G06F9/451

Controlling access to cloud resources in data using cloud-enabled data tagging and a dynamic access control policy engine

Access to data and resources in a multi-tenant computing system is managed by tagging the data and resources with attributes, as well as by tagging users with attributes. Tenant-specific access policies are configured. When an access request is received from a workload, a policy decision engine processes the attributes that are tagged to the requesting workload (e.g., user, application, etc.) as well as those tagged to the requested data or resource, given a relevant tenant-specific policy. An access decision is provided in response to the access request, and the access decision can be enforced by a tenant-specific enforcement system.

Controlling access to cloud resources in data using cloud-enabled data tagging and a dynamic access control policy engine

Access to data and resources in a multi-tenant computing system is managed by tagging the data and resources with attributes, as well as by tagging users with attributes. Tenant-specific access policies are configured. When an access request is received from a workload, a policy decision engine processes the attributes that are tagged to the requesting workload (e.g., user, application, etc.) as well as those tagged to the requested data or resource, given a relevant tenant-specific policy. An access decision is provided in response to the access request, and the access decision can be enforced by a tenant-specific enforcement system.

Computing networks and systems for updating data

Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.

Computing networks and systems for updating data

Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.

Labeled knowledge graph based priming of a natural language model providing user access to programmatic functionality through natural language input

A natural language model can be primed utilizing optimized examples generated from a labeled knowledge graph corresponding to an independently developed application program. Parsing of the labeled knowledge graph can include the identification of triples, comprising a source node, a destination node, and a link between them, each of which can be labeled. One or more natural language input examples can be generated from an individual triple by concatenating the natural language words or phrases utilized to label the source node in the link. Determinations that subsequently received natural language user input is similar to the generated examples can result in an identification of the triple, which can, in turn, trigger the performance of a function associated with the destination node of the triple. Labels can include preferred labels and alternative labels, and various permutations thereof can be concatenated to generate alternative natural language input examples.

Generating higher-level semantics data for development of visual content

Techniques are described for generating HLSD for a textual format source code, which, when rendered, causes a display of visual content. The rendering of the source code generates a tree hierarchy of visual source elements, which logically is possible to map to any graph tree. In an embodiment, visual source elements of the source code are classified to higher-level semantic data (HLSD) labels based on their property(s) and/or the property(s) of neighbor visual source element(s) in the tree hierarchy (context). The HLSD labels indicate the type of HLSD widget mapped to the visual source elements. Techniques further include determining features and a layout arrangement for HLSD widgets and generating a template thereof for the visual content.

Generating higher-level semantics data for development of visual content

Techniques are described for generating HLSD for a textual format source code, which, when rendered, causes a display of visual content. The rendering of the source code generates a tree hierarchy of visual source elements, which logically is possible to map to any graph tree. In an embodiment, visual source elements of the source code are classified to higher-level semantic data (HLSD) labels based on their property(s) and/or the property(s) of neighbor visual source element(s) in the tree hierarchy (context). The HLSD labels indicate the type of HLSD widget mapped to the visual source elements. Techniques further include determining features and a layout arrangement for HLSD widgets and generating a template thereof for the visual content.

Desktop enabling of web documents

Systems and methods for interacting with a web-based document using a desktop-based application, wherein the application includes a web content renderer and is configured to appear as an application native to the operating system using the native graphical user interface for selecting a web-based document for the application to open, retrieving the contents of the document from the URL associated with the document, displaying, using the application, the contents of the retrieved document using the graphical user interface, and enabling, using the application, a user to edit the contents of the retrieved document using the graphical user interface.

Desktop enabling of web documents

Systems and methods for interacting with a web-based document using a desktop-based application, wherein the application includes a web content renderer and is configured to appear as an application native to the operating system using the native graphical user interface for selecting a web-based document for the application to open, retrieving the contents of the document from the URL associated with the document, displaying, using the application, the contents of the retrieved document using the graphical user interface, and enabling, using the application, a user to edit the contents of the retrieved document using the graphical user interface.

User-specific applications for shared devices
11579756 · 2023-02-14 · ·

Examples described herein include systems and methods for providing user-specific applications on a shared user device. The user device can receive a first instance of an application having a Package ID that includes an identification of a first user. When the first user is logged in, the user device can display an icon associated with the first instance of the application, based on the Package ID including an identification of the first user. When the first user is not logged in, the user device can hide the first instance of the application. When a second user is logged in, the device can display a second instance of the application based on the Package ID of the second instance including an identification of the second user. The user device can also display the same instance of a shared application to both the first and second user.