in the set of raw features and one or more historical values of the selected feature; inputting the feature vector into a plurality of base models, the plurality of base models outputting a plurality of predictions, each prediction in the plurality of predictions representing future values of the selected feature; and predicting a future value of the selected feature by inputting the plurality of predictions into a meta-model.
The disclosure relates to predicting a demand based on a time-series prediction. In an embodiment, a method is disclosed which includes generating a predicted metric for a future time period; loading a plurality of rules, a given rule in the plurality of rules mapping an amount of the predicted metric to a demand amount; applying the plurality of rules to the predicted metric to compute a set of demand amounts; aggregating the set of demand amounts; and generating a predicted demand based on the aggregated demand amounts.
Disclosed are techniques for increasing the speed of pairwise comparison operations in a database system. In an embodiment, a method is disclosed comprising receiving a network request identifying a user; identifying a plurality of segments associated with the user; loading a plurality of bitmaps associated with the plurality of segments, each bitmap in the plurality of bitmaps representing a set of users associated with a segment; comparing pairs of bitmaps from the plurality of bitmaps to generate a set of overlaps; filtering the plurality of segments based on the set of overlaps to generate an anonymized set of segments; and returning aggregated data associated with the anonymized set of segments in response to the network request.
A system for incremental solution of the shift design and assignment problem comprises an interface configured to receive an incremental change and an existing schedule. The system comprises a processor to determine whether labor demand has changed; in response to labor demand having been changed, generate an updated set of shift candidates; determine a new cost function; restart a solver using the updated set of shift candidates, the existing schedule, the incremental change, and the new cost function, wherein the solver comprises a mixed integer programming (MIP) solver, and wherein the MIP solver determines simultaneously a subset of the shift candidates selected in the final schedule and a set of shift assignments of which worker is assigned to which selected shift candidate of the subset of shift candidates.
Mapping data from a first computer application to a second computer application by obtaining a second organization's application schema with data, generating a mathematical representation of the field keys and the data in the data fields of the second organization's application, extracting data from a first organization's application; processing the data from the first organization's application and data from the second organization's application, and mapping data from the first organization's application into the second organization's application schema.
A processor-implemented system and method for dynamically retrieving an attribute value of an identity claim for a user using a digitally signed access token that is digitally signed by a user device, at a relying party device associated with a relying party. The method includes (i) making an API call to retrieve at least one identity claim for the user, (ii) processing each identity claim of the user, with the relying party device, to identify if at least one by-reference identity claim that includes a URL of an endpoint, (iii) obtaining the digitally signed access token that is digitally signed by the user device, (iv) invoking the URL of the endpoint with the at least one by-reference identity claim and the digitally signed access token, and (v) dynamically retrieving the attribute value from the URL of the endpoint from an issuing party device associated with an issuing party.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
100.
System and method for authenticating a user at a user application using an credential access application and automatically redirecting to a target application
A credential accessing system includes an interface and a processor. The interface is configured to receive a request to access a credential using a credential access application. The processor is configured to execute the credential access application in response to a request from a user application, wherein the request from the user application comprises an indication of a target application. Executing the credential access application comprises:1) receiving an indication of interactive control, wherein interactive control is redirected from the user application, and wherein the indication of interactive control comprises the indication to access the credential; 2) determine whether to allow access to the credential; and 3) in response to determining to allow access to the credential, access the credential and provide the credential to the target application; and 4) indicate to redirect interactive control to the target application.
G06F 21/45 - Structures or tools for the administration of authentication
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints