-
公开(公告)号:US10565493B2
公开(公告)日:2020-02-18
申请号:US15421016
申请日:2017-01-31
Applicant: salesforce.com, inc.
Inventor: Stephen Joseph Merity , Caiming Xiong , James Bradbury , Richard Socher
Abstract: The technology disclosed provides a so-called “pointer sentinel mixture architecture” for neural network sequence models that has the ability to either reproduce a token from a recent context or produce a token from a predefined vocabulary. In one implementation, a pointer sentinel-LSTM architecture achieves state of the art language modeling performance of 70.9 perplexity on the Penn Treebank dataset, while using far fewer parameters than a standard softmax LSTM.
-
公开(公告)号:US10565217B2
公开(公告)日:2020-02-18
申请号:US15860552
申请日:2018-01-02
Applicant: salesforce.com, inc.
Inventor: Joel Palmert , Xiao Meng
IPC: G06F16/22 , G06F16/2457 , G06F16/248 , G06F16/9535
Abstract: Disclosed are methods, apparatus, systems, and computer-readable storage media for recommending an event to a user. In some implementations, one or more servers receive information identifying a plurality of events. The one or more servers store data of the plurality of events in a first one or more data tables having an action field, an intent field, and a user field, and analyze the data of the first one or more data tables to generate one or more pairs, each pair including information identifying a set of events and a target event. The one or more servers may calculate a similarity score for each of the one or more pairs and store the respective similarity score in a second one or more data tables having a set field, a target event field, and a similarity score field.
-
公开(公告)号:US10560332B2
公开(公告)日:2020-02-11
申请号:US16273150
申请日:2019-02-12
Applicant: salesforce.com, inc.
Inventor: Shauli Gal , Satish Raghunath , Kartikeya Chandrayana , Tejaswini Ganapathi
Abstract: An adaptive multi-phase approach to estimating network parameters is presented. By gathering and aggregating raw network traffic data and comparing against default network parameters, a training data set may be generated. A black box optimization may be used in tandem with a supervised learning algorithm to bias towards better choices and eventually pick network parameters which optimize performance. Data delivery strategies are applied to deliver content using the optimized network policies based on the estimated parameters.
-
公开(公告)号:US10558634B2
公开(公告)日:2020-02-11
申请号:US15257216
申请日:2016-09-06
Applicant: salesforce.com, inc.
Inventor: Matthew Fuchs
Abstract: A system receives an association of first item with first system user, generates first hash value by applying first hash function associated with first system user to first item identifier associated with first item, and sets a bit corresponding to first hash value in array. The system receives an association of second item with second system user, generates second hash value by applying second hash function associated with second user to second item identifier associated with second item, and sets a bit corresponding to second hash value in array. The system receives a request to determine whether third item is associated with first system user, generates third hash value by applying first hash function to third item identifier associated with third item, and outputs message that third item is not associated with first user if a bit corresponding to third hash value is not set in array.
-
公开(公告)号:US20200045086A1
公开(公告)日:2020-02-06
申请号:US16599503
申请日:2019-10-11
Applicant: salesforce.com, inc.
Inventor: Saptarshi Roy , Ryan Lamore , Ankush Gulati , Navya Sruti Sirugudi
Abstract: Some database systems may implement encryption services to improve the security of data stored in databases or on disks. The systems may implement encryption using multiple encryption keys. For example, a worker server may implement a system call interceptor, such as a filesystem in userspace (Fuse) driver. The system call interceptor may intercept system calls (e.g., associated with query or extract, transform, and load (ETL) jobs) as they enter or exit the kernel. The system call interceptor may determine whether data sets associated with the jobs are marked for encryption, and may perform an encryption process on the data sets. A worker may encrypt and store data sets on a worker disk or at a file store, or may retrieve and decrypt the data sets. The system may additionally manage encryption keys, and may provide mechanisms for archiving or revoking encryption keys while maintaining user access to stored data sets.
-
736.
公开(公告)号:US20200042724A1
公开(公告)日:2020-02-06
申请号:US16050671
申请日:2018-07-31
Applicant: salesforce.com, inc.
Inventor: Florian Bastianelli , Pascal Mercier , Sameer Singhvi
Abstract: Techniques and structures to provide secure data transfer between entities in a multi-user on-demand computing environment. An electronic device may comprise at least one physical memory device, one or more processors coupled with the at least one physical memory device, the one or more processors configurable to create a scratch organization within the computing environment, receive, via a user interface, a metadata selection comprising a plurality of metadata resources which define a set of components for a service implemented in an origin organization of the multi-user, on demand computing environment, extract the plurality of metadata resources from the origin organization within the computing environment into a metadata bundle, and deploy the metadata bundle in the scratch organization. Additional subject matter may be described and claimed.
-
737.
公开(公告)号:US20200042330A1
公开(公告)日:2020-02-06
申请号:US16051419
申请日:2018-07-31
Applicant: salesforce.com, inc.
Inventor: Nathan Edward Lipke , Samuel William Bailey , James Johnson , Hugh Cockburn
Abstract: Systems, methods, and apparatuses for implementing dynamic creation of an external code segment within a cloud based computing environment. For instance, an exemplary system having at least a processor and a memory therein includes means for executing object code comprising software instructions that when executed create an instance of an external segment of software instructions that is to perform business logic, wherein a name of the external segment of software instructions is to be first received during runtime of the object code.
-
738.
公开(公告)号:US20200036674A1
公开(公告)日:2020-01-30
申请号:US16441414
申请日:2019-06-14
Applicant: salesforce.com, inc.
Inventor: Eugene Lee Lew
Abstract: A system and method and enables using a mobile number in conjunction with a non-telephony internet connected device. The system also facilitates SMS communication with Internet of Things devices and SMS communication in conjunction with over-the-top (OTT) services.
-
公开(公告)号:US20200034493A1
公开(公告)日:2020-01-30
申请号:US16049559
申请日:2018-07-30
Applicant: salesforce.com, inc.
Inventor: Guillaume Jean Mathieu Kempf , Marc Brette
Abstract: For a database accessible by a plurality of separate organizations, a system is provided for predicting entities for database query results. The system includes a multi-layer neural network. The system is configured to receive a query encoding for one or more previous queries made into the database, a user entity view frequency encoding for a frequency of views by one or more users, and an organization encoding for one or more separate organizations accessing the database; and based on the query encoding, the user entity view frequency encoding, and the organization encoding, generate a neural model for predicting entities for results to a present query into the database. In some embodiments, the neural model is global across the separate organizations accessing the database.
-
公开(公告)号:US20200019898A1
公开(公告)日:2020-01-16
申请号:US16035460
申请日:2018-07-13
Applicant: salesforce.com, inc.
Inventor: Daniel Thomas Harrison
Abstract: Techniques are disclosed relating to evaluating nodes of a process. A computer system may receive instance data that relates to an instance of a multi-step process and is written by a set of the plurality of nodes that performed the instance according to a particular ordering. The computer system may process the instance data to produce path data that corresponds to a path indicative of the particular ordering. The computer system may further receive feedback data indicative of an outcome of the instance. The computer system may process the path data and the feedback data to update a model that indicates confidence scores for the plurality of nodes. The computer system may determine, using confidence scores indicated by the model, that one or more of the set of nodes do not satisfy a quality threshold.
-
-
-
-
-
-
-
-
-