Abstract:
A processor-based method of updating a secondary index for a B-tree in a database in a DBMS to include subsequent changes that occurred during creation of the secondary index includes opening an audit trail and moving back in the audit trail to a captured system time; making the secondary index visible to the DBMS for INSERT, UPDATE and DELETE processing; reading a next committed set of database updates from the audit trail; creating a secondary index modification for each row on each audit trail update and applying it to the secondary index; clearing the captured system time from control information for the B-tree to indicate completion; and making the secondary index visible to the DBMS for all processing.
Abstract:
A method of creating action-trigger phrase sets includes receiving a document from a corpus of documents; processing text from the document; and creating an action-trigger phrase set from the text.
Abstract:
A method of improving a visual instruction during running of a visual instruction sequence includes playing a visual instruction sequence to a user from a point-of-view of the user; monitoring the user for user data related to the visual instruction sequence; using the user data to improve the visual instruction sequence; generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user. A system for improving a visual instruction during running of a visual instruction sequence includes a computer device for playing a visual instruction sequence to a user from a point-of-view of the user, monitoring the user for user data related to the visual instruction sequence, using the user data to improve the visual instruction sequence, generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user.
Abstract:
A method for alerting a community to potential problematic commits includes receiving a commit submitted by an author in a project; testing the commit using a pre-trained learning model; and determining if the commit is problematic, and if the commit is problematic, sending a report in the project outlining the level of risk of implementing the commit and a reason for the level or risk. Users of the project will be alerted to potential risk of particular commits.
Abstract:
A method of determining if a commit is problematic includes determining a complexity of the commit; determining an author of the commit; determining an experience of the author; determining a component affected by the commit; and assigning a risk value to the commit based on the complexity, the author, the experience of the author and the component affected.
Abstract:
An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish secondary semantic information; and establishing, by the processor, ontologies from the primary, secondary, and additional secondary semantic information.
Abstract:
A security system includes a camera having a field of vision. The camera sends image frames to a machine readable memory. A processor is accessible to the machine readable memory. The processor performs acts of receiving from the camera a plurality of frames; detecting an object entering the field of vision; determining whether the object is a person; tracking a moving path of the person; and performing facial recognition on the person using at least one of the plurality of frames.
Abstract:
Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key.
Abstract:
Bypassing loading of memory in accessing large data objects in a relational database. A relational database may include a plurality of first type data items and associated second type data items. In response to an update-type access request, requester memory is bypassed in writing to the relational database a second type data item referenced by a file location specified in the update-type request. In response to retrieve-type request, requester memory is bypassed in reading from the relational database a second type data item referenced in the retrieve-type request and writing the second type data item at a file location specified in the retrieve-type request.
Abstract:
A processor-based method for verifying a secured file, directory, or meta-data, comprising: extracting a persistent, independent signature for a secured file, directory, or meta-data from a directory signature file, the signature identifying a certificate identifier, a hash algorithm identifier, and an encrypted hash value for that secured file, directory, or meta-data; retrieving a public key corresponding to the certificate identifier; decrypting the encrypted hash using the public key and a decryption tool, resulting in a clear text hash value; creating a new hash value for the secured file, directory, or meta-data, the hash creation corresponding to the hash algorithm identifier; and verifying the signature when the new hash value for the secured file, directory, or meta-data matches the unencrypted hash value from the persistent, independent signature for the secured file, directory, or meta-data,