A native user interface (UI) application of a mobile device includes a library of different components such as text, forms, tables, lists, maps, views and buttons. The components can also have associated actions in some cases. When a view of the UI is launched, the mobile device contacts a server or other data source to obtain metadata associated with the view. The metadata can be tailored to a user or organization of the mobile device. The metadata selects specific components and defines a layout for the components. The mobile device uses the metadata to retrieve the components and render them in the view. The views can be changed by changing the metadata without changing the native application.
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
2.
VISUAL COMPONENTS IN A DATA-AGNOSTIC DASHBOARD RUNTIME ENVIRONMENT
A dashboard runtime component includes (1) a visualization component configured to render a visual representation of data items retrieved from a data source and (2) a query execution component associated with at least the visualization component. The query execution component is configured to retrieve the data items from the data source. The dashboard runtime component also includes an application data interface configured to provide communication between the visualization component and the query execution component, including: (i) receiving notification of user interaction with the visualization component; (ii) passing a message to the query execution component, the message including instructions to execute an updated query according to the user interaction; (iii) receiving, from the query execution component, a dataset retrieved from the data source according to execution of the updated query; and (iv) passing the dataset to the visualization component, causing the visualization component to render an updated visual representation.
Database systems and methods are provided for automatically generating records at a database system in a configurable and customizable manner. One method involves using a key value associated with a configuration to identify related records at a database system associated with the key value and identify configuration metadata associated with the configuration at the database system. The method continues by providing a graphical user interface (GUI) display at a client device coupled to the database system over a network, where the GUI display includes a first region including a first subset of the records grouped into a first group based on the configuration metadata and a first common field value and a second region including a second subset of the records grouped into a second group based on the configuration metadata and a second common field value.
Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products that provide for an improved, more efficient, and more stable system of networked computing devices. The embodiments disclose an apparatus and system that enable client devices to selectively grant to third party applications permissions to access group-based communication objects of a group-based communication system. The apparatus and system further enable client devices to selectively grant to third party applications permissions to take specific actions with regards to the group-based communication objects within the system. To accomplish the improvements, the disclosed systems, apparatuses, and computing devices maintain a record of the permissions granted to third party applications in a permissions table stored in a computer storage device. The permissions table may be modified to expand the permissions granted to the third party application without requiring a new authentication process that issues a new authenticating token. Further, third party applications are installed at a group level and not at a user level within the system, which increases system stability and efficiency.
Embodiments described herein provide systems and methods for providing zero-shot visual question answering. A first image and a first question relating to a visual content of the first image are received. One or more image captions relevant to the first question are determined using a visual-language neural model by determining portions of the first image relevant to the first question. Answer candidates are generated using the one or more image captions, answer candidates. Synthetic question-answer pairs are generated using synthetic questions generated using the answer candidates and the answer candidates. A prompt is generated by concatenating the synthetic question-answer pairs. A first answer to the first question is generated using a language network model using an input of the first question prepended with the prompt.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Embodiments provide a method for predicting agent actions for neural network based agents according to an intervention. The method includes obtaining a first agent action at a first time step and a first intervention generated according to an intervention policy. The method also includes generating, by the neural network based agent model, a predicted agent action conditioned on the first agent action and the first intervention. The method also includes generating, by a neural network based intervention model, a second intervention according to the intervention policy and conditioned on the first agent action, the first intervention, and the predicted agent action. The method further includes executing a second agent action according to an agent policy that incurs a reward based on the second intervention. The method further includes training the neural network based intervention model by updating parameters of the neural network based intervention model based on an expected return.
An apparatus is provided for outputting suggested query items by a group-based communication platform. The apparatus may include at least one memory and at least one processor configured to detect group-based communication platform query data stored in a memory of the apparatus. The processor is also configured to rank suggested query items based on the group-based communication platform query data. The processor is further configured to detect non-keystroke engagement of a search input interface of the group-based communication platform. The processor is further configured to determine a first subset of the suggested query items based on the ranking of the suggested query items and automatically launch a query suggestion interface including a first subset of the suggested query items in response to detecting the non-keystroke engagement of the search input interface. Corresponding methods and computer program products are also provided.
Embodiments herein relate to prediction, based on previous usage of a cloud-based computing resource by a user of one or more users of the cloud-based computing resource, future usage of the cloud-based computing resource. Based on the predicted future usage, embodiments relate to identifying that throttling of access to the cloud-based computing resource is to occur, and notifying the user of the throttling. Other embodiments may be described and/or claimed.
Techniques are provided for thwarting attackers in a computing system which uses network management interfaces (NMIs). Before submitting NMI form data, a user computing device queries a server using a user id to obtain a signature which defines a shuffling map and random data such as a random key. The NMI form data is divided into portions and the random data is appended to each portion to provide respective data units, or buckets of data. The data units are then shuffled according to the shuffling map before being transmitted to a server, with the signature or an identifier of the signature included in a header. At the server, the data units are unshuffled to recover the data units, and the random data is removed to recover the form data portions. The instructions of the form data can then be executed.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Media, methods, and systems are provided for scheduling a scheduled event within a synchronous multimedia collaboration session within a group-based communication system. A selected start time and a selected time duration may be received such that one or more users are added to the synchronous multimedia collaboration session within a channel of the group-based communication system at or near the selected start time. Upon expiration of the selected time duration, the one or more users may be automatically removed from the synchronous multimedia collaboration session to prevent the scheduled event from extending beyond an allocated time.
Systems, devices, and techniques are disclosed for network security policy management. A file including code written using a Domain Specific Language (DSL) for network security may be received. A cloud native enforcement artifact may be generated from the code written using DSL in the file. A policy domain model including hierarchical data, relational data, and graph data for a network security policy may be generated from the code written using DSL in the file and the cloud native enforcement artifact. The policy domain model may be stored in a persistent storage.
Embodiments described herein provide regression testing using artificial intelligence. A regression testing network model for a first plurality of organizations using a common codebase is provided. The regression testing network model provides an organization finite state machine (FSM) model for each organization. A first dataset including samples of the organization FSM models based on regression testing for one or more previous releases of the common codebase prior to a first release of the common codebase is received. A training dataset is generated based on the first dataset. The regression testing network model using the training dataset. A second plurality of organizations for regression testing for the first release is determined, from the first plurality of organizations, using the trained regression testing network model.
Database systems and methods are provided for managing related records using a tiered hierarchical arrangement that supports asynchronous and independent events with respect to related records. A method involves automatically generating a child record having a field value based on configuration data associated with a parent record, automatically updating a second field value for a summarization field associated with the parent record in response to automatically generating the child record, and after automatically updating the second field value, identifying a group record that is a parent of the parent record based on a second field of the parent record, automatically updating a third value for a second summarization field associated with the group record based at least in part on the second field value, and providing a graphical representation of the group record including a graphical representation of the third value for the second summarization field.
G06F 16/26 - Visual data mining; Browsing structured data
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Techniques are disclosed relating to restarting a database node. A database node may allocate memory segments that include a restart segment for storing data records. The database node may spawn processes to read a log and replay log records of the log to update the restart segment to store data records. The database node may determine to perform a restart operation to transition from a first mode to a second mode. Performing the restart operation may include ceasing reading the log at a stop position and storing, based on the stop position, database state information that enables the processes to resume reading the log from the stop position. The database node may further deallocate the memory segments except for the restart segment and terminate the processes. After performing the restart operation, the database node may spawn the processes, which may resume reading the log based on the database state information.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
The disclosed techniques reduce a responsiveness time for a secondary node state of a database in switching from a second computing node to replace a first computing node acting in a primary node state, with both computing nodes performing the same database queries. The second node receives information regarding queries performed by the first node while in the primary state. In some embodiments, the second node retrieves, from a transaction log, log records detailing operations performed for database transactions. In some embodiments, the second node inserts, based on the log records, data records of the transactions into an in-memory cache of the second node that stores chains of database records from different transactions. Upon receiving sufficient information to switch to the primary state, the second node changes a mode of operation during failover making a committed transaction available for reads by subsequent database queries prior to record reordering.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
Systems and methods are provided for determining a first upper bound of a x-direction frame margin of a downsampled image and a second upper bound for a y-direction frame margin of the downsampled image. A total value for each row and column of a weighted grayscale image formed from the downsampled image may be determined. An outlier filtering may be applied to the determined total values for each row and column of the weighted grayscale image. A peak of pairwise ratios of consecutive values from left and right sides of the weighted grayscale image may be used to determine an x-margin, and a peak of pairwise ratios of consecutive values from top and bottom sides of the weighted grayscale image may be used to determine a y-margin. Content may be applied to the image based on the determined x-margin and y-margin values to form a composite image.
G06V 10/46 - Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]; Salient regional features
Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.
A system is programmed and operated to perform a method of indicating health, status, or condition of a monitored target. In certain implementations, the method involves: obtaining at least one metric associated with the monitored target; determining a level of audio degradation to be applied to a source digital media file that conveys default audio content, wherein the level of audio degradation is determined as a function of the obtained at least one metric; modifying the source digital media file in accordance with the determined level of audio degradation, resulting in modified audio data; and controlling playback of the modified audio data to serve as an audible indicator of the health, status, or condition of the monitored target.
An integration application comprising a plurality of components may be provided. The components may provide connections between systems. The integration application may be configured to allow the systems to exchange data. It may be determined that a new version of a first one of the components is a candidate for release. Prior to release of the new version of the first component, the integration application may be tested using the new version of the first component and an existing version of the first component. An instance of the integration application may be automatically caused to be upgraded to include the new version of the first component.
Systems and methods are provided for receiving, at a server, a workflow definition and generating a unique key for the received workflow definition. A distributed log storage may store the internal workflow schema having the not-started states to a state topic of the distributed log storage using the generated unique key, where the state topic includes the states of the internal workflow schema. One or more workers at the server may perform at least one operation based on a received message. The state may be updated at the distributed log storage based on the performed at least one operation. The state topic of the internal workflow schema for the generated key may be compacted based on the updated state, where the compacting reduces the states of the internal workflow schema to the current states, without intermediary states.
Methods, computer readable media, and devices for dynamic personalized API assembly are provided. One method may include receiving a data query from a client by a CDN, parsing the data query to generate a modified data query, transmitting the modified data query to an origin server, receiving a content from the origin server, generating a modified content based on the content, and sending the modified content to the client. Another method may include receiving an API call by an origin server, generating an API response by creating a payload file and adding markup directives indicating whether content is cacheable, and transmitting the API response.
System and methods are described for generating recommendations from dynamically-mapped data. In one implementation, a database system receives a first request to generate a recommendation objection and a second request to retrieve additional data to include in the recommendation object. The database system retrieves the recommendation data from a first database table. The database system identifies the additional data in a second database table that is stored separately from the first database table. The database system generates the recommendation object to include the recommendation data from the first database, and maps the additional data to one or more fields of the recommendation object.
Embodiments described herein provide systems and methods for multimodal layout generations for digital publications. The system may receive as inputs, a background image, one or more foreground texts, and one or more foreground images. Feature representations of the background image may be generated. The foreground inputs may be input to a layout generator which has cross attention to the background image feature representations in order to generate a layout comprising of bounding box parameters for each input item. A composite layout may be generated based on the inputs and generated bounding boxes. The resulting composite layout may then be displayed on a user interface.
Various examples are directed to systems, methods, and apparatuses for providing an interactive developer interface of a group-based communication system. Various examples are directed to systems, methods, and apparatuses for consolidating application data associated with an application within a group-based communication interface. Various examples are directed to systems, methods, and apparatuses for indexing processing actions associated with a plurality of applications.
A method for reporting a success of a dialog session including generating an outcome data indicative of a positive outcome of the dialog session with at least one of the plurality of natural language responses, receiving a natural language query, converting the natural language query into a structured database query based on the metadata, performing the structured database query on a database, generating a result in response to a response data received in response to the structured database query, generating a natural language responses in response to the result and the plurality of natural language response data, sending, by the chatbot, the natural language response, generating a result metadata in response to a comparison of the result to the outcome data, and generating an outcome log in response to the result metadata wherein the outcome log includes an indication of the positive outcome of the dialog session.
Techniques are disclosed relating to deploying application containers. A computer system may receive a request to deploy an application container onto resources of a target environment such that program code of the application container is executed. The deployment of the application container may be carried out in a mode in which the computer system does not allocate resources for the application container. The computer system may receive a request to deploy a placeholder container in the target environment. The deployment of the placeholder container may be carried out in a different mode in which the computer system allocates resources for the placeholder container. The computer system may cause an allocation of additional resources to the target environment on which to execute program code of the placeholder container. In response to the additional resources being allocated, the computer system may deploy the application container onto the additional resources for execution.
Apparatus and method for a scalable pricing engine. A scalable pricing engine is operable in a low-scale mode and a high-scale or scalable mode to process pricing data in response to pricing requests. The pricing engine operates in a first runtime environment in the low-scale mode in which it can service pricing requests up to a threshold number and in which the pricing data can be updated and tested. The pricing engine also operates in a second runtime environment which is a scalable runtime supporting pricing requests above the specified threshold. The scalable runtime and pricing engine rely on a scalable read-only data service which distributes a read-only copy of at least a portion of the pricing data from the primary database, a high-scale cache to reduce access latency, data processing and network resource allocations, and data reduction techniques when processing requests and responses.
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
G06F 12/0875 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with dedicated cache, e.g. instruction or stack
30.
ENSURING TRUST THROUGHOUT LIFECYCLE OF A NON-FUNGIBLE TOKEN
Disclosed are some implementations of systems, apparatus, methods and computer program products for ensuring trust throughout the lifecycle of a non-fungible token. The system identifies, from a metadata data structure associated with the non-fungible token, a first network address associated with a first attribute of the metadata data structure. The system accesses a first file referenced by the first network address and generates a first hash value from contents of the first file. The system generates a modified metadata data structure that includes the first hash value by storing, within the metadata data structure, the first hash value in association with the first attribute. The system then generates a second hash value using the modified metadata data structure and stores, in a public trust ledger, a first smart contract including the second hash value and a second network address that references the modified metadata data structure. The system may then attempt to validate a smart contract based, at least in part, on the second hash value.
Techniques for displaying workflow responses based on determining topics associated with user requests are discussed herein. In some examples, a user may post a request (e.g., question) to a virtual space (e.g., a channel, thread, board, etc.) of a communication platform. The communication platform may input the request into a machine learning model trained to identify topics associated with the request and confidence levels associated with topics. In such examples, the communication platform may associate a topic with the user request based on the confidence level of the topic. In some examples, the communication platform may determine that the topic is associated with a graphical identifier (e.g., emoji). The communication platform may cause the graphical identifier to be displayed to the virtual space within which the user request was posted. In response to displaying the graphical identifier, the communication platform may display a workflow response to the virtual space.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Disclosed herein are system, method, and computer program product embodiments for implementing AI driven application navigation recommendations based on user behavior. An embodiment operates by generating a trained machine learning model using training data obtained based on historical navigation logs corresponding to the web application. The embodiment deploys a reduced machine learning model within an instance of the web application, and the reduced machine learning model is generated by compressing the trained machine learning model. The embodiment then generates the page navigation recommendation using the reduced machine learning model based on an encoded navigation breadcrumb data corresponding to the instance of the web application.
Implementations(s) for deploying application(s) are described. Responsive to an indication to install a specific instance of an application registered in a registry, first and second code are retrieved from the registry to cause the installation. Responsive to the first and second code, it is detected that the first code is executable to receive information that will be generated responsive to execution of the second code; the specific instance of the second part of the application is caused to be deployed on the second TS using the fourth code identified in the second code; the information is received; and a specific instance of the first part of the application is caused to be deployed on the first TS using the third code identified in the first code and to be configured to communicate with the specific instance of the second part of the application using the information.
Embodiments described herein provide system of a neural network based news reading tool. The system includes a communication interface receiving one or more text passages from data sources. The system also includes a memory storing a discord question neural model that generates a discord question according to the text passages. The system further includes processors executing processor-executable instructions to perform operations that include determining, by the discord question neural model, respective locations within the one or more text passages for inserting the discord question; receiving, via the communication interface from a client component, an indication that a user device is accessing a first text passage from a first data source; and sending, via the communication interface, the discord question, and a first location corresponding to the first text passage to the user device thereby causing the client component to generate and display a reading interface widget.
Methods and systems are provided for providing an insights page. When data identifying a party of a call is received, a customer relationship management (CRM) application can be launched at a computing device without any further user input, and records that are potentially relevant to the call and that are to potentially be included as part of an insights page of the CRM application can be automatically determined. Some of the records are automatically determined by analyzing CRM information using artificial intelligence technologies. The records can then be ranked in a priority order according to relevance from most relevant to least relevant. The insights page can then be caused to be displayed at a user interface of the computing device without user input with at least some of the records displayed in the priority order as relevant records.
Privilege escalation in a cloud platform comprises provisioning to a client access privileges to the database entities that are covered by a license. A base escalation matrix is provisioned to the client with additional access privileges not covered by the license. An API request is received and the requested CRUD operation is attempted on a first database entity. Responsive to the requested CRUD operation initially failing because the client does not have required access privileges activation of an exception signaling failure of the requested CRUD operation is detected and used as a trigger to fetch the base escalation matrix. The access privileges of the client are escalated by applying the additional access privileges from the base escalation matrix to a user context of the current API query request, and repeating the requested CRUD operation. The escalated access privileges are then removed.
Embodiments are directed to visualizing data using a graphical user interface (GUI) that may include a graph panel and a visualization panel arranged to receive inputs or interactions. A data model may be provided and displayed in the visualization panel. Input information that specifies portions of the data model may be provided to the visualization panel. Transform models may be determined based on the specified portions of the data model such that the determined transform models include a model interface that accepts the input information. The transform models may be employed to generate graph objects based on the data model, the input information such that the graph objects may be included in a graph model. Queries based on the graph model may be executed to provide results from the data model such that the results may be displayed in a visualization.
A method for configuring the operation of the software of a data as a service (DAAS) system during run time is described. The configuring includes receiving a match query from a customer relationship management system that transmitted the match query responsive to a user using an interface to trigger an update of records in the customer relationship management system that were previously imported from the DAAS system, querying for records in the dataset that match records in the customer relationship management system previously imported from the DAAS system, the querying configured at run time according to metadata that identifies, for records in the dataset, a field to match on and a match threshold, and producing a match query result that includes records in the dataset to be imported to update records that were previously imported from the DAAS system.
Apparatus and method for asynchronous pricing. For example, some implementations include an asynchronous pricing service in addition to the pricing service. When performing a first pricing operation on a first set of pricing data, the pricing service performs operations on a pricing engine. In response to a second pricing request at the asynchronous pricing service with a second set of pricing data, the second set of pricing data is subdivided into a plurality of portions and a corresponding plurality of pricing jobs are specified, which are independently executed by the pricing engine to produce a corresponding plurality of partial pricing results. The asynchronous pricing service aggregates the partial pricing results to generate a second pricing result.
A second opened instance of a user interface may be identified based on an indication of a first instance of the user interface. An instance indication element indicating the second opened instance of the user interface may be displayed based on the identified second opened instance of the user interface. An instance indication window may be displayed based on an interaction with the instance indication element. Data fields of the instance indication window may describe the first and second opened instances of the user interface. The instance indication window may include a scrollable element to reveal, according to their opening sequence, additional data fields for additional opened instances of the user interface. Data fields of the instance indication window may be updated/modified to include new descriptions for any opened instance of the user interface. Moreover, the instance indication window includes interactive elements for closing opened instances of the user interface.
Techniques are disclosed relating to constructing a delta transition table for a database trigger. A computer system may store trigger information identifying a database trigger having a set of routines to be executed after an update operation has been performed on the database table. The computer system may perform a particular update operation that includes updating one or more rows of the database table. As part of performing the particular update operation, the computer system may construct a delta transition table that includes an original version of the one or more rows prior to the particular update operation and an updated version of the one or more rows resulting from the particular update operation. Subsequent to performing the particular update operation, the computer system may make the delta transition table available to the database trigger to facilitate an execution of the set of routines.
Various examples of the present disclosure can be directed to programmatically generating and rendering for display a context pane within a group-based communication interface. In some examples, the context pane comprises context pane content representative of channel membership associated with a communication channel identifier with which the group-based communication interface is associated. Group-based communication objects of a group-based communication data corpus can be utilized (e.g., by way of a trained machine learning model and/or work graph data structures) to inform the determination of context pane content.
A system, method, and computer-readable media for surfacing relevant topics discussed in a synchronous multimedia collaboration session to interested nonparticipants of the synchronous multimedia collaboration session. A relevant topic of the synchronous multimedia collaboration session may be determined based in part on audio data from the synchronous multimedia collaboration session. At least one nonparticipating member with an interest in the relevant topic of the synchronous multimedia collaboration session may be identified. A notification of the synchronous multimedia collaboration session associated with the relevant topic may be surfaced to the at least one non-participating member.
Techniques and systems are provided for more efficient and reliable caching of responses that are based on API calls to a backend system. The disclosed embodiments use a containerized pipeline that can be linked to each application instance regardless of the specific cloud environment(s) on which the instance is hosted and executed. Instances of the application operating on different cloud environments can access the cached responses from the other environments, thereby reducing or eliminating latency that typically results from the deployment of caching and database solutions across different availability zones in one or more cloud environments.
A computing device receives a user input to add a data visualization to a first visualization card in a first scene of an interactive presentation. In response to the user input, when the first scene is an initial scene to be added, the device computes, for each metric of a plurality of metrics, a respective parameter that measures the variability of values of the respective metric, and identifies a first subset of metrics based on the computed parameters. The device generates a respective data visualization for each metric. The device displays a plurality of the generated data visualizations. The device receives user selection of a first data visualization of the plurality of data visualizations, corresponding to a first metric of the subset of metrics. In response to the user selection, the device populates the first visualization card with the first data visualization.
A computing device displays, in a graphical user interface, a canvas region that includes one or more scenes. The one or more scenes include a first scene having a first visualization card. The device displays, in the graphical user interface, a recommendation region that includes one or more data visualizations. Each of the data visualizations corresponds to a respective metric of a data source. The respective metric has a respective temporal attribute. The device also displays, in the graphical user interface, a scene summary that includes, for each scene, a respective count of visualization cards corresponding to the scene, a respective count of text cards corresponding to the scene, a respective count of unique metrics corresponding to the scene, and a respective cumulative temporal span corresponding to the scene.
G06T 11/20 - Drawing from basic elements, e.g. lines or circles
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
47.
Using Contextual Recommendations to Present Time-Series Metrics
A computing device identifies a plurality of metrics corresponding to one or more data sources. The device receives a first user input to add a first data visualization to a first visualization card in a first scene of the interactive presentation. In response to the first user input, and in accordance with a determination that the graphical user interface includes a prior scene having a second visualization card with a second data visualization, the device computes, for each metric, a respective parameter that measures a variability of values of the respective metric. The device identifies a subset of metrics based on the computed parameters and identifies a first metric to which the second data visualization corresponds. The device determines whether the first subset of metrics includes the first metric and displays a plurality of the generated data visualizations in accordance with the determination.
A computing device displays, in a graphical user interface, a canvas region that includes a first scene. The first scene includes a first visualization card having a first data visualization and a second visualization card, adjacent to the first visualization card, the second visualization card having a second data visualization. The device receives user input to specify merging the first data visualization with the second data visualization. Responsive to the user input, and in accordance with a determination that (i) the first data visualization and the second data visualization share a common time period and (ii) there is a substantial overlap between a first range of values in a vertical axis of the first data visualization and a second range of values in a vertical axis of the second data visualization, the device merges the first data visualization and the second data visualization into a single data visualization.
G06T 11/60 - Editing figures and text; Combining figures or text
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06T 11/20 - Drawing from basic elements, e.g. lines or circles
49.
RETARGETING DASHBOARD CONTENT AS INTERACTIVE DATA SNAPSHOTS FOR COLLABORATION PLATFORMS
A computing device receives user selection of a first data element from a first data dashboard that is displayed on the computing device. The user selection designates the first data element as a first snapshot component of a first snapshot. In response to receiving the user selection, the computing device displays, in a first user interface, a plurality of component properties for the first snapshot component. The computing device receives, via the first user interface, user specification of first values for at least a first subset of component properties of the plurality of component properties. In accordance with receiving the user specification, the computing device updates the first snapshot component according to the first values, generates a first snapshot that includes the first snapshot component, and causes the first snapshot to be displayed as a message on a messaging application executed by an electronic device.
A computer system receives user specification of values for a plurality of snapshot properties of a first snapshot. The first snapshot includes a first snapshot component that is extracted from a first data dashboard. The first data dashboard is associated with a first data source. The user specification includes a first date/time for which data in the first snapshot is valid and a first collaboration platform to which the first snapshot is to be exported. The computer system, in accordance with receiving the user specification, generates a first snapshot specification for the first snapshot according to the values for the plurality of snapshot properties. The computer system generates the first snapshot according to the first snapshot specification. The computer system causes the first snapshot to be displayed as a message on a messaging application of an electronic device. The messaging application is associated with the first collaboration platform.
G06T 11/60 - Editing figures and text; Combining figures or text
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 16/26 - Visual data mining; Browsing structured data
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
51.
GENERATIVE LANGUAGE MODEL FOR FEW-SHOT ASPECT-BASED SENTIMENT ANALYSIS
Sentiment analysis is a task in natural language processing. The embodiments are directed to using a generative language model to extract an aspect term, aspect category and their corresponding polarities. The generative language model may be trained as a single, joint, and multi-task model. The single-task generative language model determines a term polarity from the aspect term in the sentence or a category polarity from an aspect category in the sentence. The joint-task generative language model determines both the aspect term and the term polarity or the aspect category and the category polarity. The multi-task generative language model determines the aspect term, term polarity, aspect category and category polarity of the sentence.
A computing device displays, in a graphical user interface, a canvas region that includes a first scene. The first scene includes a first visualization card. The device also displays, in the graphical user interface, a recommendation region that includes one or more data visualizations. Each data visualization corresponds to a respective metric of one or more metrics of a data source. The respective metric has a respective temporal attribute. The device receives user selection to add a first data visualization, corresponding to a first metric of the one or more metrics, to the first visualization card. In response to the user selection, the device updates display of the first visualization card to include the first data visualization.
A computing device displays a user interface that includes a first snapshot that is authored by a user of the computing device and displayed on a messaging application of a collaboration platform. The device displays information regarding metadata of one or more originating dashboards corresponding to the one or more snapshot components of the first snapshot. In response to detecting a first user selection of a notification, displayed in the user interface, indicating that the first snapshot has expired, the device transmits one or more identifiers of the one or more originating dashboards to a computer system and receives, from the computing system, updated data for the one or more snapshot components of the first snapshot. The device generates an updated view of the first snapshot according to the received updated data and displays the updated view of the first snapshot in the user interface.
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
Techniques are disclosed relating to managing data objects. A computer system may access a first application comprising a set of functions and may execute a second application to facilitate execution of the first application. The first application may be written in a different programming language than the second application. The second application may manage, on behalf of the first application, memory resources of data objects that are defined within ones of the set of functions of the first application. The second application may establish, for the data objects, ownership information that indicates which ones of the functions are utilizing the data objects. The ownership information may be usable to determine, upon completion of a function of the set of functions, whether a given one of the data objects can be deallocated based on whether the given data object is being utilized by another function.
A computing device displays, in a graphical user interface, a canvas region that includes a first scene. The first scene includes a first visualization card having a first data visualization and a first text card, adjacent to the first visualization card. The device receives, via the first text card, (i) text input from a user and (ii) user selection of a first user interface element for linking the first text card to the first visualization card. In accordance with the receiving, the device determines whether the text input includes a first expression having a first time span that intersects with a temporal domain of the first data visualization. In accordance with a determination that the text input includes the first expression, and in response to a first user interaction with a first region of the first text card that includes the first expression, the device visually emphasizes a first portion of the first data visualization, corresponding to the first time span.
Methods, systems, apparatuses, devices, and computer program products are described. A mapping service may receive a user input indicating conditions for generating mock data values into application programming interface (API) fields. The mapping service may map a set of API fields to a set of mock collection library (MCL) fields using a mapping scheme. For example, the mapping service may map field names or descriptions of the API and MCL fields based on similarity scores determined using word embeddings. The mapping service may display a set of mapped fields and example mock data to a user. If the user rejects the mapped fields, the mapping service may remap the fields. Once the user accepts the mapped fields, the mapping service may generate a full set of mock data for the API (e.g., mock API responses to an API request) and store the mapping scheme.
Embodiments described herein provide systems and methods for training a sequential recommendation model. Methods include determining a difficulty and quality (DQ) score associated with user behavior sequences from a training dataset. User behavior sequences are sampled during training based on their DQ scores. A meta-extrapolator may also be trained based on user behavior sequences sampled according to DQ score. The meta-extrapolator may be trained with high quality low difficulty sequences. The meta-extrapolator may then be used with an input of high quality high difficulty sequences to generate synthetic user behavior sequences. The synthetic user behavior sequences may be used to augment the training dataset to fine-tune the sequential recommendation model, while continuing to sample user behavior sequences based on DQ score. As the DQ score is based on current model predictions, DQ scores iteratively update during the training process.
Embodiments described herein provide an open-vocabulary instance segmentation framework that adopts a pre-trained vision-language model to develop a pipeline in detecting novel categories of instances.
G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
59.
SYSTEMS AND METHODS FOR ENSEMBLING SOFT PROMPTS IN FEW-SHOT FINE-TUNING OF LANGUAGE MODELS
Embodiments described herein provide a mechanism that ensembles trainable soft prompts to transfer knowledge from source tasks under few-shot learning settings. Specifically, given a source task input from a source task training dataset, a set of soft prompts may be trained using a frozen PLM on the large-scale source task training dataset. The set of soft prompts are then prepended to a target task input, based on which the frozen pre-trained language model generates a set of logits for predicting classification of the target task input, respectively. An attention module is used to generate input-logit attention scores, which are used to compute a weighted linear combination of the logits given the attention scores. The weighted linear combination are the final logits to predict the final classification of the target task input.
Systems and methods initialize distributed client device membership for new client devices joining a group-based communication channel established for content exchange among a plurality of distributed client device members. The systems and methods comprise aspects for executing a content analysis over the content of the one or more group-based communication channels to identify characterizing terms associated with each group-based communication channel. After the content analysis is performed, systems receive search parameters from a potential new member client device for a group-based communication server. Various systems and methods provide selected search results generated based at least in part on a determination that characterizing terms match one or more of the search parameters to the client device. Those selected results comprise a target that is executable by the client device to join the associated group-based communication channel.
Methods and systems are provided for generating an interactive simulation representing one or more assets based on one or more asset records. Based on information from asset records stored at a database system of a cloud-based computing system, an asset simulator module, executed at a cloud-based computing system, can generate one or more simulated representations of the assets. A simulator application executed at the cloud-based computing system can augment the simulated representations of the assets with (at least) additional information from the asset records stored in the database system, and generate a user interface that presents an interactive simulation of the assets. The user interface can include the simulated representations of the assets with the additional information from the asset records stored in the database system.
G06F 30/20 - Design optimisation, verification or simulation
G06F 9/451 - Execution arrangements for user interfaces
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
62.
DATABASE SYSTEMS AND METHODS FOR AUTOMATED DATABASE MODIFICATIONS
Database systems and related customization methods are provided. One exemplary method of modifying a database to support a new functionality involves receiving user input indicative of the new functionality from a client device coupled to a network, identifying existing customizations associated with a user of the client device in the database, determining a plurality of different solutions for implementing the new functionality based at least in part on the existing customizations associated with the user, providing a graphical user interface display at the client device including graphical indicia of the plurality of different solutions for implementing the new functionality, and in response to receiving indication of a selected solution of the plurality of different solutions from the client device, automatically instantiating a new customization corresponding to the selected solution in the database.
Methods, systems, apparatuses, devices, and computer program products are described. A mocking service may log a set of real application programming interface (API) data including a set of API requests and corresponding API responses. Using a generator function of a generative adversarial network (GAN), the mocking service may generate a set of sample (e.g., mock) data that mimics the API requests and responses. The mocking service may use a discriminator function to compare the sample data to the real API data and weight parameters of the GAN (e.g., retrain a machine learning model of the GAN) until the generator function generates sample data similar enough to the real API data. When the discriminator function is unable to distinguish the sample data, the real data, the mocking service may store the trained GAN and use it to generate mock API responses to API requests from users.
Database systems and methods are provided for providing record data to an application extension associated with a native application at a client device. One method involves a cross-platform service at the client device receiving a plurality of requests for data for one or more records at the database system from the native application, aggregating a subset of the plurality of requests into a batched request, providing the batched request to the database system over a network, receiving a batched response to the batched request from the database system over the network, and for each request of the subset of the plurality of requests of the batched request, mapping a respective data set of the batched response to a respective request and providing the respective data set to the application extension in response to the respective request via the native application.
Database systems and methods are provided for initiating an action at a database system by an instance of a native application at a client device coupled to the database system over a network. One method involves downloading, to a data storage element at the client device, metadata indicative of update criteria for a configuration associated with the instance of the native application from the database system over the network, monitoring, by a service associated with the native application at the client device, a context associated with the client device with respect to the update criteria, and when the context associated with the client device satisfies the update criteria, automatically providing, by the service to the database system over the network, an indication that the update criteria is satisfied to automatically initiate the action at the database system in accordance with the configuration associated with the native application.
Database systems and methods are provided for providing record data to an application extension associated with a native application at a client device. One method involves a cross-platform service receiving, from the native application, a query for record data associated with a record at a database system on behalf of the application extension, determining a data source for retrieving the record data based at least in part on a configuration of the native application, converting the query into a transformed query having a different format associated with the identified data source, retrieving the record data from the identified data source using the transformed query, and providing the record data to the application extension via the native application, wherein the application extension is configurable to generate a component of a graphical user interface display using the record data.
Database systems and methods are provided for providing data from a database system to a native application at a client device. Metadata indicative of a subset of data fields associated with a configuration of a graphical user interface display is downloaded to a data storage element at the client device. Thereafter, a cross-platform service at the client device receives a request for data associated with a record at the database system from the native application, requests, based on the metadata maintained in the data storage element at the client device, the subset of data fields associated with the record from the database system over the network, and provides the retrieved subset of data fields to the native application to generate the graphical user interface display in accordance with the configuration using the retrieved subset of data fields.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Database systems and methods are provided for updating a graphical user interface (GUI) display generated by an application extension associated with a native application. A method involves a cross-platform service at a client device receiving, from the native application, a request for data associated with a record on behalf of the application extension, retrieving the data associated with the record from a data source, providing the retrieved data to the application extension, via the native application, to generate a component of the GUI display using the retrieved data, monitoring for a change to the data associated with the record, and in response to the change, retrieving updated data associated with the record from the data source and providing the updated data to the application extension via the native application to update the component of the GUI display using the updated data.
Techniques for identifying mention identifiers within a message using a mentions processor are discussed herein. In some examples, a communication platform maintains a mentions processor configured to receive a message including a mention identifier, analyze the message to determine a type of the mention identifier included in the message, identify a second user account or a virtual space referenced by the mention identifier, determine whether a notification should be sent to the second user account or the virtual space, and, upon determining that the notification should be sent, send the notification associated with the message to the second user profile or the virtual space. In some examples, an observability class associated with the mentions processor allows the use of a mentions lookup tool to view one or more stored mention identifiers associated with the message and one or more stored notifications enqueued for the message.
A federation management service may generate a federated application program interface (API) based on multiple data sources. The federation management service may detect changes to one or more of the multiple data sources, which may result in generation of a new version of the federated API. The changes to the data sources may be documented in a change event log. The change event log may be used to recreate a prior version of the federated API by applying changes of the change event log to a federated schema corresponding to the federated API. A snapshotting technique may capture the state of the federated schema at various points in time, and snapshots may be used to regenerate a prior version of the federated API using the change events of the change event log.
Systems, methods, and related technologies are provided for generating interactive emails and tracking user interactions. In one implementation, an email can be received within an email client. The email can be rendered within the email client, such as by: presenting a first selectable element within the email client, presenting a second selectable element within the email client, and presenting one or more content items within the email client. A selection of the first selectable element can be received within the email client. In response to the selection of the first selectable element, a presentation of the one or more content items can be adjusted within the email client.
A method for replicating a set of parent resources from an administrator namespace to a set of tenant namespaces is described. The method includes receiving, by the administrator namespace, a global object that includes a set of object fields that reference (1) a set of parent resources and (2) the set of tenant namespaces; monitoring, by an operator controller of the administrator namespace, the global object to determine whether a change has been made to the global object; and replicating, by the operator controller, the set of parent resources to the set of tenant namespaces as child resources based on the global object in response to detecting a change to the global object.
Embodiments described herein provide a cascade-guided adversarial training method for sequential recommendation models. A system may compute cascade scores for items in a user interaction sequence. The cascade scores may be based on the position in the sequence, as well as the appearance of the same item in other sequences. Based on the computed cascade score, the system may perturb item embeddings. The perturbed user interaction sequences with perturbed item embeddings may be used to train a sequential recommendation model.
Described herein are systems, apparatus, methods and computer program products for machine learning intent classification. In various embodiments, historical utterances provided by users may be utilized for bot training. Context and personally identifiable information may be removed from the utterances. The utterances may be associated with vectors. The utterances and vectors may be used to determine recommendations.
A federation management service may receive an indication of multiple data sources to integrate into a federated application programming interface (API). One of the data sources is a database that is associated with an API schema that includes annotations that map elements of the API schema to the features of the database. The federation management services processes the API schema to generate the federated API. The federated API may receive a request for an element that is mapped to the feature of the database, generate a query based on the annotations of the API schema, and return a result based on the generated query.
Methods, systems, and devices for data processing are described. The method may include generating a federated application programming interface (API) from a plurality of data sources. One or more of the plurality of data sources may include an annotated data schema that defines one or more API endpoints for performing a distributed mutation of the plurality of data sources according to a supported distributed transaction protocol. The method may include receiving, via a single call to a single field of the federated API, a request at the federated API to perform a distributed mutation on the plurality of data sources. The method may include orchestrating, via a federation management service and the one or more API endpoints, a plurality of mutation calls to the plurality of data sources according to the distributed transaction protocol.
A contextual processing engine architecture. The architecture utilizes data objects retrieved from a database to form a new transactional item data structure as input into a contextual processing engine. The transactional data structure includes a prior context pointer to point to historical context. The historical context can be null for new transactions or one or more basis transaction item data structures for contextual transactions. The processing engine processes the input using process functions lists and aggregates the results for output.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
79.
PORTABLE BINARY FILES FOR CLIENT SIDE EXECUTION OF FEDERATED APPLICATION PROGRAMMING INTERFACES
Methods, systems, and devices for data processing are described. A federation management service may receive a user input indicating multiple data sources as federation inputs into federated application programming interface (API). The one or more data sources may have a first metadata input that defines a target schema for a computed field and a second metadata input that defines a transformation for computing a value for the computed field from a data source schema to the target schema for the computed field. A runtime service of the federation management service may compute the value of the computed field using the second metadata input. The federation management service may generate the federated API from the data sources, where the federated API includes the computed field.
A federation management service may receive, via a user interface of the federation management service, a first user input indicating a selection of a testing environment for testing a federated application programming interface (API). The federation management service may receive, in response to the first user input, a portable binary file for deployment in a web browser of a client host. In some examples, the portable binary file may include a first set of scripts for orchestrating query requests for the federated API and a second set of scripts for orchestrating communications between the web browser of the client host and the first set of scripts. The federation management service may then execute, within the web browser of the client host, a query of the federated API using the first set of scripts and the second set of scripts.
Embodiments described herein provide systems and methods for federated learning. A central system may store a neural network model which has a body of a number of layers, and a classification layer comprising class prototypes which classifies the latent representations output by the body of the model. The central system may initialize the class prototypes so that they are uniformly distributed in the representation space. The model and class prototypes may be broadcast to a number of client systems, which update the body of the model locally while keeping the class prototypes fixed. The clients may return information to the central system including updated local model parameters, and a local representation of the classes based on the latent representation of items in the local training data. Based on the information from the clients, the neural network model may be updated. This process may be repeated iteratively.
Devices, systems and methods are provided for ordering records at a database system. An instance of a virtual application presented at a client device coupled to the database system over a network provides a graphical user interface (GUI) element populated using a sorting rule table that maintains user-configured sorting rule criteria for each custom sorting rule of a plurality of different sorting rules configured at the database system. In response to the user selection of a first custom sorting rule via the GUI element, the virtual application provides graphical indication of an ordered listing of the records at the database system ordered by a user-configured field of the records associated with the first custom sorting rule in accordance with a user-configured sort order associated with the first custom sorting rule using a search index built in accordance with the user-configured sorting rule criteria for the custom sorting rules.
Media, methods, and systems of presenting and assigning interactive user statuses within a group-based communication system. The interactive user statuses may include links to resources and/or actuatable controls for accessing collaboration activities with other users. The interactive user statuses may be assigned manually or automatically based on user activity within the group-based communication system or within external applications.
H04L 51/046 - Interoperability with other network applications or services
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/04842 - Selection of displayed objects or displayed text elements
H04L 51/043 - Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
Methods, apparatuses, and computer-program products are disclosed. The method may include deploying a runtime agent onto a private compute architecture for running one or more federated application programming interfaces (APIs) on the private compute architecture. The method may include receiving, via a user interface of a federation management service, user input to manage an operation of the one or more federated APIs, where the federation management service is hosted on public cloud-based resources. The method may include communicating, based on the user input, control signaling between the runtime agent and a runtime manager that is hosted on a control plane of the federation management service in the public cloud-based resources.
A computing system may support a federation management service that receives an input indicating a plurality of data sources comprising one or more tags corresponding to one or more elements of the plurality of data sources. The federation management service may generate a federated application programming interface (API) using the data sources, and the federated API may include elements of the data sources. The federation management service may receive a second user input selecting a set of tags for exclusion or inclusion of elements in a subgraph of the federated API. The federation management service may generate the subgraph that includes a subset of the one or more elements of the plurality of data sources.
Methods, systems, and devices for data processing are described. A federation management service may receive a user selection of a first data source and a second data source via a user interface of the federation management service. The first data source and the second data source may be associated with different data source types. The federation management service may extract schema information from the first data source and the second data source by using source extensions to parse the first data source and the second data source. The federation management service may generate a federated data model by using the schema information to translate the first data source and the second data source into intermediate data sources with a common feature set. Accordingly, the federation management service may generate a target data schema for a federated application programming interface (API) based on the federated data model.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
87.
SYSTEMS AND METHODS FOR UNIVERSAL ITEM LEARNING IN ITEM RECOMMENDATION
Embodiments described herein provide a universal item learning framework that generates universal item embeddings for zero-shot items. Specifically, the universal item learning framework performs generic features extraction of items and product knowledge characterization based on a product knowledge graph (PKG) to generate embeddings of input items. A pretrained language model (PLM) may be adopted to extract features from generic item side information, such as titles, descriptions, etc., of an item. A PKG may be constructed to represent recommendation-oriented knowledge, which comprise a plurality of nodes representing items and a plurality of edges connecting nodes represent different relations between items. As those relations in PKG are usually retrieved from user-item interactions, the PKG adapts the universal representation for recommendation with knowledge of user-item interactions.
Disclosed are systems, apparatus, methods and computer-readable media for updating information stored in a database system over a network. In some implementations, first contact data is retrieved from a first virtual portion of a database system, where the first contact data provides first contact information associated with at least one entity. In some instances, the first contact data is compared with second contact data, where the second contact data provides second contact information associated with the at least one entity. In some instances, at least some of the second contact information is retrieved from a social networking system. In various implementations, at least one difference between the first contact data and the second contact data is identified, where the at least one difference is capable of being presented in a user interface displayed at a computer system. In some instances, a selection identifying contact data to store is received.
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 11/36 - Preventing errors by testing or debugging of software
G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Systems, methods, and computer-readable media are provided for reducing a number of potential code paths such that it is feasible to examine all possible code paths within source code. Source code may be received. The source code may be traversed such that the path is recorded. Predicates may cause the path to split such that both paths can be traversed with the result of the predicate stored such that the path does not need to split again when encountering a new predicate for which the stored predicate is determinative. The determined paths can then be used by applications.
A user device may identify data in a data field of a user interface and generate a changed fields window of the user interface to track changes to the data in the data field. Data in a data field of the changed fields window may correspond to the data in the data field. An indicator element may be displayed, for example, based on an interaction with the data in the data field of the changed fields window. The indicator element may indicate correspondence between the changed data in the data field and the data in the data field of the changed fields window. The indicator element may be displayed as an overlay of at least a portion of the user interface. Moreover, an inaccessible fields window including data fields that are no longer applicable in the current view of the user interface may be generated.
A prediction system of an online system deploys one or more machine-learned architectures to generate predictions. In one embodiment, the machine-learned architecture is a stacked ensemble model. The stacked ensemble model includes a plurality of base models, where a base model is coupled to receive input data and generate a base prediction for the input data. The stacked ensemble model includes a meta model that combines the base predictions to generate a meta prediction for the input data. The prediction system also generates a reliability measure that takes advantage of the base predictions to evaluate the reliability of the meta prediction. In this manner, while the quality of individual predictions may differ from one another depending on the values of the input data, the prediction system can dynamically generate the reliability measure to account for this variation.
A method of asset verification implemented by a computing device as part of an asset verification system. The asset verification utilizes unique identifying information of the asset. The method collects asset information from a user, collects asset information from the computing device, generates a unique identifier from the asset information, adds the unique identifier and the asset information to a blockchain, and stores the asset information in a distributed storage system.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
H04W 4/35 - Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
94.
Authenticating Accesses to a Shared Datastore of a Multi-Tenant Computer System
A multi-tenant computer system authenticates access to a shared datastore by a shared service running on the multi-tenant computer system. The shared service is operable to access the shared datastore to execute requests from a plurality of multi-tenant cloud computing services. The requests include an indication of a particular tenant and a particular tenant grouping indicator. Requests are authenticated by cryptographically verifying the request and verifying that the particular tenant is associated with the particular tenant grouping indicator. In response to authenticating a request, the shared service accesses the shared datastore to execute the first request.
In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine.
A system allows translation across API models represented using different API description languages. The system stores model bindings from a common visualization model format to multiple API description languages. The model bindings map constructs of the API description language to and from modeling constructs of the common visualization model format. The system uses the model bindings to convert API models to and from representations based on API description languages to the common visualization model format. The system used the common visualization model format to generate visualizations of the API model that can be displayed via a user interface and also allow users to modify the API model.
Computing systems, for example, multi-tenant systems deploy software artifacts in datacenters created in a cloud platform. The system receives multiple version maps. Each version map provides version information for a particular context associated with the datacenter. The context may specify a target environment, a target datacenter entity, or a target action to be performed on the cloud platform. The system generates an aggregate pipeline comprising a hierarchy of pipelines. The system generates an aggregate version map associating datacenter entities of the datacenter with versions of software artifacts targeted for deployment on the datacenter entities and versions of pipelines. The system executes the aggregate pipeline in conjunction with the aggregate version map to perform requested operations on the datacenter configured on the cloud platform, for example, provisioning resources or deploying services.
A group-based communication platform is configured to ascertain the relatedness of various work objects shared among users of the group-based communication platform. Moreover, the group-based communication platform may further receive and process work objects originating from non-users of the group-based communication platform, thereby further expanding the utility of the determined relatedness between work objects. These work objects (or encrypted representations of these work objects) may be indexed and stored in association with the group-based communication platform, thereby enabling users to search for and retrieve work objects originating from a plurality of work object sources simultaneously, and based on various characteristics of those work objects and the determined interrelatedness between various work objects.
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
A user device (e.g., a computing device, a smart device, a mobile device, a laptop, a tablet, a set-top box, a display device, etc.) may generate and/or display a scrollable user interface (e.g., a configuration form/interface, a web form, a web page, an application page, a data form, etc.) that includes data fields. A data reflection element for a data field that is displayed based on proximity of an interactive element to the data field may be generated. Based on an interaction with the data reflection element via the interactive element, data input to the data field may be displayed in a field of a data reflection window of the scrollable user interface. An indication element that indicates correspondence between the data field and the field of the data reflection window may also be displayed.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
100.
ELECTRONIC MAIL AUTHENTICATION AND TRACKING IN DATABASE SYSTEM USING MESSAGE IDENTIFIER WITHIN BODY OF ELECTRONIC MAIL
Disclosed are some implementations of systems, apparatus, methods and computer program products for tracking inbound email messages in association with database records. An outbound email message is automatically generated or updated to include a message identifier within one or more headers and within a body of the outbound email message. Subsequently, a first electronic mail message received via a network from a first client device is processed, where the first electronic message has one or more headers and a body. A first message identifier (ID) is obtained from the body and the first message ID is parsed such that an encrypted portion and one or more unencrypted portions are obtained, where a first unencrypted portion of the unencrypted portions includes an entity identifier associated with a first database record of a database. A secret key associated with the first electronic mail message is obtained and the first electronic mail message is authenticated using the secret key, the encrypted portion of the first message ID, and at least one unencrypted portion of the unencrypted portions of the first message ID. The first electronic mail message is processed according to a result of authenticating the first electronic mail message. In some implementations, the first message ID is obtained from the body after determining that a valid message ID cannot be obtained from the headers.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 51/214 - Monitoring or handling of messages using selective forwarding