Dynamic clear lead injection
    141.
    发明授权

    公开(公告)号:US12167053B1

    公开(公告)日:2024-12-10

    申请号:US18079406

    申请日:2022-12-12

    Abstract: Techniques implementable by a computer system are provided. The techniques include receiving, by a server device, a request to stream media, the request including a media content and a streaming start point in the media content. The techniques also include determining a first time length based at least in part on time to receive permissioning. The techniques also include determining a silence point in the media content based at least in part on the streaming start point, the first time length, and identified silence points in the media content. The techniques also include determining a second time length based at least in part on the silence point and the streaming start point, the second time length defining a clear portion. The techniques also include generating a media stream comprising the clear portion and a remaining portion, the clear portion having a time length of the second time length.

    Natural language processing
    142.
    发明授权

    公开(公告)号:US12165636B1

    公开(公告)日:2024-12-10

    申请号:US17984511

    申请日:2022-11-10

    Abstract: Devices and techniques are generally described for inference reduction in natural language processing using semantic similarity-based caching. In various examples, first automatic speech recognition (ASR) data representing a first natural language input may be determined. A cache may be searched using the first ASR data. A first skill associated with the first ASR data may be determined from the cache. In some examples, first intent data representing a semantic interpretation of the first natural language input data may be determined by using a first natural language process associated with the first skill.

    Location-based package visual delivery instructions

    公开(公告)号:US12159256B1

    公开(公告)日:2024-12-03

    申请号:US17208944

    申请日:2021-03-22

    Abstract: A system can be configured to receive and analyze an image captured by a customer at a delivery location to enable identification and verification of the delivery location upon arrival of a deliverer at the delivery location. The system can utilize algorithms trained to determine identifying features of the delivery location from the image and/or provide the image to the deliverer for manual verification. The system can provide the deliverer with the image and additional information specific to the delivery location based on one or more geofences associated with the delivery location. The image, the additional information and the manner of presentation can be configured to guide the deliverer to approved drop-off locations and ensure package placement for delivery to a customer.

    Edge computing system
    148.
    发明授权

    公开(公告)号:US12159155B1

    公开(公告)日:2024-12-03

    申请号:US17512482

    申请日:2021-10-27

    Abstract: Devices and techniques are generally described for an edge computing system. In various examples, the edge computing system may comprise a host kernel comprising a kernel-based virtual machine hypervisor. In some examples, the edge computing system may comprise virtualization software effective to communicate with the kernel-based virtual machine hypervisor to execute guest virtual machines. In various further examples, the edge computing system may comprise an engine virtual machine with access to at least one hardware component. The edge computing system may further comprise a control plane virtual machine. The control plane virtual machine may include components effective to receive a first request and determine an application corresponding to the first request, and a virtual machine manager effective to control the virtualization software to generate a virtual machine, configured in accordance with a configuration specific for the virtual machine, for executing the application.

    Techniques related to stable pseudonymous identifiers

    公开(公告)号:US12158973B1

    公开(公告)日:2024-12-03

    申请号:US17699548

    申请日:2022-03-21

    Abstract: Systems, devices, and methods are provided for stable pseudonymous identifiers. A system may obtain first data, and obtain a first cryptographic key from a cryptography service. The system may determine, based at least in part on the first data and the first cryptographic key, a first hash output of a hash function. The system may determine that a mapping table does not include a first record associated with the first hash output. The system may create, in the mapping table, a first record comprising the first hash output and a random value. The system may provide the random value as a stable pseudonymous identifier of the first data. If the first cryptographic key is subject to a key rotation, the pseudonymous identifier of the first data may remain constant even though the value of the key changes as a result of the key rotation.

    Correlating application performance to external events

    公开(公告)号:US12158828B1

    公开(公告)日:2024-12-03

    申请号:US16915895

    申请日:2020-06-29

    Abstract: A technology is described for correlating application performance to external event types. An example method may include obtaining electronic content from a content server associated with an electronic content provider and extracting a potential reference to an external event from the electronic content, where the external event may impact performance of an application hosted on a computing resources. The reference may be identified as being associated with an external event type using a categorization technique that associates the reference in the electronic content to one or more external event types, and an external event log may be generated to include event data for the external event type to allow correlation of the external event type to performance of the application hosted on the computing resources.

Patent Agency Ranking