Patent classifications
G06Q10/107
Automated electronic mail assistant
Multiple text parts of a body of an incoming e-mail are determined. For each text part, based on natural language processing, a topic category and a feature vector representation (FVR) are determined. For two text parts comprising a common topic category, a similarity value based on their FVR is calculated, and in case the similarity value fulfills a condition, the two text parts are aggregated into one aggregated text part. For each text part: a reference document is selected based on a FVR of the text part; a recipient is obtained based on the corresponding topic category; and an e-mail comprising the text part, and each selected reference document or a pointer thereto, is sent to the obtained recipient. Via aggregation of text parts based on FVR, computational resources for document retrieval based on FVR is reduced, as well as the number of outgoing e-mails.
Messaging application supporting presentation service
A messaging system supports a presentation session with participants of the presentation, a presenter and one or more audience members. The message system allows the participants to share messages and documents via respective client/mobile devices. An application on each mobile device allows the audience member to peruse and comment on document portions (e.g., pages, images, or slides) being presented. The presentation sequence for the document portions can be managed by the presenter, or document perusal can be decoupled from the presentation sequence to allow audience members to focus on past or future document portions. Comments of the audience member or other participants can be linked to corresponding document portions. A user may repeat, reprise or continue a past presentation.
Method and apparatus for improving generation of computerized groupings
Improved technological solutions are introduced for providing a secure and effective and enhanced clustering/grouping solution that is useful, for example, in an online dating forum as well as any number of other industries. The ability to attend live events in person or remotely is coupled with presence location and automatic verification of user devices and identities. This allows secured communication between participants without having to disclose actual contact information of the participants or their device addresses. An improved algorithm that groups members/items effectively based on a variety of matching criteria, with lowered possibilities of errors and more efficient use of processing power, is now introduced.
Method and apparatus for improving generation of computerized groupings
Improved technological solutions are introduced for providing a secure and effective and enhanced clustering/grouping solution that is useful, for example, in an online dating forum as well as any number of other industries. The ability to attend live events in person or remotely is coupled with presence location and automatic verification of user devices and identities. This allows secured communication between participants without having to disclose actual contact information of the participants or their device addresses. An improved algorithm that groups members/items effectively based on a variety of matching criteria, with lowered possibilities of errors and more efficient use of processing power, is now introduced.
Inserting and/or replacing machine learning models in a pipeline for robotic process automation workflows
A reconfigurable workbench pipeline for robotic process automation (RPA) workflows is disclosed. Different workbench pipelines may be built for different users. For instance, a global workflow (e.g., a receipt extractor) may be built and used initially, but this workflow may not work optimally or at all for a certain user or a certain task. A machine learning (ML) model may be employed, potentially with a human-in-the-loop, to specialize the global workflow for a given task.
Social communities assistant
A social communities assistant system may serve as a proxy for a user when communicating with social networking communities. The user may have a single interface on, such as an application, to communicate with a plurality of social communities. As a proxy, the social communities assistant system may manage parallel communications among the social communities on behalf of the user. The social communities assistant system may manage communications of various types. These types of communication may include queries, responses, statements, event notifications, or actions, among other things.
Enterprise workspace notifications service
A notification builder implemented through a graphical user interface (“GUI”) provides a platform for building notifications and defining priorities for how the notifications will be presented to users of managed devices. Elements included in the notification builder and selectable as part of a build process can provide options for naming a notification, providing content for the notification, defining recipients, setting a respective priority, and creating action buttons. An action button can allow a user that has received a notification built with the notification builder to interact with the notification in a predetermined manner. The GUI can also provide data relating to the notification, such as success/failure, read/unread, etc.
Methods and systems for detecting phishing emails using feature extraction and machine learning
Methods and systems for detecting a phishing attack on a computer device can involve scanning one or more email messages, and separating email parts from the one or more email messages, in response to scanning the at least one email message. In addition, the email parts of the at least one email message can be subject to a feature extraction operation. The email features extracted from the email parts can be then analyzed to determine whether or not any of the email features contain suspected phishing content, confirmed phishing content and benign email content.
Methods and systems for detecting phishing emails using feature extraction and machine learning
Methods and systems for detecting a phishing attack on a computer device can involve scanning one or more email messages, and separating email parts from the one or more email messages, in response to scanning the at least one email message. In addition, the email parts of the at least one email message can be subject to a feature extraction operation. The email features extracted from the email parts can be then analyzed to determine whether or not any of the email features contain suspected phishing content, confirmed phishing content and benign email content.
System and method for labeling a therapeutic value to digital content based on meta-tags
Disclosed is a system and method for labeling digital content based on intended psycho-emotional effect on a viewer in order to provide an advisory prior to viewing comprising the steps of: uploading or stream-initiating a digital content by a viewer; selecting at least one intended psycho-emotional effect from the content based on scraped meta-data tags of the content; and overlaying a digital nutrition label to the digital content corresponding to the scraped psycho-emotional effect from the content, wherein the overlaid label displays at least one of an effect or triggered neurotransmitter associated with the effect in order to provide an advisory to the viewer prior to viewing the labeled digital content.