Oracle Patent Applications

ENTITY LEVEL DATA AUGMENTATION IN CHATBOTS FOR ROBUST NAMED ENTITY RECOGNITION

Granted: January 11, 2024
Application Number: 20240013780
Techniques for data augmentation for training chatbot systems in natural language processing. In one particular aspect, a method is provided that includes generating a list of values to cover for an entity, selecting utterances from a set of data that have context for the entity, converting the utterances into templates, where each template of the templates comprises a slot that maps to the list of values for the entity, selecting a template from the templates, selecting a value from the…

CROSS-REGIONAL REPLICATION OF KEYS

Granted: January 11, 2024
Application Number: 20240015143
Discussed herein is a technique for replication of keys across regions of a cloud infrastructure. A first vault is created in a first region. The first vault stores a plurality of records, each of which is associated with a key and corresponding metadata. A second region, different from the first region, is selected where replication of the plurality of records is desired. A second vault is created in the second region. The plurality of records are relayed from the first vault to the…

METHOD AND APPARATUS FOR HOLISTIC RENDERING OF CLOUD NETWORK CONFIGURATION

Granted: January 11, 2024
Application Number: 20240015071
The present is directed to systems, methods, and devices for holistic rendering of cloud network configuration. The method can include receiving data characterizing a plurality of devices in a computing network. The method can include generating with the inventory processor a data file characterizing each of the plurality of devices in the computing network. This data file can be generated based on the received data and on a set of static overrides. The method can include generating a…

ENTITY LEVEL DATA AUGMENTATION IN CHATBOTS FOR ROBUST NAMED ENTITY RECOGNITION

Granted: January 11, 2024
Application Number: 20240013780
Techniques for data augmentation for training chatbot systems in natural language processing. In one particular aspect, a method is provided that includes generating a list of values to cover for an entity, selecting utterances from a set of data that have context for the entity, converting the utterances into templates, where each template of the templates comprises a slot that maps to the list of values for the entity, selecting a template from the templates, selecting a value from the…

TEXT-TRIGGERED DATABASE AND API ACTIONS

Granted: January 11, 2024
Application Number: 20240012837
Techniques for initiating system actions based on text content are disclosed. A system applies a semantic analysis model at run-time to human-understandable text to identify actionable content within the human-understandable text. The system analyzes metadata associated with the text to identify a mapping between one or more data objects associated and the semantic content in the text. The system identifies one or more contact lists associated, respectively, with the one or more data…

Transitioning Between Thread-Confined Memory Segment Views And Shared Memory Segment Views

Granted: January 11, 2024
Application Number: 20240012765
Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the…

Transitioning Between Thread-Confined Memory Segment Views And Shared Memory Segment Views

Granted: January 11, 2024
Application Number: 20240012764
Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the…

Governing Access To Third-Party Application Programming Interfaces

Granted: January 11, 2024
Application Number: 20240012700
Techniques for governing access to third-party application programming interfaces (API's) are disclosed. A proxy service exposes an API configured to receive requests, from user-facing services, to perform functions of backend services. The proxy service stores a usage policy that defines a criterion that is (a) different from any authorization criterion and (b) associated with using a function of a backend service. The proxy service receives a request to perform the function of the…

CROSS-REGIONAL REPLICATION OF KEYS

Granted: January 11, 2024
Application Number: 20240015143
Discussed herein is a technique for replication of keys across regions of a cloud infrastructure. A first vault is created in a first region. The first vault stores a plurality of records, each of which is associated with a key and corresponding metadata. A second region, different from the first region, is selected where replication of the plurality of records is desired. A second vault is created in the second region. The plurality of records are relayed from the first vault to the…

METHOD AND APPARATUS FOR HOLISTIC RENDERING OF CLOUD NETWORK CONFIGURATION

Granted: January 11, 2024
Application Number: 20240015071
The present is directed to systems, methods, and devices for holistic rendering of cloud network configuration. The method can include receiving data characterizing a plurality of devices in a computing network. The method can include generating with the inventory processor a data file characterizing each of the plurality of devices in the computing network. This data file can be generated based on the received data and on a set of static overrides. The method can include generating a…

TEXT-TRIGGERED DATABASE AND API ACTIONS

Granted: January 11, 2024
Application Number: 20240012837
Techniques for initiating system actions based on text content are disclosed. A system applies a semantic analysis model at run-time to human-understandable text to identify actionable content within the human-understandable text. The system analyzes metadata associated with the text to identify a mapping between one or more data objects associated and the semantic content in the text. The system identifies one or more contact lists associated, respectively, with the one or more data…

Transitioning Between Thread-Confined Memory Segment Views And Shared Memory Segment Views

Granted: January 11, 2024
Application Number: 20240012765
Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the…

Transitioning Between Thread-Confined Memory Segment Views And Shared Memory Segment Views

Granted: January 11, 2024
Application Number: 20240012764
Techniques for transitioning between memory segment views include: instantiating a first memory segment view that confines access to a memory segment to a first thread; receiving a request to transition ownership of the memory segment to a second thread; responsive to receiving the request to transition ownership of the memory segment to the second thread: instantiating a second memory segment view that permits access to the memory segment by the second thread; copying metadata from the…

Governing Access To Third-Party Application Programming Interfaces

Granted: January 11, 2024
Application Number: 20240012700
Techniques for governing access to third-party application programming interfaces (API's) are disclosed. A proxy service exposes an API configured to receive requests, from user-facing services, to perform functions of backend services. The proxy service stores a usage policy that defines a criterion that is (a) different from any authorization criterion and (b) associated with using a function of a backend service. The proxy service receives a request to perform the function of the…

DE-CENTRALIZED WORKFLOW EXECUTION

Granted: January 4, 2024
Application Number: 20240004682
Techniques for de-centralized execution of workflows are disclosed. A system executes a sequence of jobs in a workflow. Each job includes application code to perform a defined set of functions. Each job includes wrapper code at one or both ends of the application code. The system executes the sequence of jobs by iteratively spinning up a virtual machine, loading workflow data to be used by application code, executing the application code, and storing modified workflow data. The virtual…

MULTI-STEP FORECASTING VIA TEMPORAL AGGREGATION

Granted: January 4, 2024
Application Number: 20240005201
Aspects if the disclosure are directed towards multi-step forecasting via temporal aggregation. An example embodiment includes a method the includes receiving a time series including a first time step value and a second time step value. The method can further include generating a temporally aggregated time series by summing the first time step value and the second time step value to create a third time step value. The method can further include calculating a first set of input values and…

GENERATION OF INFERENCE LOGIC FROM TRAINING-TIME ARTIFACTS FOR MACHINE LEARNING MODEL DEPLOYMENTS

Granted: January 4, 2024
Application Number: 20240005200
A system is disclosed that includes capabilities for generating a Machine Learning (ML) inference pipeline for deploying an ML model using artifacts received from one or more training stages in an ML training pipeline. The system receives one or more artifacts for one or more training stages in a set of training stages in a ML training pipeline associated with an ML process. The system then identifies one or more inference stages in an ML inference pipeline that correspond to the one or…

PREDICTING TEXT AND DATA VARIABLES USING CUSTOMER-SPECIFIC MODELS

Granted: January 4, 2024
Application Number: 20240005095
A text prediction system for providing personalized text suggestions for different customers is disclosed. For a text message being composed via an application for an intended recipient, the system receives a portion of the text message based upon a current cursor position in the text message. The system identifies a customer associated with the intended recipient and identifies a customer-specific model for the customer. The system predicts text to be suggested for type-ahead insertion…

System And Method For Query Resource Caching

Granted: January 4, 2024
Application Number: 20240004881
Operations include determining whether to cache resources accessed by a query based on the execution time of the query. The system identifies a set of executions of a same query. The system determines a cumulative execution time for the set of executions of the same query. If the cumulative execution time exceeds a threshold value, then the system caches a resource used for execution of the query.

ONLINE MERGING OF FRAGMENTED COMPUTING RESOURCES ACROSS STORAGE SERVERS BY TENANT IN CLOUD ENVIRONMENTS

Granted: January 4, 2024
Application Number: 20240004844
Client data corresponding to a single client can be stored. A decision to proceed with a defragmentation of two or more particular core groups can be determined. A destination core group to receive client data can be identified. At least one additional core group can be initiated to manage interim data write requests from the single client. Each of the two or more particular core groups can be closed to data write requests. A defragmentation of the two or more particular core groups can…