PREDICTING TEXT AND DATA VARIABLES USING CUSTOMER-SPECIFIC MODELS
Granted: January 4, 2024
Application Number:
20240005095
A text prediction system for providing personalized text suggestions for different customers is disclosed. For a text message being composed via an application for an intended recipient, the system receives a portion of the text message based upon a current cursor position in the text message. The system identifies a customer associated with the intended recipient and identifies a customer-specific model for the customer. The system predicts text to be suggested for type-ahead insertion…
DNS RECURSIVE PTR SIGNALS ANALYSIS
Granted: December 28, 2023
Application Number:
20230420147
Cyber-security techniques are described for monitoring a cloud environment and identifying potential problems, including malicious threats, to the monitored cloud environment using operational telemetry. Techniques are described for monitoring and collecting data related to reverse or recursive DNS (rDNS) traffic associated with a monitored cloud environment. The recursive DNS traffic includes recursive DNS (rDNS) requests originating from the cloud environment and responses to those…
MACHINE LEARNING TECHNIQUES TO PREDICT TASK EVENT
Granted: December 28, 2023
Application Number:
20230419165
Machine learning techniques are disclosed for predicting a task event such as a service completion event based on a predefined workflow. In one aspect a method includes obtaining initial data for a service request (e.g., an account application), enriching the initial data with data from one or more repositories of an enterprise executing the service request, generating a data structure comprising independent variables extracted from the enriched data, receiving a request for a prediction…
TECHNIQUES FOR NEGATIVE ENTITY AWARE AUGMENTATION
Granted: December 28, 2023
Application Number:
20230419127
Novel techniques are described for negative entity-aware augmentation using a two-stage augmentation to improve the stability of the model to entity value changes for intent prediction. In some embodiments, a method comprises accessing a first set of training data for an intent prediction model, the first set of training data comprising utterances and intent labels; applying one or more negative entity-aware data augmentation techniques to the first set of training data, depending on the…
TECHNIQUES FOR POSITIVE ENTITY AWARE AUGMENTATION USING TWO-STAGE AUGMENTATION
Granted: December 28, 2023
Application Number:
20230419052
Novel techniques are described for positive entity-aware augmentation using a two-stage augmentation to improve the stability of the model to entity value changes for intent prediction. In one particular aspect, a method is provided that includes accessing a first set of training data for an intent prediction model, the first set of training data comprising utterances and intent labels; applying one or more positive data augmentation techniques to the first set of training data,…
TECHNIQUES FOR TWO-STAGE ENTITY-AWARE DATA AUGMENTATION
Granted: December 28, 2023
Application Number:
20230419040
Novel techniques are described for data augmentation using a two-stage entity-aware augmentation to improve model robustness to entity value changes for intent prediction. In some embodiments, a method comprises accessing a first set of training data for an intent prediction model; applying one or more data augmentation techniques to the first set of training data to result in a second set of training data; applying an additional augmentation technique to augment the second set of…
SMART DISTRIBUTED TRACING CONTEXT INJECTION
Granted: December 28, 2023
Application Number:
20230418723
Disclosed systems relate to propagating tracing across a distributed software application. In an example, an application logs tracing data for a web page from an original server. The application determines, at the web browser, that the web page from the original server requires a request to an external server outside a domain of the original server. The application interrogates the external server to determine whether the external server allows tracing headers in requests. The…
TECHNIQUES FOR PERSISTING DATA ACROSS INSTANCES OF A CLOUD SHELL
Granted: December 28, 2023
Application Number:
20230418495
Techniques for persisting user data across secure shell instances are provided. A method includes receiving a first request from a session manager service to establish a connection to a secure shell instance and restore a user block volume with corresponding backup user data. The method may include reserving an empty block volume. The method may also include transmitting a backup data identifier associated with the corresponding backup user data to a backup service and receiving the…
HIERARCHICAL KEY MANAGEMENT FOR CROSS-REGION REPLICATION
Granted: December 21, 2023
Application Number:
20230412375
Novel techniques are described for performing hierarchical key management involving an end-to-end file storage replication between different cloud infrastructure regions. The novel hierarchical key management comprises three different keys, a first security key for the source region, a session key, valid only for a session, for the transfer of data between two different regions, and a second security key for the target region. Novel techniques are also described for using different file…
LOAD-BASED MANAGEMENT FOR NVME OVER TCP CONNECTIONS
Granted: December 21, 2023
Application Number:
20230412489
The disclosed systems, methods and computer readable media relate to managing Non-Volatile Memory Express (NVMe) over Transmission Control Protocol (TCP) (NVMeOTCP) connections between a smart network interface card (smartNIC) and a block storage data plane (BSDP) of a cloud computing environment. A software agent (“agent”) executing at the smartNIC may manage a number of network paths (active and, in some cases, passive network paths). The agent may monitor the network traffic…
GENERATING LOG TIMELINE DATA STRUCTURES BASED ON THE HIERARCHICAL DATA STRUCTURE
Granted: December 21, 2023
Application Number:
20230409350
Plugins that are independently written are executed in a collaborative manner to analysis a log. A plugin executing with respect to a particular node of a hierarchical data structure determines values for a set of keys based on information of the particular node and/or any ancestor nodes, and information stored in a shared repository. The plugin stores the values for the keys as additional information of the particular hierarchical node and/or into the shared repository. The plugin does…
DETECTING ANOMALIES IN LIVE MARKETING CAMPAIGN DATA
Granted: December 21, 2023
Application Number:
20230410143
Techniques for detecting anomalies in live marketing campaign data are disclosed, including: obtaining baseline data associated with one or more digital marketing campaigns; configuring an anomaly detection model to detect anomalies in digital marketing data, based at least on the baseline data; receiving a live stream of a set of digital marketing data associated with a particular digital marketing campaign that is currently being executed; while the particular digital marketing…
PARTITIONING MECHANISM FOR PARALLEL PROCESSING IN DELTA GENERATION
Granted: December 21, 2023
Application Number:
20230409597
Techniques are described for partitioning B-tree keys of file systems into key ranges for parallel processing in delta generation during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, a delta generation processing for cross-region replication may utilize a key-range splitting mechanism involving a recursive algorithm that partitions B-tree keys of a source file system into roughly equal-size key ranges. All the…
TECHNIQUES FOR EFFICIENT REPLICATION AND RECOVERY
Granted: December 21, 2023
Application Number:
20230409538
Techniques are described for efficient replication and maintaining snapshot data consistency during file storage replication between file systems in different cloud infrastructure regions. In certain embodiments, provenance IDs are used to efficiently identify a starting point (e.g., a base snapshot) for a cross-region replication process, conserve cloud resources while reducing network and IO traffic.
TECHNIQUES FOR RESOURCE UTILIZATION IN REPLICATION PIPELINE PROCESSING
Granted: December 21, 2023
Application Number:
20230409535
Techniques are described for ensuring end-to-end fair-share resource utilization during cross-region replication. In certain embodiments, a fair-share architecture is used for communication among pipeline stages performing a cross-region replication between different cloud infrastructure regions. Cross-region replication-related jobs are distributed evenly from a pipeline stage into a temporary buffer in the fair-share architecture, and then further distributed evenly form the fair-share…
TECHNIQUES FOR REPLICATION CHECKPOINTING DURING DISASTER RECOVERY
Granted: December 21, 2023
Application Number:
20230409534
Techniques are described for checkpointing multiple key ranges in parallel and concurrently during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, multiple range threads processing multiple key ranges, one thread per key range, create checkpoints for their respective key ranges in parallel and concurrently after processing a per-determined number of B-tree keys. In certain embodiments, each thread requests a lock from a…
SCALABLE AND SECURE CROSS REGION AND OPTIMIZED FILE SYSTEM DELTA TRANSFER FOR CLOUD SCALE
Granted: December 21, 2023
Application Number:
20230409522
Novel techniques for end-to-end file storage replication and security between file systems in different cloud infrastructure regions are disclosed herein. In one embodiment, a file storage service generates deltas between snapshots in a source file system, and transfers the deltas and associated data through a high-throughput object storage to recreate a new snapshot in a target file system located in a different region during disaster recovery. The file storage service utilizes novel…
END-TO-END RESTARTABILITY OF CROSS-REGION REPLICATION USING A COMMON SNAPSHOT
Granted: December 21, 2023
Application Number:
20230409448
Techniques are described for performing different types of restart operations for a file storage replication between a source file system and a target file system in different cloud infrastructure regions. In certain embodiments, the disclosed techniques perform a restart operation to terminate a current cross-region replication by synchronizing resource cleanup operations in the source file system and the target file system, respectively. In other embodiments, disclosed techniques…
TECHNIQUES FOR MAINTAINING DATA CONSISTENCY DURING DISASTER RECOVERY
Granted: December 21, 2023
Application Number:
20230409442
Techniques are described for maintaining data consistency when failure events occur during file storage replications between file systems in different cloud infrastructure regions. In certain embodiments, two generation numbers (or different identifications) are assigned to two groups of processed B-tree key-value pairs, one before and one after a failure event, within a key range. In some embodiments, the two generation numbers are assigned to a group of B-tree key-value pairs processed…
GENERATING A HIERARCHICAL DATA STRUCTURE THAT REPRESENTS A LOG
Granted: December 21, 2023
Application Number:
20230409351
Plugins that are independently written are executed in a collaborative manner to analysis a log. A plugin executing with respect to a particular node of a hierarchical data structure determines values for a set of keys based on information of the particular node and/or any ancestor nodes, and information stored in a shared repository. The plugin stores the values for the keys as additional information of the particular hierarchical node and/or into the shared repository. The plugin does…