1552 patents
Page 7 of 78
Utility
Index suggestion engine for relational databases
27 Jun 23
Creating and executing flow plans by performing at least the following: obtaining a run-time flow plan that comprises a trigger, a first operation, and a second operation, wherein the first operation precedes the second operation within the run-time flow plan and one or more input values of the second operation are linked to the first operation, determining whether one or more conditions of the trigger are met, execute the first operation based at least on the determination that the one or more conditions of the trigger are met, monitoring whether the second operation is ready for execution based at least on a determination that the one or more input values of a second action operation are ready, and executing the second action operation when the second action operation has been identified as ready for execution.
Gurnish Anand
Filed: 12 Mar 21
Utility
Intermediate widget cache
27 Jun 23
A request is received from a client for data to render a modular contained widget component of an application user interface.
Yuvaraj Chandrasekaran, Bryce D. Gelinas, Ayman Amoodi, Sai Divya Panditi, Rajeshbabu Ramasamy
Filed: 15 Oct 21
Utility
Machine learning classification with model quality prediction
30 May 23
An embodiment may include a machine learning based classifier that maps input observations into respective categories and a database containing a corpus of training data for the classifier.
Baskar Jayaraman
Filed: 9 Aug 18
Utility
Dynamic discovery of executing applications
30 May 23
A computing system may include a proxy server application and a database.
Noam Biran, Amit Dhuleshia, Sreenevas Subramaniam
Filed: 29 Mar 21
Utility
Phishing Attempt Search Interface
25 May 23
Systems, methods, and media are used to identify phishing attacks.
Deepakeswaran Sundaragopal Kolingivadi, Amil Sharma, Santosh Reddy Poreddy, Sachin Shivarama Nayak
Filed: 9 Jan 23
Utility
Clustering and Dynamic Re-clustering of Similar Textual Documents
18 May 23
A computer-implemented method includes obtaining a plurality of textual records divided into clusters and a residual set of the textual records, where a machine learning (ML) clustering model has divided the plurality of textual records into the clusters based on a similarity metric.
Baskar Jayaraman, ChitraBharathi Ganapathy, Dinesh Kumar Kishorkumar Surapaneni, Tao Fang, Jun Wang
Filed: 17 Jan 23
Utility
Systems and Methods for Third-party Library Management
18 May 23
In accordance with the present approach, a library management system identifies third-party libraries that developers request to incorporate into a software release.
Vinaykumar Polisetty, Gnanaganesh Dhanavel, Sravan Srungarapu, Rajesh Sao
Filed: 18 Jan 23
Utility
Enabling Third-party Content Overlay
18 May 23
A graphical interface is provided by a second-party service provider for specifying parameters for content of a third-party configured for a first-party, wherein the first-party, the second-party service provider, and the third-party are different parties.
Aditya Marla, Sarup Paul, Mayank Agrawal
Filed: 17 Nov 21
Utility
Determining semantic content of textual clusters
16 May 23
The embodiments herein provide a framework for and specific implementations of machine learning (ML) analysis of incident, online chat, knowledgebase, skills, and perhaps other types of databases.
Baskar Jayaraman
Filed: 11 Dec 19
Utility
Embedded dynamic user interface item segments
16 May 23
An indication to view a selected record of a workflow is received.
Maor Cohen, Alexander Fedayev, Eliran Zvi
Filed: 7 Jul 21
Utility
Quarantine for cloud-based services
16 May 23
A quarantine system could be disposed between an outer firewall and an inner firewall.
Antony Chan
Filed: 7 Dec 20
Utility
Improved Localization Procedures and Prioritization for Applications
11 May 23
A system includes a database containing database tables.
Jebakumar Mathuram Swvigaradoss, Ankit Goel, Srikar Bakka, Ankit Chauhan
Filed: 4 Mar 21
Utility
Data Augmentation for Intent Classification
11 May 23
The present disclosure relates to a data augmentation system and method that uses a large pre-trained encoder language model to generate new, useful intent samples from existing intent samples without fine-tuning.
Dzmitry Bahdanau
Filed: 1 Nov 22
Utility
Low-Code and No-Code Customization User Interface Components
11 May 23
Persistent storage may contain a plurality of user interface (UI) component definitions.
Patrick Scott Wilson, Kapeel Sharadrao Sable, Christopher Paul David Johnson, Bojan Beran, Carl David Solis, Benjamin Kresky, Bhupal Tiduwar Lambodhar, Kevin Marren, Anthony Raymond Bullard
Filed: 8 Nov 21
Utility
Root Cause Analysis Based on Process Optimization Data
11 May 23
A system for root cause analysis based on process optimization data is provided.
Fabio Casati, Hans Jochen Gerhard Pohle, Sai Harini Chettla, Manjeet Singh, Siddhant Sinha
Filed: 8 Nov 21
Utility
Discovery of database and related services
9 May 23
A computing system includes a database and a discovery application.
Tom Bar Oz, Noam Biran, Hail Tal, Aviya Aron, Robert Bitterfeld, Boris Erblat, Bary Solomon
Filed: 27 Oct 20
Utility
Dynamic agent management for multiple queues
9 May 23
An example system for dynamic agent management involving multiple queues is presented.
Victor Chung-Wai Chan, Scott Michael Rhodes, Prithvi Yoganand
Filed: 21 Jan 21
Utility
Method and system for generating a vector representation of an image
9 May 23
There is described a computer-implemented method for generating a vector representation of an image, the computer-implemented method comprising: receiving a given image and semantic information about the given image; generating a first vector representation of the given image using an image embedding method; generating a second vector representation of the semantic information using a word embedding method; combining the first vector representation of the image to be embedded and the second vector representation of the semantic information together, thereby obtaining a modified vector representation for the image to be embedded; and outputting the modified vector representation.
Pedro Oliveira Pinheiro, Chen Xing, Negar Rostamzadeh
Filed: 17 Jan 20
Utility
Database key management
9 May 23
An indication that a secure connection has been established with a key management service is received.
Ashton Mozano
Filed: 4 Jun 21
Utility
Reduced Memory Utilization for Data Analytics Procedures
4 May 23
An example embodiment may involve a main database; a main memory; and one or more processors configured to: retrieve, by a data collector application, records from the main database, wherein the data collector application includes an embedded database; aggregate, by the data collector application, values in the records relating to a key performance indicator (KPI) to form partial KPI data stored in one or more blocks of the main memory; determine, by the data collector application, that utilization of the main memory exceeds a pre-defined threshold; in response to the utilization of the main memory exceeding the pre-defined threshold, write, by the data collector application, the partial KPI data to a row of the embedded database; and release, by the data collector application, the one or more blocks of the main memory used to store the partial KPI data.
Vignesh Salem Ramamurthy, Gayatri Kamarajugadda, Lav Jaitak, Vamshi Sandhireddy, Kyle Barron-Kraus, . Aiswarya, Radhika Khandelwal, Rahul Borkar, Abhijith Nagarajan, Benedetto Fiorelli, Aravind Racharla
Filed: 28 Oct 21