Business service discovery
    91.
    发明授权

    公开(公告)号:US10382566B2

    公开(公告)日:2019-08-13

    申请号:US14688566

    申请日:2015-04-16

    Abstract: A non-transitory machine-readable storage medium is described in which discovery job instructions initiate a discovery job to discover target configuration items associated with a target business service in an information technology infrastructure. The storage medium comprises scoping instructions to, for a first configuration item and in response to a first stop condition not existing, designate the first configuration item as one of the target configuration items and continue the discovery job from the first configuration item to a second configuration item; and for the second configuration item and in response to the first stop condition or a second stop condition existing, stop the discovery job from proceeding from the second configuration item to a third configuration item.

    Workflow generation from natural language statements

    公开(公告)号:US10360066B2

    公开(公告)日:2019-07-23

    申请号:US15420272

    申请日:2017-01-31

    Abstract: In one example in accordance with the present disclosure, a method may include classifying each word in a natural language statement and determining an implementation, from a set of possible implementations, for a workflow platform based on the classified words. The method may also include mapping a first of the classified words to a task selected from a set of possible tasks associated with the implementation and mapping a second of the classified words to an input parameter associated with the task. The method may also include generating a workflow for the workflow platform using the task and the input.

    Collaboration with 3D data visualizations

    公开(公告)号:US10359905B2

    公开(公告)日:2019-07-23

    申请号:US15534258

    申请日:2014-12-19

    Abstract: An example collaboration system is provided in according with one implementation of the present disclosure. The system includes a 3D display a 3D data visualization, at least two hand avatars of two different users, and a view field avatar. The system also includes a plurality of auxiliary computing devices and a behavior analysis engine to perform a behavior analysis of a user. The behavior analysis engine is to: determine an attention engagement level of the user, and determine a pose of the user in relation to the auxiliary computing device. The system further includes an intention analysis engine to determine an intention of the user in relation to the 3D visualization based on the user's attention engagement level and the user's pose, and a collaboration engine to implement an action with the 3D data visualization by using a hand avatar based on the user's intention and an identified gesture.

    Payment card processing system with structure preserving encryption

    公开(公告)号:US10318932B2

    公开(公告)日:2019-06-11

    申请号:US13155156

    申请日:2011-06-07

    Abstract: A customer may provide a merchant with primary account number information in connection with a purchase transaction. The merchant may send an associated authorization request to a payment card processor. A tokenization server at the payment card processor may generate a token corresponding to the primary account number. To secure the token, the token may be encrypted at the payment card processor using a cryptographic key shared with the merchant. A structure preserving encryption algorithm may be used in encrypting the token. A processor identifier may be embedded in the encrypted version of the token during the structure preserving encryption operation. The merchant can use the shared key to decrypt the token and extract the processor identifier. A settlement request may be directed to the processor from the merchant to settle the transaction using the processor identifier.

    Cross-domain information management

    公开(公告)号:US10313460B2

    公开(公告)日:2019-06-04

    申请号:US15311265

    申请日:2014-08-28

    Abstract: Examples relate to managing cross-domain information. The examples disclosed herein relate to generating a cross-domain sharing specification that comprises an identifier of a first domain and at least one type of user interaction information that a first user enables for cross-domain sharing. The at least one type of user interaction information may be selected from a plurality of types of user interaction information related to the first domain. The examples relate to obtaining, from the first domain, user interaction information corresponding to the at least one type of user interaction information and storing the user interaction information in the cross-domain sharing specification.

    Dynamic graphic entity determination

    公开(公告)号:US10304224B2

    公开(公告)日:2019-05-28

    申请号:US15307435

    申请日:2014-05-28

    Abstract: Example implementations relate to dynamic graphic entity determination. Some examples may include a data access engine to access data values. Each data value may be associated with a category and a subcategory of the category. Some examples may include a display entity determination engine to analyze the data values to determine whether an overlap of a proposed graphic representing the subcategory and a proposed graphic representing the category exceeds an overlap tolerance level. Some examples may include a visual representation generation engine to generate an actual visual representation based on the analysis. The actual visual representation may display: a single consolidated graphic representing at least the category and the subcategory if the overlap does not exceed the overlap tolerance level; or the subcategory as a separate graphic from a graphic representing at least a portion of the remainder of the category if the overlap exceeds the overlap tolerance level.

    Managing database nodes
    100.
    发明授权

    公开(公告)号:US10303567B2

    公开(公告)日:2019-05-28

    申请号:US13968278

    申请日:2013-08-15

    Abstract: A method for managing database nodes includes determining that a data segment is on a failed node. The data segment is referenced by an operation of a query plan. The method includes selecting a victim node based on a segmentation ring, a buddy node for the data segment, a plurality of remaining operational nodes, and a predetermined selection parameter. The method includes generating a query plan such that the victim node performs double duty for operations accessing the data segment from a buddy projection on the victim node, and operations accessing a data segment for a primary projection of the victim node.

Patent Agency Ranking