G06F16/24562

METHODS AND APPARATUS FOR ELECTRONICALLY DETERMINING ITEMS TO ADVERTISE

This application relates to apparatus and methods for automatically determining items to advertise, such as on a website, based on user search queries. In some examples, a computing device trains a machine learning process with user session data that identifies user search queries and related search context. The computing device may execute the trained machine learning process to determine one or more predicted items for each of a plurality of search queries. The predicted items may be stored in a database. The computing device may receive a request for recommended items to advertise in connection with a current user query. In response, the computing device determines items for the current user query based on the predicted items stored in the database. In some examples, the computing device determines additional items based on search queries similar to the current search query. Advertisements for the items may then be displayed.

TECHNIQUES FOR SUPERVISING COMMUNICATIONS FROM MULTIPLE COMMUNICATION MODALITIES
20210160208 · 2021-05-27 ·

A computing device can receive communications sent using one or more communication modalities. The communications can be determined to be a single interaction. A communication object can be generated for the single interaction with a structure being consistent across different communication modalities. A policy can be identified that defines which communication objects to review. The communications can be reviewed along with one or more additional communications similar to the communication object.

Method a source storage device to send a source file and a clone file of the source file to a backup storage device, a source storage device and a backup storage device

A method for a source storage device to send a source file and a clone file of the source file to a backup storage device. The source storage device sends a data block to the backup storage device to be stored as a target file. Then, the source storage device determines that the source file is associated with the clone file by searching a cloning recorder with a source file ID of the source file. Based upon the determining, the source storage device sends a clone creating request including the source file ID to the backup storage device to instruct the backup storage device to create a clone file of the target file. Thus, the method is capable of replicating the clone file of the file without sending a large number of mapping data.

INDIRECT BLOCK CONTAINING REFERENCES TO BLOCKS OF A PERSISTENT FINGERPRINT INDEX

In some examples, a system performs data deduplication using a deduplication fingerprint index in a hash data structure comprising a plurality of blocks, wherein the hash data structure is stored in persistent storage, and a block of the plurality of blocks comprises fingerprints computed based on content of respective data units. The system uses an indirect block in a memory to access a given block of the plurality of blocks in the hash data structure, the indirect block containing references to blocks of the hash data structure containing the deduplication fingerprint index, and the references indicating storage locations of the plurality of blocks in the persistent storage.

Media Sharing Across Service Providers
20210089567 · 2021-03-25 ·

Embodiments including methods and apparatus to share file and file recommendations are disclosed. Data is received indicating a particular media item from a first service provider, where the particular media item is accessible from the first service provider according to a first pointer. A second pointer is identified in a database according to which the particular media item is accessible from a second service provider. Data indicating the second pointer is transmitted to a media playback system, via at least one of a WAN or a LAN.

Management of unique identifiers in a database

Systems, methods, and computer program products for associating a unique identifier with an object. The system may include a database with a memory unit, an index unit, and a control pointer unit, at least one identifier management unit, and at least one update unit. A finite set of identifiers is organized in pages, and each page includes a bitmap representing the availability of the identifiers. The pointers to data in the index include a pointer to a last page loaded by an identifier management unit, and a pointer to a last page updated by an update unit.

VIRTUAL DATABASE TABLES WITH UPDATABLE LOGICAL TABLE POINTERS

Techniques and solutions are described for implementing virtual table schemas. A virtual table schema includes a logical pointer that is used to target a table that includes data and is defined according to the virtual table schema. Values assigned to the logical pointer can be used to target tables at different locations, such as in-memory storage or in dynamic storage of a database management system. The dynamic storage includes an in-memory buffer cache and persistent storage. The logical pointer can be updated to point to the in-memory storage or the dynamic storage, including based on use statistics. Similarly, a table having data for the virtual table can be transitioned between the in-memory buffer cache and the persistent storage, including based on use statistics for the virtual table. A value for the logical pointer can be updated when the table is transferred between the in-memory buffer cache and the dynamic storage.

Strongly-consistent secondary index for a distributed data set

A secondary index may be implemented for a distributed data set that is strongly consistent. Updates to a distributed data set that add or remove items from the distributed data set may be reflected in the secondary index as part of performing the update. Pointers to items to be added to a distributed data set may be included in the secondary index as part of processing an insertion request for the new items. Pointers to items removed from a distributed data set may be removed from the secondary index as part of processing a deletion request. Changes to the secondary index may be performed so that the secondary index does not fail to identify items that are present in the distributed data set.

SYSTEMS AND METHODS FOR FUZZY SEARCH WITHOUT FULL TEXT
20210042305 · 2021-02-11 ·

Systems, methods, and computer-readable media for fuzzy-searches on encrypted messages include maintaining, in an indexer, a dictionary of words appearing in a message history. Upon receiving a query including at least one search term, a fuzzy search of the dictionary using the at least one search term is performed to determine one or more fuzzy-matching words in the dictionary, and one or more search tokens are generated from the one or more fuzzy-matching words, the one or more search tokens including encrypted versions of the one or more fuzzy-matching words. The one or more search tokens are provided to a search service for searching a database of encrypted messages of the message history, where the at least one search term may not have an exact match with any of the words in the dictionary.

VIRTUAL WIDGET CONTAINER

A system includes reception of a request to execute queries associated with an interactive data visualization, building, based on the request, of all queries required by the interactive data visualization on a background thread, reception of a query response associated with each built query on the background thread, building of a final response on the background thread based on the received query responses, and rendering, on a main thread, of the interactive data visualization based on the final response.