Partitioning Documents For Contextual Search
Granted: October 24, 2024
Application Number:
20240354323
Operations of a search management system are disclosed. The operations may include: identifying a data corpus containing a plurality of documents, generating sets of feature vectors representing the plurality of documents, receiving a query to search the data corpus, generating a query vector for the query, identifying a target feature vector that meets a similarity threshold by comparing the query vector to the feature vectors, and presenting a query result that includes at least part…
LAYER-2 NETWORKING INFORMATION IN A VIRTUALIZED CLOUD ENVIRONMENT
Granted: October 17, 2024
Application Number:
20240348541
Techniques are described for communications in an L2 virtual network of a customer. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Information associated with the L2 virtual switches is collected and provided to the…
BACKGROUND-PIXEL-BASED IMAGE SEGMENTATION
Granted: October 17, 2024
Application Number:
20240346662
Techniques for segmenting an electronic document based on identifying background regions within the document are disclosed. A system identifies foreground regions-such as regions containing text and graphics-in an electronic document by clustering background regions of the document to determine the boundaries of the remaining regions. The system identifies the remaining regions as foreground regions, without requiring an analysis of distances between the foreground regions and without…
SOURCE CODE DOCUMENTATION DEHYDRATOR
Granted: October 17, 2024
Application Number:
20240346248
Techniques for dehydrating hierarchical source code documentation are disclosed, including: obtaining (a) a first set of documentation associated with a first element of source code and (b) a second set of documentation associated with a second element of source code that inherits functionality from the first element of source code; identifying a repeated segment of text in the first set of documentation and the second set of documentation; assigning a token to the repeated segment of…
AUTHORIZATION BROKERING
Granted: October 17, 2024
Application Number:
20240346129
A framework for managing credentials for access to a secured entity of an infrastructure service. For example, techniques for maintaining credentials for access to the secured entity within a trusted environment while utilizing the credentials for performance of actions within the infrastructure service.
Usage-Based Optimization Of Software Configurations
Granted: October 17, 2024
Application Number:
20240345835
Techniques for configuring a software system include generating a hierarchy of entities representing usage of the software system by a set of users, wherein the hierarchy includes a first set of nodes representing a set of tasks, a second set of nodes representing a set of components that implement the tasks, and a set of edges between the first set of nodes and the second set of nodes. The techniques also include updating the hierarchy based on a first set of configurations for the…
NETWORK PATH PERFORMANCE MEASUREMENTS BY UTILIZING MULTI-LAYER TUNNELING TECHNIQUES
Granted: October 10, 2024
Application Number:
20240340234
Techniques for making network path performance measurements by utilizing multi-layer tunneling are described. In a distributed environment that includes one or more nodes configured to inject network traffic (compute nodes) and one or more nodes that are not configured to inject network traffic (router nodes), techniques are disclosed that allow for the measurement of performance metrics across network segments that include at least one router node. In certain implementations, with one…
PLATFORM-AGNOSTIC COMPUTE INSTANCE LAUNCHES
Granted: October 10, 2024
Application Number:
20240340336
A technique may include receiving, by a management service a plurality of instance configurations from a client device. The technique may then include receiving, by the management service, information identifying a launch request for a compute instance. The technique may include determining, by the management service, one or more candidate shapes for the compute instance based at least in part on the plurality of instance configurations. The technique may include selecting, by the…
SECURE INSTANCE METADATA AS CRYPTOGRAPHIC IDENTITY
Granted: October 10, 2024
Application Number:
20240340272
A method may include transmitting a request for metadata associated with a compute instance and receiving, by a computing system, metadata associated with the compute instance signed with a private key. The private key may be associated with a public key. The method may include receiving a request to access a cloud resource and transmitting the request for the metadata. The method may also include receiving the metadata. The metadata may indicate that the compute instance is hosted on…
SELECTIVE HANDLING OF TRAFFIC RECEIVED FROM ON-PREMISES DATA CENTERS
Granted: October 10, 2024
Application Number:
20240340238
A redirector (RD) in a cloud hosted data center receives a packet originating from a source device in an on-premises data center. The packet is directed to a destination IP address associated with a router located in the cloud hosted data center. A destination address field in a header of the packet is set to the destination IP address. The RD determines whether the packet is to be forwarded to the router or to a host machine implementing a service host that implements a tunnel end-point…
TECHNIQUES FOR ORCHESTRATED LOAD SHEDDING
Granted: October 10, 2024
Application Number:
20240339834
Disclosed techniques relate to orchestrating power consumption reductions across a number of hosts. A number of response levels may be utilized, each having an association to a corresponding set of reduction actions. The impact to customers, hosts, and/or workloads can be computed at run time based on current and/or predicted conditions and workloads, and a particular response level can be selected based on the computed impact. These techniques enable a sufficient, but least impactful…
GENERATING TEMPLATES FOR USE IN SYNTHETIC DOCUMENT GENERATION PROCESSES
Granted: October 10, 2024
Application Number:
20240338959
The system generates templates to be used for use in synthetic document generation. Generating a template includes selecting entities to be included in the template and/or selecting characteristics of entities in the template. The system may execute randomization functions to determine which entities, of a candidate set of entities, are to be included in a template. The randomization functions may accept, as input, probabilities associated with the entities to compute the inclusion or…
SYNTHETIC DATA FINE-TUNED OPTICAL CHARACTER RECOGNITION ENGINE FOR EXTENSIBLE MARKUP LANGUAGE DOCUMENT RECONSTRUCTION
Granted: October 10, 2024
Application Number:
20240338958
Techniques are disclosed for optical character recognition of extensible markup language content. A method can include a system generating a first training data comprising extensible markup language (XML) content, the first training data comprising a first plurality of training instances, each training instance including a respective image comprising XML content and annotation information for the respective image. The system can train a plurality of machine learning models using the…
PERFORMING AUTOMATED TICKET CLASSIFICATION
Granted: October 10, 2024
Application Number:
20240338594
According to certain implementations, tickets generated in response to system incidents may be automatically labeled utilizing a trained machine learning model, where such labels indicate (1) whether the ticket needs user attention and/or (2) a severity of the incident that prompted the ticket. Only tickets labeled as needing attention may be provided to users (such as systems engineers) for additional analysis, and tickets labeled as not needing user attention may be discarded and/or…
TECHNIQUES FOR PROVIDING EXPLANATIONS FOR TEXT CLASSIFICATION
Granted: October 10, 2024
Application Number:
20240338531
A chatbot system is configured to execute code to perform determining, by the chatbot system, a classification result for an utterance and one or more anchors each anchor of the one or more anchors corresponding to one or more anchor words of the utterance. For each anchor of the one or more anchors, one or more synthetic utterances are generated, and one or more classification results for the one or more synthetic utterances are determined. A report is generated by the chatbot system…
EXECUTING UNSUPERVISED PRE-TRAINING TASKS WITH A MACHINE LEARNING MODEL TO PREDICT DOCUMENT GRAPH ATTRIBUTES
Granted: October 10, 2024
Application Number:
20240338395
Techniques for multi-layer training of a machine learning model are disclosed. A system pre-trains a machine learning model on training data obtained from unlabeled document graph data by executing unsupervised pre-training tasks on the unlabeled document graph data to generate a labeled pre-training data set. The system modifies document graphs to change attributes of nodes in the document graphs. The system pre-trains the machine learning model with a data set including the modified…
Asynchronous Cross-Region Block Volume Replication
Granted: October 10, 2024
Application Number:
20240338385
Techniques are provided for cross-region replication of block volume data. The techniques include a method wherein a computer system implements operations including creating a first snapshot of a block volume at a first geographic region and at a first logical time, the block volume including a plurality of partitions, transmitting first snapshot data to an object storage system at a second geographic region, creating a second snapshot of the block volume at the first geographic region…
Form Field Recommendation Management
Granted: October 10, 2024
Application Number:
20240338233
Techniques for generating recommendations for form fields are disclosed. A system obtains user interaction data based on a user's interaction with a digital form. The digital form includes form fields mapped to attribute fields of data object resources. The data object resources specify criteria for when recommendations should be permitted or prohibited for the attribute fields of the business objects. The system obtains the criteria from the data object resources corresponding to the…
Compile-Time Checking For Exhaustive Switch Statements And Expressions
Granted: October 10, 2024
Application Number:
20240338186
Techniques for compiling switch blocks are disclosed. One or more embodiments analyze and rewrite a set of pattern labels in a switch block in a compile-time process for determining whether the switch block is exhaustive. At compile-time, a system populates a set with case labels from a switch block. The system applies a set of rules to iteratively re-write pattern labels in the set and checks whether the re-written set, and hence the original switch block, is exhaustive. If the compiler…
USING STATEMENT CACHING WHEN IMPLEMENTING SERVER BASED OR PROXY BASED POOLING SOLUTIONS
Granted: October 3, 2024
Application Number:
20240330297
Disclosed is an improved approach to implement cursor sharing in database systems, where a server-side mapping of cursor identifiers to SQL is maintained to allow for continued use of client-side statement caches even after connections and database sessions are returned to shared pools and then subsequently re-assigned. This avoids the need to clear the statement cache across session releases to the database session pools. Instead, applications can retain their statement cache while…