摘要:
A regenerated container file is detected, and a file in the regenerated container file is determined that is different from any file in an existing container file related to the regenerated container file. To store the regenerated container file, the different file is sent to the data storage for storing.
摘要:
Techniques associated with entity extraction feedback are described in various implementations. In one example implementation, a method may include generating a proposed entity extraction result associated with a document, the proposed entity extraction result being generated based on a ruleset applied to the document. The method may also include receiving feedback about the proposed entity extraction result, the feedback including an actual entity associated with the document and a feature of the document that is indicative of the actual entity. The method may also include determining a proposed modification to the ruleset based on the feedback.
摘要:
An example method for data compaction is disclosed in accordance with an aspect of the present disclosure. The method may include receiving, at a computing device, data files associated with an account. The method may also include determining, by the computing device, whether the account has expired. The method may also include, in response to determining that the account has expired, compacting, by the computing device, the data files associated with the account based on the content of the data files.
摘要:
An example method for managing access to a network includes presenting, in a user interface of a computer on the network, options to designate by device class, one or more classes of device to which network access will be allowed; and, with a dynamic host configuration protocol (DHCP) server on the network, allowing or denying access to the network based, at least in part, on whether a device requesting access belongs to the one or more classes designated.
摘要:
Techniques for predicting failure of a storage device are described in various implementations. An example method that implements the techniques may include receiving, at an analysis system and from a computing system having a storage device, current diagnostic information associated with the storage device. The method may also include storing, using the analysis system, the current diagnostic information in a collection that includes historical diagnostic information associated with other storage devices of other computing systems. The method may also include predicting, using the analysis system, whether the storage device is likely to fail in a given time period based on the current diagnostic information and an estimated lifespan for storage devices that are of a same classification as the storage device, the estimated lifespan determined based on the collection.
摘要:
User profile information for many users may be stored in a user profile database associated with a server computer connected to a network. Based on information received from a mobile computing device, the server computer selects augment information from an augment information database coupled with the user profile database. The information received from the mobile computing device is related to frames of a video stream being captured by the mobile computing device and geographical information associated with these frames. The augment information is also selected based on the user profile associated with the mobile computing device. The augment information is to be transmitted from the server computer to the mobile computing device using wireless communication and is used by the mobile computing device to overlay the frames of the video stream being captured by the mobile computing device.
摘要:
Crowd behavior in a video feed may be analyzed based on movement of a human object identified in the video feed. An abnormal event may be triggered if the movement of the human object deviates from the analyzed crowd behavior. A camera may scan a face of the human object, if the abnormal event is triggered.
摘要:
Examples disclosed herein involve obfuscating training data. An example method includes computing a sequence of acoustic features from audio data of training data, the training data comprising the audio data and a corresponding text transcript; mapping the acoustic features to acoustic model states to generate annotated feature vectors, the annotated feature vectors comprising the acoustic features and corresponding context from the text transcript; and providing a randomized sequence of the annotated feature vectors as obfuscated training data to an audio analysis system.
摘要:
A method may include selecting a particular entity from a knowledge graph when a level of connectivity between entities in the knowledge graph that are neighbors to the particular entity is above a certain level and determining whether the particular entity is in a character string.
摘要:
Techniques associated with sentiment feedback are described in various implementations. In one example implementation, a method may include generating a proposed sentiment result associated with a document, the proposed sentiment result being generated based on a rule set applied to the document. The method may also include receiving feedback about the proposed sentiment result, the feedback including an actual sentiment associated with the document and a feature of the document that is indicative of the actual sentiment. The method may also include identifying a proposed modification to the rule set based on the feedback.