G06F16/00

Longevity management of social network data

In an approach to longevity management of social network data, a computer detects a posting of a social artifact by a first user of a social network. A computer stores the social artifact with associated identification information. A computer stores activity associated with the social artifact by one or more other users. A computer detects a status change in an account associated with the first user, wherein the status change indicates the first user is not active in the social network. In response to detecting the status change, a computer determines a second user from the one or more other users to which to transfer the social artifact based on the social artifact, the associated identification information, and the activity associated with the social artifact by the one or more other users. A computer transfers the social artifact to an account associated with the second user on the social network.

Phrase indexing

Intent-resolution using a phrase index may include obtaining data expressing a usage intent, the data expressing the usage intent including an unresolved data portion, identifying a phrase fragment based on the data expressing the usage intent and a defined phrase pattern, the phrase fragment including the unresolved data portion, identifying, by a processor, an indexed phrase as a candidate phrase by searching a phrase index based on the phrase fragment, wherein the candidate phrase at least partially matches the phrase fragment in accordance with the defined phrase pattern, and outputting the candidate phrase for presentation to a user as a candidate for resolving the unresolved portion.

Information processing apparatus and non-transitory computer readable medium storing information processing program

An information processing apparatus includes an access controller that performs control for enabling a content to be accessed on a second terminal in a case where an icon storing the content is presented and the content is opened in a first terminal.

Cross-language search
11556530 · 2023-01-17 ·

In accordance with one disclosed method, a computing system may receive, via a first version of an application presenting an interface in a first language, a first query entered in a second language different from the first language. The computing system may search resources accessible to a second version of the application to identify at least a first resource corresponding to the first query, the second version of the application being in the second language. Based at least in part on a result of the searching, an indication of the first resource may be returned to the interface.

Triggering backups of objects based on relevance of categories of changes thereof

A solution is proposed for controlling backups of objects in an information technology system. A corresponding method comprises determining change categories of changes of the objects being changed since a previous backup thereof; backups of the changed objects are triggered according to corresponding trigger indicators based on change categories of their changes and on relevance weights thereof.

Triggering backups of objects based on relevance of categories of changes thereof

A solution is proposed for controlling backups of objects in an information technology system. A corresponding method comprises determining change categories of changes of the objects being changed since a previous backup thereof; backups of the changed objects are triggered according to corresponding trigger indicators based on change categories of their changes and on relevance weights thereof.

Machine learning system for automated attribute name mapping between source data models and destination data models

A computer-implemented method of mapping attribute names of a source data model to a destination data model includes obtaining multiple source attribute names from the source data model, and obtaining multiple destination attribute names from the destination data model. The destination data model includes multiple attributes that correspond to attributes in the source data model having different attribute names. The method includes processing the obtained source attribute names and the obtained destination attribute names to standardize the attribute names according to specified character formatting, supplying the standardized attribute names to a machine learning network model to predict a mapping of each source attribute name to a corresponding one of the destination attribute names, and outputting, according to mapping results of the machine learning network model, an attribute mapping table indicating the predicted destination attribute name corresponding to each source attribute name.

ESTIMATION APPARATUS, ESTIMATION METHOD AND PROGRAM
20230008765 · 2023-01-12 ·

An estimation device includes: a collection section configured to collect related information when cyber threat intelligence of a maliciousness estimation target is input, the related information being related to the cyber threat intelligence and other cyber threat intelligence different from the cyber threat intelligence; a feature generation section configured to generate a feature based on the related information, the feature representing a feature of the cyber threat intelligence; a graph information generation section configured to generate graph information based on the related information and the other cyber threat intelligence, the graph information indicating a graph in which each of the cyber threat intelligence and the other cyber threat intelligence is a node and a relationship between the nodes is an edge; and an estimation section configured to estimate the maliciousness of the cyber threat intelligence by a graph convolutional neural network using the feature of the cyber threat intelligence when a graph indicated by the graph information has a graph structure between the cyber threat intelligence and the other cyber threat intelligence.

Variable replication levels for an object of a snapshot of a block storage volume
11550816 · 2023-01-10 · ·

Systems and methods are provided to manage a replication service of a block storage volume to increase dependability and/or decrease data loss. Each snapshot of a block storage volume can include a point-in-time representation of the volume. Each snapshot may include multiple objects that correspond to one or more blocks of the volume. One or more objects of a snapshot may reference a parent snapshot instead of a block of the volume. Each object of a snapshot may be replicated a number of times based on the number of references by other snapshots. The number of replicas may be based on the number of snapshots referencing the object or the number of unique clients referencing the object. The replication service can manage the replicas of the object and increase or decrease the number of replicas as needed.

Time-based partitioning to avoid in-place updates for data set copies

Time-based partitioning of a data set is applied to capture updates to the data set in a copy of the data set. Items that have been updated in a data set with in a time period are identified. Partitions of the data set that include the updated items are created according to a partitioning scheme. The created partitions are grouped in a storage location for the time period in a file structure that stores a copy of the database. A latest version of the copy of the data set may be accessed according to latest partitions of the data set stored in the different locations of the file structure.