Patent classifications
G06F16/27
System and method for automatic persona generation using small text components
Systems and methods for automated and explainable machine learning to generate seamlessly actionable insights by generating explainable personas directly from customer relationship management systems are disclosed. The personas are defined as a collection of segments, scored by likelihood to generate good opportunities, accompanied ranked profile attribute importance, with descriptive names and summaries, associated human and database readable queries which have been generated to optimally find cluster candidates in a broader data universe. Such a system would effectively and accurately model the composition of past clients, perform the categorization in an explainable way such that actions can be taken on the information to have predictable results. What is further required are the mean to categorize small text components, trained over dependent and independent model sets, to enable a cleaner and more explicit representation of information rich short-strings, in order to facilitate a more meaningful representation of the user profiles.
Driving mode assessment
An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.
Driving mode assessment
An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.
Distributed database stored at an edge application
Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.
Distributed database stored at an edge application
Systems and methods for reducing latency in transactions are described herein. In an embodiment, an application edge acts as a system of record for an application. When a client computing device sends a request to perform a transaction to the application, the application edge receives the request and, without forwarding the request to a backend computing network, searches a transaction datastore stored at the application edge for the account balance and responds to the client computing device with the account balance. The client computing device then determines that a transaction can be performed and sends a request to perform the transaction to the application. The application edge passes this request to the backend computing network which performs the requested transaction. The application edge then uses a webhook infrastructure to update each transaction datastore stored at the application edge.
Recordation of device usage to public/private blockchains
A personal blockchain is generated as a cloud-based software service in a blockchain environment. The personal blockchain immutably archives usage of any device, perhaps as requested by a user. However, some of the usage may be authorized for public disclosure, while other usage may be designated as private and restricted from public disclosure. The public disclosure may permit public ledgering by still other blockchains, thus providing two-way public/private ledgering for improved record keeping. Private usage, though, may only be documented by the personal blockchain.
Recordation of device usage to public/private blockchains
A personal blockchain is generated as a cloud-based software service in a blockchain environment. The personal blockchain immutably archives usage of any device, perhaps as requested by a user. However, some of the usage may be authorized for public disclosure, while other usage may be designated as private and restricted from public disclosure. The public disclosure may permit public ledgering by still other blockchains, thus providing two-way public/private ledgering for improved record keeping. Private usage, though, may only be documented by the personal blockchain.
Fenced clone applications
Snapshots of storage volumes and containers of a bundled application may be created and used to rollback or clone the bundled application. Clone snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. Components of cloned applications may communicate with one another using addresses of these components in the parent application. Containers of the bundled application may communicate with an open virtual switch (OVS) that implements flows to implement translation between clone and parent addresses. Containers may be modified to execute operation-specific entrypoint functions prior to invoking an entrypoint of an application instance loaded in the containers.
Fenced clone applications
Snapshots of storage volumes and containers of a bundled application may be created and used to rollback or clone the bundled application. Clone snapshots of storage volumes may be gradually populated with data from prior snapshots to reduce loading on a primary snapshot. Components of cloned applications may communicate with one another using addresses of these components in the parent application. Containers of the bundled application may communicate with an open virtual switch (OVS) that implements flows to implement translation between clone and parent addresses. Containers may be modified to execute operation-specific entrypoint functions prior to invoking an entrypoint of an application instance loaded in the containers.
Industrial data verification using secure, distributed ledger
A verification platform may include a data connection to receive a stream of industrial asset data, including a subset of the industrial asset data, from industrial asset sensors. The verification platform may store the subset of industrial asset data into a data store, the subset of industrial asset data being marked as invalid, and record a hash value associated with a compressed representation of the subset of industrial asset data combined with metadata in a secure, distributed ledger (e.g., associated with blockchain technology). The verification platform may then receive a transaction identifier from the secure, distributed ledger and mark the subset of industrial asset data in the data store as being valid after using the transaction identifier to verify that the recorded hash value matches a hash value of an independently created version of the compressed representation of the subset of industrial asset data combined with metadata.