ENHANCED PROCESSING FOR COMMUNICATION WORKFLOWS USING MACHINE-LEARNING TECHNIQUES
Granted: October 3, 2024
Application Number:
20240330062
The present disclosure generally relates to evaluating communication workflows comprised of tasks using machine-learning techniques. More particularly, the present disclosure relates to systems and methods for generating a prediction of a task outcome of a communication workflow, generating a recommendation of one or more tasks to add to a partial communication workflow to complete the communication workflow, and generating a vector representation of a communication workflow.
BLOCKCHAIN TOKENS AS REAL ESTATE IN AUGMENTED REALITY ECOSYSTEMS
Granted: October 3, 2024
Application Number:
20240330899
Techniques are described herein for generating, encoding, and processing blockchain tokens as real estate in an augmented or virtual reality ecosystem. In some embodiments, the techniques include an encoding schema that encodes physical location coordinates to the unique identifier of a blockchain token. For example, the location coordinates may include the latitude and longitude of a physical space on earth. Blockchain tokens that have unique token identifiers represented by encoded…
MACHINE-LEARNING MODEL-BASED LIFE-CYCLE CLASSIFICATION FOR SELECTION OF A FORECASTING MODEL
Granted: October 3, 2024
Application Number:
20240330779
Techniques for training a machine learning model to generate life-cycle classifications for product-store pairs are disclosed. A system generates training data sets for training a machine learning model by comparing sets of time-series data to a set of feature-based rules mapped to life-cycle labels. The system trains the machine learning model using the training data sets to classify time-series data associated with product-store pairs. The system applies the trained machine learning…
Manager For Ingesting Secure User Information and Permitting Scope Limited Access
Granted: October 3, 2024
Application Number:
20240330508
Embodiments permit scope limited access to a user's secure information using blockchain backed credential(s). A user can register with a secure information manager and control the scope with which the user's secure information is shared. For example, the user can permit a vetted entity access to the user's secure information via a portable access point. The user can select scope definition that control how the user's secure information is shared. The vetted entity can scan the user's…
AUTOMATED VALIDATION OF APPLICATION STACKS
Granted: October 3, 2024
Application Number:
20240330433
Systems and methods for automated validation of application stacks are described herein. A method for automated validation of application stacks can include receiving identification of a stack for validation at a publication service system from a customer tenancy in a cloud computing environment. The stack can include an associated stack identifier. The method can include retrieving with the publication service system job information from the customer tenancy relevant to the stack and…
AUTOMATED CORRELATION ANALYSIS AND SELF-REGULATION OF ATTRIBUTES
Granted: October 3, 2024
Application Number:
20240330400
Operations associated with determining correlations between various attributes are disclosed. The operations may include: identifying a target attribute and a plurality of influencing attributes, determining a first correlation value representing a first correlation between the target attribute and a first influencing attribute of the plurality of influencing attributes, determining a second correlation value representing a second correlation between the target attribute and a second…
USING STATEMENT CACHING WHEN IMPLEMENTING SERVER BASED OR PROXY BASED POOLING SOLUTIONS
Granted: October 3, 2024
Application Number:
20240330297
Disclosed is an improved approach to implement cursor sharing in database systems, where a server-side mapping of cursor identifiers to SQL is maintained to allow for continued use of client-side statement caches even after connections and database sessions are returned to shared pools and then subsequently re-assigned. This avoids the need to clear the statement cache across session releases to the database session pools. Instead, applications can retain their statement cache while…
SYSTEM AND TECHNIQUES FOR TRAVERSING A DEPENDENCY GRAPH OR TREE STRUCTURE IN ONE STEP
Granted: October 3, 2024
Application Number:
20240330266
In some aspects, techniques can be performed by a processor of a computing device, the method can include receiving an input selecting a first node instance of a first node. The method can include accessing a node dependency table listing one or more parent nodes and child nodes for the selected first node instance. The method can include determining if dependencies for the selected first node instance are met by accessing a node process log. The technique can include running the first…
ADAPTIVE CACHING FRAMEWORK
Granted: October 3, 2024
Application Number:
20240330179
Disclosed is an improved approach to implement caching. An adaptive and performance aware caching framework is provided that complements the existing state-of-the-art caching algorithms. Instead of using fixed-sized cache unit sizes, the approach adaptively switches to a cache unit size that incurs the lowest performance penalty, thereby yielding faster I/O and improved system performance.
UPGRADE-SAFE EXTENSIBLE SOFTWARE-AS-A-SERVICE PLATFORM
Granted: October 3, 2024
Application Number:
20240330088
Techniques for operating an upgrade-safe, extensible software-as-a-service (SaaS) platform are disclosed, including: receiving, by the SaaS platform, an application programming interface (API) request associated with a tenant of the SaaS platform; determining, by the SaaS platform, that the API request includes a tenant-specific type that extends a built-in type of the SaaS platform; responsive to determining that the API request includes the tenant-specific type: executing, by the SaaS…
BUILD SYSTEM FOR SECURELY BUILDING AND DEPLOYING A TARGET BUILD ARTIFACT
Granted: October 3, 2024
Application Number:
20240329953
A build system is disclosed that identifies the inputs used by a build process for securely building and deploying a piece of software to production. The build system comprises a build container and a build proxy server. The build container receives a set of initial inputs for performing a build and generates a build output (e.g., a target artifact) as a consequence of performing the build. The build proxy server monitors both internal interactions as well as external interactions (e.g.,…
CLASS-BASED QUEUEING FOR SCALABLE MULTI-TENANT RDMA TRAFFIC
Granted: September 26, 2024
Application Number:
20240323255
Techniques and apparatus for data networking are described. In one example, a method of queuing Remote Direct Memory Access (RDMA) packets includes receiving a first RDMA packet having a first quality-of-service (QOS) data field; based on a value of the first QoS data field, queueing the first RDMA packet in a first queue of a plurality of queues; receiving a second RDMA packet having a second QoS data field; and based on a value of the second QoS data field, queueing the second RDMA…
DIGITAL TWIN FOR DISTRIBUTING DECENTRALIZED COMPUTE RESOURCES
Granted: September 26, 2024
Application Number:
20240323142
The present disclosure relates to systems and methods for distributing decentralized compute resources. Compute resource metadata that identifies a set of decentralized compute resources can be received. A request to use one or more compute resources can be received. A digital twin can be generated. The digital twin can facilitate identification of a particular compute resource, and the digital twin can be representative of potential interactions between a receiver entity and a set of…
TECHNIQUES FOR SERVICE EXECUTION AND MONITORING FOR RUN-TIME SERVICE COMPOSITION
Granted: September 26, 2024
Application Number:
20240320303
A server system may receive two or more Quality of Service (QoS) dimensions for the multi-objective optimization model, wherein the two or more QoS dimensions include at least a first QoS dimension and a second QoS dimension. The server system may maximize the multi-objective optimization model along the first QoS dimension, wherein the maximizing includes selecting one or more pipelines for the multi-objective optimization model in the software architecture that meet QoS expectations…
IDENTIFICATION AND CLASSIFICATION OF SENSITIVE INFORMATION IN DATA CATALOG OBJECTS
Granted: September 26, 2024
Application Number:
20240320242
A data catalog system is described that includes capabilities for automatically identifying and classifying sensitive information stored in data objects associated with various data sources. The data catalog system identifies a data object associated with a data asset stored in a data catalog metadata repository and computes a sensitivity score for the data object based on a set of one or more sensitive data identification techniques. The system determines a set of enrichment labels for…
MOBILE PREFAB FACTORY FOR BUILDING CLOUD REGIONS
Granted: September 19, 2024
Application Number:
20240311122
Techniques are disclosed for a mobile prefab factory for building region data centers. The mobile prefab factory can include a containment enclosure configured to mount physical computing resources of a data center, a networking device, a power supply electrically connected to the networking device, and a plurality of computing devices of the physical computing resources communicatively connected to the networking device and electrically connected to the power supply. A manager service…
TECHNIQUES FOR A CABLE TERMINATION PROTECTION APPARATUS IN A PREFAB FACTORY
Granted: September 19, 2024
Application Number:
20240313460
A cable termination protection apparatus and methods of use in a prefab factory are disclosed. The cable termination protection apparatus can include a frame having ports arranged on a face of the frame. Each of the ports can be configured to accept a cable termination connector of a networking cable of a static network fabric in a prefab factory. A computing device can generate instructions usable to disconnect a networking cable from the cable termination protection apparatus and…
TRACKING PERFORMANCE OF RECOMMENDED CONTENT ACROSS MULTIPLE CONTENT OUTLETS
Granted: September 19, 2024
Application Number:
20240311863
The present disclosure relates to systems and methods for tracking content across multiple content outlets. Content items, characterized by first metadata, and content slots, characterized by second metadata, can be received. Third metadata for digital content slots can be generated. Fourth metadata can be received. A recommended content item package can be provided based on a comparison between a combination of the first metadata, the second metadata, and the third metadata and the…
TECHNIQUES FOR VALIDATING CLOUD REGIONS BUILT AT A PREFAB FACTORY
Granted: September 19, 2024
Application Number:
20240311517
Techniques are disclosed for validating a cloud region built at a prefab factory. A computing device of the cloud region can receive a network configuration from a manager service. The network configuration can correspond to a network topology of physical resources in the cloud region and can include a first identifier associated with a computing device, a second identifier associated with a neighboring computing device, and information associating the computing device with the…
Method And System For Implementing Machine Learning Classifications
Granted: September 19, 2024
Application Number:
20240311386
Disclosed is a system, method, and computer program product for implementing a log analytics method and system that can configure, collect, and analyze log records in an efficient manner. Machine learning-based classification can be performed to classify logs. This approach is used to group logs automatically using a machine learning infrastructure.