-
公开(公告)号:US20210141684A1
公开(公告)日:2021-05-13
申请号:US16682954
申请日:2019-11-13
Applicant: salesforce.com, inc.
Inventor: João Henrique Pimentel Wanderley Neves
Abstract: Systems and methods are disclosed herein for using screen shots of an application to evaluate whether the application is in a fault state. In an embodiment, a processor captures screen shots of a screen of an application during operation of the application. The processor applies a classifier to the captured screen shots, and determines, from output of the classifier, a state of the application. The processor evaluates whether the determined state is a fault state of the application. Responsive to determining that the determined state is a fault state of the application, the processor prompts a user with an alert indicating the fault state and a corresponding point during the operation that exhibited the fault state.
-
公开(公告)号:US11005864B2
公开(公告)日:2021-05-11
申请号:US15600562
申请日:2017-05-19
Applicant: salesforce.com, inc.
Inventor: Matthew Saunders , Ping Yan , John Slater , Wei Deng
Abstract: Techniques for user behavior anomaly detection. At least one low-variance characteristic is compared to an expected result for the corresponding low-variance characteristics to determine if the low-variance characteristic(s) is/are within a pre-selected range of the expected results. A security response action is taken in response to the low-variance characteristic not being within the first pre-selected range of the expected results. At least one high-variance characteristic is compared to an expected result for the corresponding high-variance characteristics to determine if the high-variance characteristic(s) is/are within a pre-selected range of the expected results. A security response action is taken in response to the high-variance characteristic not being within the first pre-selected range of the expected results. Access is provided if the low-variance and the high-variance characteristics are within the respective expected ranges.
-
公开(公告)号:US11003317B2
公开(公告)日:2021-05-11
申请号:US16221075
申请日:2018-12-14
Applicant: salesforce.com, inc.
Inventor: Eric Jacobson , Michael Gonzalez , Wayne Cho , Adheip Varadarajan , Daniel McCall , Victor Oliveros , Annie Abrahamian , David Klein , Nicholas Howland , Kyle Haskins , John Vollmer , Benjamin Snyder , Mike Rosenbaum
IPC: G06F3/0482 , G06F3/0483 , G06F3/0484
Abstract: Disclosed herein are system, method, and computer program product embodiments for unifying graphical user interface (GUI) displays across different device types. In an embodiment, a unification system may convert various GUI view appearing on, for example, a desktop device into a GUI view on a mobile device. Both devices may be accessing the same application and/or may use a cloud computing platform to access the application. The unification system may aid in reproducing GUI modifications performed on one user device onto other user devices. In this manner, the unification system may maintain a consistent look-and-feel for a user across different computing device type.
-
公开(公告)号:US20210136119A1
公开(公告)日:2021-05-06
申请号:US16675678
申请日:2019-11-06
Applicant: salesforce.com, inc.
Inventor: Toan Nguyen
Abstract: A system receives network security specifications for two different networks that are equivalent. The system compares the two network security specifications expected to implement the same network security policy for the two equivalent networks and identifies possible discrepancies between them. The system generates a representation of relations between subnetworks of the corresponding network for each network security specification. The representation efficiently stores permitted connections between subnetworks. The system compares the representations corresponding to the two network security specifications to identify discrepancies across the two network security specifications. If discrepancies are identified across the two network security specifications the system generates a report identifying the discrepancies.
-
公开(公告)号:US20210136052A1
公开(公告)日:2021-05-06
申请号:US17146255
申请日:2021-01-11
Applicant: salesforce.com, inc.
Inventor: Kyle Edward Heldman , Douglas Christopher Wilson , Jackson Gregory Reed , Kyle Warren Apple , Jacob Andrew Richwine
Abstract: Techniques are disclosed relating to a computer system accessing a client credential set to authenticate with a destination computer system. A computer system may, subsequent to receiving an indication to make available an application for a particular user, retrieve configuration data specifying a reference to a key value. The computer system may maintain a data object that includes a client credential set for the particular user. In response to an occurrence of an event associated with the application, the computer system may access the client credential set of the particular user from the data object using the key value and an indication of the particular user. The computer system may then send a request including the client credential set to a destination computer system for authentication with the destination computer system and receive a response indicating whether the computer system has been authenticated.
-
公开(公告)号:US20210132966A1
公开(公告)日:2021-05-06
申请号:US16670891
申请日:2019-10-31
Applicant: salesforce.com, inc.
Inventor: Sultan ALI , Aria NIAZI , Darrel Dazhi LIU , Jeremy ELLISON , Jianmin LIU , Bhargav VENKATARAMAN
Abstract: Disclosed herein are system, method, and device embodiments for implementing dynamic customizable animations. A multi-tenant service may configure a visual component of an application to present an animation based on a rule, generate a multi-tenant entity record defining the rule, and generate application code associated with the application. Further, the multi-tenant service may receive a request for animation information associated with the multi-tenant entity record, and send the animation information to the client device. Further, in some embodiments, a client device executing the application may present the animation based on evaluating the animation information.
-
公开(公告)号:US10997250B2
公开(公告)日:2021-05-04
申请号:US16140418
申请日:2018-09-24
Applicant: salesforce.com, inc.
Inventor: Sitaram Asur , Aditya Sakhuja , Hui S. Fisher , Anjan Goswami , Khoa Le
IPC: G06F16/9032 , G06F9/451 , G06F40/30 , G06F40/295
Abstract: A method is provided for generating a ranked list of candidate responders. In some embodiments, the method includes receiving a question from a user and generating a question feature vector representing an intent of the question and a first skill set inferred from the question. The method also includes for one or more candidate responders, generating a candidate feature vector representing a skill set and questions associated with the respective candidate responder; computing a reputation score based on questions and user feedback associated with the respective candidate responder; and computing, based on the question feature vector, candidate feature vector, and reputation score, a probability score representing a prediction of the quality of an answer that would be provided by the respective candidate responder if the input question were routed to the respective candidate responder. The method further includes generating a ranked list of candidate responders using the computed probability scores.
-
公开(公告)号:US20210126964A1
公开(公告)日:2021-04-29
申请号:US16660904
申请日:2019-10-23
Applicant: salesforce.com, inc.
Inventor: Olumayokun Obembe , Da Zhao , Fabio Meireles Fernandez Valbuena , Ping-Hsiu Hsieh , Xiaodan Wang , Vijayanth Devadhar , Jason Woods , Ashwini Bijwe , Yichuan Cai , Paul E. Jatkowski , Kin Lun Wong , Sidarth Conjeevaram , Zeyu Zheng , Jae Young Park
Abstract: Techniques and structures to prevent exhaustion of a database connection pool, including retrieving data from the database connection pool, monitoring the data to determine whether the connection pool is at risk of an exhaustion condition, analyzing the data to determine whether one or more clients accessing the database connection pool are offenders upon determining that the connection pool is at risk and throttling access to the one or more clients accessing the database connection pool upon determining the one or more clients to be offenders.
-
公开(公告)号:US20210126885A1
公开(公告)日:2021-04-29
申请号:US16662718
申请日:2019-10-24
Applicant: salesforce.com, inc.
Inventor: Yuxi ZHANG , Kexin XIE
Abstract: Disclosed embodiments are related to send time optimization technologies for sending messages to users. The send time optimization technologies provide personalized recommendations for sending messages to individual subscribers taking into account the delay and/or lag between the send time and the time when a subscriber engages with a sent message. A machine learning (ML) approach is used to predict the optimal send time to send messages to individual subscribers for improving message engagement. The personalized recommendations are based on unique characteristics of each user's engagement preferences and patterns, and deals with historical feedback that is generally incomplete and skewed towards a small set of send hours. The ML approach automatically discovers hidden factors underneath message and send time engagements. The ML model may be a two-layer non-linear matrix factorization model. Other embodiments may be described and/or claimed.
-
公开(公告)号:US20210125007A1
公开(公告)日:2021-04-29
申请号:US16664429
申请日:2019-10-25
Applicant: salesforce.com, inc.
Inventor: Swaroop JAYANTHI , Ramalinga Raju KALIDINDI , Ramaprasad Venkata SANAPALA , Satyanarayana SILAPARASETTI
Abstract: System and methods are described for automated replication of a database. The method includes generating a replication decision tree (RDT) for a database replication, deploying a database installation according to the RDT, and identifying a replication topology for the database replication according to the RDT. The method further includes loading schemas for one or more source databases and one or more target databases according to the replication topology and the RDT, validating a replication policy, and cloning the one or more source databases to the one or more target databases according to the replication policy.
-
-
-
-
-
-
-
-
-