G06F16/8373

Resource management service

A resource management service implements techniques for provisioning a process with computing resources sufficient to process a query. A query is received and computing system resources sufficient to process the query are provisioned. A response to the query is generated by running the process with the provisioned computing system resources.

Searchable table extraction

Method includes generating a base model by training a pretrained model using a base training dataset including first training datapoints identifying tables in historical document images that include the tables and text, where the generated base model is configured to extract the tables as objects; and generating a table extraction model by training the base model using an enhanced training dataset including second training datapoints that are different from the first training datapoints and identify a plurality of cells disposed in each of the tables in a row direction and a column direction. The table extraction model is trained to output content of the tables and table information in an XML format, the table information including cell level information of the plurality of cells that is searchable via a query configured to provide target content that corresponds to one or more cells.

MICROSERVICES DATA AGGREGATION SEARCH ENGINE UPDATING

A method to update data of a data view. The data is distributed in multiple microservice databases and aggregated in a data aggregation search engine index. A user makes a request to update data of the data view. In response to the update request, an immediate data update operation is performed to update the data in one or more of the multiple microservice databases. A change queue is used to update the aggregated data in the data aggregation search engine index.

MANAGING DATA OBJECTS FOR GRAPH-BASED DATA STRUCTURES

Various embodiments provide methods, systems, apparatus, computer program products, and/or the like for managing, ingesting, monitoring, updating, and/or extracting/retrieving information/data associated with an electronic record (ER) stored in an ER data store and/or accessing information/data from the ER data store, wherein the ERs are generated, updated/modified, and/or accessed via a graph-based domain ontology.

Efficient storage and utilization of a hierarchical data set
11036797 · 2021-06-15 · ·

First data of a hierarchical data structure is accessed. A directed graph is generated based on the first data. Generating the directed graph includes creating multiple nodes representing the first data and linking first nodes representing data at a particular level of the hierarchical data structure to second nodes representing data at a lower level of the hierarchical data structure. A query requesting information from the hierarchical data structure is received. A particular node, that is a starting point for searching the directed graph based on the query, is identified within the directed graph. Out-links, that link the particular node to other nodes of the directed graph, are identified. Each of the other nodes, that is connected to the particular node by the out-links, is inspected to determine which of the other nodes represents responsive data matching the query. The query is responded with the responsive data.

Systems and methods for unified hierarchical cybersecurity

Disclosed herein are embodiments of systems, methods, and products comprise an analytic server, which improves the cybersecurity of a unified system comprising a plurality of sub-systems. The analytic server may instantiate a sub attack tree for each network sub-system within the unified system of distributed network infrastructure. The analytic server may access the sub attack trees of the network sub-systems based on the corresponding identifiers. The analytic server may build a high-level attack tree of the unified system by aggregating the sub attack tree of each sub-system. The analytic server may determine how the interconnection of the plurality of network sub-systems may affect the unified system security. The analytic server may update one or more nodes of the attack tree to reflect the changes produced from the interconnection. The analytic server may build the attack tree based on a set of aggregation rules.

Dimension-Specific Dynamic Text Interface For Data Analytics
20210173861 · 2021-06-10 ·

Embodiments relate to a dynamic text provider that generates and communicates a text object to a text consumer (e.g., a table with a text header, a chart having text axis labels and/or title). An engine is positioned between a dynamic text service, and an underlying data set organized according to a model with hierarchical elements (e.g., measures, dimensions, pages). The engine receives an input from the text consumer. The input includes at least a first identifier of the text consumer, a second identifier of the data set, and a third identifier of a specific element (e.g., dimension) of the model. The engine references the model to create a context. Based upon that context, the engine queries the data set to generate a dynamic text object including a list of values (LOV) for the dimension. The dynamic text object including the LOV is communicated to the text consumer.

Methods and systems for data retrieval using an XML configuration file

Some embodiments are directed to a method for exchanging data between a user and a first data source, the method including configuring a non-transitory computer readable medium to retrieve and display a first set of data from the first data source via a first data source query in accordance with connection information, a set of display options and data retrieval filters specified in a user-defined XML configuration file. The non-transitory computer readable medium further applies the user-defined XML configuration file to a second data source query to display a second set of data from a second data source in accordance with the set of display options specified for the first data source in the user-defined XML configuration file.

System and methods for retrieving data using a database configuration file

Some embodiments are directed to a method for exchanging data between a user and one or more data sources, the method including configuring a non-transitory computer readable medium to access data from the one or more data sources via a data source query in accordance with options specified in first and second XML configuration files. The non-transitory computer readable medium further retrieves the data in a predefined format at a database and displays the data in accordance with display options specified in the first and the second XML configuration files.

DISTINCT VALUE ESTIMATION FOR QUERY PLANNING
20210149904 · 2021-05-20 ·

The problem of distinct value estimation has many applications, but is particularly important in the field of database technology where such information is utilized by query planners to generate and optimize query plans. Introduced is a novel technique for estimating the number of distinct values in a given dataset without scanning all of the values in the dataset. In an example embodiment, the introduced technique includes gathering multiple intermediate probabilistic estimates based on varying samples of the dataset, 2) plotting the multiple intermediate probabilistic estimates against indications of sample size, 3) fitting a function to the plotted data points, and 4) determining an overall distinct value estimate by extrapolating the objective function to an estimated or known total number of values in the dataset.