Incorporating internet of things (IoT) data into chatbot text entry data

    公开(公告)号:US12113754B1

    公开(公告)日:2024-10-08

    申请号:US18381077

    申请日:2023-10-17

    IPC分类号: G06F15/16 G16Y20/40 H04L51/02

    CPC分类号: H04L51/02 G16Y20/40

    摘要: A computer-implemented method, according to various approaches, includes parsing a first collection of data into a plurality of elements. A first sub-set of the elements includes text entry data and a second sub-set of the elements includes IoT data. In response to a determination that the text entry data does not satisfy a predetermined threshold of specificity, the first collection of data is rephrased into a second collection of data. The method further includes causing the second collection of data to be sent to a determined chatbot server and causing a first output of the determined chatbot server to be returned to a first user device. The first output is an answer to the second collection of data.

    Heterogeneous schema discovery for unstructured data

    公开(公告)号:US11947561B2

    公开(公告)日:2024-04-02

    申请号:US17807884

    申请日:2022-06-21

    摘要: An embodiment for analyzing and tracking data flow to determine proper schemas for unstructured data. The embodiment may automatically use a sidecar to collect schema discovery rules during conversion of raw data to unstructured data. The embodiment may automatically generate multiple schemas for different tenants using the collected schema discovery rules. The embodiment may automatically use ETL to export unstructured data to SQL databases with the generated multiple schemas for the different tenants. The embodiment may automatically monitor usage data of the SQL databases and collect the usage data. The embodiment may automatically optimize schema discovery using the collected usage data. The embodiment may automatically discover schemas with hot usage and apply the discovered schemas with hot usage to other tenants for consumption and further monitoring.

    Multipart uploading to object-based storage

    公开(公告)号:US11893257B2

    公开(公告)日:2024-02-06

    申请号:US17840762

    申请日:2022-06-15

    IPC分类号: G06F3/06

    摘要: A system may include a memory and a processor in communication with the memory configured to perform operations. The may operations include obtaining transaction logs in blocks from nodes of a data storage system. The operations may include, for each transaction log, splitting the transaction log into log entries, grouping log entries into groups associated with a same data source, and writing the log entries of the groups to empty blocks such that log entries from different groups do not share a same block. The operations may include identifying a same sequence of log entries from the written transaction logs and uploading first blocks of a first transaction log, including the same sequence of log entries, to an object-based storage without uploading second blocks of a second transaction log including the same sequence of log entries to the object-based storage.

    WORKFLOW OPTIMIZATION AND RE-DISTRIBUTION
    5.
    发明公开

    公开(公告)号:US20240004723A1

    公开(公告)日:2024-01-04

    申请号:US17809570

    申请日:2022-06-29

    IPC分类号: G06F9/50 G06N5/02

    摘要: Workflow optimization and re-distribution involves a target task set that is determined from a plurality of tasks in a workflow and based on a data flow of the workflow. The target task set is re-distributed to obtain at least one re-distributed task set. Each re-distributed task set indicates a respective data path different from a data path of the target task set and has a same function as the target task set. A simulated data flow for the at least one re-distributed task set is obtained by simulating data flowing in at least one data path indicated by the at least one re-distributed task set. An optimized task set for the target task set is determined based on the simulated data flow for the at least one re-distributed task set.

    Checking source code validity at time of code update

    公开(公告)号:US11675575B2

    公开(公告)日:2023-06-13

    申请号:US17931678

    申请日:2022-09-13

    IPC分类号: G06F8/41 G06F8/30

    CPC分类号: G06F8/447 G06F8/315 G06F8/423

    摘要: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.

    SCALABLE AUTHENTICATION MANAGEMENT

    公开(公告)号:US20220417250A1

    公开(公告)日:2022-12-29

    申请号:US17361540

    申请日:2021-06-29

    IPC分类号: H04L29/06

    摘要: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.

    COGNITIVE PROBLEM ISOLATION IN QUICK PROVISION FAULT ANALYSIS

    公开(公告)号:US20210248022A1

    公开(公告)日:2021-08-12

    申请号:US16783652

    申请日:2020-02-06

    IPC分类号: G06F11/07 G06F9/445 G06F9/50

    摘要: An approach is provided in which a set of provision information is generated from a set of provisioners that are in process of fulfilling a client's provision request. The approach creates a set of provision events based on the set of provision information and, in response to detecting a failure of the provision request, the approach generates a provision chain from the set of provision events. The provision chain links the set of provision events based on correlation rules and identifies at least one isolation point of the failure. The approach informs the client of the at least one isolation point of the failure identified in the provision chain.

    Method of proactive object transferring management

    公开(公告)号:US10298690B2

    公开(公告)日:2019-05-21

    申请号:US15403062

    申请日:2017-01-10

    摘要: Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A mobile device associated with a user detects a communication between that user and another user. A relationship between the users is determined from a profile. The relationship indicates that the users are authorized to transfer a file between mobile devices. Upon determining that a relationship exists between the users, the communication is sent to a network service. The network service evaluates the communication for an intention to transfer a file between the users.