Nexus determination in a computing device

    公开(公告)号:US09940187B2

    公开(公告)日:2018-04-10

    申请号:US14690361

    申请日:2015-04-17

    Inventor: Navendu Jain

    CPC classification number: G06F11/079 G06F11/0742 G06F11/0751

    Abstract: A nexus of a software failure can be determined. A feature module can determine execution features based at least in part on particular execution-related data. An analysis module can determine particular nexus data based at least in part upon a stored computational model and the determined execution features. In some examples, a communications module receives the particular execution-related data and transmits the determined particular nexus data via the communications interface. In some examples, a modeling module determines the computational model based at least in part on training data including execution features of a plurality of execution-related data records and respective nexus data values. Some examples include executing a program module, transmitting execution-related data of the program module, receiving a nexus data value, and executing the program module again if the nexus is a condition external to the program module.

    CHARACTERISTIC-PATTERN ANALYSIS OF TEXT
    33.
    发明申请

    公开(公告)号:US20180060302A1

    公开(公告)日:2018-03-01

    申请号:US15245675

    申请日:2016-08-24

    CPC classification number: G06F17/2775 G06F16/35 G06F17/277 G06F17/2785

    Abstract: A computing device can receive at least one document including text segments. The computing device can determine a characteristic pattern associated with a first text segment of the text segments and determine an association between the first text segment and a first individual class of a model based at least in part on the characteristic pattern. The computing device can determine a collection of classes of the model associated with the at least one document based at least in part on the association, and determine an actionable item associated with the at least one document based at least in part on the collection and at least one grammar pattern. The computing device can present or transmit an indication of the actionable item. In some examples, the computing device can arrange actionable items in an order based at least in part on occurrences of the actionable items from multiple documents.

    System and method for intelligent incident routing

    公开(公告)号:US11030547B2

    公开(公告)日:2021-06-08

    申请号:US15706010

    申请日:2017-09-15

    Abstract: Methods for automatic and intelligent incident routing are performed by systems and apparatuses. The methods intelligently optimize routing of incidents to correct owners from a pool of many possible owners by utilizing learning models and algorithms based on feature vectors. Users provide information related to incidents of services or systems. The information is cleaned and featurized to generate a feature vector for the incident. The systems and apparatuses intelligently and automatically determine sets of candidate recipients based on outputs of algorithms, e.g., machine learning algorithms, such as classifiers using the feature vectors as inputs. Classifiers may utilize models or algorithms trained with featurizations used for feature vectors. Sets of candidate recipients are provided to users for selection of a recipient for the information from the set of candidate recipients instead of from all the possible recipients. Methods for intelligent bug and feedback routing are also performed by systems and apparatuses.

    SYSTEM AND METHOD FOR INTELLIGENT AND AUTOMATIC ELECTRONIC COMMUNICATION SUPPORT AND ROUTING

    公开(公告)号:US20190108486A1

    公开(公告)日:2019-04-11

    申请号:US15725983

    申请日:2017-10-05

    Abstract: Methods for automatic and intelligent electronic communication support, including using machine learning, are performed by systems and apparatuses. The methods intelligently and automatically route electronic communication support requests and intelligently and automatically provide senders with information related to their support requests. The methods generate feature vectors from cleaned request information via featurization techniques, and utilize machine-learning algorithms/models and algorithm/model outputs based on the input feature vectors. Based on the algorithm/model outputs and personalized to the specific sender, relevant support information is automatically provided to the sender. The methods also determine a set of prior communications related to the support request based on a similarity measure, and provide prior communication information to the sender. The methods also include routing support requests to correct feature owner recipients based on the algorithm/model outputs.

    AUTOMATED ORCHESTRATION OF INCIDENT TRIAGE WORKFLOWS

    公开(公告)号:US20190108470A1

    公开(公告)日:2019-04-11

    申请号:US15729073

    申请日:2017-10-10

    Inventor: Navendu Jain

    Abstract: Methods, systems, and apparatuses are provided for enabling an automated handling of information technology incidents in a computing environment. An incident report relating to an incident in a computing environment is received. Based on the incident report, a feature vector is generated and provided as an input to a machine-learning model that may output one or more suggested actions to respond to the incident. For instance, the machine-learning model may be trained based on previous actions performed by a user in response to previous incident reports. A user interface is provided allowing a user to select one or more of the suggested actions. In response to the user's selection, the selected actions may be executed automatically. By orchestrating a set of actions to execute automatically, incident reports may be addressed in a timely and efficient manner.

    HYBRID HARDWARE-SOFTWARE DISTRIBUTED THREAT ANALYSIS

    公开(公告)号:US20190014084A1

    公开(公告)日:2019-01-10

    申请号:US16111141

    申请日:2018-08-23

    CPC classification number: H04L63/0254 H04L63/1416 H04L63/1441

    Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.

    Hybrid hardware-software distributed threat analysis

    公开(公告)号:US10084752B2

    公开(公告)日:2018-09-25

    申请号:US15054692

    申请日:2016-02-26

    CPC classification number: H04L63/0254 H04L63/1416 H04L63/1441

    Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.

Patent Agency Ranking