摘要:
A system and related method to process natural queries is provided. In one aspect, it is determined whether any portion of the natural language query matches one of a plurality of semantic keywords. In another aspect, the natural language query is translated into at least one database query. In a further aspect, the database query may be executed in a database arranged in accordance with the database model.
摘要:
Disclosed herein is a technique for disambiguating associations between one keyword and multiple attributes of a database model and for disambiguating associations between one attribute of a database model and multiple attribute types.
摘要:
Disclosed herein is a technique for disambiguating associations between one keyword and multiple attributes of a database model and for disambiguating associations between one attribute of a database model and multiple attribute types.
摘要:
Disclosed herein are a system, non-transitory computer-readable medium, and method for responding to natural language queries. Keywords likely to appear in a natural language query are determined and each likely keyword is associated with a module. A response to a natural language query comprises information generated by each module associated with a likely keyword appearing in the natural language query.
摘要:
Systems, methods, and machine-readable and executable instructions are provided for detecting abnormal behavior. Detecting abnormal behavior can include receiving a mean at a previous time interval, a sum of squares at the previous time interval, and a first sample of a metric at a current time interval from a system and adjusting a first weight and a second weight at the current time interval to the first sample and a system change report. Detecting abnormal behavior can also include calculating a mean and a standard deviation of the metric at the current time interval by assigning the first sample the adjusted first weight and by assigning the mean and the sum of squares at a previous time interval the adjusted second weight and detecting abnormal behavior by comparing the first sample to an outlier value based on the mean and the standard deviation at the previous time interval.
摘要:
Methods performed by a physical computing system include automatically identifying, using at least one trained classifier, an action for responding to an anomaly in the execution of the application in a cloud computing system. The at least one trained classifier relates a metrics set to a result of performing an action for addressing an anomaly. Systems and computer readable media are also described herein.
摘要:
Methods and systems related to planning an execution of an application in a cloud computing system are described herein. The method includes determining whether a workload causes an anomaly associated to the execution of an application. Upon determining that execution of the application under the workload causes an anomaly, an action, or a value of at least one parameter for execution of the application in the cloud computing system, is determined. The action, or the value, is for addressing the anomaly.
摘要:
A method of determining reliability of electronic documents associated with an event occurring in connection with a computing device may comprise, with a processor, composing a number of search queries based on text included in an event message, searching for a number of electronic documents via a network, said searching performed based on the composed search queries, and ranking the electronic documents identified by said searching based upon an indication of reliability in addressing the event associated with the event message, in which, ranking the electronic documents comprises applying a content source ranking criteria.
摘要:
A method for automated detection of a real IT system problem may include obtaining monitor measurements of metrics associated with activities of a plurality of configuration items of the IT system. The method may also include detecting anomalies in the monitor measurements. The method may further include grouping concurrent anomalies of the detected anomalies corresponding to configuration items of the plurality of configuration items which are topologically linked to be regarded as a system anomaly. The method may further include calculating a significance score for the system anomaly, and determining that the system anomaly relates to a real system problem based on the calculated significance score.
摘要:
A method is described that involves creating a private key and a public key cryptographic key pair, generating a unique and random identifier for a voter's vote and accepting an election vote from said voter. The vote and identifier are electronically signed with the private key to create a digital signature. The vote and identifier are provided in a human readable format to the voter. The digital signature is provided to the voter. The method further involves generating a second unique and random identifier for a second voter's vote and accepting a second election vote from the second voter. The second vote and identifier are electronically signed with the private key to create a second digital signature. The second vote and second identifier are provided in a human readable format to the second voter. The second digital signature is provided to the second voter. The public key is published on an internet. Information is publicly provided on the internet that associates together: (i) the voter's vote in a human readable format, (ii) the identifier in a human readable format, and (iii) the digital signature. The voter's vote is verifiable with the digital signature and the public key. Information is publicly provided on the internet that associates together: (iv) the second voter's vote in a human readable format, (v) the second identifier in a human readable format, and (vi) the second digital signature. The second voter's vote is verifiable with the second digital signature and the public key. The method includes, in response to receiving a request from the internet containing the identifier, providing (i), (ii) and (iii) above through an internet communication. The method also includes in response to receiving a second request from the internet containing the second identifier, providing (iv), (v) and (vi) above through a second internet communication.