摘要:
A method for matching a user to a conversation includes, for each of a plurality of documents, mapping the document to one or more of a plurality of topics. The document is associated with a user. For each user, the user is mapped to each of the plurality of topics that are mapped to documents with which the user is associated. One of the users is matched to a conversation according to the mappings of the users to those of the plurality of topics that are also mapped to the conversation.
摘要:
An automated method of processing computer system event logs comprises receiving event messages associated with one or more system event logs, each event message including event text, determining a set of message clusters, each comprising a template text, representative of the event messages across the one or more event logs, and assigning each event message to a message cluster of the set, according to a measure of similarity between the respective event text of the event message and the template text of the message cluster.
摘要:
A method for matching a user to a conversation includes, for each of a plurality of documents, mapping the document to one or more of a plurality of topics. The document is associated with a user. For each user, the user is mapped to each of the plurality of topics that are mapped to documents with which the user is associated. One of the users is matched to a conversation according to the mappings of the users to those of the plurality of topics that are also mapped to the conversation.
摘要:
An automated method of processing computer system event logs comprises receiving event messages associated with one or more system event logs, each event message including event text, determining a set of message clusters, each comprising a template text, representative of the event messages across the one or more event logs, and assigning each event message to a message cluster of the set, according to a measure of similarity between the respective event text of the event message and the template text of the message cluster.
摘要:
Disclosed herein are a system, non-transitory computer-readable medium, and method for responding to natural language queries. Keywords likely to appear in a natural language query are determined and each likely keyword is associated with a module. A response to a natural language query comprises information generated by each module associated with a likely keyword appearing in the natural language query.
摘要:
A system and methods authenticate sensitive information such as passwords. Password characters are transformed into distorted characters and distorted character groups are generated such that each distorted password character is part of a group. An image is created containing the groups and the password or other sensitive information is authenticated when groups are identified within the image that contain the password characters in an expected sequence.
摘要:
Methods performed by a physical computing system include automatically identifying, using at least one trained classifier, an action for responding to an anomaly in the execution of the application in a cloud computing system. The at least one trained classifier relates a metrics set to a result of performing an action for addressing an anomaly. Systems and computer readable media are also described herein.
摘要:
Methods performed by a physical computing system include automatically identifying, using at least one trained classifier, an action for responding to an anomaly in the execution of the application in a cloud computing system. The at least one trained classifier relates a metrics set to a result of performing an action for addressing an anomaly. Systems and computer readable media are also described herein.
摘要:
A system and methods authenticate sensitive information such as passwords. Password characters are transformed into distorted characters and distorted character groups are generated such that each distorted password character is part of a group. An image is created containing the groups and the password or other sensitive information is authenticated when groups are identified within the image that contain the password characters in an expected sequence.
摘要:
A method of determining reliability of electronic documents associated with an event occurring in connection with a computing device may comprise, with a processor, composing a number of search queries based on text included in an event message, searching for a number of electronic documents via a network, said searching performed based on the composed search queries, and ranking the electronic documents identified by said searching based upon an indication of reliability in addressing the event associated with the event message, in which, ranking the electronic documents comprises applying a content source ranking criteria.