Task allocation
    12.
    发明授权

    公开(公告)号:US10430741B2

    公开(公告)日:2019-10-01

    申请号:US15839745

    申请日:2017-12-12

    Abstract: A method of assigning a task to a resource in a multiple resource environment is performed by one or more processors or special-purpose computing hardware. The method includes receiving task information relating to at least one task to be performed by a resource in the multiple resource environment. The method also includes determining a cost value for each task, the cost value indicating a cost incurred if a maintenance event occurs during performance of the respective task. The method also includes receiving predictive maintenance information in relation to each of the multiple resources in the multiple resource environment, the predictive maintenance information indicating a likelihood of a maintenance event with respect to each of the multiple resources in the multiple resource environment. The method also includes allocating the at least one task to one of the resources in the multiple resource environment dependent on the predictive maintenance information of the multiple resources and the calculated cost score.

    Clustering data based on indications of financial malfeasance
    15.
    发明授权
    Clustering data based on indications of financial malfeasance 有权
    基于财务渎职迹象的聚类数据

    公开(公告)号:US09230280B1

    公开(公告)日:2016-01-05

    申请号:US14278963

    申请日:2014-05-15

    CPC classification number: G06Q40/00

    Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed to assist in detection of financial malfeasance. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data (such as trades, emails or chat messages) and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster, and the clusters may be displayed and ranked based on their scores. Various embodiments may enable an analyst to review clusters of trades, emails and/or chat messages that are the most likely to reveal financial malfeasance.

    Abstract translation: 在各种实施例中,公开了系统,方法和技术,用于从种子生成相关数据集合的集合以帮助检测财务不正当性。 可以根据种子生成策略或规则生成种子。 可以通过例如检索种子,将种子添加到第一群集,检索群集策略或规则以及将相关数据(例如交易,电子邮件或聊天消息)和/或数据实体添加到群集中来生成群集 基于聚类策略。 可以基于给定集群中的数据的属性来生成各种集群分数,并且可以基于它们的分数来显示和排名集群。 各种实施例可以使分析者能够检查最有可能揭示财务渎职的交易,电子邮件和/或聊天消息的集群。

    Determining and extracting changed data from a data source
    17.
    发明授权
    Determining and extracting changed data from a data source 有权
    从数据源确定和提取更改的数据

    公开(公告)号:US08924429B1

    公开(公告)日:2014-12-30

    申请号:US14254773

    申请日:2014-04-16

    Abstract: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data of a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical number of data items included in each of the plurality of groupings; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of a corresponding compressed local version of the first grouping of data items; extract changed data items of the first grouping; and forward the extracted changed data items to a destination system.

    Abstract translation: 根据某些方面,计算机系统可以被配置为获得指示数据源的多个数据分组的信息,所述信息指示包括在多个分组中的每一个中的数据项的数量; 通过比较包括在第一组中的第一数量数据项和包括在多个分组中的每一个中的数据项的历史数目来确定多个分组中的第一分组,包括已经改变的一个或多个数据项; 从数据源访问包括在第一组中的数据项; 将包括在第一组中的数据项与数据项的第一组数据对应的压缩本地版本的数据项进行比较; 提取第一组的更改数据项; 并将提取的改变的数据项转发到目的地系统。

    Joined and coordinated detection, handling, and prevention of cyberattacks

    公开(公告)号:US11587177B2

    公开(公告)日:2023-02-21

    申请号:US14919506

    申请日:2015-10-21

    Abstract: Methods, devices, systems and computer program products enable monitoring and responding to cyber security attacks. One such system relates to a consortium of monitoring companies and an infrastructure including one or more central monitoring stations or local handling stations for a monitoring company are provided. A central monitoring station of a monitoring company detects a cyberattack that has been launched against a client computer system, and requests a local station to respond to the cyberattack via onsite visits or requests additional resources from other monitoring companies through the consortium system. The central monitoring station also sends to the consortium system updates on a cyberattack that is detected or mitigated by a central monitoring station or local handling station of the monitoring company. The monitoring consortium enables stronger capabilities than any individual monitoring company can offer by the combination and coordination of the efforts and resources of the members.

    Pluggable fault detection tests for data pipelines

    公开(公告)号:US10936479B2

    公开(公告)日:2021-03-02

    申请号:US16572404

    申请日:2019-09-16

    Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.

Patent Agency Ranking