Patent classifications
G06F15/16
Systems and methods for initiating actions based on multi-user call detection
A group-based communication platform is configured to detect one or more recurring calls performed via a calling system, such as an external calling platform, and to perform one or more follow-up actions upon detecting a recurring call. The group-based communication platform receives call data for one or more calls, such as previously completed calls or future scheduled calls. The group-based communication platform is further configured to identify user profiles associated with one or more calls, to thereby identify user profiles associated with one or more recurring calls. Thus, the one or more follow-up actions executed by the group-based communication platform for a recurring call is associated with one or more user profiles that are correlated with a recurring call.
Extraction of semantic relation
A computer-implemented method for extracting semantic relations is disclosed. In the method, a plurality of hierarchal structures that originates from a corpus of documents is obtained. Each hierarchal structure includes a plurality of elements having respective recitations included in a corresponding document. In the method, for each predetermined relationship between ancestor and descendant elements in the hierarchal structures, a first keyword list is extracted from the ancestor element and a second keyword list is extracted from the descendant element. A statistical index is calculated for each pair of first and second keywords using the first keyword lists and the second keyword lists. The index indicates a strength of association between the first and second keywords. In the method, a candidate list of keyword pairs having semantic relationships is output using the statistical index calculated for each pair.
Real-time archiving method and system based on hybrid cloud
Provided are a data archiving method and apparatus capable of providing a remote near-line data archiving function by receiving remote function invoking from a target system in which data is stored, providing the target system with a first function for archiving, in a storage system, at least some of the data stored in the target system over a network in response to the remote function invoking, and providing the target system with a second function for the query of the data archived in the storage system over the network.
Systems and methods for secure peer-to-peer caching
Embodiments described include systems and methods for providing peer-to-peer caching among client applications. A cache coordinator is configured to receive a first request to register an object stored in a cache by a first client application including a first embedded browser. The first embedded browser obtains the object via a session established by the first embedded browser with a first network application on a server of a second entity. The cache coordinator is configured to store a location of the first client application and a hash of the object. The cache coordinator is configured to receive a second request from a second client application. The second request requests the location of the object among peer client applications. The cache coordinator is configured to communicate identification of the location of the first client application to the second client application for retrieving the object from the cache of the first client application.
Monitoring and managing of complex multi-role applications
A bundled application includes a plurality of entities such as logical storage volumes, application instances, pods, clusters, and computing nodes that are dependent on one another. Dependencies of the bundled application on individual entities is determined and quantified. Impact of failure of an entity may be determined using the dependencies. Dependency may be determined with reference to redundancy among entities. Usage of an entity by other entities and potential redistribution may be determined.
System, control method, and storage medium
The client makes an authorization start request by designating a resource identifier. An authorization server receiving the authorization start request inquires a resource sever of a resource owner of the designated resource identifier. After resolving the resource owner, the authorization server makes an authorization confirmation request to a user terminal corresponding to the resolved user identifier.
MAC mobility for 802.1x addresses for virtual machines
A system and method for provisionally authenticating a host moving from one router to another router in a network using border gateway protocol (BGP) is disclosed. A host is initially authenticated at a first BGP router, this discovery is advertised to a second BGP router pursuant to BGP with a new extended community indicating successful authentication (or pre-authentication) of the host at the first BGP router. An indication for re-authentication of the host at the second BGP router is then received, which blocks network traffic from the host to the second BGP router. Due to the notification of a previous authentication of the host, the second BGP router begins a provisional authentication session. In response to a successful completion of the provisional authentication session, the host is authorized to transmit network traffic on the second BGP router and subsequently blocked from doing the same at the first BGP router.
Distributed quantum computing systems
It is determined that a first quantum process is to be initiated and will utilize a first quantity of qubits. Quantum computing system (QCS) metadata is accessed that identifies a plurality of QCSs and, for each respective QCS in the plurality of QCSs, a plurality of qubits implemented by the respective QCS. Based on the QCS metadata, a set of QCSs from the plurality of QCSs is selected to form a first distributed QCS. A set of qubits implemented by the QCSs in the set of QCSs is selected. Distributed QCS information is sent to each QCS in the set of QCSs, the distributed QCS information identifying one QCS in the set of QCSs as a primary QCS.
Packet forwarding control protocol (PFCP) message service using a remote procedure call (RPC) based protocol suitable for PFCP connection sharing
A computing device may be configured to provide a shared N4 termination function for a plurality of Session Management Function (SMF) instances of an SMF Set and interface with one or more User Plane Function (UPF) instances. To achieve this, the computing device may operate a server configured with a Remote Procedure Call (RPC)-based protocol (e.g. gRPC Remote Procedure Call or “gRPC”) for a Packet Forwarding Control Protocol (PFCP) message service for serving a plurality of client stubs respectively situated at the plurality of SMF instances. The server may perform processing associated with each client stub by receiving an RPC-based protocol message which indicates a request, unpacking the RPC-based protocol message for obtaining PFCP message request data, and operating or interfacing with a PFCP message handling client for sending a PFCP message having the PFCP message request data to an indicated one of the UPF instances.
Using a quantum processor unit to preprocess data
In a general aspect, input data for a computer process are preprocessed by a preprocessor unit that includes a quantum processor. In some aspects, a preprocessor unit obtains input data for a computer process that is configured to run on a computer processing unit. Randomized parameter values are computed for variable parameters of a quantum logic circuit based on the input data. A classical processor in the preprocessor unit computes the randomized parameter values from the input data and a set of random numbers. A quantum processor in the preprocessor unit produces quantum processor output data by executing the quantum logic circuit having the randomized parameter values assigned to the variable parameters. Preprocessed data generated based on the quantum processor output data are then provided as the input for the computer process configured to run on the computer processing unit.