Dynamic deployment of access controls anchored on request actions

    公开(公告)号:US11012443B2

    公开(公告)日:2021-05-18

    申请号:US16175308

    申请日:2018-10-30

    Abstract: Techniques and structures to provide dynamic deployment of access controls in a on-demand environment. A host electronic device may comprise one or more processors coupled with the at least one physical memory device, the one or more processors configurable to receive, via a user interface, request to access one or more resources managed by the electronic device in the multi-user, on demand computing environment, the request comprising one or more request elements, determine whether a virtual access rule logic comprises one or more virtual access check rules which are anchored to the one or more request elements, and in response to a determination that the virtual access rule logic comprises one or more virtual access check rules which are anchored to the one or more request elements, apply the one or more virtual access check rules to the request. Additional subject matter may be described and claimed.

    Visualization for monitoring infrastructure entities

    公开(公告)号:US11012317B2

    公开(公告)日:2021-05-18

    申请号:US15681089

    申请日:2017-08-18

    Abstract: An infrastructure monitor receives an indication of a fault on a first host computer of a plurality of host computers, wherein each of the plurality of host computers is associated with a different subset of a plurality of queues, and wherein each of the plurality of queues are serviced by a different subset of the plurality of host computers. The monitor identifies a first subset of the plurality of queues associated with the first host computer and determines a workload present on the first subset of the plurality of queues. The monitor further generates a single visualization to provide the indication of the fault on the first host computer, the first subset of the plurality of queues impacted by the fault, and the workload present on the first subset of the plurality of queues and causes presentation of the single visualization.

    Temporary slots for storing chat data

    公开(公告)号:US11010558B2

    公开(公告)日:2021-05-18

    申请号:US15885355

    申请日:2018-01-31

    Abstract: This disclosure relates to configuration tools for interactive agents, sometimes referred to as bots, chatbots, virtual robots, or talkbots. Such interactive agents utilize slots for organizing and storing data received as inputs and displayed as outputs. These slots can be configured such that a slot is temporary and does not persist beyond its source dialog. Slots can also be configured such that a slot is pre-populated with information contain in incoming passed parameters.

    Systems and methods for secure data transfer between entities in a multi-user on-demand computing environment

    公开(公告)号:US11010272B2

    公开(公告)日:2021-05-18

    申请号:US16177337

    申请日:2018-10-31

    Abstract: Techniques and structures to provide secure data transfer between entities in a multi-user on-demand computing environment. An electronic device may comprise at least one physical memory device, one or more processors coupled with the at least one physical memory device, the one or more processors configurable to create a scratch destination organization within the computing environment, receive, via a user interface, a metadata selection comprising a plurality of metadata resources, extract the plurality of metadata resources from an origin organization within the computing environment into a metadata bundle, and deploy the metadata bundle in the scratch organization. Additional subject matter may be described and claimed.

    Multi-Task Knowledge Distillation for Language Model

    公开(公告)号:US20210142164A1

    公开(公告)日:2021-05-13

    申请号:US16716249

    申请日:2019-12-16

    Abstract: Systems and methods are provided that employ knowledge distillation under a multi-task learning setting. In some embodiments, the systems and methods are implemented with a larger teacher model and a smaller student model, each of which comprise one or more shared layers and a plurality of task layers for performing multiple tasks. During training of the teacher model, its shared layers are initialized, and then the teacher model is multi-task refined. The teacher model predicts teacher logits. During training of the student model, its shared layers are initialized. Knowledge distillation is employed to transfer knowledge from the teacher model to the student model by the student model updating its shared layers and task layers, for example, according to the teacher logits of the teacher model. Other features are also provided.

    Image-Based Detection of Errors in Application State

    公开(公告)号:US20210141684A1

    公开(公告)日:2021-05-13

    申请号:US16682954

    申请日:2019-11-13

    Abstract: Systems and methods are disclosed herein for using screen shots of an application to evaluate whether the application is in a fault state. In an embodiment, a processor captures screen shots of a screen of an application during operation of the application. The processor applies a classifier to the captured screen shots, and determines, from output of the classifier, a state of the application. The processor evaluates whether the determined state is a fault state of the application. Responsive to determining that the determined state is a fault state of the application, the processor prompts a user with an alert indicating the fault state and a corresponding point during the operation that exhibited the fault state.

    Feature-agnostic behavior profile based anomaly detection

    公开(公告)号:US11005864B2

    公开(公告)日:2021-05-11

    申请号:US15600562

    申请日:2017-05-19

    Abstract: Techniques for user behavior anomaly detection. At least one low-variance characteristic is compared to an expected result for the corresponding low-variance characteristics to determine if the low-variance characteristic(s) is/are within a pre-selected range of the expected results. A security response action is taken in response to the low-variance characteristic not being within the first pre-selected range of the expected results. At least one high-variance characteristic is compared to an expected result for the corresponding high-variance characteristics to determine if the high-variance characteristic(s) is/are within a pre-selected range of the expected results. A security response action is taken in response to the high-variance characteristic not being within the first pre-selected range of the expected results. Access is provided if the low-variance and the high-variance characteristics are within the respective expected ranges.

Patent Agency Ranking