Disclosed herein are system, method, and computer program product embodiments for automatically generating unique icons for applications on an application exchange platform based on application property representations. An automatic icon generation tool receives a selection of an application on the application exchange platform. The application includes one or more properties. A property representation is determined for the application based on the one or more properties of the application. A unique icon is generated for the application based on the property representation. The unique icon includes one or more characteristics and a characteristic of the one or more characteristics of the unique icon corresponds to a part of the property representation. The unique icon is displayed for the application on the application exchange platform.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Techniques are disclosed relating to database schemas. A computer system may receive a metadata document that describes an updated schema for a database that stores a plurality of records. The computer system may instantiate a set of processes to perform an upgrade routine to upgrade ones of the plurality of records to comply with the updated schema. While the set of processes are upgrading the records, the computer system may receive a request to perform an operation on one of the plurality of records. The computer system may detect that the record corresponds to an earlier schema version than a version of the updated schema of the metadata document and may upgrade the record to comply with that updated schema. After upgrading the record, the computer system may perform the requested operation on the record.
Embodiments are directed to translating a natural language query into a code snippet in a programing language that semantically represents the query. The embodiments include a cascading neural network that includes an encoder network and a classifier network. The encoder network being faster but less accurate than the classifier network. The encoder network is trained using a contrastive learning framework to identify code candidates from a large set of code snippets. The classifier network is trained using a binary classifier to identify the code snippet that semantically represents the query from the code candidates.
Disclosed herein are system, method, and computer program product embodiments for providing asynchronous backend processing of complex, time consuming, and/or expensive jobs. A command line interface (CLI) provides a command interface between a user and a backend processing server. The CLI sends a job request to the backend server, which immediately replies to the request with a confirmation message that includes a job identifier. This response is sufficient to allow the CLI to end its wait for the job response. Meanwhile, the backend server carries out the job by parsing the job into component tasks according to a declaration file and assigns those different tasks to different work servers. The backend server functions as a master server, tracking the statuses of the different tasks and assigning out new tasks until the job is complete. An overall job status is provided to the CLI upon request by referencing the job identifier.
A method for providing a neural network system includes performing contrastive learning to the neural network system to generate a trained neural network system. The performing the contrastive learning includes performing first model augmentation to a first encoder of the neural network system to generate a first embedding of a sample, performing second model augmentation to the first encoder to generate a second embedding of the sample, and optimizing the first encoder using a contrastive loss based on the first embedding and the second embedding. The trained neural network system is provided to perform a task.
Techniques are disclosed relating to a database system includes worker nodes operable to perform transactions and director nodes operable to ensure transactional consistency for the transactions. A worker node may receive a request to perform a transaction involving writing a record. The worker node may then issue, to director nodes of the database system, a request for information that facilitates performance of an operation for the transaction. A director node may determine whether to approve the request based on whether the operation could cause transactional inconsistency in the database system. The worker node may proceed to perform the operation for the transaction in response to receiving approval responses from a majority of the director nodes, with none of the received responses indicating a disapproval of the transaction.
Techniques are disclosed relating to a database system includes worker nodes operable to perform transactions and director nodes operable to ensure transactional consistency for the transactions. A worker node may receive a request to perform a transaction involving writing a record. The worker node may then issue, to director nodes of the database system, a request for information that facilitates performance of an operation for the transaction. A director node may determine whether to approve the request based on whether the operation could cause transactional inconsistency in the database system. The worker node may proceed to perform the operation for the transaction in response to receiving approval responses from a majority of the director nodes, with none of the received responses indicating a disapproval of the transaction.
Embodiments described herein provide visual-and-language (V+L) systems and methods for learning vision and language representations. Specifically, a method may comprise receiving a training dataset comprising a plurality of image samples and a plurality of text samples; encoding the plurality of image samples into a plurality of encoded image samples and the plurality of text samples into a plurality of encoded text samples; computing a first loss objective based on the plurality of encoded image samples and the plurality of encoded text samples; encoding a first subset of the plurality of encoded image samples and a second subset of the plurality of encoded text samples into a plurality of encoded image-text samples; computing a second loss objective based on the plurality of encoded image-text samples; and updating the V+L model based at least in part on the first loss objective and the second loss objective.
Embodiments described herein provide a dense hierarchical retrieval for open-domain question and answering for a corpus of documents using a document-level and passage-level dense retrieval model. Specifically, each document is viewed as a structural collection that has sections, subsections and paragraphs. Each document may be split into short length passages, where a document-level retrieval model and a passage-level retrieval model may be applied to return a smaller set of filtered texts. Top documents may be identified after encoding the question and the documents and determining document relevance scores to the encoded question. Thereafter, a set of top passages are further identified based on encoding of the passages and determining passage relevance scores to the encoded question. The document and passage relevance scores may be used in combination to determine a final retrieval ranking for the documents having the set of top passages.
Embodiments described a field extraction system that does not require field-level annotations for training. Specifically, the training process is bootstrapped by mining pseudo-labels from unlabeled forms using simple rules. Then, a transformer-based structure is used to model interactions between text tokens in the input form and predict a field tag for each token accordingly. The pseudo-labels are used to supervise the transformer training. As the pseudo-labels are noisy, a refinement module that contains a sequence of branches is used to refine the pseudo-labels. Each of the refinement branches conducts field tagging and generates refined labels. At each stage, a branch is optimized by the labels ensembled from all previous branches to reduce label noise.
Techniques herein enable a tenant of a multi-tenant database to select a programming language to interact with a platform that uses a default programming language. A tenant-specific engine may manage a runtime context associated with the tenant in which a tenant may input code that is translated into the default programming language and executed. During execution, the tenant-specific engine may enforce various multi-tenant protections associated with the tenant. For example, the tenant-specific engine may monitor the runtime context and operations of the translated code, and may enforce computational limitations of the tenant as the translated code is executed.
A system uses a neural network to detect anomalies in time series data. The system trains the neural network for a fixed number of iterations using data from a time window of the time series. The system uses the loss value at the end of the fixed number of iterations for identifying anomalies in the time series data. For a time window, the system initializes the neural network to random values and trains the neural network for a fixed number of iterations using the data of the time window. After the fixed number of iterations, the system compares the loss values for various data points to a threshold value. Data points having loss value exceeding a threshold are identified as anomalous data points.
Embodiments described herein provide safe policy improvement (SPI) in a batch reinforcement learning framework for a task-oriented dialogue. Specifically, a batch reinforcement learning framework for dialogue policy learning is provided, which improves the performance of the dialogue and learns to shape a reward that reasons the invention behind human response rather than just imitating the human demonstration.
Techniques are disclosed relating to efficiently managing skip list data structures. In some embodiments, a computing system stores a skip list including a plurality of key-value records that include one or more pointers to others of the plurality of key-value records. The computing system scans the plurality of key-value records in key order to identify key-value records to be purged from the skip list. The scanning includes maintaining a list of key-value records that include pointers that point to key-value records that have not yet been scanned by the scanning. In response to identifying a key-value record for purging, the computing system purges the key-value record by substituting the pointers included the key-value records of the list with pointers included in the key-value record being purged.
Computing systems, for example, multi-tenant systems deploy software artifacts in data centers created in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system uses a control datacenter with a set of service groups used for configuring other datacenters, for example, for performing continuous delivery of software artifacts for other datacenters. The system uses a primary control datacenter and a secondary control datacenter. The primary control datacenter configures infrastructure of the tenant datacenter, for example, by configuring computing resources in the cloud platform for the tenant datacenter according to a declarative specification of the tenant datacenter. The secondary control datacenter efficiently takes control of the process of configuring the tenant datacenter, for example, if there is a failure of the primary control datacenter.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
G06F 8/71 - Version control Configuration management
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
An abstract data graph may be constructed at a server. The abstract data graph may include nodes and links between nodes and may represent computer programming instructions for generating a graphical user interface at a client machine. At least some of the links may represent dependency relationships between portions of the graphical user interface. The abstract data graph may be resolved at the client machine to identify data items, which may be retrieved from the server and used to render the graphical user interface.
Techniques are disclosed relating to managing distributed storage of data for various entities according to classifications for these entities. A database node of a distributed storage system may receive, from a first entity of a plurality of entities, a request to store a set of data. The database node may further obtain metadata associated with the first entity, wherein the metadata specifies one of a plurality of classifications for the entities. The database node may provide the set of data to one or more of a plurality of caches for storage. The caches may be located in two or more availability zones and are configured to store the set of data based on the classification for the first entity identified in the metadata associated with the first entity. The database node may also store the set of data in a shared object storage coupled to the database node.
Techniques are disclosed relating to managing distributed storage of data with low latency access and durable storage. A distributed storage system may include storage caches distributed across availability zones in front of a shared object storage. Database nodes collocated with the storage caches may handle the storage, retrieval, and manipulation of data in the storage caches and the shared object storage. The shared object storage cache provides persistent storage of data for the distributed storage system while storage of the data in the storage caches is implemented to provide low latency retrieval of the storage. The storage caches across the availability zones may be populated through the shared object storage rather than moving data across availability zones.
Described herein are systems, apparatus, methods and computer program products configured to detect bends within a flexible display and utilize the flexible display to provide a plurality of viewports. A geometry identifier may be electrically coupled to the flexible display and allow for determination of bends of the flexible display and for segregating the display into a plurality of viewport based on the bends.
G09G 3/00 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes
G06F 1/16 - Constructional details or arrangements
G06F 3/045 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means using resistive elements, e.g. a single continuous surface or two parallel surfaces put in contact
G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
Methods, systems, and devices for data processing are described. According to the techniques described herein, a device (e.g., an application server) may render a first graphical user interface including a first view of a first data record, the first view including a first field. The device may receive, via the first graphical user interface, a user input including a field-level comment for the first field. The first view further includes the field-level comment and a first field-level visual indicator indicating that the field-level comment is associated with the first field. The device may also render a second graphical user interface including a second view of a set of data records including the first data record. In some cases, the second view omits the first field and includes the field-level comment and a second record-level visual indicator indicating that the field-level comment is associated with the first data record.
Computing systems, for example, multi-tenant systems deploy software artifacts in data centers created in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system allows users to specify a system configuration freeze for a time interval for services running in a datacenter configured on a cloud platform. During the system freeze, changes to the system are prohibited or put on hold. The system generates pipelines for modifying system configuration of services. A pipeline includes a change stage for making a change associated with a service and a pre-change stage for acquiring a lock. If the system receives a request for performing system freeze of a datacenter entity, the system acquires locks on services of the datacenter entity. As a result, execution of pipelines configured to change the system configuration of the services is put on hold.
An online system extracts information from non-fixed form documents. The online system receives an image of a form document and obtains a set of phrases and locations of the set of phrases on the form image. For at least one field, the online system determines key scores for the set of phrases. The online system identifies a set of candidate values for the field from the set of identified phrases and identifies a set of neighbors for each candidate value from the set of identified phrases. The online system determines neighbor scores, where a neighbor score for a candidate value and a respective neighbor is determined based on the key score for the neighbor and a spatial relationship of the neighbor to the candidate value. The online system selects a candidate value and a respective neighbor based on the neighbor score as the value and key for the field.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a patternLocating or processing of specific regions to guide the detection or recognition
G06V 30/416 - Extracting the logical structure, e.g. chapters, sections or page numbersIdentifying elements of the document, e.g. authors
Disclosed herein are system, method, and computer readable storage medium for detecting space suitable for overlaying media content onto an image using (i) a neural networks-based approach and (ii) using a heuristics-based approach. The system receives a candidate image which may be an image or a video frame. In the neural networks-based approach, the candidate image is then input into a neural network. The neural network may output coordinates and one or more dimensions representing one or more bounding boxes for inserting media content into the candidate image. In the heuristics-based approach, the candidate image is processed using image processing techniques in order to automatically propose spaces that are further analyzed using a heuristic rules-based approach to select insertion spaces defined by bounding boxes for inserting media content. Subsequently, one or more media content items may be selected for insertion onto the selected bounding boxes in the image. The system may then cause a display of the image with the selected media content item overlaid onto the image within the selected bounding boxes.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
A service may leverage a mutual transport layer security (mTLS) service to authenticate a client that is configured with a client certificate chain. The client may request access to the service, and the service may transmit a redirection response to the client. The redirection response may indicate an endpoint for the mTLS service that is associated with the tenant. In response to receiving the redirection response, the client may perform a digital handshake with the mTLS service, and the mTLS service may validate the client digital certificate and digitally sign the client digital certificate. The mTLS may transmit a redirection response, which redirects the client to the service where the client presents an indication of the digitally signed digital certificate chain. The service may validate the chain of trust associated with the digitally signed digital certificate chain and issue an indication that the client is authenticated to access the service.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
25.
DEPLOYMENT OF SOFTWARE RELEASES ON DATACENTERS CONFIGURED IN CLOUD PLATFORMS
Computing systems, for example, multi-tenant systems deploy software artifacts in data centers created in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives an artifact version map that identifies versions of software artifacts for datacenter entities of the datacenter and a cloud platform independent master pipeline that includes instructions for performing operations related to services on the datacenter, for example, deploying software artifacts, provisioning computing resources, and so on. The system compiles the cloud platform independent master pipeline in conjunction with the artifact version map to generate cloud platform specific detailed pipeline that deploys the appropriate versions of deployment artifacts on the datacenter entities in accordance with the artifact version map. The system sends the cloud platform specific detailed pipeline to a target cloud platform for execution.
Embodiments described herein provide methods and systems for training task-oriented dialogue (TOD) language models. In some embodiments, a TOD language model may receive a TOD dataset including a plurality of dialogues and a model input sequence may be generated from the dialogues using a first token prefixed to each user utterance and a second token prefixed to each system response of the dialogues. In some embodiments, the first token or the second token may be randomly replaced with a mask token to generate a masked training sequence and a masked language modeling (MLM) loss may be computed using the masked training sequence. In some embodiments, the TOD language model may be updated based on the MLM loss.
Computing systems, for example, multi-tenant systems create data centers in a cloud platform using a cloud platform infrastructure language that is cloud platform independent. The system receives a cloud platform independent declarative specification describing a new datacenter to be created or modifications to an existing datacenter deployed on a cloud platform. The system compiles the cloud platform independent declarative specification to generate a metadata representation of the data center. If the datacenter is existing, the system generates a metadata representation representing modifications to the datacenter to obtain a desired datacenter. The system sends the metadata representation and a set of instructions for execution on a target cloud platform. The target cloud platform executes the instructions to configure the data center. The system provides users with access to the computing resources of the data center configured by the target cloud platform.
Techniques are disclosed relating to tracking record writes for keyspaces across a set of database nodes. A first database node of a database system may receive a request to perform a database transaction that includes writing a particular record for a key included in a keyspace. The first database node may access a keyspace reference catalog that stores a plurality of indications of when keyspaces were written to by database nodes of the database system. In response to determining that a second database node has written a record for the keyspace within a particular time frame, the first database node may send a request to the second database node for information indicating whether the second database node has written a record for the key. Based on a response that is received from the second database node, the first database node may determine whether to write the particular record.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
A method for data processing includes identifying, for communication of a content object, a segment of entities including entities of a first entity class of a plurality of entity classes defined by a data model that is configured for a tenant of a multi-tenant system, where the data model defines relationships between entity classes of the plurality of entity classes. The method may further include activating for selection at a user interface at least one second entity class that is related to the first entity class based on the relationships and identifying a set of additional entities of the second entity class from the remaining entities that are related to the segment of entities as defined by the data model. The method may include transmitting to a content communication system an indication of the plurality of entity identifiers corresponding to a modified segment of entities that includes the additional entities.
A method, a system, and a non-transitory computer readable medium (CRM) for controlling access to an online presentation are disclosed. At least one embodiment includes granting a controller status to a first user for a first slide during the online presentation. Then operating the online presentation based on a set of slide commands from the first user having the controller status. The at least one embodiment also includes determining a second user is to have the controller status for a second slide during the online presentation, and transferring the controller status from the first user to the second user for the second slide during the online presentation.
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
31.
SYSTEMS AND METHODS FOR COUNTERFACTUAL EXPLANATION IN MACHINE LEARNING MODELS
Embodiments described herein provide a two-stage model-agnostic approach for generating counterfactual explanation via counterfactual feature selection and counterfactual feature optimization. Given a query instance, counterfactual feature selection picks a subset of feature columns and values that can potentially change the prediction and then counterfactual feature optimization determines the best feature value for the selected feature as a counterfactual example.
A conversation engine performs conversations with users using chatbots customized for performing a set of tasks that can be performed using an online system. The conversation engine loads a chatbot configuration that specifies the behavior of a chatbot including the tasks that can be performed by the chatbot, the types of entities relevant to each task, and so on. The conversation may be voice based and use natural language. The conversation engine may load different chatbot configurations to implement different chatbots. The conversation engine receives a conversation engine configuration that specifies the behavior of the conversation engine across chatbots. The system may be a multi-tenant system that allows customization of the chatbots for each tenant.
Embodiments described herein provide an Adapt-and-Adjust (A2) mechanism for multilingual speech recognition model that combines both adaptation and adjustment methods as an integrated end-to-end training to improve the models' generalization and mitigate the long-tailed issue. Specifically, a multilingual language model mBERT is utilized, and converted into an autoregressive transformer decoder. In addition, a cross-attention module is added to the encoder on top of the mBERT's self-attention layer in order to explore the acoustic space in addition to the text space. The joint training of the encoder and mBERT decoder can bridge the semantic gap between the speech and the text.
Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.
Disclosed are examples of systems, apparatus, methods and computer program products providing network security orchestration and management across different clouds. In some implementations, network security information includes a set of security policies indicating permitted communications between or among computing resources. The network security information is converted to a cloud-independent representation. From the cloud-independent representation, policy sets can be generated, where each policy set is specific to a different cloud.
System and methods are described for efficient monitoring of network traffic in a public cloud computing environment. In one implementation, a method comprises: generating flow log records of network traffic in the public cloud computing environment; identifying a data packet that presents a potential security risk; identifying a captured data packet (PCAP) record corresponding to the identified data packet; and transmitting the PCAP record to a computing device for network traffic analysis.
A computing platform may be configurable to cause receiving a request from a video conferencing application while a video conference is in session, the request comprising one or more user parameters identifying one or more participants in the video conference session. The computing platform is also configurable to cause implementing a query of a database system, the query being configured to retrieve one or more user data objects associated with at least one participant, wherein the at least one participant is different from a user of the client device. The computing platform is further configurable to cause generating, a result object based, at least in part, on the retrieved one or more user data objects, the result object being configured to cause display, at a user interface of the video conferencing application, visual information about the at least one participant, and sending the result object to the video conferencing application.
Embodiments described herein provide a flexible controllable summarization system that allows users to control the generation of summaries without manually editing or writing the summary, e.g., without the user actually adding or deleting certain information under various granularity. Specifically, the summarization system performs controllable summarization through keywords manipulation. A neural network model is learned to generate summaries conditioned on both the keywords and source document so that at test time a user can interact with the neural network model through a keyword interface, potentially enabling multi-factor control.
Embodiments described herein provide an attentive network framework that models dynamic attributes with item and feature interactions. Specifically, the attentive network framework first encodes basket item sequences and dynamic attribute sequences with time-aware padding and time/month encoding to capture the seasonal patterns (e.g. in app recommendation, outdoor activities apps are more suitable for summer time while indoor activity apps are better for winter). Then the attentive network framework applies time-level attention modules on basket items' sequences and dynamic user attributes' sequences to capture basket items to basket items and attributes to attributes temporal sequential patterns. After that, an intra-basket attentive module is used on items in each basket to capture the correlation information among items.
Container orchestration system (COS) service discovery across multiple COS clusters based on COS cluster domain name system (DNS) is described. An indication that a first COS service and first COS endpoints are created in a first COS cluster is received. In response to the receipt of the indication, a request to create, in a second COS cluster, a second COS service and second COS endpoints is transmitted. The second COS service and the second COS endpoints correspond to the first COS service and the first COS endpoints. The creation of the second COS service and the second COS endpoints causes insertion of first DNS records in a first DNS server that is local to the second COS cluster enabling COS pods of the second COS cluster to communicate with the COS pods of the first COS cluster through a network.
A system performs conversations with users using chatbots customized for performing a set of tasks. The system may be a multi-tenant system that allows customization of the chatbots for each tenant. The system receives a task configuration that maps tasks to entity types and an entity configuration that specifies methods for determining entities of a particular entity type. The system receives a user utterance and determines the intent of the user using an intent detection model, for example, a neural network. The intent represents a task that the user is requesting. The system determines one or more entities corresponding to the task. The system performs tasks based on the determined intent and the entities and performs conversations with users based on the tasks.
A client may transmit an authentication request to a server. the server may initiate a key agreement process using a short-lived private key generated at the server and a public key of the device, generate a shared secret, and derive a symmetric key. The symmetric key may be used to encrypt a random challenge. Further, the server initiates a key agreement process for the client using the partial private key that was generated for the client and the short-lived public key generated at the server. A partial key agreement result and the encrypted random challenge may be transmitted to the client. The client may complete the key agreement process using the partial key agreement result and a respective portion of the private key. The client may derive the encryption key and decrypt the random challenge. An indication of the random challenge may be transmitted to the server, which authenticates the client.
Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices.
Described herein are a system, apparatus, device, method, and/or computer program product embodiments and/or combinations and sub-combinations thereof for managing alerts and subscriptions in a cloud collaborative system. In one embodiment, a modification notice identifying a change to a field of a record is obtained, and the change is compared with a criterion specified in a subscription for a user. If the change satisfies the criterion, an alert is generated based on the modification notice. An alert GUI is transmitted to a user device to display alerts for the user. The user may access an expanded view of the record through the alert in the alert GUI. The user may also publish the alert to a chat session involving other users of the cloud collaborative system.
Provided herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for displaying a database record in a chat platform. In a given embodiment, a server may detect a request to launch a search window, including an input field. The server may cause the display of the search window, including the input field, in response to detecting the request to launch the search window. The server may receive a string via the input field. The server may query a database for a database record matching the string. The server may receive a selection of the database record from the chat participant. The server may cause display of a subset of fields of the database record in the chat session.
Techniques are disclosed relating to tree data structures capable of storing information indicative of database keys. A computer system may operate a database. The computer system may store a multi-level tree data structure usable to perform key lookups for the database. In various cases, the multi-level tree data structure may be stored in system memory as a plurality of subtree data structures each comprising a set of linked nodes. A given one of the plurality of subtree data structures may be stored as a respective continuous block of information in system memory. The computer system may access the respective continuous block for a first particular subtree data structure encompassing a particular range of levels in the multi-level tree data structure. The accessing may be performed without accessing one or more other subtree data structures encompassing one or more levels within the particular range of levels.
Methods, computer readable media, and devices for automated routing based on content metadata are provided. One method may include receiving a user request for content with metadata from a client by a content distribution network (CDN), parsing the user request for content to generate an evaluation of the metadata, determining a routing decision representing a selection of one of a plurality of origin services for the user request for content based on the evaluation of the metadata, transmitting the user request for content to the selected one of the plurality of origin services based on the routing decision, receiving a response to the user request for content from the selected one of the plurality of origin services, and sending the response to the client.
Methods, computer readable media, and devices for efficient application programming interface (API) processing with privacy protection are disclosed herein. One method may include receiving a user request for content from a client, parsing the user request for content to identify one or more request portions having a type of public information, customized information, and personal information, transmitting the one or more request portions to a corresponding microservice based on the type of the portion of content being requested, receiving one or more response portions, determining a type of the one or more portions of content, and in response to determining the type of a portion of content is not personal information, caching the portion of content based on the type of the portion of content, combining the one or more response portions into a user response, and sending the user response to the client.
Systems and method are provided for tracking actions from one or more users of an electronic product catalog, assigning a first token to each of the tracked actions that are unrelated to product item information, assigning second tokens to the one or more tracked actions which have catalog information or product identity, assigning third tokens to the one or more tracked actions based on at least one category of a page of the electronic product catalog, and assigning fourth tokens to at least one search queries and/or search refinement of the one or more tracked actions. The server may generate a sequence of tokens in one or more vectors for each of the one or more users, may encode profile information for the one or more users as a matrix of vectors, and may determine at least one product recommendation for the one or more users from the electronic catalog.
A method, apparatus, and system for communications to support audio menu navigation and option selection via display device is described. To support audio menu navigation and option selection via display device, a communication connection between an automated voice menu system and a user device is established, one or more option selections corresponding to a menu of options are determined, a user interface including an arrangement of elements corresponding to the one or more option selections is generated at the user device, an input from a user is received via the user interface, and a response is transmitted from the user device to the automated voice menu system via the communication connection based at least in part on the received input from the user, wherein the response is responsive to the audio feedback and indicates a selection of the subset of the determined one or more option selections.
Techniques are disclosed for handling database queries from multiple different application versions using a single database. A computer system executing a database management system (DBMS) may receive a database query from a particular version of an application having a plurality of versions. The database query may specify the particular version. The computer system may then identify catalog tables, where the catalog tables include version information columns storing version access information. The computer system may determine that version access information for the database query indicates that one or more database objects corresponding to the database query are accessible to the particular version of the application. Based on the determining, the computer system may access one or more database objects that are responsive to the database query and are accessible to the particular version of the application, which may advantageously reduce or avoid duplication of data stored in the database.
Techniques are disclosed relating to probabilistic data structures. A database node may maintaining a probabilistic data structure capable of encoding database keys. The probabilistic data structure may include a plurality of levels that are each capable of storing an indication of a transition between successive characters in a database key. The database node may insert a particular database key into the probabilistic data structure and the particular database key may comprise a series of characters. The inserting may include setting, for each transition between successive characters of the series of characters, an indication in a corresponding level of the plurality of levels that is indicative of that transition. The database node may further maintain lineage information specifying one or more lineages that correspond to the transition.
The techniques utilize an authentication process to authenticate the user to view protected data and an image monitoring process to monitor the field of view of the image detection component. When a user requests access to the protected data, the authentication process is activated. After a user is authenticated, the data may be displayed and an image monitoring process is activated and may use the image detection component to monitor the field of view to determine whether the user is actively viewing the data or that an additional person is in the field of view. When either event is detected, the protected data is concealed at the display of the user device.
An analytics system uses one or more machine-learned models to predict a hormone receptor status from a H&E stain image. The system partitions H&E stain images each into a plurality of image tiles. Bags of tiles are created through sampling of the image tiles. The analytics system trains one or more machine-learned models with training H&E stain images having a positive or negative receptor status. The analytics system generates, via a tile featurization model, a tile feature vector for each image tile a test bag for a test H&E stain image. The analytics system generates, via an attention model, an aggregate feature vector for the test bag by aggregating the tile feature vectors of the test bag, wherein an attention weight is determined for each tile feature vector. The analytics system predicts a hormone receptor status by applying a prediction model to the aggregate feature vector for the test bag.
Techniques are disclosed relating to providing and using probabilistic data structures to at least reduce requests between database nodes. In various embodiments, a first database node processes a database transaction that involves writing a set of database records to an in-memory cache of the first database node. As part of processing the database transaction, the first database node may insert, in a set of probabilistic data structures, a set of database keys that correspond to the set of database records. The first database node may send, to a second database node, the set of probabilistic data structures to enable the second database node to determine whether to request, from the first database node, a database record associated with a database key.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Techniques are disclosed relating to determining a similarity of components of a current user interface (UI) to new UI components for use in automatically generating a new UI. A computer system may receive information specifying a current UI including a particular current UI component and information specifying a plurality of new UI components for a new UI. The computer system may then identify characteristics of the particular current UI component. Based on these identified characteristics, the computer system may score ones of the plurality of new UI components, where the scoring is performed to determine a similarity to the particular current UI component. The computer system may then select, based on the scores, a particular new UI component from the plurality of new UI components for use, in the new UI, for the particular current UI component. Such techniques may advantageously improve user experience by automatically providing up-to-date user interfaces.
A method for maintaining cache of database objects using a chain set that includes multiple chains each specifying an ordering of database objects is disclosed. In response to a change of state of a particular database object, a corresponding chain is selected. The selected chain is then locked, the state of the particular database object changed, and then the selected chain is unlocked.
Disclosed herein are system, method, and computer program product embodiments for performing hover operations, where a cursor is rested over a visual element, on devices that do not have cursors (such as touchscreens). The approaches provided herein allows application developers to implement hover functionality uniformly across desktop systems supporting cursors, and mobile systems that do not support cursor functionality.
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
59.
CUSTOM USER INTERFACE GENERATION FOR COMPLETING A PREDICTED TASK
Disclosed herein are system, method, and computer program product embodiments for generating custom user interfaces (UIs) for completing a task. One embodiment operates by obtaining contextual information associated with a user and an application on a user device operated by the user, where the application includes a plurality of UI elements. Then, determining the user is attempting to complete a first task within the application based on the contextual information and a prediction model. The embodiment further operates by obtaining a minimum set of UI elements required for the first task. Further, the embodiment operates by transmitting a first custom UI including the minimum set of UI elements for the first task to the user device for display to the user.
Techniques are disclosed relating to determining whether a set of database schemas are different. A computer system may receive a request to create a snapshot for a set of data stored in a database having a first database schema. In response to receiving the request, the computer system may create the snapshot for the set of data. As part of the creating, the computer system may generate, based on the first database schema, a first hierarchy of hash values that includes a first root hash value for the first database schema. The first hierarchy of hash values may be usable to determine whether the first database schema is different from a second database schema. The computer system may include the first hierarchy of hash values with the snapshot.
A method of asset verification implemented by a computing device as part of an asset verification system. The asset verification utilizes unique identifying information of the asset. The method collects asset information from a user, collects asset information from the computing device, generates a unique identifier from the asset information, adds the unique identifier and the asset information to a blockchain, and stores the asset information in a distributed storage system.
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
62.
NESTED TENANCY THAT PERMITS A HIERARCHY HAVING A PLURALITY OF LEVELS
A multi-tenant computer system implements a platform for providing data protection scopes to shared infrastructure services according to a nested tenant model that permits a hierarchy having a plurality of levels. The multi-tenant computer system provisions data protection scopes for cloud products, service products, cloud product tenants, service products operating in the context of cloud products, service products operating in the context of cloud product tenants, and combinations of the foregoing.
Techniques are disclosed relating to concurrently processing transactions. A computer system may maintain a database table having a plurality of versions. Each of the versions may identify a corresponding portion of the database table that transactions associated with that version are permitted to access. The computer system may receive a first request to perform a first transaction to modify a definition of the database table. The computer system may receive a second request to perform a second transaction to modify data stored in the database table. In response to determining that the first and second transactions are associated with different versions of the plurality of versions, the computer system may concurrently process the first and second transactions.
Disclosed herein are system, method, and computer program product embodiments for generating software artifacts operable across diverse platforms from a single conceptual data model. The conceptual data model may be enhanced with metadata that allows the creation of platform-specific logical data models containing additional metadata that is leveraged to create deployable software artifacts. An organization may subsequently modify the conceptual data model and all relevant software artifacts may be updated and redeployed across all integrated platforms. Such a conceptual data model further facilitates the creation of documentation describing data entities in the organizations technical infrastructure, the creation of mapping files for use by a data exchange system, and the processing of federated queries that gather data from multiple data stores across a data landscape.
Techniques are disclosed relating to providing a web application capable of executing within a particular web browser or a client application native to a client platform. The particular web browser and the client platform support differing sets of features. A server computer system hosts the web application for distributing to instances of the client application. The server computer system receives, from a particular instance of the client application that is executing on a client device that implements the client platform, a request for the web application. The server computer system sends the web application to the particular instance to cause the web application to be executed within the particular instance. Such execution of the web application permits the web application to use at least one feature not supported by the particular web browser.
Techniques are disclosed relating to caching techniques for processing a database change stream. A caching module of a computer system may receive change records from a change stream that includes a plurality of records indicating changes to a database table. The change stream may include change records for multiple shards and is accessible by providing one or more position indicators for one or more of the multiple shards to request one or more change records and an updated position indicator. The caching module may store, for changes to a set of one or more shards for which the caching module is configured, one or more cache entries that each include a group of change records up to a threshold group size. A change processor module of the computer system may request a portion of the change stream by providing a received position indicator. The change processor module may receive, from the caching module, one or more cached change records from a cache entry that matches the provided position indicator.
A method performed by a system of a host organization for providing a right to forget data in a blockchain, the system providing a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization each serving as nodes in a blockchain network. The method includes receiving a request including an identifier of a requestor, the request to access transaction data designated as private, requesting access to the transaction data from nodes in the blockchain network including the identifier of the requestor, receiving at least one shared secret from a node in the blockchain network indicating consensus to access the transaction data by the requestor, and denying access to the transaction data in response to receiving insufficient shared secrets from the nodes indicating the transaction data is permanently unavailable to access.
A method for responding to a consent request for an action based on a set of records is described. The method includes receiving the consent request, including a set of identifiers and the action for obtaining consent; locating a first record of a first object type and a second record of a second data type, wherein the first record corresponds to a first identifier in the set of identifiers, the second record corresponds to a second identifier of the set of identifiers, and one or more of the first and second records includes consent information for performing the action; determining a final response based on the first and second records, wherein the final response includes at least one proceed element that indicates whether consent exists for the action based on at least the first and second records; and returning the final response as a response.
A wire web component graph that includes a plurality of nodes may be accessed to identify one or more application procedure interfaces (APIs) through which to update one or more data values included in a designated wire web component in a graphical user interface (GUI) being presented on a display device. Each of the data values may correspond to a respective data field represented in the wire web component graph, and each data field may be associated with a respective API in the wire web component graph. The graphical user interface may be updated based on one or more updated data values determined by communicating with the identified APIs over a network and via a communications interface.
System determines first and second scores based on applying function to features of first and second values in fields in first and second records, respectively. System determines first priority based on first score and second priority based on second score for displaying first and second values in fields in first profile. System revises, based on feedback associated with first value and second value, parameter associated with function and determines third score based on applying function, associated with revised parameter, to feature of third value in field in third record. System determines fourth score based on applying function, associated with revised parameter, to feature of fourth value in field in fourth record and determines third priority, based on third score, for displaying third value in field in second profile and fourth priority, based on fourth score, for displaying fourth value in field in second profile.
Systems and methods are provided for efficient off-policy credit assignment (ECA) in reinforcement learning. ECA allows principled credit assignment for off-policy samples, and therefore improves sample efficiency and asymptotic performance. One aspect of ECA is to formulate the optimization of expected return as approximate inference, where policy is approximating a learned prior distribution, which leads to a principled way of utilizing off-policy samples. Other features are also provided.
According to some embodiments, systems and methods are provided to develop or provide common sense auto-generated explanations (CAGE) for the reasoning used by an artificial intelligence, neural network, or deep learning model to make a prediction. In some embodiments, the systems and methods use supervised fine-tuning on a language model (LM) to generate such explanations. These explanations may then be used for downstream classification.
System and methods of the disclosed subject matter provide segregating, at a memory storage coupled to a multitenant database system, first tenant data of a first tenant from at least second tenant data of a second tenant, based on a first tenant identifier. A first encryption key associated with the first tenant may be retrieved from a key cache memory based on the first tenant identifier, to encrypt one or more fragments of the first tenant data. The fragments of the first tenant data may be encrypted based on the retrieved encryption key. Non-encrypted header information may be generated for each of the encrypted fragments of the first tenant data, where the header information may have metadata including the first tenant identifier. The encrypted fragments of the first tenant data and the corresponding non-encrypted header information may be stored in the immutable storage.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
74.
SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING EFFICIENT STORAGE AND VALIDATION OF DATA AND METADATA WITHIN A BLOCKCHAIN USING DISTRIBUTED LEDGER TECHNOLOGY (DLT)
Systems, methods, and apparatuses for implementing efficient storage and validation of data and metadata within a blockchain using Distributed Ledger Technology (DLT) in conjunction with a cloud based computing environment are described herein. For example, according to one embodiment there is a system having at least a processor and a memory therein executing within a host organization, in which such a system includes means for operating a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization, in which each one of the plurality of tenants operate as a participating node with access to the blockchain; receiving a transaction for the blockchain requesting the host organization to update a data record persistently stored on the blockchain, the transaction specifying updated values for one or more of a plurality of data elements of the data record; executing a smart contract to validate the updated values specified by the transaction before permitting the transaction to be added to the blockchain to update the data record on the blockchain with the updated values; and writing the updated values for the data record to the blockchain by adding the transaction to a new block on the blockchain pursuant to successful validation of the updated data values by the smart contract. Other related embodiments are disclosed.
Approaches for the translation of structured text include an embedding module for encoding and embedding source text in a first language, an encoder for encoding output of the embedding module, a decoder for iteratively decoding output of the encoder based on generated tokens in translated text from previous iterations, a beam module for constraining output of the decoder with respect to possible embedded tags to include in the translated text for a current iteration using a beam search, and a layer for selecting a token to be included in the translated text for the current iteration. The translated text is in a second language different from the first language. In some embodiments, the approach further includes scoring and pointer modules for selecting the token based on the output of the beam module or copied from the source text or reference text from a training pair best matching the source text.
Techniques are disclosed relating to operations management for computer systems. A computer system may access operational information defining a set of commands for an operational scenario. The computer system may access blueprints for a set of operational entities to be utilized in a target computer environment for implementing the operational scenario. The computer system may implement the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules having an orchestrator controller module at top level of the hierarchy that is executable to carry out the set of commands by issuing instructions to controller modules at a next level of the hierarchy. The hierarchy may include controller modules executable to manage the set of operational entities according to respective blueprints in order to complete the operational scenario, including by changing states of one or more of the set of operational entities.
Techniques are disclosed relating to operations management for computer systems. A computer system may access operational information defining a set of commands for an operational scenario. The computer system may access blueprints for a set of operational entities to be utilized in a target computer environment for implementing the operational scenario. The computer system may implement the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules having an orchestrator controller module at top level of the hierarchy that is executable to carry out the set of commands by issuing instructions to controller modules at a next level of the hierarchy. The hierarchy may include controller modules executable to manage the set of operational entities according to respective blueprints in order to complete the operational scenario, including by changing states of one or more of the set of operational entities.
Techniques are disclosed relating to operations management for computer systems. A computer system may access operational information defining a set of commands for an operational scenario. The computer system may access blueprints for a set of operational entities to be utilized in a target computer environment for implementing the operational scenario. The computer system may implement the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules having an orchestrator controller module at top level of the hierarchy that is executable to carry out the set of commands by issuing instructions to controller modules at a next level of the hierarchy. The hierarchy may include controller modules executable to manage the set of operational entities according to respective blueprints in order to complete the operational scenario, including by changing states of one or more of the set of operational entities.
Techniques are disclosed relating to refining, based on user feedback, one or more machine learning engines for automatically generating component-based user interfaces. In various embodiments, a computer system stores template information that defines a plurality of component types and one or more display parameters identified for one or more user interfaces. The computer system may receive a request to generate a user interface, where the request specifies a data set to be displayed. Further, the computer system may automatically generate a user interface, where the generating is performed by one or more machine learning engines that use the template information and the data set as inputs. The computer system may then provide the user interface to one or more users, receive user feedback associated with the user interface, and train at least one of the one or more machine learning engines based on the user feedback.
Systems, devices, and techniques are disclosed for identification of records for post-cloning tenant identifier translation. Records may be received from a database system executing a database executor at a computing device executing a database application. The database application may identify, from among the records, records that include a record header that includes a bit indicating that an encoded value of a tenant identifier is stored in the record in a column of the record that is not a tenant identifier column. The database application may generate an index based on the records identified by the database application. The database application may access the records using the index and replace the encoded value of the tenant identifier stored in columns of the records with an encoded new value of a tenant identifier.
A system and corresponding method are provided for generating responses for a dialogue between a user and a computer. The system includes a memory storing information for a dialogue history and a knowledge base. An encoder may receive a new utterance from the user and generate a global memory pointer used for filtering the knowledge base information in the memory. A decoder may generate at least one local memory pointer and a sketch response for the new utterance. The sketch response includes at least one sketch tag to be replaced by knowledge base information from the memory. The system generates the dialogue computer response using the local memory pointer to select a word from the filtered knowledge base information to replace the at least one sketch tag in the sketch response.
An agent for navigating a mobile automated system is disclosed herein. The navigation agent receives a navigation instruction and visual information for one or more observed images. The navigation agent is provided or equipped with self-awareness, which provides or supports the following abilities: identifying which direction to go or proceed by determining the part of the instruction that corresponds to the observed images (visual grounding), and identifying which part of the instruction has been completed or ongoing and which part is potentially needed for the next action selection (textual grounding). In some embodiments, the navigation agent applies regularization to ensures that the grounded instruction can correctly be used to estimate the progress made towards the navigation goal (progress monitoring).
Among other things, embodiments of the present disclosure may utilize identification information associated with a user from a variety of sources in order to authenticate the user for a particular platform. Other embodiments may be described and/or claimed.
G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
A method of visual search of a data set includes receiving a request from a client digital data device comprising an image and utilizing a detection model to identify, in the image, apparent objects of interest, as well as bounding boxes within the image of those apparent objects. For each of one of more of the apparent objects of interest, the method extracts a sub-image defined by its respective bounding box. A feature retrieval model is used to identify features of apparent objects in each of those sub-images, and those features are applied (e.g., as text or otherwise) to a search engine to identify items in the digital data set. Results of the search can be presented on a digital data device of a requesting user.
Systems, devices, and techniques are disclosed for translation of tenant identifiers. A record may be received. A value of a tenant identifier for the record may be determined from a key for the record or a scan descriptor. The value of the tenant identifier in the key for the record may be replaced with a new value for the tenant identifier. A bitmap stored in a record header of the record may be used to identify columns of the record that stored an encoded value of the tenant identifier. An encoded new value of the tenant identifier may be stored in columns identified by the bitmap stored in the record header that include an attribute indicating that tenant identifier translation is enabled.
A processor can produce a database catalog for a second version of a database management system of the database. The database catalog can store metadata related to definitions of objects or tables included in the second version of the database. A controller can be caused to be established in memory cells being used for the first version of the database. A copy of the database catalog for the second version of the database management system can be stored in the memory cells being used for the first version of the database. The controller, using the copy of the database catalog, can produce the second version of the database management system. The second version of the database management system can be caused to interact with data stored in a storage of the database. The storage can be included in the memory cells being used for the first version of the database.
A method of deleting tombstones early includes setting an initial- flag in a first record in the storage system, setting a delete-flag in a second record in the storage system, selecting a set of one or more records in the storage system to be written to an extent of the storage system in a merge operation, each of the one or more records being associated with the first key, and performing the merge operation, wherein the second record is not written to the extent during the merge operation if it is determined that the first record having the initial-flag set is the oldest record in the set and the second record having the delete-flag set is the newest record in the set.
A method of deleting a plurality of records in a log-structured merge (LSM) tree based storage system during a merge operation that writes data from a memory storage to an extent, includes receiving a command to delete a plurality of records, inserting a range tombstone into the memory storage component of the storage system, the range tombstone indicating the plurality of records to be deleted, selecting one or more delayed deletion processes based at least in part on whether the plurality of records is contiguous beyond a predetermined threshold amount, modifying a manifest of the storage system based on the selected delayed deletion process, and performing the merge operation, wherein the plurality of records is not written to the extent during the flush operation based at least in part on the delayed deletion process.
Embodiments for training a neural network using sequential tasks are provided. A plurality of sequential tasks are received. For each task in the plurality of tasks a copy of the neural network that includes a plurality of layers is generated. From the copy of the neural network a task specific neural network is generated by performing an architectural search on the plurality of layers in the copy of the neural network. The architectural search identifies a plurality of candidate choices in the layers of the task specific neural network. Parameters in the task specific neural network that correspond to the plurality of candidate choices and that maximize architectural weights at each layer are identified. The parameters are retrained and merged with the neural network. The neural network trained on the plurality of sequential tasks is a trained neural network.
A method for managing data by a multi-tenant server in a distributed network is described. The multi-tenant server manages a multi-tenant environment for a set of tenant systems and peers in the distributed network, which include the set of tenant systems and a set of non-tenant systems. The method includes receiving a tenant transaction request to modify an object in the distributed network, wherein the tenant transaction request is received from a tenant system in the set of tenant systems based on a non-tenant transaction request from a non-tenant system from the set of non-tenant systems; generating, on behalf of the tenant system and the non-tenant system, a transaction object based on an exchange object and the tenant transaction request; and making, on behalf of the tenant system, the transaction object available to the sets of tenant non-tenant systems to attempt to obtain consensus for modifying the object.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
91.
FIELD-BASED PEER PERMISSIONS IN A BLOCKCHAIN NETWORK
A method for a multi-tenant server to manage data in a blockchain network is described. The method includes generating an exchange object for the network, wherein the exchange object includes a set of exchange fields and a mapping between each exchange field in the set of exchange fields and a field of an object associated with each peer in the network; determining permissions for each exchange field and for each peer in the network; generating, on behalf of a first peer in the network, a transaction object using the exchange object, wherein the transaction object includes a set of field values for the set of exchange fields and one or more field values in the set of values are encrypted based on the permissions; and making the transaction object available to a second peer in the network to attempt to obtain consensus for altering an object of the first peer.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
92.
USING UNSTRUCTURED INPUT TO UPDATE HETEROGENEOUS DATA STORES
Approaches to using unstructured input to update heterogeneous data stores include receiving unstructured text input, receiving a template for interpreting the unstructured text input, identifying, using an entity classifier, entities in the unstructured text input, identifying one or more potential parent entities from the identified entities based on the template, receiving a selection of a parent entity from the one or more potential parent entities, identifying one or more potential child entities from the identified entities based on the template and the selected parent entity, receiving a selection of a child entity from the one or more potential child entities, identifying an action item in the unstructured text input based on the identified entities and the template, determining, using an intent classifier, an intent of the action item, and updating a data store based on the determined intent, the identified entities, and the selected child entity.
A method for a multi-tenant server to manage data in a peer-to-peer blockchain network is described. The method includes monitoring one or more fields of a first physical object of a first tenant in the peer-to-peer blockchain network to determine when one or more conditions of a smart contract have been fulfilled; determining that one or more conditions of the smart contract have been met by the first physical object of the first tenant; and performing one or more operations of the smart contract, which are associated with the one or more conditions, in response to determining that the one or more conditions of the smart contract have been met by the first physical object of the first tenant, wherein the one or more operations are performed in relation to a second physical object of a second tenant in the peer-to-peer blockchain network.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
94.
REDUCING INSTANCES OF INCLUSION OF DATA ASSOCIATED WITH HINDSIGHT BIAS IN A TRAINING SET OF DATA FOR A MACHINE LEARNING SYSTEM
Instances of data associated with hindsight bias in a training set of data for a machine learning system can be reduced. A first set of data, having a first set of fields, can be received. Data in a first field can be analyzed with respect to data in a second field corresponding to an event to be predicted. A result can be that the data in the first field is associated with hindsight bias. A second set of data, having a second set of fields, can be produced. The second set of fields can exclude the first field. One or more features associated with the second set of data can be generated. A third set of data, having the second set of fields and fields that correspond to the one or more features, can be produced. The training set of data can be produced using the third set of data.
Methods and systems are provided to determine suitable hyperparameters for a machine learning model and/or feature engineering process. A suitable machine learning model and associated hyperparameters are determined by analyzing a dataset. Suitable hyperparameter values for compatible machine learning models having one or more hyperparameters in common and a compatible dataset schema are identified. Hyperparameters may be ranked according to each of their respective influences on a model performance metrics, and hyperparameter values identified as having greater influence may be more aggressively searched.
A processor can cause a first communication, to a user device, of a first item based on an eventing system being in a first mode, a configuration to cause the eventing system to cause, without a request from the user device, a communication of an item to the user device in response to an entry of the item into a memory. After the first communication, the processor can cause the eventing system to be in a second mode, a configuration to cause the eventing system to refrain from communications of items to the user device. The processor can receive, from the user device, a signal to cause the eventing system to switch from the second mode to the first mode. After receiving the signal, a second item can be entered into the information memory. The processor can cause a second communication, to the user device, of the second item.
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests with an unknown destination across tenants of at least one multi-tenant database system. Authentication is facilitated using an intermediate system that is accessible by and independent from the tenants of the multi-tenant database system.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
Techniques are disclosed relating to servicing search requests based on index information stored in a storage shared between multiple search servers. In some embodiments, a first search server maintains a local cache including index information usable to service received search requests and synchronizes the local cache with the shared storage. The synchronizing includes retrieving, from the shared storage, metadata indicative of the index information in the shared storage and determining, based on the metadata, whether the index information in the local cache differs from the shared storage. In response to determining that the index information in the local cache differs from the index information in the shared storage, the first search server updates the index information in the local cache with the index information in the shared storage. The first search server may then provide one or more search results determined using the updated index information.
A method for a server to manage data in a peer-to-peer blockchain network is described herein. The method includes generating, by a multi-tenant web server, an exchange object for the peer-to-peer blockchain network, wherein the exchange object includes a set of exchange fields and a mapping between each exchange field in the set of exchange fields and a field of a physical object associated with each peer in the peer-to-peer blockchain network; generating, by the multi-tenant web server, a transaction object based on the exchange object, wherein the transaction object includes the set of exchange fields and proposes an alternation to a physical object; and making, by the multi-tenant web server, the transaction object available to the peers in the peer-to-peer blockchain network to attempt to obtain consensus for the alteration.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system