-
公开(公告)号:US10402435B2
公开(公告)日:2019-09-03
申请号:US14788247
申请日:2015-06-30
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Rajeev Dubey , Adam J. Betz , Bill A. Haase , Huy P. M. Dao
Abstract: User feedback may be analyzed with semantic hierarchies. In some instances, the user feedback includes free-form text. The user feedback may be mapped to one or more semantic hierarchies that include multiple levels of nodes, where each node corresponds to a class. Information of the one or more semantic hierarchies may be mapped to an ontology model. The mapped information of the ontology model may be used to identify an actionable item for the user feedback, such as a problem, suggestion, question, or other issue. Information regarding the actionable item may be made available to an individual for evaluation of the actionable item.
-
公开(公告)号:US09940187B2
公开(公告)日:2018-04-10
申请号:US14690361
申请日:2015-04-17
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain
IPC: G06F11/07
CPC classification number: G06F11/079 , G06F11/0742 , G06F11/0751
Abstract: A nexus of a software failure can be determined. A feature module can determine execution features based at least in part on particular execution-related data. An analysis module can determine particular nexus data based at least in part upon a stored computational model and the determined execution features. In some examples, a communications module receives the particular execution-related data and transmits the determined particular nexus data via the communications interface. In some examples, a modeling module determines the computational model based at least in part on training data including execution features of a plurality of execution-related data records and respective nexus data values. Some examples include executing a program module, transmitting execution-related data of the program module, receiving a nexus data value, and executing the program module again if the nexus is a condition external to the program module.
-
公开(公告)号:US20180060302A1
公开(公告)日:2018-03-01
申请号:US15245675
申请日:2016-08-24
Applicant: Microsoft Technology Licensing, LLC
Inventor: Mei Liang , Wei Luo , Lingzhi Sun , Navendu Jain
CPC classification number: G06F17/2775 , G06F16/35 , G06F17/277 , G06F17/2785
Abstract: A computing device can receive at least one document including text segments. The computing device can determine a characteristic pattern associated with a first text segment of the text segments and determine an association between the first text segment and a first individual class of a model based at least in part on the characteristic pattern. The computing device can determine a collection of classes of the model associated with the at least one document based at least in part on the association, and determine an actionable item associated with the at least one document based at least in part on the collection and at least one grammar pattern. The computing device can present or transmit an indication of the actionable item. In some examples, the computing device can arrange actionable items in an order based at least in part on occurrences of the actionable items from multiple documents.
-
公开(公告)号:US11030547B2
公开(公告)日:2021-06-08
申请号:US15706010
申请日:2017-09-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Vivek Jain
Abstract: Methods for automatic and intelligent incident routing are performed by systems and apparatuses. The methods intelligently optimize routing of incidents to correct owners from a pool of many possible owners by utilizing learning models and algorithms based on feature vectors. Users provide information related to incidents of services or systems. The information is cleaned and featurized to generate a feature vector for the incident. The systems and apparatuses intelligently and automatically determine sets of candidate recipients based on outputs of algorithms, e.g., machine learning algorithms, such as classifiers using the feature vectors as inputs. Classifiers may utilize models or algorithms trained with featurizations used for feature vectors. Sets of candidate recipients are provided to users for selection of a recipient for the information from the set of candidate recipients instead of from all the possible recipients. Methods for intelligent bug and feedback routing are also performed by systems and apparatuses.
-
公开(公告)号:US10545999B2
公开(公告)日:2020-01-28
申请号:US15614338
申请日:2017-06-05
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Luhui Hu , Liyuan Zhang , Rahul Potharaju , Vitaly Voloshin , Mingshi Wang , Joseph K. W. Chan
IPC: G06F16/00 , G06F16/31 , G06F16/335 , G06F11/07 , G06Q10/00
Abstract: Disclosed herein is a system and method for generating an enhanced index for documents contained in a knowledge base. Documents or configuration snapshots are tokenized and then passed through a number of filters. The filters modify the token stream to generate an enhanced token stream for the document by removing words from the stream and adding domain level knowledge to the tokens in the stream. The token stream is then added to the index for the document so that searches can be completed against the knowledge base when searches are generated from configuration snapshots or from inputted search queries.
-
公开(公告)号:US20190215236A1
公开(公告)日:2019-07-11
申请号:US16357202
申请日:2019-03-18
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Rahul Potharaju
CPC classification number: H04L41/0686 , G06F11/079 , H04L41/0654 , H04L41/0672 , H04L41/069 , H04L41/0886 , H04L41/16
Abstract: Described herein are various technologies pertaining to providing assistance to an operator in a data center with respect to failures in the data center. An alarm is received, and a failing device is identified based upon content of the alarm. Failure conditions of the alarm are mapped to a failure symptom that may be exhibited by the failing device, and troubleshooting options previously employed to mitigate the failure symptom are retrieved from historical data. Labels are respectively assigned to the troubleshooting options, where a label is indicative of a probability that a troubleshooting option to which the label has been assigned will mitigate the failure symptom.
-
37.
公开(公告)号:US20190108486A1
公开(公告)日:2019-04-11
申请号:US15725983
申请日:2017-10-05
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Shane Hu
Abstract: Methods for automatic and intelligent electronic communication support, including using machine learning, are performed by systems and apparatuses. The methods intelligently and automatically route electronic communication support requests and intelligently and automatically provide senders with information related to their support requests. The methods generate feature vectors from cleaned request information via featurization techniques, and utilize machine-learning algorithms/models and algorithm/model outputs based on the input feature vectors. Based on the algorithm/model outputs and personalized to the specific sender, relevant support information is automatically provided to the sender. The methods also determine a set of prior communications related to the support request based on a similarity measure, and provide prior communication information to the sender. The methods also include routing support requests to correct feature owner recipients based on the algorithm/model outputs.
-
公开(公告)号:US20190108470A1
公开(公告)日:2019-04-11
申请号:US15729073
申请日:2017-10-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain
Abstract: Methods, systems, and apparatuses are provided for enabling an automated handling of information technology incidents in a computing environment. An incident report relating to an incident in a computing environment is received. Based on the incident report, a feature vector is generated and provided as an input to a machine-learning model that may output one or more suggested actions to respond to the incident. For instance, the machine-learning model may be trained based on previous actions performed by a user in response to previous incident reports. A user interface is provided allowing a user to select one or more of the suggested actions. In response to the user's selection, the selected actions may be executed automatically. By orchestrating a set of actions to execute automatically, incident reports may be addressed in a timely and efficient manner.
-
公开(公告)号:US20190014084A1
公开(公告)日:2019-01-10
申请号:US16111141
申请日:2018-08-23
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ang Chen
IPC: H04L29/06
CPC classification number: H04L63/0254 , H04L63/1416 , H04L63/1441
Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.
-
公开(公告)号:US10084752B2
公开(公告)日:2018-09-25
申请号:US15054692
申请日:2016-02-26
Applicant: Microsoft Technology Licensing, LLC
Inventor: Navendu Jain , Ang Chen
IPC: H04L29/06
CPC classification number: H04L63/0254 , H04L63/1416 , H04L63/1441
Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.
-
-
-
-
-
-
-
-
-