-
公开(公告)号:US11755006B2
公开(公告)日:2023-09-12
申请号:US17182542
申请日:2021-02-23
Applicant: Palantir Technologies Inc.
Inventor: Ezra Spiro , Andre Frederico Cavalheiro Menck , Peter Maag , Thomas Powell
CPC classification number: G05B23/0283 , G05B23/0237 , G06F11/0766 , G06F11/3003 , G06F11/3089 , G06F11/3476 , G06F16/219 , G06Q10/06 , G06Q10/20
Abstract: Systems, methods, and non-transitory computer-readable media can be configured to perform receiving a notification of a maintenance event associated with a resource. The method includes retrieving historic maintenance data in relation to the resource with which the fault is associated, the maintenance information originating from a time period preceding the time of the maintenance event. The method includes identifying at least a portion of the retrieved historic maintenance data as being indicative of the maintenance event. The method also includes causing the portion of the retrieved historic maintenance data identified as being indicative of the maintenance event to be stored as a precursor signal of the maintenance event. The method also includes causing future maintenance data received from a plurality of resources related to the resource with which the maintenance event is associated to be monitored to predict a future occurrence of the maintenance event in the plurality of resources.
-
公开(公告)号:US11252248B2
公开(公告)日:2022-02-15
申请号:US16439444
申请日:2019-06-12
Applicant: Palantir Technologies Inc.
Inventor: Peter Maag , Tom O'Brien , Sarun Peter Tosirisuk , Saad Abdali , Carl Freeland , Greg DeArment , Maciej Albin , Matthew Lynch , Phillip Worton-Cross
Abstract: Various systems and methods are provided that allow reviewers to review and potentially flag processed communication data in order to spot potential malfeasance or illegal activity. Certain systems and methods includes modules for removing duplicate data from the communication data files, generating thread data for email data files, generating lexicon tag data for the data files, removing blacklisted data that meets blacklisted criteria, or generating group association data.
-
公开(公告)号:US11144857B2
公开(公告)日:2021-10-12
申请号:US16546026
申请日:2019-08-20
Applicant: Palantir Technologies Inc.
Inventor: Ezra Spiro , Andre Frederico Cavalheiro Menck , Peter Maag , Thomas Powell
Abstract: A method of assigning a task to a resource in a multiple resource environment is performed by one or more processors or special-purpose computing hardware. The method includes receiving task information relating to at least one task to be performed by a resource in the multiple resource environment. The method also includes determining a cost value for each task, the cost value indicating a cost incurred if a maintenance event occurs during performance of the respective task. The method also includes receiving predictive maintenance information in relation to each of the multiple resources in the multiple resource environment, the predictive maintenance information indicating a likelihood of a maintenance event with respect to each of the multiple resources in the multiple resource environment. The method also includes allocating the at least one task to one of the resources in the multiple resource environment dependent on the predictive maintenance information of the multiple resources and the calculated cost score.
-
公开(公告)号:US20210176281A1
公开(公告)日:2021-06-10
申请号:US17129563
申请日:2020-12-21
Applicant: Palantir Technologies Inc.
Inventor: Jacob Albertson , Melody Hildebrandt , Harkirat Singh , Shyam Sankar , Rick Ducott , Peter Maag , Marissa Kimball
Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.
-
公开(公告)号:US10885456B2
公开(公告)日:2021-01-05
申请号:US16853093
申请日:2020-04-20
Applicant: Palantir Technologies Inc.
Inventor: Ezra Spiro , Andre Frederico Cavalheiro Menck , Peter Maag , Thomas Powell
Abstract: A method of processing sensor logs is described. The method includes accessing a first sensor log and a corresponding first reference log. Each of the first sensor log and the first reference log includes a series of measured values of a parameter according to a first time series. The method also includes accessing a second sensor log and a corresponding second reference log. Each of the second sensor log and the second reference log includes a series of measured values of a parameter according to a second time series. The method also includes dynamically time warping the first reference log and/or and second reference log by a first transformation between the first time series and a common time-frame and/or a second transformation between the second time series and the common time-frame. The method also includes generating first and second warped sensor logs by applying the or each transformation to the corresponding ones of the first and second sensor logs.
-
公开(公告)号:US20200250563A1
公开(公告)日:2020-08-06
申请号:US16853093
申请日:2020-04-20
Applicant: Palantir Technologies Inc.
Inventor: Ezra Spiro , Andre Frederico Cavalheiro Menck , Peter Maag , Thomas Powell
Abstract: A method of processing sensor logs is described. The method includes accessing a first sensor log and a corresponding first reference log. Each of the first sensor log and the first reference log includes a series of measured values of a parameter according to a first time series. The method also includes accessing a second sensor log and a corresponding second reference log. Each of the second sensor log and the second reference log includes a series of measured values of a parameter according to a second time series. The method also includes dynamically time warping the first reference log and/or and second reference log by a first transformation between the first time series and a common time-frame and/or a second transformation between the second time series and the common time-frame. The method also includes generating first and second warped sensor logs by applying the or each transformation to the corresponding ones of the first and second sensor logs.
-
公开(公告)号:US20200012593A1
公开(公告)日:2020-01-09
申请号:US16572404
申请日:2019-09-16
Applicant: Palantir Technologies, Inc.
Inventor: Peter Maag , Jacob Albertson , Jared Newman , Matthew Lynch , Maciej Albin , Viktor Nordling
Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.
-
公开(公告)号:US20190287014A1
公开(公告)日:2019-09-19
申请号:US16421264
申请日:2019-05-23
Applicant: Palantir Technologies Inc.
Inventor: Ezra Spiro , Andre Frederico Cavalheiro Menck , Anshuman Prasad , Arthur Thouzeau , Caroline Henry , Charles Shepherd , Joanna Peller , Jennifer Yip , Marco Diciolla , Matthew Todd , Peter Maag , Spencer Tank , Thomas Powell
Abstract: Systems, methods, non-transitory computer readable media can be configured to access a plurality of sensor logs corresponding to a first machine, each sensor log spanning at least a first period; access first computer readable logs corresponding to the first machine, each computer readable log spanning at least the first period, the computer readable logs comprising a maintenance log comprising a plurality of maintenance task objects, each maintenance task object comprising a time and a maintenance task type; determine a set of statistical metrics derived from the sensor logs; determine a set of log metrics derived from the computer readable logs; and determine, using a risk model that receives the statistical metrics and log metrics as inputs, fault probabilities or risk scores indicative of one or more fault types occurring in the first machine within a second period.
-
公开(公告)号:US10417120B2
公开(公告)日:2019-09-17
申请号:US15671423
申请日:2017-08-08
Applicant: Palantir Technologies, Inc.
Inventor: Peter Maag , Jacob Albertson , Jared Newman , Matthew Lynch , Maciej Albin , Viktor Nordling
Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.
-
公开(公告)号:US20190205897A1
公开(公告)日:2019-07-04
申请号:US16297028
申请日:2019-03-08
Applicant: Palantir Technologies Inc.
Inventor: Peter Maag , Tom O'Brien , Phil Cross , Sarun Peter Tosirisuk
CPC classification number: G06Q30/0185 , G06Q40/00 , G06Q40/04
Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed to assist in detection of financial malfeasance. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data (such as trades, emails or chat messages) and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster, and the clusters may be displayed and ranked based on their scores. Various embodiments may enable an analyst to review clusters of trades, emails and/or chat messages that are the most likely to reveal financial malfeasance.
-
-
-
-
-
-
-
-
-