Abstract:
An embodiment includes creating an action item record corresponding to an action item of an action plan record that is responsive to a service request. The action item record comprises a service requirement of the action item. The embodiment executes a querying process that searches vendor records for candidate vendors associated with the service requirement and returns a set of candidate vendors. The embodiment updates the action item record with the set of candidate vendors and determines an optimal vendor team based at least in part on reputation data and cost data associated with each of the candidate vendors. The embodiment updates the action plan record to include the optimal vendor team, which triggers creation of a vendor team dispatch request.
Abstract:
A base query having a plurality of base query terms is obtained. A plurality of problem log files are accessed. Words, contained in a corpus vocabulary, are extracted from the plurality of problem log files. Based on the words extracted from the plurality of problem log files, a first expanded query is generated from the base query. The corpus is queried, via a query engine and a corpus index, with a second expanded query related to the first expanded query.
Abstract:
Embodiments of the present invention disclose a method, computer program product, and system for exposing more dissatisfied service requests through survey sample selection. The computer builds a user dissatisfaction model based on a plurality of historical survey results, and a plurality of historical service request information. The plurality of historic service request information includes at least one dissatisfaction metric, wherein the at least one dissatisfaction metric includes a total time spent resolving a problem, a total travel time, a total onsite time, a at least one part used, and/or a plurality of other metrics. The computer determines a probability of dissatisfaction for each of a plurality of service requests. The computer selects a survey sample that includes a plurality of dissatisfied users based on the determined probability of dissatisfaction for each of the plurality of service requests. The computer transmits a survey to each user of the survey sample.
Abstract:
The methods, systems, and computer program products described herein provide optimized provisioning of replacement parts for service calls through the use of machine learning. In some aspects, historical hardware maintenance tickets may be processed to generate symptoms vectors identifying sets of symptoms associated with the hardware maintenance tickets. The symptoms vectors and corresponding parts usage records of the historical hardware maintenance tickets may be used train a decision model to predict a probability that a particular part will be used to fulfill the new hardware maintenance ticket. The predicted probability may be used by the system when generating a parts provisioning plan for the new hardware maintenance ticket.
Abstract:
Automatic teller machine network management control system executes a deterministic optimization process based on a deterministic forecasted withdrawal demand to determine a cash refill amount, and executes a stochastic simulation process to determine an overall automatic teller machine network management cost based on a stochastic forecasted withdrawal demand and the cash refill amount. The executing of the deterministic optimization process and the executing of the stochastic simulation process are iterated based on updated scaling parameter from the stochastic simulation process and the cash refill amount determined by the deterministic optimization process at current iteration until a termination threshold is met. A target scaling parameter that minimizes the overall automatic teller machine network management cost out of all iterations is determined, and target cash refill amount and time specification for refilling the automatic teller machine are determined based on executing the deterministic optimization process with the target scaling parameter.
Abstract:
Determining which snapshot deltas tend to occur in: (i) healthy virtual machines (VMs) that have been subject to an attack yet remained healthy, and/or (ii) unhealthy VMs that have apparently been adversely affected by an attack. Snapshot deltas that occur in at least some (or more preferably all) of the healthy VM subset provide information about software changes (for example, updates, configuration changes) that may be helpful. Snapshot deltas that occur in at least some (or more preferably all) of the unhealthy VM subsets provide information about software changes (for example, updates, configuration changes) that may be unhelpful.
Abstract:
User trustworthiness may be introduced in implicit feedback based supervised machine learning systems. A set of training data examples may be scored based on the trustworthiness of users associated respectively with the training data examples. The training data examples may be sampled into a plurality of training data sets based on a weighted bootstrap sampling technique, where each weight is a probability proportional to trustworthiness score associated with an example. A machine learning algorithm takes the plurality of the training data sets as input and generates a plurality of trained models. Outputs from the plurality of trained models may be ensembled by computing a weighted average of the outputs of the plurality of trained models.
Abstract:
A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource.
Abstract:
Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.
Abstract:
Automatic teller machine network management control system executes a deterministic optimization process based on a deterministic forecasted withdrawal demand to determine a cash refill amount, and executes a stochastic simulation process to determine an overall automatic teller machine network management cost based on a stochastic forecasted withdrawal demand and the cash refill amount. The executing of the deterministic optimization process and the executing of the stochastic simulation process are iterated based on updated scaling parameter from the stochastic simulation process and the cash refill amount determined by the deterministic optimization process at current iteration until a termination threshold is met. A target scaling parameter that minimizes the overall automatic teller machine network management cost out of all iterations is determined, and target cash refill amount and time specification for refilling the automatic teller machine are determined based on executing the deterministic optimization process with the target scaling parameter.