In one example, a method for dynamically scaling computer resources in a cloud computing environment is disclosed. The method includes determining lag state information of a message broker. The message broker handles real-time data exchanged with application instances running in a cloud service. The method includes determining whether the lag state information indicates a change to the application instances running in the cloud service. If the lag state information indicates a change, the method includes providing instructions to the cloud service to alter the application instances.
A method for using a Gaussian Process-based algorithm to approximate an optimal stopping of a time series that corresponds to a sequence of events is provided. The method includes: receiving information that relates to an event sequence; estimating, based on the received information, a first potential reward that is obtained by stopping the event sequence at a first time, and a set of respective second potential rewards that are obtained by stopping the event sequence at corresponding times; and determining, based on the estimated first and second potential rewards, an optimal time for stopping the event sequence. The event sequence may include a numerical sequence that is modeled as a statistical learning method via a Gaussian Process (GP) function and/or a deep GP function that indicates a probability density distribution of the items in the numerical sequence over a predetermined time interval.
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
3.
SYSTEM AND METHOD FOR IMPLEMENTING A CLOUD AGNOSTIC DATA MESH MODULE
Various methods, apparatuses/systems, and media for providing centralized seamless data access are disclosed. A processor builds a data mesh architecture in a cloud environment. The data mesh architecture includes a single central hub account provided between a plurality of data producer accounts and a plurality of data consumer accounts. The processor causes the plurality of data producer accounts to publish different types of data received from a plurality of data sources onto the single central hub account along with corresponding metadata. The processor also causes the single central hub account to: incorporate the metadata into an application; receive a request from the plurality of data consumer accounts to access the published different types of data from the single central hub account; and control who from the plurality of data consumer accounts can access the published different types of data from the single central hub account based on the metadata.
H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
4.
SYSTEMS AND METHODS FOR REMOVAL OF ATTRIBUTES FROM MULTI-MODALITY AND MULTI-ATTRIBUTE DATA
A method for removing uninterested attributes from multi-modality data may include: receiving, by a multi-modality attribute removal computer program executed by an electronic device, multi-modality data comprising a plurality of modalities from a data source, wherein data in each modality are related; receiving, by the multi-modality attribute removal computer program, an uninterested attribute in the multi-modality data to remove; training, by the multi-modality attribute removal computer program, a modality-focused encoder for each modality of the multi-modality data to remove the uninterested attribute using a removal loss and a retention loss for the respective modality; receiving, by the multi-modality attribute removal computer program, a multi-modality data set for processing; and processing, by the multi-modality attribute removal computer program, the multi-modality data set using the modality-focused encoders, wherein the processing results in a processed multi-modality data set with the uninterested attribute removed and one or more interested attribute retained.
Systems and methods for automated notification and resolution of trigger events are disclosed. According to one embodiment, a method for automated notification and resolution of trigger events may include: (1) monitoring, by a backend computer program, an account for a trigger condition; (2) generating, by the backend computer program, a voice notification for the trigger condition; (3) communicating, by the backend computer program, the voice notification to an electronic device associated with the account and a link to a network location to resolve the trigger condition; (4) presenting, by the backend computer program and at the network location to resolve the trigger condition, one or more resolution options; (5) receiving, by the backend computer program and at the network location to resolve the trigger condition, a selection of one of the one or more resolution options; and (6) executing, by the backend computer program, the selected resolution option.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for assessing mergers and acquisition vulnerabilities in financial markets are disclosed. Embodiments allow advising institutions, such as financial institutions, to recognize times when a hostile party might take advantage of a market climate or other adverse events and attempt a hostile takeover. Embodiments may monitor public markets and may quantify the vulnerability of any given company based on publicly available data to protect the interests of these companies before other parties can exploit these vulnerabilities.
A method and a system for using implicit neural representations for generation of interpretable time series are provided. The method includes: receiving time series information, such as pairings of time coordinate values with time series signal values, that relates to an event sequence; generating, based on the time series information, an implicit neural representation of the event sequence that includes a plurality of embedded values and a corresponding plurality of weights; and using the implicit neural representation to predict at least one item of information that relates to the event sequence and is not included in the received time series information, such as an interpolation or an extrapolation of the time series.
Systems and methods for efficient speech representation are disclosed. In one embodiment, a method for efficient speech representation may include training a teacher model using training data to get embeddings from intermediate and/or final layers of the teacher model; training a student model using training data processed with audio distortion to have outputs matching the embeddings from the teacher model; and injecting known hand-crafted audio features into intermediate or final layers of the student model.
A method and a system for providing actionable smart monitoring of error messages generated during repave microservice operations in order to reduce the number of human interventions required are provided. The method includes: receiving reports that relate to system failures; analyzing each report to determine features that relate to the system failures; clustering the features into a set of feature groups; determining a corresponding report as a representative error indicator for each respective feature group; and generating, for each respective feature group, a cluster representative message that identifies the corresponding report. The cluster representative messages are then displayable on a user interface to facilitate efficient user action to address system failures and errors.
A slider may include a first side-edge surface, a second side-edge surface, and an air-bearing surface (ABS) comprising: a first side cavity adjacent to the first side-edge surface, and a first island side blocker situated at a mouth of the first side cavity, wherein: a first outer surface of the first island side blocker forms a portion of the first side-edge surface, a second outer surface of the first island side blocker is recessed from the first side-edge surface, a first side opening is situated on a leading side of the first island side blocker, and a second side opening is situated on a trailing side of the first island side blocker.
G11B 5/60 - Fluid-dynamic spacing of heads from record carriers
F16C 32/06 - Bearings not otherwise provided for with moving member supported by a fluid cushion formed, at least to a large extent, otherwise than by movement of the shaft, e.g. hydrostatic air-cushion bearings
13.
SYSTEMS AND METHODS FOR INTEROPERABILITY AMONG PERSON-TO-PERSON FUNDING APPLICATIONS
In some aspects, the techniques described herein relate to a method including: aggregating data for use in an interoperable P2P application; transferring funds from a user's account associated with a first disparate P2P funding application to fund an account associated with the interoperable P2P application; transferring the funds from the account associated with the interoperable P2P application to an account associated with a second disparate P2P application; initiating a transfer of the funds from the user's account associated with a second disparate P2P application to a colleague's account associated with the second disparate P2P application; and recording transactions carried out by the interoperable P2P application in a ledger system associated with the interoperable P2P application.
Various methods, apparatuses/systems, and media for data migration readiness of a target data source are disclosed. A processor hosts an application on a cloud server; receives data corresponding to the application from a plurality of types of data sources; defines expressions to be applied to the data for parsing and transforming the data dynamically on the cloud server; validates the defined expressions based on a determination that each defined expression meets a predefined threshold value; generates a lookup data file in a predefined file format in response to validating the defined expressions; parses the lookup data file; dynamically transforms the data based on the parsed lookup data file and applying the validated expressions; and generates an output file in the predefined file format for consumption after transforming the data.
Methods and systems for estimating call durations while handling incoming telephone calls in order to improve call queue management and efficiency with respect to telephone support systems are provided. The method includes: receiving a first incoming telephone call from a first person; retrieving historical information that relates to the first person; forecasting, based on the historical information, a next customer state that relates to the first person; and estimating, based on the forecasted next customer state, a potential duration of the first incoming call. The estimated call duration is then usable for assigning a priority to the first incoming call and determining an order of handling the first incoming call with respect to each of a plurality of other incoming calls based on the assigned priority.
The present disclosure generally relates to improving space efficiency when storing logical to physical (L2P) entries. Rather than writing a physical block address (PBA) spanning multiple entries, the PBA is split between a first portion stored in the buffer with the remaining bits of the PBA added to the metadata buffer. The metadata buffer is sub-optimal due to the small size of the metadata relative to the entry and therefore, adding extra bits to the metadata buffer will make the metadata buffer more optimal. In this scheme, the alignment is preserved, the system becomes more optimal in terms of DRAM access, and the metadata buffer can be easily optimized and adapted.
A lubricant adheres to a magnetic recording medium via at least one of chemisorption or bonding, and contains a perfluorinated polyether attached to or terminated with a functional group that is phosphonic acid, silanol or carboxylic acid, and may be:
A lubricant adheres to a magnetic recording medium via at least one of chemisorption or bonding, and contains a perfluorinated polyether attached to or terminated with a functional group that is phosphonic acid, silanol or carboxylic acid, and may be:
R1—Rf—R1
where Rf is —CF2O(CF2CF2CF2CF2O)n—, —CF2O(CF2CF2CF2O)nCF2—, —CF2O[CF(CF3)CF2O]nCF2—, —CF2O(CF2CF2O)m(CF2O)nCF2—, —CF2O(CF2CF2O)nCF2—, n, m is from 1 to 100 and R1 is the functional group. A lubricant is formed from a multiple ether segments according to formula:
A lubricant adheres to a magnetic recording medium via at least one of chemisorption or bonding, and contains a perfluorinated polyether attached to or terminated with a functional group that is phosphonic acid, silanol or carboxylic acid, and may be:
R1—Rf—R1
where Rf is —CF2O(CF2CF2CF2CF2O)n—, —CF2O(CF2CF2CF2O)nCF2—, —CF2O[CF(CF3)CF2O]nCF2—, —CF2O(CF2CF2O)m(CF2O)nCF2—, —CF2O(CF2CF2O)nCF2—, n, m is from 1 to 100 and R1 is the functional group. A lubricant is formed from a multiple ether segments according to formula:
Re1—Rb1-Ri-Rc-Ri-Rb2—Re2;
where Rc includes perfluoroalkyl ether, Rb1 and Rb2 are, independently, a sidechain segment including a perfluoroalkyl ether, optional Ri independently is a divalent linking segment including a functional group including elements from periodic table Group 13-17, and of Re1 and Re2 are phosphonic acid, silanol or carboxylic acid. Lubricant synthesis includes reacting a perfluorinated polyether with a halogenated functional group, selected from phosphonic acid, silanol or carboxylic acid.
A data storage device includes a controller. The controller includes a controller memory buffer (CMB). The controller is configured to associate both the CMB and a host memory buffer (HMB) of a host device as a single buffer pool with a plurality of CMB buffers and a plurality of HMB buffers. The controller is further configured to allocate either a CMB buffer or a HMB buffer based on a tradeoff between latency and performance between using the CMB or using the HMB to store data. By leveraging the benefits of both the CMB and the HMB to store data, the overall performance of the data storage device may be improved.
Aspects of a storage device including a memory and a controller are provided, which allow for error detection or data integrity checking during data transfer of write operations and read operations. The controller may be configured to generate data integrity information based on at least one data byte to be written to the memory, and to transfer the at least one data byte contemporaneously with the data integrity information on separate data paths to the memory. The controller may be configured to select between transferring data bus inversion information or the data integrity information based on whether a data integrity protection mode is active between the memory and the controller. The memory may be configured to receive the at least one data byte and the data integrity information from the controller, and detect whether an error exists in the at least one data byte based on the data integrity information.
A method and system for generating a token for securing sensitive data are provided. The method includes receiving first information that relates to a first format of a first type of data and second information that relates to a second format of a second type of data; defining a first algorithm for generating a first token that has the first format and a second algorithm for generating a second token that has the second format; using the first algorithm to generate a set of unique first tokens; using the second algorithm to generate a set of unique second tokens; and when a request for protecting sensitive data that has either the first format or the second format is received, retrieving a first token or a second token and associating the retrieved token with the sensitive data. The method is optimized for issuing tokens of any format.
Systems and methods for dynamic inclusion of enhanced data in transactions are disclosed. According to another embodiment, in an information processing apparatus comprising at least one computer processor, a method for conducting a mobile wallet payment with dynamic enhanced data using a mobile payment application may include: (1) receiving, from a merchant point of transaction device, a transaction request from a mobile payment application executed by a mobile electronic device, the transaction request comprising a unique identifier for a financial instrument provisioned to a mobile wallet computer application and a payment option selection; and (2) processing the transaction request according to the payment option selection.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
The present disclosure generally relates to improved access to the DRAM using namespace mapping. The PMR address range is mapped to LBA address space. Mapping the PMR address range in LBA address space allows the host to access the PMR indirectly using NVMe commands. The host device may hold in the namespace the most frequently accessed data and obtain highest performance and low latency. Implementation of the Power Loss Protection (PLP) feature over the PMR makes the system prefer storing the data in PMR rather in host memory. All internal SRAMs (e.g. Transfer RAMs, XOR RAMs, etc.) may be mapped in the LBA address space so the host device can access mainly for debug purposes. Some internal flops that hold important data are mapped in the LBA address space as well.
Example systems, read channels, and methods provide states equalization for a digital data signal in preparation for a soft output detector. The states equalizer determines a set of signal values from the digital data signal and filters the set of signal values through a set of finite impulse response filters configured to generate a set of state values for a target signal value, where each filter corresponds to a potential state of the target signal value. Based on the state values, a set of probabilities for possible states is determined and used to populate a decision matrix for a soft output detector.
A method for using an artificial intelligence (AI) model to simulate a limit order book market in order to facilitate study and evaluation of trading strategies is provided. The method includes: receiving information that relates to a state of the market at a particular time; and determining, based on the information, a potential market action that is expected to occur. The determination is made by applying an AI algorithm that implements a machine learning technique to determine the potential market action. The AI algorithm is trained by using historical data that relates to the market.
Aspects of a storage device are provided that handle host commands associated with active and inactive zones using a hybrid L2P mapping system. The storage device includes a NVM, a controller, a first volatile memory and a second volatile memory. The controller allocates, as a superblock, one or more physical blocks respectively in one or more memory dies of the NVM, receives write commands including logical addresses associated with active zones, and stores in an L2P mapping table L2P address mappings of these logical addresses to physical addresses associated with either volatile memory or the superblock. The controller refrains from storing L2P address mappings for inactive zones, instead storing in a superblock mapping table a mapping of superblocks to inactive zones in response to respective zone finish commands. As a result, L2P mapping table sizes are reduced, zone read, reset, and TTR performance are increased, and reduced WAF is achieved.
Various apparatuses, systems, methods, and media are disclosed to provide a heat-assisted magnetic recording (HAMR) medium. A magnetic recording medium includes a substrate, a heat sink layer on the substrate, and an underlayer on the heat sink layer. The underlayer includes an amount of an electrically conductive material between about 20 mole percent (mol %) and about 100 mol %. The magnetic recording medium further includes the plurality of magnetic recording layers on the underlayer. The plurality of magnetic recording layers includes a first magnetic recording layer that comprises FePt—Ag—X, wherein X is an oxide.
G11B 13/08 - Recording simultaneously or selectively by methods or means covered by different main groups; Record carriers therefor; Reproducing simultaneously or selectively therefrom using near-field interactions or transducing means and at least one other method or means for recording or reproducing
Systems and methods for determining estimated returns for image-assisted identification of property changes are disclosed. In one embodiment, a method for may include a computer program executed by mobile electronic device: (1) receiving a first image of a property captured by an image capture device at a first time; (2) identifying a plurality of first items in the first image; (3) tagging each of the plurality of first items with a first description by comparing each of the plurality of first items in the first image with a database of items and descriptions; (4) generating a list of the descriptions for the property; (5) receiving a first condition for each of the plurality of first items on the list; (6) communicating the list to a backend computer program; and (7) saving the list and descriptions.
A data storage device includes interfaces for coupling the data storage device to a host system and a server system. The data storage device also includes a device memory for storing or providing data. The data storage device also includes a controller comprising a storage subsystem and a security subsystem. The storage subsystem is configured to receive a host command, receive a probe request for an exception state, generate and transmit, to the security subsystem, a report for the exception state. In response to receiving an update from the security subsystem, the storage subsystem restarts at least a portion of the controller. The security subsystem is configured to monitor and transmit a probe request to the storage subsystem, transmit the report to the server system, receive the update from the server system, and transmit the update to the storage subsystem. Methods and systems are also disclosed.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
29.
Channel Circuit with Asynchronous Sampling from an Oversampled Analog-to-Digital Converter
Example channel circuits, data storage devices, and methods for asynchronous sampling from an oversampled analog-to-digital converter are described. The channel circuit may include an analog-to-digital converter configured to generate an oversampled digital signal from an analog data signal using a sample rate that is an integer multiple of the baud rate of the channel circuit. A digital sample interpolator may then interpolate interpolated digital signal values from multiple signal values of the oversampled digital signal and select values at baud rate to generate a baud rate digital signal. The baud rate digital signal may be used by an iterative detector in a timing loop and, once a target timing is achieved, for the iterative detector to detect data bits from the interpolated digital signal.
Various illustrative aspects are directed to a data storage device comprising one or more disks, an actuator arm assembly comprising a voice coil motor (VCM), the VCM configured to operate in a first mode and a second, different mode, wherein the first mode corresponds to at least a first and a second setting, and a control circuitry configured to cause the VCM to seek towards a target track in the first mode using the first setting for a first duration, control transition of the VCM from the first to the second setting in the first mode, cause the VCM to seek towards the target track using the second setting for a second duration, and control transition of the VCM from the first to a second mode, wherein controlling the transitioning comprises seeking the VCM toward the target track in the second mode for a third duration.
Methods and apparatus for processing data in a distributed inference scheme based on sparse inputs. An example method includes receiving an input at a first node. A first sparsified input is generated for a second node based on a set of features associated with the second node, which are identified based on a weight mask having non-zero values for weights associated with features upon which processing by the second node depends and zeroed values for weights associated with other features. The first sparsified input is transmitted to the second node for generating an output of the second node. A second sparsified input is received from the second node and combined into a combined input. The combined input is processed into an output of the first node. The neural network is configured to generate an inference based on processing the outputs of the first node and the second node.
A method for facilitating intelligent itinerary management via a progressive reservation system is disclosed. The method includes aggregating itinerary information for a user from user transactions, the itinerary information corresponding to a transit reservation; continuously monitoring, in real-time via an application programming interface, the transit reservation by using the itinerary information; determining, based on a result of the continuous monitoring, whether parameters that correspond to the transit reservation satisfy a predetermined threshold, the parameters including an operational status; automatically retrieving, from a repository, historical information that corresponds to the user when the parameters satisfy the predetermined threshold; automatically identifying, in real-time using a model, a future transit reservation based on the itinerary information and the historical information; and providing, via a graphical user interface, the identified future transit reservation to the user.
A data storage device comprising a non-volatile storage medium configured to store data, a data port configured to receive and transmit data between a host computer system and the data storage device and a controller. The controller is configured to receive, via the data port, a first command data structure comprising a status reporting activation and receive, via the data port, a second command data structure. In response to receiving the second command data structure, the controller is configured to, determine a response information associated with the second command data structure, and in response to the status reporting activation, determine a status information, and transmit, via the data port, a response data structure comprising the response information and the status information.
Various processes for efficiently and effectively determining or predicting whether data stored in a non-volatile storage device is unreadable and/or unrecoverable during a read-retry process. To make the determination, different dynamic read threshold (DRT) entries of a dynamic read threshold (DRT) table are applied, in parallel, across different planes of the non-volatile storage device to determine whether the data is unreadable and/or unrecoverable.
A programming order of memory dies of a metablock is typically fixed. However, in some storage architectures, this may cause performance bottlenecks. As such, the programming order of the memory dies may be altered to reduce or eliminate performance bottlenecks.
Systems and methods for activating and using dynamic cards are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for activating a dynamic transaction instrument may include: (1) receiving, from an electronic device, an identification of an inactive financial instrument to activate; (2) receiving, from the electronic device, at least one parameter that restricts the use of the inactive financial instrument after it is activated; and (3) activating the inactive financial instrument subject to the at least one parameter by associating, at a backend, an account with the inactive financial instrument.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
37.
Exception Handling Using Security Subsystem in Storage Device
A data storage device includes a host interface for coupling the data storage device to a host system. The data storage device also includes a device memory for storing or providing data in response to commands receive from the host system. The data storage device also includes a controller comprising a storage subsystem and a security subsystem. The storage subsystem is configured to receive a host command from the host interface, and process the host command for the device memory. The security subsystem includes a device recovery circuit configured to monitor the storage subsystem for an exception state, and reinitialize pending operations for the storage subsystem after the exception state. Methods and systems are also disclosed.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
38.
SYSTEMS AND METHODS OF DETERMINING CONTRAST FOR ACCESSIBILITY
Systems, methods, and devices for determining a contrast of colors displayed by a digital user interface are disclosed, In one embodiment, in an electronic device including a processor, a compliance module is configured to receive a user selection of a graphical element displayed on a user interface of the electronic device; determine first color data associated with a background of the selected graphical element; determine second color data associated with a text string within the selected graphical element; determine a luminosity associated with the first color data and a luminosity associated with the second color data; calculate a color contrast ratio based on the luminosity associated with the first color data and the luminosity associated with the second color data; and display, at the user interface of the electronic device, the calculated color contrast ratio.
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 3/04812 - Interaction techniques based on cursor appearance or behaviour, e.g. being affected by the presence of displayed objects
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
39.
SYSTEM AND METHOD FOR MICROSERVICES TO MONOLITH - DATA SYNCBACK SOLUTION
Various methods, apparatuses/systems, and media for data migration readiness of a target data source are disclosed. A processor invokes, in response to triggering a process, an application programming interface (API) to call corresponding source application or microservice hosted on a source database; updates, by the source application or microservice, the source database to reflect the changes made to one or more fields data of user profile; generates a mapping identifier (ID) in response to updating the source database; stores the mapping ID onto a mapping database in a predefined format; invokes another API call to obtain source table field details of the updated source database and the mapping ID that maps source column of the source table to a corresponding target column of a target table of a target database; and automatically updates the target database to match the updated data of the source database based on the mapping ID.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/25 - Integrating or interfacing systems involving database management systems
40.
Control table set determination in storage devices
Various devices, such as storage devices or systems are configured to efficiently manage and determine control table sets. Such a device may include a processor, a memory array including a plurality of memory devices which include a plurality of control table sets stored in a plurality of regions, and a control table set determination logic configured to: receive a command from a host device associated with logical to physical address mapping updates, determine a control table set of the plurality of control table sets associated with the command, determine a region of the plurality of regions associated with the determined control table set, determine a position in the control table set in the determined region associated with the command, generate additional control table sets upon a first determination that the position is not vacant, and store the command in the generated additional control table sets.
A power supply system includes a RF power source configured to generate an output signal at an output frequency, a signal source configured to generate a perturbation signal, an extremum seeking frequency controller configured to generate a frequency control signal based on the perturbation signal, and a frequency selector configured to select a perturbation frequency of the perturbation signal that is isolated from at least one frequency tone associated with the power supply system. The frequency control signal varies the output frequency of the RF power source. Other example power supply system, methods for controlling a RF generator, and control systems for controlling a RF generator are also disclosed.
Disclosed are systems and methods for accelerating commands from accelerators in data storage devices using accelerator queues. A data storage device includes accelerator interfaces, each accelerator interface couples a controller to a respective accelerator. The device also includes a device memory comprising one or more memories and one or more sets of queues. Each set of queues corresponds to a respective memory, at least one queue is configured to queue one or more tasks associated with an accelerator, and each queue is associated with a respective priority level of a plurality of priority levels. A controller is configured to: receive an accelerator command, identify a first memory corresponding to a task for the accelerator command; and enqueue the task to a first queue corresponding to the first memory, the first queue configured to queue one or more tasks associated with the first accelerator corresponding to the first accelerator interface.
Technology is disclosed herein for handling of mixed random read and sequential read command sequences. Plane read commands are formed from one or more sequential read commands. A sequential read command may be split into multiple plane read commands at plane boundaries. The plane read commands are submitted to the respective planes as asynchronous independent plane read commands. Random read commands may be submitted to the planes as asynchronous independent plane read (AIPR) commands on par with the split sequential read commands. Therefore, AIPR may be used for both sequential read commands and random read commands. Submitting a split sequential read command to one or more planes while one or more other planes are performing a random read command can significantly improve performance.
The present disclosure generally relates to magnetoresistive (MR) devices. The MR device comprises a synthetic antiferromagnetic (SAF) layer that increases stability to magnetic fields, and in turn, results in lower magnetic noise of the device. The MR device comprises a first ferromagnetic (FM1) layer and a second ferromagnetic (FM2) layer, in between which is an SAF spacer of RuAl alloy having a B2 crystalline structure with (001) texture, meaning that the (001) plane is parallel to the surface of MR device substrate. The first ferromagnetic (FM1) layer and a part of the second ferromagnetic (FM2) layer also have the (001) texture. An amorphous layer in a second ferromagnetic (FM2) layer can reset the growth texture of the MR device to a (111) texture in order to promote the growth of an antiferromagnetic (AF) pinning layer.
H01L 27/22 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate using similar magnetic field effects
A method for providing an integrated data quality capability for distributed data repositories is disclosed. The method includes identifying, from a data stream, an indication that a job corresponding to a source data set has been started, the job relating to a data ingestion job and a data transformation job; triggering a data reconciliation action based on the identified indication; persisting, in a repository, a first result of the data reconciliation action; initiating a data quality action based on the first result; persisting, in the repository, a second result of the data quality action; initiating a scan action based on the second result; persisting, in the repository, a third result of the scan action; and generating a graphical element and a report based on an analysis of the first result, the second result, and the third result, the graphical element is displayable via a graphical user interface.
G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
46.
SYSTEM AND METHOD FOR SMART SUBSCRIPTION TO CLOUD BASED SERVICES
Various methods, apparatuses/systems, and media for automated subscription to cloud-based services are disclosed. A processor establishes a communication link between a cloud environment and a user interface via a communication interface, wherein cloud-based services are hosted in the cloud environment. The processor also implements a predefined ML/AI algorithm to determine service tier for each of said cloud-based services; provisions the services based on the determined service tier; continuously monitors preconfigured parameters associated with each service tier; builds a ML/AI based model based on the preconfigured parameters; automatically changes a level of each service tier based on implementing the ML/AI based model; receives user input data to subscribe to the cloud-based services; determines a service tier that matches the received user input data based on the ML/AI based model; and automatically allows subscription to the cloud-based services in accordance with the service tier that matches the received user input data.
A method for performing differential routing based on message content. The method includes receiving, from a user device, a message inquiry; identifying and extracting one or more keywords from the message inquiry; determining, for each of the one or more keywords, a corresponding tag type; predicting a conversation length based on the determined tag type for each of the one or more keywords; determining whether the message inquiry is amenable to being serviced by an automated service; and routing the message inquiry based on the determining whether the message inquiry is amenable to being serviced by the automated service.
G06F 16/31 - Indexing; Data structures therefor; Storage structures
G06F 16/38 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
48.
SYSTEMS AND METHODS FOR FACILITATING COLLABORATION AND INTEGRATION ACROSS CUSTOMER RELATIONSHIP MANAGEMENT INSTANCES
Systems and methods for facilitating collaboration and integration across customer relationship management (CRM) instances are disclosed. According to one embodiment, a method for facilitating collaboration and integration across customer relationship management instances may include: (1) receiving, at a collaboration and integration platform and from a CRM program instance for a user executed on a user electronic device, an identification of a collaboration between a plurality of users on an out-of-band collaboration network to subscribe to, the collaboration involving a client, a prospective client, or a project; (2) subscribing, by the collaboration and integration platform, the user to the collaboration on the out-of-band collaboration network; (3) receiving, by the collaboration and integration platform and from the out-of-band collaboration network, a message for the subscribed collaboration; and (4) communicating, by the collaboration and integration platform, the message to a CRM program network.
A system that aggregates client data and cyber indicators to authenticate a client is provided. The system receives a request to access a financial account of the client, and retrieves a client profile. The client profile includes an aggregation of data into a plurality of data indicators. An optimal number of data indicators is determined based on an initial threshold inquiry regarding the request, with the optimal number of data indicators being determined based on a phone requesting the access to the financial account. A risk score is generated based on a weighting for each of the plurality of data indicators included within the optimal number, with the weighting representing a confidence in the accuracy of each of those data indicators. Access to predetermined actions by the client is granted based on the risk score.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
50.
SSD USE OF HOST MEMORY BUFFER FOR IMPROVED PERFORMANCE
Aspects of a storage device are provided that requests L2P address translation data from an HMB for execution of an associated host command using a dynamically determined HMB transfer size. The storage device includes a volatile memory and a controller. The controller allocates, in the volatile memory, multiple memory locations for L2P address translation data from an HMB. The controller receives a command indicating a host data length, and transmits a request for a portion of the L2P address translation data stored in the HMB for the command. The HMB transfer size associated with the request may be based on the host data length of the associated host command, a quantity of free and contiguous memory locations available in the HMB read buffer, or a minimum between a size of the portion and a total size of the free and contiguous memory locations. Thus, HMB transfer latency may be reduced.
The present disclosure generally relates to reducing latency when fetching Scatter Gather Lists (SGL). Rather than fetching the required SGLs sequentially regardless of what SGL descriptor is needed, the data storage device fetches all of the last entries of each SGL segment in ahead of time after receiving the command, but before the read data is available. The data storage device will still fetch the previous entries in the segment. Once the last entries are fetched, the last entries are stored in a table where the earlier descriptors of each segment are stored as the segments are fetched. In so doing, parallel fetching allows the data storage device to fetch SGL descriptors as needed and reduces the latency.
A method for providing an automated routing layer to facilitate end-to-end testing is disclosed. The method includes detecting, in real-time, electronic messages from a data stream based on a predetermined configuration; intercepting the detected electronic messages from the data stream; extracting message data from the intercepted electronic messages, the message data including payload information that corresponds to the electronic messages; determining, in real-time, downstream destination paths for each of the intercepted electronic messages based on the extracted message data and the predetermined configuration; and automatically routing, in real-time, each of the intercepted electronic messages based on the determined downstream destination paths.
A method and system for classifying and verifying data are provided. The method includes receiving first information that relates to an individual person; categorizing each item of the first information as relating to either a non-mutable attribute or a mutable attribute of the individual person; verifying an accuracy of each item of the first information by comparing the respective item with second information that is independently maintained by an external source; and when a request for updating first information that relates to a mutable attribute of the individual person is received, verifying an accuracy of the first information to be updated by using an external source.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A data storage device includes a host interface for coupling the data storage device to a host system. The data storage device also includes a device memory and a controller. The controller is configured to determine if a retrim is needed for the data storage device. In accordance with a determination that the retrim is needed, the controller is configured to identify a time to initiate a new trim on the data storage device, and cause the new trim on the data storage device at the time identified.
A data storage device includes a memory device and a controller. The controller is configured to assert a strobe cycle having a plurality of strobes to the memory device, where a die of the memory device may be associated with one or more strobes of the plurality of strobes. The controller is further configured to determine whether the die of the memory device requires additional power and adjust a strobe length of time of the corresponding strobe when the die of the memory device requires additional power. The controller is further configured to decrease a strobe length of time of one or more strobes that do not require additional power. By utilizing a time division peak power management (TD-PPM) feature by dynamically changing a strobe length of time of each strobe of the plurality of strobes, performance and latency of the data storage device may be improved.
Zone Write Groups (ZWGs) to assist data storage devices and host devices with data recovery. In one embodiment, a data storage device includes a memory storing a Zoned NameSpace (ZNS). The ZNS includes a ZWG including host zones and parity zones. An interface connects the data storage device with a host device. The data storage device includes a data storage device controller including an electronic processor and a memory. The data storage device controller populates the ZWG with buffers received from the host device. The data storage device controller detects corrupted data associated with the ZNS and requests one or more buffers stored in the ZWG. Once the data storage device controller receives the one or more buffers from the ZWG, the data storage device controller performs a recovery event with the one or more buffers.
Various methods, apparatuses/systems, and media for data migration readiness of a target data source are disclosed. A processor receives a request having configurable filters and parameters from a consumer service to obtain data; invokes, in response to receiving the request, a service application programming interface (API) for the data; fetches requested data from a legacy data source in response to calling the service API; fetches data corresponding to the same request having the same configurable filters and parameters from a target data source; compare the fetched data from the legacy data source to the fetched data from the target data source; generates, in response to comparing, a data quality validation score; and when it is determined that the data quality validation score is equal to or more that predetermined threshold value, validates the target data source for migration readiness and terminating the legacy data source.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
58.
Extremum-Seeking Control Apparatuses and Methods for Automatic Frequency Tuning
A RF generator includes a RF power source configured to generate an output signal at an output frequency, and an extremum-seeking frequency controller configured to generate a frequency control signal. The frequency control signal varies the output frequency of the RF power source, and the frequency control signal is formed from a gradient signal. The RF generator further includes a gradient estimator configured to generate the gradient signal. A frequency of the frequency control signal is adjusted based on the gradient signal. The gradient estimator is configured to receive frequency values of the frequency control signal and corresponding output response values, and the gradient signal is generated based on the frequency values and the output response values. Other example RF generators, methods for extremum-seeking frequency control of a RF generator, and control systems for controlling a RF generator are also disclosed.
The present disclosure generally relates to improving adaptive tuning of different clock rates of a memory device. Rather than clock rates only being determined off of one parameter such as workload, the clock rates now will be determined using multiple parameters. The tuning may be based on system parameters to allow the system to withstand challenges that arise during the operation. The clock frequency table is maintained in the device controller. The table holds the clock frequency of each component. The disclosure proposes modifying the table according to different system environment parameters to maintain performance or reduce power consumption. Adaptive tuning allows a more flexible system design that can adapt according to the current system status. Adaptive tuning also reduces peak power consumption, improves performance, and better quality of service (QoS) compatibility characteristics.
Dynamically determining respective threshold temperatures for data storage devices (DSDs) in a data storage system (DSS) slot involves determining a marginal temperature of a DSD (TMd) based on the difference between a current threshold temperature of a corresponding DSS slot (TTe) and a current temperature value of the DSD (TCd), and raising the current TTe to an updated TTe accordingly, thereby effectively permitting the DSD to operate at temperatures up to the updated TTe. Updating TTe may come after first determining whether the TMd is greater than a lower limit and/or less than an upper limit, both of which are based on an inherent threshold temperature value of the DSD (TTd). This approach can be applied to other DSDs housed in the same DSS enclosure, enabling varying each respective DSD operating temperature, in contrast to using a fixed operating temperature range for the entire enclosure.
Technology is disclosed herein for early erase termination as a counter-measure for erase disturb. Multiple erase blocks of NAND memory cells are erased in parallel during an erase procedure. Erasing multiple erase blocks in parallel can place considerable strain on the circuitry that generates the erase voltage. If there is significant leakage current in one of the erase blocks the magnitude of the erase voltage for all of the erase blocks may drop. The erase blocks are tested sequentially for leakage current during the first erase loop while the erase voltage is applied to only the erase block under test. If any erase block fails the leakage current test that erase block is removed from the erase procedure. One or more additional erase loops are then performed with only those erase blocks that passed the leakage current test simultaneously receiving an erase voltage, thereby preventing erase disturb with early termination.
A method for providing test and regression automation via a cloud native elastic tool is disclosed. The method includes obtaining test configurations, the test configurations corresponding to a test suite; parsing the test configurations to identify testing conditions for the test suite; automatically determining testing parameters for executing the test suite based on the identified testing conditions; executing the test suite based on the automatically determined testing parameters in a computing environment, the computing environment including a distributed computing environment; verifying results of the executing; and generating a report for the test suite, the report including information that corresponds to the automatically determined testing parameters, an execution status, and a verification result.
Apparatuses and methods of directly accessing a memory space of a storage device by a host are provided. In one embodiment, a method of driverless access of a non-volatile memory of a non-volatile memory device by a host includes initializing a PCIe memory space mapping a portion of the non-volatile memory of the non-volatile memory device to a host memory space. The non-volatile memory is mapped through a PCIe link between the host and the non-volatile memory device. Load/store commands are sent to the PCIe memory space for driverless access. The method further includes negotiating an alignment size of the minimum transaction packet size to complete the load/store commands.
A method for performing a determination of voter eligibility and facilitation of secure electronic voting is provided. The method includes authenticating a voter according to security setting and displaying a voting page for a jurisdiction corresponding to the voter's residence. The method then transmits to an adjudicating entity, voter information for determination of voter eligibility, and stores the voter information in a non-public blockchain. The method further includes determining whether the voter is eligible to vote based on the voter information stored in the non-public blockchain, generating a unique voter specific ballot for the voter in response to a determination that the voter is eligible to vote, and transmitting, to the adjudicating entity, a ballot selection received from the voter. The ballot selection is then stored on a public blockchain, and made available for release.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
65.
ANNOTATION INJECTOR FOR PROTECTING PERSONAL INFORMATION, CONFIDENTIAL INFORMATION, HIGHLY CONFIDENTIAL INFORMATION, AND OTHERWISE SENSITIVE DATA
Various methods, apparatuses/systems, and media for automatically protecting sensitive information data entering application logs, events, metrics, traces, or other outputs are disclosed. A processor receives source code associated with an application being developed; parses the source code and identifies variables or fields in the source code that include sensitive information data; applies artificial intelligence or machine learning algorithm to the source code to automatically identify variables that contain the sensitive information data based on the identified variables or fields and annotating accordingly. Each annotation is a hint that data associated with corresponding annotation is confidential and sensitive information that should not be published, logged, or printed. The processor automatically updates the source code with the annotation; and automatically updates the database or the code editor with the updated source code so that changes made to the source code would be permanently implemented during compiling and deploying of the application.
The present disclosure generally relates to utilizing a transparent host memory buffer (HMB) where the host device is granted access to the HMB to obtain data from a mapping table. The data storage device stores the mapping table in HMB and then allows the host device to view the mapping table and retrieve information. The host device sends a command to the data storage device that includes not only a read command, but also mapping table info specific to the read command. Additionally, an indication of the mapping table version from where the information is also provided. The data storage device, upon receiving the command, confirms the version of the information is the most recent version and then, if confirmed, utilizes the mapping information provided with the command. In so doing, accessing the HMB after receiving the command will not be necessary.
Systems and methods for unit test generation using reinforcement learning augmented transformer architectures are disclosed. A method may include: receiving raw data for source code from a database; identifying a function for which a unit test will be generated and an existing unit test for that function; receiving the function and the existing unit test; generating a generated unit test for the function using the function for the unit test and the existing unit test using a deep learning model; applying a loss function to the generated unit test, wherein the loss function is based on a comparison between the generated unit test and the existing unit test and results of the application of the loss function are fed back to the transformer computer program; simulating the generated unit test using a simulator; generating scalar feedback; and refining the generated unit test using the scalar feedback.
Systems and methods for enhanced mobile device authentication are disclosed. Systems and methods for enhanced mobile authentication are disclosed. In one embodiment, method for electronic device authentication may include (1) a server comprising at least one computer processor communicating a one-time passcode to an electronic device over a first communication channel; (2) the server receiving, from the electronic device over a second communication channel the one-time passcode encrypted with a private key associated with the electronic device; (3) the server decrypting the one-time passcode using a public key; (4) the server validating the one-time passcode; (5) the server generating a device identifier for the electronic device; and (6) the server persisting an association between the device identifier and the electronic device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method and a system for providing a shared state module that acts as a common interface for facilitating data sharing among microservice front-end modules that are being used in conjunction with one another within a single application are provided. The method includes: receiving an input that includes information that relates to a set of microservice modules to be utilized for constructing an application; uploading each of the set of microservice modules and a shared state module that is configured to facilitate data sharing; transmitting, to each of the set of microservice modules, an instruction that provides access to the shared state module; and when a particular microservice module requests a subset of data that is accessible via the shared state module, causing the requested subset of data to be received by the particular microservice module.
Exemplary embodiments may provide an online automobile purchasing experience for a customer. The experience may be provided by, or associated with, a financial institution. The automobile buying experience may be accessible to both customers of the financial institution as well as non-customers. Customers of the financial institution may receive added benefits during and after the experience. Non-customers may have the opportunity to become a customer of the financial institution as part of the experience.
A host system includes an interface for coupling the host system to a data storage device. The host system also includes one or more processors, and memory storing one or more programs for execution by the one or more processors. The one or more programs include instructions for: determining if a retrim is needed for the data storage device; and in accordance with a determination that the retrim is needed: identifying a time to initiate a new trim on the data storage device; and causing the new trim on the data storage device at the time identified.
Systems and methods for multi cloud task orchestration are disclosed. In one embodiment, a method for multi cloud task orchestration may include: (1) creating, by a workflow task function, a first job for a service provided on a container orchestration system, wherein the workflow task function cannot call the service directly; (2) forwarding, by the workflow task function, the first job to the service as a serverless task/function using a request forwarder; (3) waiting, by the workflow task function, for a period of time; (4) checking, by the workflow task function, a status of the first job with the serverless task/function, (5) receiving, by the workflow task function, the status of the first job; and (6) continuing, by the workflow task function, with a second job for the service provided on the container orchestration system.
Methods and systems for using images that represent time-series data to forecast corresponding images depicting future values of the time-series data are provided. The method includes: receiving a set of time-series data; converting the set of time-series data into a partial first image that includes a blank region to which future data to be included in the first set of time-series data corresponds; and performing an inpainting operation with respect to the partial first image by generating pixels for filling in the blank region in order to produce an augmented version of the first image. A machine learning algorithm that is trained by using historical time-series data may be used to perform the inpainting operation.
Disclosed are systems and methods for large write planning for performance consistency and resource usage efficiency. A method is implemented using one or more controllers for one or more storage devices. The method includes receiving, via a host interface, a notification of a write data burst. The method also includes computing available spaces in a plurality of memories and a write ratio, to handle the write data burst to the plurality of memories, based on the notification. The method also includes receiving, via the host interface, the write data burst. The method also includes, in response to receiving the write data burst, toggling writes between the plurality of memories, based on the available spaces and the write ratio.
A plasma source is provided that is configured to form a section of a wall of a vacuum component. The plasma source comprises a body including a dielectric member, a first surface exposed to an exterior region of the vacuum component, and a second surface exposed to an interior region of the vacuum component. The plasma source also comprises at least one electrode disposed in a receiving channel of the body with at least a portion of the dielectric member located adjacent to the at least one electrode in the receiving channel. The plasma source further comprise at least one discharge region adjacent to the receiving channel within the body. The at least one discharge region is exposed to the interior region of the vacuum component via an opening on the second surface of the body.
A data storage device includes a memory device and a controller to the memory device. The controller is configured to receive key value (KV) pair data having a key and a value from a host device and generate a mapping in a key-to-physical (K2P) table corresponding to the received KV pair data. The mapping includes a first slot for storing a physical address corresponding to the value and a second slot for storing a physical address corresponding to metadata associated with the KV pair data. When the associated metadata is sent to the data storage device, which may be non-concurrent to transferring the KV pair data, the mapping of the associated metadata is linked to a same key as the mapping of the KV pair data. Thus, using the mapping, the key of the KV pair data is associated with the KV pair data and the associated metadata.
A method for providing ingestion checkpointing from an event topic is disclosed. The method includes polling, via an event consumer, a message broker to initiate consumption of events from the event topic, the event topic relating to event storage; checkpointing, based on a result of the polling, the consumption of the events by writing corresponding data in multiple stages to a checkpointing durable store; inserting an event pending status for each of the events in an events time bucket table; committing, via the event consumer, the consumption of the events; initiating event processing for the events; and updating the events time bucket table with an event complete status when consumption of the events are completed.
The present disclosure generally relates to aligning non-aligned data for more efficient data reading. Data for write commands does not always perfectly align, yet the data is written in order of write command receipt. In such cases, aligned chunks of data may be split into two word lines (WLs) due to the presence of previously received smaller chunks of data. Rather than writing the data in order, the smaller chunks of data, which are non-aligned, are held in a buffer and written later to ensure that any aligned chunks of data remain aligned when written to the memory device. Once sufficient smaller chunks or data have accumulated to be aligned, or upon a need to write the smaller chunks upon reaching a threshold, the smaller chunks are written together in a single WL so as to not cause non-alignment of aligned data.
G11C 11/406 - Management or control of the refreshing or charge-regeneration cycles
G11C 11/56 - Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
79.
NAND DIE WITH RDL FOR ALTERED BOND WIRE BANDWIDTH IN MEMORY DEVICES
A storage device includes a substrate of a memory package and a first memory die. The substrate includes a controller and a first pin pad, the first pin pad being electrically connected to the controller and defining a data channel for data communications. The first memory die includes a front pin pad electrically connected to the first pin pad of the substrate by way of a first bond wire, a rear pin pad, a redistribution layer electrically connecting the front pin pad and the rear pin pad of the first memory die, and a plurality of memory cells configured to provide non-volatile storage accessible by way of the data channel.
H01L 23/522 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body
H01L 23/00 - SEMICONDUCTOR DEVICES NOT COVERED BY CLASS - Details of semiconductor or other solid state devices
H01L 23/528 - Layout of the interconnection structure
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid state devices all the devices being of a type provided for in the same subgroup of groups , or in a single subclass of , , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
80.
SYSTEMS AND METHODS FOR DERIVING WORKFORCE ACTIVITY AND BEHAVIORAL INSIGHTS FROM DATA EXHAUST
Systems and methods for deriving workforce activity and behavioral insights from data exhaust are disclosed. In one embodiment, a method for deriving workforce activity and behavioral insights from data exhaust may include: (1) ingesting, by a workforce activity data computer program executed by an electronic device, worker data for a plurality of workers from a plurality of data sources; (2) retrieving, by the workforce activity data computer program, reference data; (3) joining, by the workforce activity data computer program, the worker data and the reference data; (4) enriching, by the workforce activity data computer program, derived data points from the joined worker data and reference data; and (5) outputting, by the workforce activity data computer program, the enriched derived data points.
A method for identifying fraud merchant descriptors (that is implemented by disclosed apparatus) is disclosed. The method comprises matching one or more input descriptor with a first database comprising one or more valid trademarks of one or more clients; identifying a set of valid merchant descriptors and a set of suspected merchant descriptors, from the one or more input merchant descriptors based on the matching; identifying a target client associated with each merchant descriptor in the set of suspected merchant descriptors; communicating the each merchant descriptor from the set of suspected merchant descriptors to the associated target client; receiving an authentication decision associated with each merchant descriptor from the set of suspected merchant descriptors; and identifying one or more merchant descriptors from the set of suspected merchant descriptor as fraud merchant descriptor in an event the authentication decision associated with said one or more merchant descriptors is negative.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
82.
METHOD AND SYSTEM FOR PERSONAL FINANCIAL PLANNING BY ARTIFICIAL INTELLIGENCE SEARCH
A method and a computing apparatus for generating a personal financial plan are provided. The method includes: receiving a first input that includes information about an initial financial state of an individual person; receiving a second input that includes information about a goal financial state of the individual person; receiving a third input about financial habits of the individual person; defining a set of available user actions, each respective available user action being assigned a corresponding probability that indicates a likelihood that the individual person successfully performs the respective available user action; determining, based on the defined set of available user actions and heuristics designed to maximize a likelihood of execution, proposed sequences of potential user actions by which the goal financial state is achievable; and calculating, for each proposed sequence, a respective likelihood score that indicates a corresponding feasibility of a successful completion thereof.
Various apparatuses, systems, methods, and media are disclosed to provide a heat-assisted magnetic recording (HAMR) medium. The HAMR medium includes a substrate, a heat sink layer on the substrate, and a plurality of magnetic recording layers on the heat sink layer. The plurality of magnetic recording layers includes a first magnetic layer and a second magnetic layer disposed on the first magnetic layer. The second magnetic layer includes FePt—Ag—Cu—X, wherein X is a segregant comprising BN. The HAMR medium can use BN-based segregants to improve a thermal gradient of the HAMR medium for better areal density capability (ADC) and enable the use of a MgO underlayer with reduced thickness.
G11B 5/66 - Record carriers characterised by the selection of the material comprising only the magnetic material without bonding agent the record carriers consisting of several layers
Aspects of a storage device including a memory and a controller are provided. In certain aspects, the controller may determine that data stored on a first block satisfies a threshold data-error condition, the data comprising invalid data and valid data. For example, the first block may have a high ratio of valid data to invalid data that satisfies or exceeds a threshold value. In certain aspects, the controller may determine a close block boundary associated with the first block, wherein the close block boundary is configured to bifurcate the first block into a first portion and a second portion, wherein the first portion comprises the data. For example, the controller may determine a boundary defined by a data length, an indirection mapping unit, a physical program boundary, etc.
Aspects of a storage device including a memory and a controller are provided. The controller may measure an error rate of one or more blocks of the memory. In certain aspects, the controller may also estimate, based at least in part on the error rate, a time shift indicative of a duration of time for which the storage device was powered off. In some examples, the controller may also set a read level for multiple blocks of the memory, wherein the read level is determined based at least in part on the time shift.
A Zoned Namespace data storage device configured to perform logical-to-physical (L2P) address translation using first and second L2P tables of different respective granularities. In an example embodiment, the first L2P table has a finer (e.g., page-level) granularity and is used to perform L2P address translation for open zones. The second L2P table has a coarser (e.g., erase-block) granularity and is used to perform L2P address translation for finished zones. A controller of the data storage device performs granularity-changing transfers of L2P entries between the first and second L2P tables in response to a respective open zone becoming finished and in response to a new zone becoming open. The coarser granularity of the second L2P table enables the full L2P table to have a relatively small size, which can beneficially be used to make more space available in the same amount of RAM for other operations.
A method may include: receiving input data comprising company business descriptions, industry tags, and industry tag descriptions; creating a similarity matrix for the industry tags using a minimum labeling strategy, wherein the similarity matrix comprises a plurality of similarity scores for pairs of industry tags; sampling the industry tags using a stratified sampling method; generating a semantic textual similarity style dataset comprising triplets of the industry tag descriptions, the company business descriptions, and the similarity scores; fine-tuning a baseline language model for a semantic similarity model; training the semantic similarity model by subjecting embeddings generated for pairs of the company business description and industry tag descriptions to a cosine similarity function; creating a checkpoint model for the semantic similarity model, and inferring an industry tag for each company using the checkpoint model that generates a cosine similarity for pairs for industry tag descriptions.
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control (DNC), flexible manufacturing systems (FMS), integrated manufacturing systems (IMS), computer integrated manufacturing (CIM)
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
PROVISION OF AN ONLINE MARKETPLACE, FOR BUYERS AND SELLERS OF GOODS AND SERVICES, INCLUDING A DEPOSIT LEDGER AND PAYMENT RAIL USING DISTRIBUTED LEDGER TECHNOLOGY, FOR FUNDS OR ASSET TRANSFER AMONG BUYERS AND SELLERS OF FINANCIAL ASSETS PAYMENT PROCESSING SERVICES VIA DISTRIBUTED LEDGER TECHNOLOGY; RECORDING OF DEPOSIT LIABILITIES VIA A DEPOSIT LEDGER AND PAYMENT RAIL BASED ON DISTRIBUTED LEDGER TECHNOLOGY, FOR USE BY PARTICIPANTS OF AN ON-LINE COMMUNITY VIA A GLOBAL COMPUTER NETWORK; CURRENCY EXCHANGE SERVICES VIA DISTRIBUTED LEDGER TECHNOLOGY; FINANCIAL MANAGEMENT OF PORTFOLIOS AND ADVICE ON FINANCIAL ASSETS VIA DISTRIBUTED LEDGER TECHNOLOGY; FINANCIAL MANAGEMENT OF ASSETS VIA DISTRIBUTED LEDGER TECHNOLOGY; SECURITIES SETTLEMENT SERVICES USING DISTRIBUTED LEDGER TECHNOLOGY; SECURITIES BROKERAGE SERVICES USING DISTRIBUTED LEDGER TECHNOLOGY; SECURITIES BROKERAGE SERVICES USING DISTRIBUTED LEDGER TECHNOLOGY; FINANCIAL SERVICES, NAMELY, BROKER/DEALER SERVICES ON SECURITIES EXCHANGES AND OVER-THE-COUNTER MARKETS USING DISTRIBUTED LEDGER TECHNOLOGY; FINANCIAL INFORMATION SHARING, ACCOUNT DATA SHARING, PAYMENT INFORMATION SHARING, CHECK INFORMATION SHARING, LOCKBOX DATA PROCESSING, ACCOUNT VALIDATION SERVICES, CURRENCY CONVERSION INTELLIGENCE, CROSS BORDER PAYMENT INFORMATION, FRAUD DATA, FRAUD IDENTIFICATION SERVICES, FEDERATED LEARNING, FEDERATED INTELLIGENCE ALL PROVIDED VIA DISTRIBUTED LEDGER TECHNOLOGY PLATFORM AS A SERVICE (PAAS) SERVICES FEATURING SOFTWARE FOR VALIDATING BUSINESS TRANSACTIONS USING DISTRIBUTED LEDGER TECHNOLOGY; PLATFORM AS A SERVICE (PAAS) SERVICES FEATURING SOFTWARE TO ALLOW USERS TO PERFORM ELECTRONIC BUSINESS TRANSACTIONS VIA A GLOBAL COMPUTER NETWORK USING DISTRIBUTED LEDGER TECHNOLOGY; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR VALIDATING BUSINESS TRANSACTIONS USING DISTRIBUTED LEDGER TECHNOLOGY; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE TO ALLOW USERS TO PERFORM ELECTRONIC BUSINESS TRANSACTIONS VIA A GLOBAL COMPUTER NETWORK USING DISTRIBUTED LEDGER TECHNOLOGY; COMPUTER AND TECHNOLOGY SERVICES FOR SECURING COMPUTER DATA AND PERSONAL AND FINANCIAL INFORMATION AND FOR THE DETECTION OF UNAUTHORIZED ACCESS TO DATA AND INFORMATION, NAMELY, DATA ENCRYPTION SERVICES, ELECTRONIC MONITORING OF PERSONALLY IDENTIFYING INFORMATION TO DETECT IDENTITY THEFT VIA THE INTERNET ALL PROVIDED VIA DISTRIBUTED LEDGER TECHNOLOGY
Aspects of a storage device including a memory and a controller are provided. The controller may determine to perform garbage collection on a superblock. During the garbage collection process, the controller will typically move the superblock into an erase pool for erasing the superblock. However, aspects of the disclosure are directed to a method of measuring a raw bit error rate (RBER) of the superblock prior to erasure. The measured RBER may be used to estimate a data retention time of the storage device and provide the customer with an early warning notification if a health metric of the storage devices reaches a threshold retention time.
The present disclosure generally relates to a dual free layer (DFL) read head and methods of forming thereof. In one embodiment, a method of forming a DFL read head comprises depositing a DFL sensor, defining a stripe height of the DFL sensor, depositing a rear bias (RB) adjacent to the DFL sensor, defining a track width of the DFL sensor and the RB, and depositing synthetic antiferromagnetic (SAF) soft bias (SB) side shields adjacent to the DFL sensor. In another embodiment, a method of forming a DFL read head comprises depositing a DFL sensor, defining a track width of the DFL sensor, depositing SAF SB side shields adjacent to the DFL sensor, defining a stripe height of the DFL sensor and the SAF SB side shield, depositing a RB adjacent to the DFL sensor and the SAF SB side shield, and defining a track width of the RB.
A Zoned Namespace data storage device configured to perform logical-to-physical (L2P) address translation using a compacted L2P having an erase-block granularity. For a host logical address, the compacted L2P table only has the physical address of the corresponding erase block, which provides a first part of the pertinent physical address. A controller of the data storage device calculates a second part of the pertinent physical address based on the superblock layout employed in the device and further based on the sequential write requirement to the superblocks. The controller then obtains the full physical address corresponding to the host logical address by combining the first and second parts. The erase-block granularity of the compacted L2P table enables the full L2P table of the device to have a relatively small size, which can beneficially be used to make more space available in the same amount of RAM for other operations.
Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method further includes generating a hash number for the at least one target image, where the hash number identifies the at least one target image, and concealing the hash number in the at least one target image, where the concealing of the hash number provides security in an authentication of the at least one target image. The method further includes generating an encrypted identification token, where the encrypted identification token includes the hash number. The method further includes associating the encrypted identification token with the user, and storing the encrypted identification token in a database for authentication of at least one target image and the user.
G06F 21/36 - User authentication by graphic or iconic representation
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electronic downloadable publications, namely, newsletters pertaining to financial services, investment services, and advice regarding companies’ climate and carbon offsetting goals. Newsletters pertaining to financial services, investment services and advice regarding companies’ climate and carbon offsetting goals. Financial analysis and advisory services related to environmental sustainability initiatives, carbon accounting, and alignment of financial investment portfolios with carbon neutral companies and industries. Scientific and technological research, surveying in the nature of preparation of scientific reports, and consultancy services relating to environmentally sustainable business practices, innovations, and carbon offsetting.
94.
Data storage device with servo control processor with initial fast lock of disk lock clock
Various illustrative aspects are directed to a data storage device, comprising one or more disks; an actuator mechanism configured to position heads proximate to a recording medium of the disks; a spindle motor configured for rotating the one or more disks; and one or more processing devices comprising a servo control processor. The servo control processor is configured to receive a spindle speed error signal indicative of an error in a rotational speed of the spindle motor. The servo control processor is further configured to output an initial frequency offset signal, wherein the initial frequency offset signal is proportional to the spindle speed error signal.
A data storage device has a controller that instructs a memory to read memory cells using a number of different read voltage levels and then selects the read voltage level that provides the best read. Instead of sending individual commands for each of the different read voltage levels, the controller sends a single command that specifies an initial read voltage level and a voltage shift, and the memory automatically increments the read voltage level by the voltage shift for each read.
Various illustrative aspects are directed to a data storage device, comprising one or more disks; an actuator mechanism configured to position one or more heads proximate to one or more disk surfaces of the one or more disks; and one or more processing devices, comprising an actuator mechanism control system configured for controlling the actuator mechanism. The one or more processing devices are configured to: output a multi-rate excitation to at least one multi-rate notch filter of the actuator mechanism control system; detect a frequency response of the actuator mechanism in response to the multi-rate excitation; and calibrate the at least one multi-rate notch filter of the actuator mechanism control system, based at least in part on the detected frequency response of the actuator mechanism.
G11B 5/596 - Disposition or mounting of heads relative to record carriers with provision for moving the head for the purpose of maintaining alignment of the head relative to the record carrier during transducing operation, e.g. to compensate for surface irregularities of the latter or for track following for track following on disks
41 - Education, entertainment, sporting and cultural services
Goods & Services
Education services, namely, consulting in the field of business and entrepreneurship; education services, namely, providing classes, seminars, workshops, and consulting in the field of business and entrepreneurship; providing a website featuring information about business and entrepreneurship
41 - Education, entertainment, sporting and cultural services
Goods & Services
Education services, namely, consulting in the field of business and entrepreneurship; education services, namely, providing classes, seminars, workshops, and consulting in the field of business and entrepreneurship; providing a website featuring information about business and entrepreneurship
41 - Education, entertainment, sporting and cultural services
Goods & Services
Education services, namely, consulting in the field of business and entrepreneurship; education services, namely, providing classes, seminars, workshops, and consulting in the field of business and entrepreneurship; providing a website featuring information about business and entrepreneurship