Embodiments described herein provide systems and methods for training neural network based language models using human feedback. An existing (or generated) summary of a document is provided, and that summary may be used to generate a number of other summaries. A human annotator may reject the summary if there is any factuality issue with the summary. Summaries which are agreed to have no factuality problems are used as baseline summaries. Small atomic edits are made to the baseline summaries (e.g., replacing a single word or phrase) to create a group of summaries. Human annotators label each of these summaries as factual or not. The annotated summaries are used to train a summarization model and/or a factual detector model.
Apparatus and method for dynamic and persistent data sharing between cloud services. To address limitations in existing systems, resource provisioning and application deployment pipelines are configured with calls to share data using a configuration service. In some implementations, the configuration service includes an API, which is called by one or more stages of the resource provisioning pipeline to write configuration data in key-value pairs (e.g., data related to resource provisioning). One or more stages of the application deployment pipeline are configured with calls to access the configuration data. The stages then use the configuration data for application deployment. The configuration service manages the key-value store using versioning, repeatability, and immutability, to ensures that a configuration generated by any pipeline execution can be automatically re-used by another pipeline, at execution time. Thus, the configuration service is a dynamic, single source of truth for sharing pipeline configuration data.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
3.
SYSTEMS AND METHODS FOR CONTROLLABLE IMAGE GENERATION
Embodiments described herein provide a method of image generation. The method includes a fixed diffusion model, and a trainable diffusion model. The fixed diffusion model may be pretrained on a large training corpus. The trainable diffusion model may be used to control the image generation of the fixed diffusion model by modifying internal representations of the fixed diffusion model. A task instruction may be provided in addition to a text prompt, and the task instruction may guide the trainable diffusion model together with the visual conditions. The visual conditions may be adapted according to the task instruction. During training, a fixed number of task instructions may be used. At inference, unseen task instructions may be used by combining convolutional kernels of the visual condition adapter.
G06T 5/20 - Amélioration ou restauration d'image en utilisant des opérateurs locaux
G06V 10/771 - Sélection de caractéristiques, p.ex. sélection des caractéristiques représentatives à partir d’un espace multidimensionnel de caractéristiques
4.
SYSTEMS AND METHODS FOR RECONSTRUCTING A THREE-DIMENSIONAL OBJECT FROM AN IMAGE
Embodiments described herein provide a 3D generation system from a single RGB image of an object by inferring the hidden 3D structure of objects based on 2D priors learnt by a generative model. Specifically, the 3D generation system may reconstruct the 3D structure of an object from an input of a single RGB image and optionally an associated depth estimate. For example, a radiance field is formulated to depict the input image in one viewpoint of the target 3D object, based on which other viewpoints of the 3D object can be inferred. Based on the visible surface depicted by the input image, points between the reference camera and the surface are assigned with zero density, and points on the surface are assigned with high density and color equal to the corresponding pixel in the input image.
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
G06T 7/194 - Découpage; Détection de bords impliquant une segmentation premier plan-arrière-plan
G06T 7/50 - Récupération de la profondeur ou de la forme
H04N 13/279 - Générateurs de signaux d’images à partir de modèles 3D d’objets, p.ex. des signaux d’images stéréoscopiques générés par ordinateur les positions des points de vue virtuels étant choisies par les spectateurs ou déterminées par suivi
5.
SYSTEMS AND METHODS FOR RECONSTRUCTING A THREE-DIMENSIONAL OBJECT FROM AN IMAGE
Embodiments described herein provide a 3D generation system from a single RGB image of an object by inferring the hidden 3D structure of objects based on 2D priors learnt by a generative model. Specifically, the 3D generation system may reconstruct the 3D structure of an object from an input of a single RGB image and optionally an associated depth estimate. For example, a radiance field is formulated to depict the input image in one viewpoint of the target 3D object, based on which other viewpoints of the 3D object can be inferred. Based on the visible surface depicted by the input image, points between the reference camera and the surface are assigned with zero density, and points on the surface are assigned with high density and color equal to the corresponding pixel in the input image.
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
6.
Infoscenting Fields for Multi-Fact Data Model Analysis Using Shared Dimensions
A computing device displays, in a user interface, data field icons corresponding to a plurality of data fields. Each of the data fields is associated with a respective object in an object model. In response to receiving (i) user selection of a first data field icon corresponding to a first data field, and (ii) placement of the first data field icon in a shelf region of the user interface, where the first data field is associated with a first object of the object model, the computing device generates a first data visualization and updates a visual characteristic of a subset of the data field icons from a first visual characteristic to a second visual characteristic. Each data field icon in the subset is associated with a second object of the object model. The data field icons in the subset are user-selectable independently of the first or second visual characteristic.
A computing device receives user input specifying a first dimension data field and a second dimension data field. The device constructs a dimension subquery according to characteristics of the first dimension data field, the second dimension data field, a first object to which the first dimension data field belongs, and/or a second object to which the second dimension data field belongs, including determining a join type for combining (i) first data rows that include data values of the first dimension data field and (ii) second data rows that include data values of the second dimension data field. The device constructs the dimension subquery according to the determined join type, and executes the dimension subquery to retrieve first tuples. The device constructs measure subqueries and executes the measure subqueries to retrieve second tuples. The device forms extended tuples, and generates and displays the data visualization according to the extended tuples.
Database systems and methods are provided for assigning structural metadata to records and creating automations using the structural metadata. One method of assigning structural metadata involves determining a candidate group of semantically similar conversations based on unassigned conversations, determining a clustering performance metric associated with the candidate group based on a relationship between the candidate group and a plurality of existing groups of semantically similar conversations, and when the clustering performance metric is greater than a threshold, automatically assigning one or more unassigned conversations to the candidate group based on the representative utterances associated therewith and automatically updating one or more associated records at a database system to include metadata identifying the candidate group.
A system receives an access token generated by a user performing authentication via an authentication device, for example, a smart card. The system obtains a personalized virtual machine assigned to the user. The system exchanges the access token for a temporary certificate having an expiry time. The system provides the temporary certificate that includes verifiable user identity to a personalized virtual machine. The system provides the user with access to the personalized virtual machine. The system allows the user to present verifiable user identity and connect to any of a plurality of systems without requiring the user to authenticate again using the authentication device. After the expiry time of the temporary certificate is exceeded, the system denies subsequent requests from the user to connect to any of the plurality of systems.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
10.
Creation and Consumption of Data Models that Span Multiple Sets of Facts
A computing device displays a first object icon representing a first object of a first data source and a second object icon, representing a second object of the first data source. The first object icon is connected to the second object icon via a first connector representing a relationship between the first object and the second object. In response to receiving a first user input to add a third object, the computing device displays a third object icon representing the third object. In response to receiving a second user input on the third object icon, in accordance with a determination that the second object and the third object include at least one common data field, the computing device displays a second connector, connecting the third object icon to the second object icon.
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 3/04812 - Techniques d’interaction fondées sur l’aspect ou le comportement du curseur, p.ex. sous l’influence de la présence des objets affichés
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
11.
Automatic structure selection and content fill within a group-based communication system
Media, methods, and systems for automatically selecting and prefilling template structures within a group-based communication system. A template structure is automatically selected based on a received user input. A prompt including one or more keywords from the user input is submitted to a content fill model. The content fill model returns a response with content output used to automatically populate one or more content fields within the template structure.
Techniques are disclosed that relate to truncating a subrange of records from a database table. A computer system receives a request to truncate the subrange of records. The request specifies a conditional expression that is usable to identify the subrange from other subranges of records of the database table. Before truncating the subrange of records, the computer system determines whether the subrange of records can be truncated from the database table with a single-record subrange truncate operation, regardless of a size of the subrange of records, based on whether the conditional expression satisfies a set of preconditions. Based on determining that the conditional expression satisfies those preconditions, the computer system performs the single-record subrange truncate operation that includes generating a truncate record that causes the subrange of records to be truncated from the database table.
Embodiments described herein provide a method of generating a multi-modal task output to a text instruction relating to inputs of multiple different modalities (e.g., text, audio, video, 3D). The method comprises receiving, via a data interface, a first input of a first modality, a second input of a second modality and the text instruction relating to the first and the second inputs; encoding, by a first multimodal encoder adapted for the first modality, the first input of the first modality into a first encoded representation conditioned on the text instruction; encoding, by a second multimodal encoder adapted for the second modality, the second input of the second modality into a second encoded representation conditioned on the text instruction; and generating, by a neural network based language model, the multi-modal task output based on an input combining the first encoded representation, the second encoded representation, and the text instruction.
Embodiments described herein provide a query-focused summarization model that employs a single or dual encoder model. A two-step approach may be adopted that first extracts parts of the source document and then synthesizes the extracted segments into a final summary. In another embodiment, an end-to-end approach may be adopted that splits the source document into overlapping segments, and then concatenates encodings into a single embedding sequence for the decoder to output a summary.
Systems, devices, and techniques are disclosed for a horizontally scalable system for managing container clusters. A monolithic management system may perform a first task on a first level of a cloud computing server system. The monolithic management system may perform a second task on a second level of a cloud computing server system. The monolithic management system may invoke instances of a container manager on a level of the cloud computing server system below the second level. The instances of the container manager may update container clusters of the cloud computing server system. The instances of the container manager may be associated with container clusters and the instances of the container manager update their associated container clusters.
A computer-implemented method for monitoring and control of a network traffic in a cloud server environment is disclosed. The method includes receiving network traffic at a cloud service account that includes a corresponding local security enforcement module configured to enforce security policies for data processed by the cloud service account and forwarding a part of the network traffic from the cloud service account to a centralized security monitoring hub that includes a hardware-based security component. The method also includes detecting, by the hardware-based security component, offending traffic that includes traffic from an unwanted source or with malicious content. The method further includes sending a notification of the offending traffic to the localized security enforcement module, by the centralized security monitoring hub, and responsive to the notification, implementing a security enforcement strategy in the cloud service account based on the security policy, by the corresponding localized security enforcement module.
A computing platform configurable to allow users to graphically represent relationships between database records may be provided to a plurality of organizations. A request to generate a customizable visualization for graphically representing relationships between a root database record and child database records in a customizable format may be processed. Graphical representations of the root database record and the child database records may be caused to be displayed in accordance with the customizable format.
G06F 16/26 - Exploration de données visuelles; Navigation dans des données structurées
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
18.
CONTENT-OBLIVIOUS FRAUDULENT EMAIL DETECTION SYSTEM
A system supporting one or more machine learning models may receive, via a cloud-based platform that supports a multi-tenant system, metadata associated with a set of electronic communication messages for a tenant of the multi-tenant system. The system may normalize the metadata by extracting fields of the metadata into a format readable by the machine learning model to identify a set of fraudulent users associated with the set of electronic messages. The system may utilize the machine learning model to identify the set of fraudulent users based on executing a set of detection models and performing pattern matching between a set of previously authenticated user activity logs and a set of newly generated user activity logs in the metadata. Upon detection of the set of fraudulent users, the system may generate and transmit a report indicating the set of fraudulent users and the respective electronic message corresponding to the respective fraudulent user.
A computing device receives a natural language input specifying a first search term and a second search term, directed to a dataset. The device (i) executes, for the first search term, first queries against a search index to retrieve a first set of labeled trend events; and (ii) executes for the second search term, second queries against the search index to retrieve a second set of labeled trend events. Each labeled trend event has a respective chart identifier. The device constructs sequences of labeled trend events based on the retrieved sets of labeled trend events, assigns each sequence into groups according to the respective chart identifier, and ranks the groups. The device retrieves data corresponding to a subset of line charts having the respective chart identifiers of the ranked groups, generates the subset of line charts, and displays one or more line charts of the subset.
A computing device receives user interaction with a portion of a data visualization that is displayed on the computing device. In response to receiving the user interaction, the computing device generates a first prompt that includes (i) a first parameter specifying a visualization type of the data visualization, (ii) a second parameter specifying a data array corresponding to data marks of the data visualization, and (iii) a third parameter specifying a title of the data visualization. The computing device inputs the first prompt into a large language model (LLM) and obtains, from the LLM, a text narrative for the portion of the data visualization. The device generates a second prompt in accordance with the text narrative, inputs the second prompt into the LLM, and obtains from the LLM a title for the text narrative. The device generates a self-contained story based on the text narrative and the title.
A computing device receives a natural language input specifying search terms directed to a dataset. The device parses the input into tokens and executes queries against a search index to retrieve a plurality of labeled trend events. Each labeled trend event has a respective chart identifier. The device determines a respective composite score for each labeled trend event and individually assigns each labeled trend event to a respective group. For each group, the device sorts the respective labeled trend events within the respective group according to respective composite scores, determines a respective final score for each group, and ranks the groups according to one or more determined final scores. The device retrieves data corresponding to a first subset of line charts having the respective chart identifiers of the ranked groups, generates the first subset of line charts, and displays one or more line charts of the first subset with annotation.
System, method and interface for interpreting natural language comparisons during visual analysis are provided. The system includes obtaining a natural language utterance that includes a comparison query and a dataset of attributes and values relevant to interpreting the comparison query. The system also includes interpreting the natural language utterance based on the dataset using multi-step chain-of-thought reasoning prompting to generate a response to the comparison query. The system also includes generating a visualization based on the response and a text summary describing the multi-step chain-of-thought reasoning for the comparison query.
Methods, apparatuses, and computer-program products are disclosed. A method may include activating, in a processing entity, a connection agent and a manifest, the manifest including a data signature and an endpoint type that are associated with the processing entity. The method may include generating, based on the data signature, the endpoint type, or both, one or more load balanced dynamic endpoints configured for access, by the connection agent and via one or more application programming interfaces, to a repository including access configurations for the processing entity. The method may include retrieving, via the one or more load balanced dynamic endpoints and from the repository, one or more first access configurations of the plurality of access configurations and the one or more first access configurations may be associated with the processing entity.
Online meeting software typically generates a flow of data. A server system is configured to receive the flow of data, which may include metadata. The data may include metadata of online meetings. Different types of metadata are generated by online meetings. Such different types of metadata are provided in different patterns. Different types of metadata are provided throughout the online meeting session or at various points of the session and are provided to various different elements of the server system. The various different metadata received are then parsed and certain specific metadata elements are identified to match the different metadata streams.
Techniques are disclosed relating to storing location information about storage nodes in cookies. A cloud-based service may send location requests to an orchestration service that instantiated storage nodes included in a storage cluster of the cloud-based service. The cloud-based service may receive location information that identifies in which computer zone that a given storage node is located. The cloud-based service may store the location information in cookies at a metadata store that is shared among the storage nodes. The cloud-based service may receive, from a client node, a search request to identify ones of the storage nodes that store particular data. The cloud-based service may return a set of cookies corresponding to identified storage nodes. The set of cookies may enable the client node to determine whether there is a storage node that stores the particular data and is within the same computer zone as the client node.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
System and methods are presented for configuring and managing metadata switches and platform licenses in a distributed system. Using metadata switches, a platform license can be developed for a software product without the need for an engineer to develop the platform license by hand. A software application depot can be used to configure metadata switches that provide configuration information for a particular aspect of the software product and, when associated to a platform license that utilizes metadata switches, generate an accessible platform license for use by tenant organizations.
Systems and methods are provided for parsing, at a server, a design file including code for a user interface, where the code is readable by the server into a tree representation having nodes, the nodes represent design elements of the user interface and includes one or more design properties, a unique identifier, and references to child elements. The server traverses the tree representation and comparing the design elements of the tree representation to a set of factors to determine when the design elements and meet a criteria to be a subcomponent for one or more components of the code of the design file. The server adds the design elements to a list of subcomponent candidates that meet at least one of the set of factors to be a subcomponent. The server generates a tree structure for the one or more components using the list of subcomponent candidates.
Techniques for locating information previously shared via a virtual space of a communication platform are disclosed herein. For example, the communication platform may receive, at the virtual space associated with a first user and a second user, a message containing one or more keywords. Based at least in part on receiving an indication from one of the first user or the second user, the communication platform may determine that the message is a searchable message. In some examples, the communication platform may then receive, from a third user of the communication platform unassociated with the virtual space, a request to access one or more messages associated with a keyword of one or more keywords. Based at least in part on receiving the request, the communication platform may cause presentation, to the third user, of at least a portion of the searchable message.
Disclosed are examples of systems, apparatus, methods and computer program products for sharing and publishing files. In one aspect, the database system can maintain a user database, a file database and a library. The database system can receive a first request initiated by a first user to share a first file with one or more second users and, responsive to the first request, enable a second set of one or more permissions for each of the second users. The database system also can receive a second request initiated by the first user to publish the first file to the library and, responsive to the second request, publish the first file to the library. The database system additionally can restrict access to the published file based on permissions associated with the library.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.
A plurality of permissions associated with the on-demand computing services environment may be identified. Each of the permissions may identify a respective one or more actions permitted to be performed within the on-demand computing services environment. Each of the permissions may be granted to a respective one or more user accounts within the on-demand computing services environment. A degree of overlap between a first group of the user accounts granted a first one of the permissions and a second group of the user accounts granted a second one of the permissions may be determined. When the degree of overlap exceeds a designated threshold, a designated permission set that includes the first permission and the second permission may be created.
A multi-tenant system receives a request to build a software artifact for deploying on one or more target datacenter entities of the datacenter configured on the could platform. A software artifact comprises executable instructions associated with a service configured for execution on one or more cloud platforms. The system generates a release configuration that includes reusable release components and is used as a template by the release orchestration system to orchestrate release of the software artifact. The release configuration may specify one or more stagger groups, or a group of target datacenter entities that can be rolled-out in parallel.
A method provides visual analysis of datasets. A system receives a natural language search query that is directed to data repositories including data sources and data visualizations. The system parses search tokens to determine if the natural language search query contains analytic intents. The system also determines if the search tokens match fields in one or more data sources, using a semantic search. When (i) the search tokens match fields in the one or more data sources and (ii) the natural language search query contains analytic intents, the system generates and displays visualization responses. When (i) the search tokens do not match fields in the data sources or (ii) the natural language search query does not contain the analytic intents, the system displays pre-authored content from the data visualizations.
Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with one or more data objects in an online social network. A user interface includes a publisher with a custom action. The custom action is defined in accordance with custom action instructions provided by a first entity via an application programming interface (API). Such custom action instructions may declaratively or programmatically define the data object, the interaction to be performed with the data object, and other attributes associated with the custom action. A user may request to interact with the data object via selection of the custom action by a second entity. Information may be submitted through the publisher to interact with the data object to update a database system associated with the data object. A feed item may be presented for inclusion in the information feed based on the update.
G06F 40/143 - Balisage, p.ex. utilisation du langage SGML ou de définitions de type de document
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
G06F 40/106 - Affichage de la mise en page des documents; Prévisualisation
G06F 40/14 - Documents en configuration arborescente
G06Q 30/01 - Services de relation avec la clientèle
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04W 4/21 - Signalisation de services; Signalisation de données auxiliaires, c. à d. transmission de données par un canal non destiné au trafic pour applications de réseaux sociaux
H04W 4/60 - Services basés sur un abonnement qui utilisent des serveurs d’applications ou de supports d’enregistrement, p.ex. boîtes à outils d’application SIM
35.
PROCESSING FORMS USING ARTIFICIAL INTELLIGENCE MODELS
An application server may receive an input document including a set of input text fields and an input key phrase querying a value for a key-value pair that corresponds to one or more of the set of input text fields. The application server may extract, using an optical character recognition model, a set of character strings and a set of two-dimensional locations of the set of character strings on a layout of the input document. After extraction, the application server may input the extracted set of character strings and the set of two-dimensional locations into a machine learned model that is trained to compute a probability that a character string corresponds to the value for the key-value pair. The application server may then identify the value for the key-value pair corresponding to the input key phrase and may out the identified value.
G06V 30/412 - Analyse de mise en page de documents structurés avec des lignes imprimées ou des zones de saisie, p.ex. de formulaires ou de tableaux d’entreprise
Implementations(s) for simulated software features are described. Responsive to a request for accessing a first web page, first code for the first web page is caused to be retrieved from a first web application. Responsive to the first code, the first web page is caused to be displayed with an access to a simulation of a feature that may be used in the first web application. Responsive to a user's selection of the access, the first web page is caused to be updated to include a first user interface (UI) component that identifies a second web page; responsive to the updated first web page, second code for the second web page is caused to be retrieved from a second web application; and responsive to the second code, the second web page is caused to be displayed inside the first UI component to allow for the simulation.
A text interaction record including interaction text from one or more messages between a client machine and a service provider is received at a database system. A search vector including a text embedding representing the interaction text in a multi-dimensional vector space may be determined based on the interaction text via a processor at the database system. A reference interaction record including reference interaction text may be retrieved from the database system based on the search vector. The reference interaction record may include a reference vector representing the reference interaction text in the multi-dimensional vector space. Recommended reply text is determined based on the interaction text and the reference interaction text by a large language model configured to generate the recommended reply text in response to a prompt that includes one or more natural language instructions.
Methods, systems, and storage media are described for providing access to private resources such as in a Virtual Private Cloud (VPC) or in a database which is behind a Virtual Private Network (VPN). The solution involves configuring access to the privately owned resource, then using an integration platform to solve design operations or execute the full integration against the private resources. Ephemeral (short-term) or long-term connectivity can be provided.
Embodiments are directed to pre-training a transformer model using more parameters for sophisticated patterns (PSP++). The transformer model is divided into a held-out model and a main model. A forward pass and a backward pass are performed on the held-out model, where the forward pass determines self-attention hidden states of the held-out model and the backward pass determines loss of the held-out model. A forward pass on the main model is performed to determine a self-attention hidden states of the main model. The self-attention hidden states of the main model are concatenated with the self-attention hidden states of the held-out model. A backward pass is performed on the main model to determine a loss of the main model. The parameters of the held-out model are updated to reflect the loss of the held-out model and parameters of the main model are updated to reflect the loss of the main model.
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06F 18/21 - Conception ou mise en place de systèmes ou de techniques; Extraction de caractéristiques dans l'espace des caractéristiques; Séparation aveugle de sources
G06F 40/00 - Maniement de données en langage naturel
40.
METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A CHANNEL CALENDAR IN A GROUP-BASED COMMUNICATION SYSTEM
Method, apparatus and computer program product for generating a channel calendar in a group-based communication system are described herein. The apparatus is configured to at least generate a channel calendar identifier associated with a group-based communication channel in the group-based communication system, receive a calendar sharing request associated with the channel calendar identifier from a client device, retrieve the calendar object and calendar object metadata set based on the channel calendar identifier, and cause rendering of the calendar object for display via a user interface of the client device.
Embodiments described herein provide a method of training a language model by tuning a prompt. The method comprises masking tokens of first and second conversational texts which have the same semantic meaning but in different languages (e.g., a translation). The masked texts are input to a language model with a prepended soft prompt. The language model generates respective predicted outputs. A loss objective is computed including a masked language model loss. The prompt is updated based on the computed loss objective via backpropagation while keeping the language model frozen.
Techniques are disclosed relating to restarting a database node. A database node may allocate memory segments that include a restart segment for storing data records. The database node may spawn processes to read a log and replay log records of the log to update the restart segment to store data records. The database node may determine to perform a restart operation to transition from a first mode to a second mode. Performing the restart operation may include ceasing reading the log at a stop position and storing, based on the stop position, database state information that enables the processes to resume reading the log from the stop position. The database node may further deallocate the memory segments except for the restart segment and terminate the processes. After performing the restart operation, the database node may spawn the processes, which may resume reading the log based on the database state information.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
A method and system for defining feature variable configurations in a system defined by a codebase has been developed. The codebase is executed over a set of test cases to test the software feature behaviors of a software feature. Feature variable configurations including feature variables generated by the test cases are logged. Associations between the feature variables and individual software feature behaviors are identified based on the logged feature variable configurations. Impact scores for the feature variables associated with individual software feature behaviors are calculated based on an occurrence of the associations between the feature variables and individual software feature behaviors. Deterministic feature variables are identified for individual software feature behaviors based on the calculated impact scores. At least one common feature variable is operable to enable access to the software feature in the system is identified from the deterministic features variables associated with the individual of software feature behaviors.
Techniques are disclosed relating to index metadata that is usable for accessing multi-level data structures. A computer system may operate a database, including maintaining a set of records having a set of corresponding keys. The computer system may create multi-level data structures that facilitate key range lookups against those records. A given multi-level data structure may store key information indicative of a subset of the corresponding keys. The computer system may create separate index metadata that is usable for accessing the multi-level data structures. The index metadata may specify indications of key information that is stored in the multi-level data structures and locations of the multi-level data structures. The computer system may perform a key range lookup that includes using the index metadata to determine a particular set of the multi-level data structures whose key information corresponds to a key range of the key range lookup.
Techniques for displaying tasks and/or virtual spaces to a user within a group-based communication platform are discussed herein. In some examples, a user may use a first device to start a first session on a communication platform. As the user may transition from the first user device to a second device, the communication platform may determine that the user has changed devices based on determining that the first session has ended and/or the user having requested to start a second session using a second device. Upon receiving the request and/or based on the first session ending, the communication platform may identify or otherwise predict a task and/or virtual space that the user may want to access upon starting the second session on the second device. The communication platform may cause the task and/or virtual space to be displayed via a user interface of the second device.
In some embodiments, a method determines a first functional domain that includes a group of security policies that have been copied from a second functional domain. Network flow data is queried to determine network traffic that is associated with a security policy in the group of security policies in the first functional domain. The method analyzes utilization of the security policy based on the network traffic. Based on the analyzing, a recommendation is generated to change the security policy in the first functional domain.
A method of training a neural network based three-dimensional (3D) encoder is provided. A first plurality of samples of a training dataset are generated using a first 3D model. An image generator with multi-view rendering is used to generate a plurality of two-dimensional (2D) images having different viewpoints of the first 3D model. A first language model is used to generate a plurality of texts corresponding to the plurality of 2D images respectively. A first text for a first image is generated by using one or more text descriptions generated by the first language model. A point cloud is generated by randomly sampling points in the 3D model. The first plurality of samples are generated using the plurality of 2D images, the corresponding plurality of texts, and the point cloud. The neural network based 3D encoder is trained using the training dataset including the first plurality of samples.
An extensible platform-as-a-service (PaaS) system is used during the software development lifecycle (SDLC) processes of an application. The system facilitates the process of getting security approval for the application. The system allows developers to use software bundles including software modules that are pre-approved. The system allows a developer to customize one or more software modules of the software bundle if necessary. The system monitors the development of the application to check if the developer customizes any software module to use a configuration that is not pre-approved. The system automatically generates a report noting the customization to the software module and requests the security team to review the modified configuration for security approval.
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
Techniques are disclosed relating to upgrade groups. A node of a computer system may access metadata assigned to the node during deployment of the node. The node may be one of a plurality of nodes associated with a service that is implemented by the computer system. The node may perform an operation on the metadata to derive a group identifier for the node and the group identifier may indicate the node's membership in one of a set of groups of nodes managed by the service. The node may then store the group identifier in a location accessible to the service.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
50.
CONTROLLED UPDATES OF CONTAINERS IN A DISTRIBUTED APPLICATION DEPLOYMENT ENVIRONMENT
System and methods are described for implementing controlled updates of containers in a distributed application deployment environment. In one implementation, a method comprises: receiving a request to update a target container of a plurality of containers within a deployed computing unit; identifying an updated configuration object to be applied to the target container based on the request; receiving or computing a health indicator representative of performance of the deployed computing unit or other containers to which the updated configuration object has been applied; and assigning the updated configuration object to the target container based on the health indicator.
A method in a computing environment for application start up includes: generating a directed acyclic graph (DAG) for tasks that are performed during application start-up; performing topological sorting of the tasks based on the DAG to define an order for the tasks; allocating a tenant-specific priority queue; loading the tasks in the tenant-specific priority queue in the order determined by the topological sorting; allocating a plurality of computing threads to executing the tasks; executing the tasks using the plurality of computing threads that were allocated, wherein a plurality of the tasks are executed in parallel, and the tasks are assigned to the computing threads in an order based on the order in which the task are loaded in the tenant-specific priority queue; preparing a start page for use in accessing the application; and causing the start page to be displayed on a user access device for accessing the application.
Systems, devices, and techniques are disclosed for provisioning and secure access control for storage on public servers. Data may be received from a tenant service identifying both the tenant service and a security certificate. A data storage container may be generated on a public server. A security role that is associated with the tenant service and includes permissions for accessing data in the data storage container may be generated on the public server. A request to access the data storage container may be received from the tenant service, including an identification of the tenant service and the security certificate. Credentials and a request to assume the security role may be sent to an identity provider. A temporary security token for accessing the data storage container with the permissions of the security role may be received from the public server. The temporary security token may be sent to the tenant service.
Embodiments described herein provide a feedback based instructional image editing framework that employs a diffusion process to follow user instruction for image editing. A diffusion model is fine-tuned using a reward model, which may be trained via human annotation. The training of the reward model may be done by having the image editing model output a number of images, which a human annotator ranks based on their alignment with the original image and a given instruction.
Embodiments provide a generative AI creation framework to a customized generative AI stack using a foundational model (such as GPT) based on user-defined prompts, a natural language description of the task to be accomplished, and domain adaptation. In one embodiment, organization-specific knowledge may be injected into either the prompt and/or the foundational model. In this way, the customized generative AI stack thus supports a full spectrum of domain-adaptive prompts to enable a full spectrum of personalized and adaptive AI chat applications.
A method for data processing is described. The method includes receiving an indication of a reference string from a cloud client of a content generation service. The method further includes generating multiple candidate strings associated with the reference string based on using a machine learning model to calculate similarity metrics between the reference string and the multiple candidate strings, where the machine learning model is trained using a dataset of annotated strings. The method further includes selecting a quantity of the candidate strings based on filtering the multiple candidate strings according to the similarity metrics. The method further includes causing the quantity of candidate strings to be displayed at the cloud client. The method further includes receiving feedback associated with the quantity of candidate strings and a selection of at least one candidate string displayed at the cloud client.
Embodiments described herein provide a method of generating an image. the method comprises receiving, via a data interface, a natural language prompt, obtaining a noised image vector, and generating a denoised image vector by a first forward pass of a plurality of iterations of a denoising diffusion model with the noised image vector as an input and conditioned on the natural language prompt. The method further includes calculating a gradient of a loss function based on the denoised image vector with respect to the noised image vector, and updating the noised image vector based on the gradient. A final image is generated using a final forward pass of the denoising diffusion model with the updated noised image vector as an input and conditioned on the natural language prompt.
Embodiments provide a generative AI creation framework to a customized generative AI stack using a foundational model (such as GPT) based on user-defined prompts, a natural language description of the task to be accomplished, and domain adaptation. In one embodiment, organization-specific knowledge may be injected into either the prompt and/or the foundational model. In this way, the customized generative AI stack thus supports a full spectrum of domain-adaptive prompts to enable a full spectrum of personalized and adaptive AI chat applications.
A method and system for rendering a stack trace visualization display has been developed. A first stack trace associated with execution of an application during a time period is received from a central processing unit profiler. A first stack trace visualization display is rendered including a plurality of stack frames stacked in accordance with an order of ancestry based on the first stack trace. Rendering at least one stack frame involves rendering at a first location of the first stack trace visualization display, a stack frame rectangle for the at least one stack frame in accordance with the order of ancestry and rendering at a second location of the first stack trace visualization display, stack frame specific text for the at least one stack frame. The second location overlays the first location. Rendering of the stack frame rectangle is independent of the rendering of the stack frame specific text.
A request to perform an action related to a smart contract recorded on a public trust ledger external to the database system may be received via a communication interface at a database system. The request may authenticate a designated database system account. A determination may be made as to whether the designated database system account is authorized to perform the action by accessing definition information for a public trust ledger synthetic party identifying a plurality of database system accounts authorized to perform one or more actions related to the smart contract. The database system may communicate with a token exchange to perform the action by executing the smart contract when it is determined that the designated database system account is authorized to perform the action.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
60.
AUTOMATICALLY IDENTIFYING AND RIGHT SIZING INSTANCES
A system is disclosed. The system includes a resource monitor to monitor a resource utilization of a set of resources of one or more instances, the resource utilization corresponding to a first level of performance and cost and an instance type determiner to, based on the resource utilization, determine if there is an instance type for at least one of the one or more instances, with a resource profile, that will provide a second level of performance and cost that is closer to a default level of performance and cost than the first level of performance and cost. In addition, the system also includes an instance type recommender to, based on the determining, perform one of making and not making a recommendation to replace the instance type of the at least one of the one or more instances.
Methods, systems, apparatuses, devices, and computer program products are described. An application server or another device may receive a set of input data associated with an activity between an actor and an electronic communication message (e.g., a marketing email). From the input data, the application server may identify a set of features associated with the activity (an open rate, a click rate, etc.) and a set of source network addresses of respective, known automated scanners. The application server may input the features and source network addresses into a positive-and-unlabeled (PU) learning model, which may output a classification result that indicates a probability that the activity is associated with an automated scanner.
Techniques are disclosed pertaining to migrating a database between different storage clusters. A computer system identifies a current state of the database that is managed by a database application that enables a client application to access data of the database stored at a first storage cluster. The computer system copies first particular data of the database that is associated with the current state from the first storage cluster to a second storage cluster. After the copying, the computer system transitions the database application into a read-only mode in which it processes read but not write traffic. The computer system copies, from the first storage cluster to the second storage cluster, second particular data of the database that was generated by the database application during the copying of the first particular data. The computer system may also instantiate another instance of the database application in association with the second storage cluster.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
63.
SYSTEMS AND METHODS FOR AN ENCODER-DECODER BASED FRAMEWORK FOR CODE GENERATION AND UNDERSTANDING
Embodiments described herein provide a mixture of encoder-decoder Transformer framework for multi-task pretraining and flexible finetuning for both code understanding and generation tasks. Specifically, the framework is built on multimodal encoder and decoder modules. During pre-training, the encoder-decoder framework is trained with multiple learning objectives, including a diverse set of self-supervised tasks over two major stages of pretraining on unimodal and bimodal data.
A method is provided for reusing custom concepts in visual analytics workflows. The method includes displaying a data visualization for a data source. The method also includes receiving a natural language input directed to the visualization. The method also includes parsing the natural language input to data fields and/or data values. The method also includes executing queries to data sources for retrieving results, based on the data fields and/or the data values. The method also includes generating and storing a named concept from the results, including either (i) saving underlying data as the named concept or (ii) querying the results and saving resulting data as the named concept. Saving the underlying data corresponds to saving data in an attribute. Querying the results is performed when a referenced attribute is not part of the results so a new query is issued that adds data from the referenced attributes.
Disclosed herein are example embodiments of an improved narrative generation system where an analysis service that executes data analysis logic that supports story generation is segregated from an authoring service that executes authoring logic for story generation through an interface. Accordingly, when the authoring service needs analysis from the analysis service, it can invoke the analysis service through the interface. By exposing the analysis service to the authoring service through the shared interface, the details of the logic underlying the analysis service are shielded from the authoring service (and vice versa where the details of the authoring service are shielded from the analysis service). Through parameterization of operating variables, the analysis service can thus be designed as a generalized data analysis service that can operate in a number of different content verticals with respect to a variety of different story types.
G06F 16/2457 - Traitement des requêtes avec adaptation aux besoins de l’utilisateur
G06F 16/248 - Présentation des résultats de requêtes
G06F 16/26 - Exploration de données visuelles; Navigation dans des données structurées
G06F 16/28 - Bases de données caractérisées par leurs modèles, p.ex. des modèles relationnels ou objet
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
A system is disclosed. The system includes a resource monitor to monitor a resource utilization of a set of resources of one or more instances, the resource utilization corresponding to a first level of performance and cost and an instance type determiner to, based on the resource utilization, determine if there is an instance type for at least one of the one or more instances, with a resource profile, that will provide a second level of performance and cost that is closer to a default level of performance and cost than the first level of performance and cost. In addition, the system also includes an instance type recommender to, based on the determining, perform one of making and not making a recommendation to replace the instance type of the at least one of the one or more instances.
In an example, an apparatus may include a validation module configured to identify a security policy update from a security as code repository, wherein the identified security policy update is a candidate for deployment to a production environment having a plurality of attributes defined by an infrastructure as code repository; identify, from the plurality of attributes and using the infrastructure as code repository, individual attributes that correspond to the identified security policy update, wherein the identified individual attributes are identical to a subset of the plurality of attributes; generate a test environment based on the identified individual attributes; following deployment of the identified security policy update to the test environment, check for security exceptions or availability exceptions using the test environment; and output validation results based on a result of the checking.
Media, methods, and systems are provided for scheduling a scheduled event within a synchronous multimedia collaboration session within a group-based communication system. A selected start time and a selected time duration may be received such that one or more users are added to the synchronous multimedia collaboration session within a channel of the group-based communication system at or near the selected start time. Upon expiration of the selected time duration, the one or more users may be automatically removed from the synchronous multimedia collaboration session to prevent the scheduled event from extending beyond an allocated time.
Methods and systems are provided for automatically determining a need to invoke functionality of a feature of an application while using a primary application and for automatically invoking that functionality without user action. When input information is input into the primary application via a user interface of a user system, it can be received by an application server from a sender process at the user system, and a prefix that occurs before a text string can be identified. The text string that follows the prefix can be extracted by performing a matching analysis against a library of keywords and extracting a matching keyword. The text string comprises extracted text from the input information. The matching keyword can be matched to an entry that is mapped to a command that can be executed to generate an action that automatically invokes the functionality of the feature of the application without user action.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
Media, methods, and systems are disclosed for documenting synchronous multimedia collaboration sessions in a group-based communication system. A live synchronous multimedia collaboration session is detected. In response to the detecting, a first audio segment is received and transcribed into a first text segment. A collaboration thread associated with the live synchronous multimedia collaboration session is generated. In real time, a first message is posted based on the first transcribed text segment to the collaboration thread associated with the live synchronous multimedia collaboration session. Next, a second audio segment is received and transcribed into a second text segment. Finally, in real time and during the live synchronous multimedia collaboration session, a second message is posted to the collaboration thread based on the second transcribed text segment.
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 65/1089 - Procédures en session en supprimant des médias
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p.ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
Disclosed are some implementations of systems, apparatus, methods and computer program products for executing process flows. A graphical representation of a flow is provided for presentation via a display device, where the flow includes a plurality of elements, each of the elements corresponding to a set of computer-readable instructions. A set of metrics associated with the flow is generated or updated, where the set of metrics indicates, for each of a plurality of paths of the flow, one or more metrics collected across a plurality of users of the database system that accessed the flow, each of the paths of the flow corresponding to a subset of the plurality of elements of the flow. An indication of the set of metrics associated with the flow is provided, for presentation via the display device, in relation to one or more elements of the flow such that at least a first portion of the set of metrics is provided for presentation in close proximity to a visual representation of a first one of the elements of the flow and a second portion of the set of metrics is provided for presentation in close proximity to a visual representation of a second one of the elements of the flow. A request to modify the flow is processed and the graphical representation of the flow is modified responsive to processing the request to modify the flow. In addition, a modified flow corresponding to the modified graphical representation can be stored.
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p.ex. interaction avec des règles ou des cadrans
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 16/248 - Présentation des résultats de requêtes
73.
METHOD AND SYSTEM FOR PROCESSING A STREAM OF INCOMING MESSAGES SENT FROM A SPECIFIC INPUT MESSAGE SOURCE AND VALIDATING EACH INCOMING MESSAGE OF THAT STREAM BEFORE SENDING THEM TO A SPECIFIC TARGET SYSTEM
Methods and systems are provided for processing a stream of incoming messages sent from a specific input message source and validating each incoming message of that stream before sending them to a specific target system.
Database systems and methods are provided for securing an instance of a web application from vulnerabilities in third party libraries using a web application firewall. One method involves receiving, at a web application firewall between an application server and a client, vulnerability information associated with the web application, generating, at the web application firewall, executable code for securing the instance of the web application based at least in part on the vulnerability information, providing, by the web application firewall, the executable code to the client over a network, and thereafter detecting a vulnerable library associated with the instance of the web application, wherein the client executes the executable code to secure the instance of the web application in response to detecting the vulnerable library.
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Elastic connection pools for database nodes are described. A system receives a user request that references data in a database, and uses the user request to identify a partition of multiple partitions of the database. The system uses the identified partition to identify a database node in a cluster of database nodes. The system uses the identified database node to identify a connection pool of multiple connection pools provided by an application server. If the identified connection pool does not have any available connections to the identified database node, the system uses connection criteria to select another connection pool of the remainder of the connection pools. The system enables the user request to access the referenced data in the identified partition of the database by providing the user request with an available connection, from the other connection pool, to another database node in the cluster.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
77.
SYSTEMS AND METHODS FOR CROSS DOMAIN SERVICE COMPONENT INTERACTION
Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).
G06Q 30/01 - Services de relation avec la clientèle
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
H04L 51/52 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel pour la prise en charge des services des réseaux sociaux
H04L 65/403 - Dispositions pour la communication multipartite, p.ex. pour les conférences
A computer-implemented method of providing targeted content to a user includes generating a query index from a data corpus, the query index including a plurality of market segment-based queries, wherein each market segment-based query of the plurality of queries is configured to provide targeted content on a browser user interface of a user determined to be within a corresponding market segment. The method further includes constructing the browser-executable library including the query index, where the browser-executable library is configured to execute within a local machine browser of the user, and transmitting the browser-executable library to the local machine browser of the user, wherein the browser-executable library is configured to determine that a query of the plurality of market segment-based queries matches user-specific data only stored in the local machine browser of the user, where the query matching the user-specific data stored in the local machine browser of the user is configured to cause the local machine browser to request the targeted content corresponding to the user-specific data.
Systems and methods are provided for requesting, at a service configured on a server, a public key infrastructure (PKI) generated certificate using a PKI agent, where the PKI agent stores a private key and the generated certificate in a key management service (KMS). An application layer security controller communicatively coupled to the server registers the service to enable the application layer to inspect packets. The PKI agent transmits version information for the certificates to the application layer security controller, and the PKI agent updates the certificates and keys in the KMS. The service and an application layer datapath component change the routing of packets using an overlay network and inspect at least one of the packets. The application layer datapath component decapsulates at least one packet by using the private keys and certificates retrieved from the KMS, and performs application inspection of the decapsulated packet.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
80.
IDENTIFICATION OF PATENT-RELEVANT MESSAGES IN A GROUP-BASED COMMUNICATION SYSTEM USING MACHINE LEARNING TECHNIQUES
Methods, systems, apparatuses, devices, and computer program products are described. In a group-based communication system, users may post messages discussing potentially patentable concepts. To support automatic identification of patent-relevant messages within the group-based communication system, the system may use a machine learning model including at least an embedding function. The system may generate a set of features for one or more messages and may input the set of features into the machine learning model. Using the embedding function, the model may create a message embedding and may compare the message embedding with embeddings of patent application language to determine a level of similarity. The machine learning model may output an indication of whether the one or more messages are associated with a patentable concept based on the embedding, and the indication may be surfaced to a user associated with managing patents for an organization of the group-based communication system.
Systems and methods are provided for receiving, at a computing system, an expression in a formula language to generate a user interface to be displayed, where the expression includes data to be retrieved. The computing system may determine whether a first portion of the data for the expression has been retrieved from at least one data source when the user interface is to be generated based on a signal received by the computing system from the at least one data source. When the first portion of the data is available, the user interface may be output. When the signal is received by the computing system that the first portion of the data for the expression is not available, the computing system outputs the user interface without the first portion of the data and revises the user interface to include the first portion of the data when the first portion of data becomes available.
The system performs optimized upgrades for datacenters configured on a cloud platform. The optimized upgrade process combines upgrades of operating system and services on a node of a cluster of machines of the cloud platform. The system detects a service version change and operating system version change. If the system detects the version change for both a service and the operating system for a node, the system orchestrates the upgrade process for both service and operating system at the same time. The system restarts the node and service once the upgrade completes. This reduces the multiple restarts of the node/services thereby improving the availability of the system for clients.
A user device may modify structure information for a user interface (UI) to display the content by allocating a portion of the UI to a preview element for an asset associated with the content based on a request for content related to an entity. The user device may retrieve a code library with functions for manipulating assets of the entity from a static resource for the user interface based on the modified structure information. The user device may generate the UI comprising a preview of the asset within a portion of the UI based on image data indicative of the asset received via a function of the code library and mapped to the preview element.
A multi-tenant system receives a request to build a software artifact for deploying on one or more target datacenter entities of the datacenter configured on the could platform. A software artifact comprises executable instructions associated with a service configured for execution on one or more cloud platforms. The system generates a release configuration that includes reusable release components and is used as a template by the release orchestration system to orchestrate release of the software artifact. In one embodiment, the release configuration includes a variable representing a placeholder for one or more elements of the release.
Techniques for generating priority scores associated with meetings via group-based communication platforms are discussed herein. For example, a group-based communication platform may receive, from a user of the group-based communication platform, a request to generate a meeting between additional users of the group-based communication platform. The group-based communication platform may then input the request into a machine-learning model and receive a priority score associated with an importance of the meeting. Based at least in part on one or more calendars associated with the additional users, the group-based communication platform may determine an availability of the additional users. The group-based communication platform may then send, to the additional users, an invitation to the meeting including the priority score, and receive at least one response.
A method or system for dynamic network security control. The system discovers multiple external network addresses (ENAs) associated with multiple services in a trusted public cloud environment (TPCE), and records the discovered ENAs in a first storage. The system also accesses multiple network security policies stored in the TPCE. The system then maps the ENAs to the network security policies based on contextual relationships therebetween, and stores mappings between the ENAs and the network security policies in the TPCE. The system causes a network access control list to be update based in part on the mappings. The network access control list contains rules that specify which entities are granted or denied access to the ENAs associated with the services.
A method or a system for predicting a likelihood of an occurrence of a transaction. The system accesses a graph including multiple nodes and multiple edges linking the nodes. The multiple nodes include a first type of nodes representing a first type of entities an a second type of nodes representing a second type of entities. The system extract a set of node features for each node, and a set of edge features for each edge. For an edge connecting a first node of the first type and a second node of the second type, the system generates a set of edge embeddings based in part on the node features and edge features, and computes a score based in part on the set of edge embeddings. The score indicates a likelihood of an occurrence of a transaction between the first node and the second node.
Techniques for preventing deadlock when upgrading a plurality of instances of a software service that is distributed across multiple different computing zones. Upgrade software executing on a cloud computer system receives an upgrade request to upgrade the plurality of instances. Respective upgrade processes are initiated in parallel. Node acquisition portions of the respective upgrade processes have a constraint on parallelization, as they are performed using a common upgrade procedure in which a given instance is upgraded by acquiring nodes in different ones of the computing zones according to a specified order. After acquiring the nodes according to the specified order, an updated instance is deployed to the acquired nodes to update the given instance. The acquiring of the nodes may be performed by node-securing pods in some embodiments, with the specified order enforced with affinity and anti-affinity rules.
Systems, methods, and devices are disclosed herein that provide distribution of policies for computing platforms. A computing platform may be implemented using a server system, and the computing platform is configurable to cause receiving a policy data object at a first domain of the computing platform, the policy object identifying one or more security policies associated with the first domain, and determining if the policy data object should be implemented at the first domain based, at least in part, on a second domain identified by the policy data object. The computing platform is also configurable to cause determining if one or more changes should be made to the policy data object based, at least in part, on one or more properties of the first domain, and implementing the policy data object at the first domain by translating the policy data object from a generic syntax to a domain-specific syntax.
Methods, systems, apparatuses, devices, and computer program products are described. In a group-based communication system, a user may save posts for later (e.g., to reply to a message at a later time, to complete a task associated with a message at a later time). The system may use a machine learning model to determine to automatically mark a post for later for a user, for example, based on a set of features including at least a semantic embedding of the post. Additionally, or alternatively, the system may use a machine learning model to determine an order for displaying items (e.g., posts, reminders, files) within a user view (e.g., a later tab, a drafts tab, a threads tab, a files tab) for a user via a user interface. The system may update one or more machine learning models based on how users interact with the posts, user views, or both.
Systems, methods, and devices are disclosed herein that provide management of usage of application program interfaces. A computing platform may be configurable to cause detecting a first action comprising an event at a user interface associated with an on-demand application hosted by the computing platform, and making, using a first application program interface (API), an asynchronous call for a data record in response to detecting the first action, the asynchronous call being made to a storage location of the computing platform. The computing platform may also be configurable to cause detecting a second action associated with the on-demand application, and determining if a synchronous call should be performed using a second API, the synchronous call being made in response to determining that a cache does not include the data record. The computing platform may also be configurable to cause generating a result responsive to the second action.
Techniques are disclosed pertaining to determining whether execution of a transaction will exceed a system resource threshold. A computer system stores a precomputed permissions data structure in association with particular data stored in a database. That precomputed data structure may be used to determine whether a user can access the particular data. The computer system may capture metric information that pertains to parameters involved in different types of transactions that can be performed to recompute the precomputed permissions data structure. Upon receiving a request to perform a transaction that involves recomputing the permissions data structure, the computer system, may determine, based on the metric information and the transaction's particular type, whether an execution of the transaction will exceed the system resource threshold. If the transaction exceeds the threshold, the computer system prevents the transaction from being executed and may provide suggestions to enable that transaction to be executed.
Techniques are disclosed relating to a database recovery routine to start up a database system in response to a database failure. The database system accesses checkpoint information identifying a set of active database transactions that were active at a flush point that occurred before the database failure. As a part of the database recovery routine, the database system replays database transactions that occurred between a recovery point and the flush point. The database transactions include the set of active database transactions but exclude any committed or aborted database transactions that occurred between the recovery point and the flush point such that less than a total number of database transactions occurring between the recovery point and the flush point are replayed. The database system further replays, without excluding committed or aborted database transactions, database transactions occurring between the flush point and a recovery end point at which the database failure occurred.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
Techniques are disclosed that pertain to tracing performance information. A computer system receives a request from a second computer system to perform operations pertaining to a database statement of a database transaction that is being executed by the second computer system. The computer system determines that the request is an initial request received by the computer system to perform work of that database statement. Based on the determining, the computer system stores, in association with the database statement, baseline information that is indicative of a baseline state of one or more performance metrics. Subsequent to performing the operations, the computer system receives a request from the second computer system for performance information. The computer system derives the performance information from a difference between the current state of the one or more performance metrics and the baseline state. The computer system sends the performance information to the second computer system.
Methods, systems, and devices for data processing in a computing system are described. The computing system may receive a notification of an update to network security objects hosted in diverse substrates within the computing system. The computing system may retrieve a network security policy for a service instance impacted by the update. The computing system may update the network security policy for the service instance according to a network security configuration of the hosting substrate. The computing system may translate the updated network security policy into access control lists (ACLs) for network entities managing communications between service instances within the computing system. The computing system may store the ACLs in respective data repositories that are accessible to the network entities. The computing system may transmit a notification that the ACLs are available for deployment, thereby causing the network entities to retrieve the ACLs from the respective data repositories.
Methods and systems for data processing and troubleshooting at a query management service are described. The query management service may receive, via a proxy between the query management service and a communication service, an indication of a query from a user of the communication service. The query management service may determine an intent of the query based on using a third-party natural language processing (NLP) model and customized logic to analyze the query. The query management service may obtain query results based on executing, within a distributed computing environment that includes the query management service and a set of multi-substrate network security services, a sequence of actions, that correspond to the intent of the query. The query management service may transmit an indication of the query results to the communication service, where the query results are rendered according to feedback information received from the user.
The disclosed techniques identify and prevent suspicious activity occurring within a messaging software executed via an enterprise system. The disclosed techniques detect a current message sent from a particular user account of the messaging software executed via the enterprise system at a user device. The techniques compare the current message and user account activity associated with the current message with a behavior profile of the particular user account, where the behavior profile is generated based on prior user account activity that includes one or more prior messages sent from the user account via the enterprise system, and where the prior account activity occurs before the current message. Based on the comparing and predetermined risk levels, the disclosed techniques determine a risk level of the current message. Based on the determined risk level of the current message, the disclosed techniques perform preventative actions with respect to the particular user account.
The disclosed techniques include the generation of a summary event log from multiple event logs that are identical. Event logs may be identical when the event logs include the same action by the same user using the same source. In various instances, multiple event logs accumulated over a predetermined period of time are summarized in the summary event log. The summary event log includes the information that is identical among the multiple event logs along with additional information about the time period the event logs are accumulated, the number of events that are identical, and memory usage by the event logs. Other information may also be annotated to the summary event log as necessary.
The disclosed techniques automatically ingest new documents and store data extracted from the documents in a database for conversion into a different format. The disclosed techniques identify, via a backend API, newly released documents that include data for users and, based on the identifying, automatically ingest, via an ingestion call executed made by the backend API, the newly released documents. The disclosed techniques extract, using a computer vision model trained on different types of documents, a data from the newly released documents, where the extracting includes identifying locations within the documents from which to extract data. The disclosed techniques store the extracted data in the database storing data extracted from previously ingested documents for users in a text-based object format and convert, using a machine learning model trained on a plurality of metatags, data corresponding to a given user from the text-based object format to a queryable file format.