Abstract:
Embodiments of the invention are directed to a control device for aggregation of machine-initiated resource distribution. The invention is a control device that links user associated smart devices. The control device generates code to extract data from the smart devices and control the communications disseminated from and received by the smart device from third parties. In this way, the control device prevents smart devices from communicating with third party systems and from third party systems from communicating directly with the smart devices. Thus, fixing the technical challenges within a current network including the need to consolidate and aggregate data across smart devices associated with the user, the need to control and manage the flow of data packets from smart devices to third parties (privacy, filtering, protection), and the need to easily track and refresh an inventory of smart devices.
Abstract:
Performance data received from interrelated communication devices is analyzed to determine the current operating state of the device and based on the current operating state a variable associated with replacing the device is determined which is implemented in the determination of a dynamic user-specific replacement schedule for the interrelated communication devices.
Abstract:
Embodiments of the invention are directed to a system, method, or computer program product for aggregation of machine-initiated resource distribution. The invention generates a smart device portal for linkage of user associated smart devices. The portal generates code to extract data from the smart devices and control the communications disseminated from and received by the smart device from third parties. Thus, the generated portal and coded stored signal fixes the technical challenges within the current network including the need to consolidate and aggregate data across smart devices associated with the user, the need to control and manage the flow of data packets from smart devices to third parties (privacy, filtering, protection), and the need to easily track and refresh an inventory of smart devices in a manner that allows key data to remain associated with the user while the user's inventory, device associations, and personal/business associations change over time.
Abstract:
Embodiments disclosed herein relate to systems, methods, and computer program products for a system for monitoring application development standards. The system, method, and computer program product are configured to access application code on a server associated with a network, wherein the application code is installed on the server; scan the application code to identify applications that are integrated into the application code; identify products in the application code based on the scan, wherein the products are identified based on a textual analysis of the application code; compare the products identified in the application code to a list of non-allowed products; identify non-allowed products in the application code based on the comparison of the products to the list; determine an allowed product as an alternative to the non-allowed product; and provide a report to a user comprising the non-allowed product and the alternative allowed product.
Abstract:
A system for customizing media presentation based on user's sentiments is disclosed. The system presents a media item to the user on a platform comprising a website. The system captures a first set of microexpressions of the user reacting to the media item. The system extracts a set of baseline features from the first set of microexpressions. The system determines whether the media item elicits positive or sentiment from the user. If the system determines that the media item elicits positive sentiment from the user, the system classifies the media item into a first class of media items that elicit positive sentiment from the user. The system adjusts contents of the platform to include media items from the first class of media items.
Abstract:
A system for customizing media presentation based on user's sentiments is disclosed. The system presents a media item to the user on a platform comprising a website. The system captures a first set of microexpressions of the user reacting to the media item. The system extracts a set of baseline features from the first set of microexpressions. The system determines whether the media item elicits positive or sentiment from the user. If the system determines that the media item elicits positive sentiment from the user, the system classifies the media item into a first class of media items that elicit positive sentiment from the user. The system adjusts contents of the platform to include media items from the first class of media items.
Abstract:
A code identifies a first segment of code included in a first computer program stored on a first repository that matches, within a threshold range, a second segment of code included in a second computer program stored on a second repository. The first segment of code and the second segment of code perform one or more computing tasks. An application programming interface (API) is generated that performs the one or more computing tasks of the first and second segments of code. The first segment of code within the first computer program is replaced with a first call to the generated API. The second segment of code within the second computer program is replaced with a second call to the generated API.
Abstract:
A system for implementing robotic process automation (RPA) to enhance computer network security. Specifically, RPA is used to detect an unauthorized attempt to access a dataset and, in response, the unauthorized entity is provided access to a bot-generated modified dataset that includes modified data elements that are reasonable facsimiles of the actual data elements and do not expose confidential data. Once access to the modified data set is provided, RPA is implemented to track actions by the unauthorized entity accessing the modified data set and, once copied, RPA is implemented to track usage of the data by the unauthorized entity. Additionally, RPA may be implemented to mitigate damages caused by attempts or actual accessing of the actual datasets by performing actions that prevent further damages, such as deactivating/activating resource storage and authorizing previously configured resource events.
Abstract:
Aspects of the disclosure relate to a dynamic virtual reality (VR) coaching computing platform. The dynamic VR coaching computing platform may configure a VR coaching model based on model training data. The dynamic VR coaching computing platform may use the VR coaching model and a user profile to select a plurality of VR modules. The dynamic VR coaching computing platform may configure a first VR module of the plurality of VR modules based on one or more user selections. The dynamic VR coaching computing platform may receive real-time feedback during execution of the first VR module. The dynamic VR coaching computing platform may select a second plurality of VR modules based on the first real-time feedback. The dynamic VR coaching computing platform may configure a second VR module of the second plurality of VR modules based on user selections.
Abstract:
The invention utilizes a plurality of robotic process automation (RPA) bots to provide cross-technology user access provisioning across multiple applications. Typically, an entity system comprises a plurality of different systems, such as mainframe systems, client applications, web applications, and the like. As such, a user typically must input an access request into several different systems or applications in order to complete a task. By utilizing RPA, the invention is able to provision user access through a single request across all of the systems to which the user must be given access to complete the task.