G06F16/24565

Digital processing systems and methods for data visualization extrapolation engine for item extraction and mapping in collaborative work systems

Systems, methods, and computer-readable media for extrapolating information display visualizations are disclosed. The systems and methods may involve maintaining a board with a plurality of items, each item defined by a row of cells, and wherein each cell is configured to contain data and is associated with a column heading; linking at least a first column to at least a second column so that a change in data in a cell of the at least first column causes a change in data of a cell in the at least second column; receiving a first selection of a particular item from the board, wherein the particular item includes a plurality of cells with data in each cell, and wherein data in a first cell of the plurality of cells is linked to data in a second cell of the plurality of cells; upon receipt of the first selection.

DYNAMIC DATA RESTRICTION IN A DATABASE CLEAN ROOM

Embodiments of the present disclosure may provide a data clean room architecture that dynamically restricts data included in the clean room. The data clean room architecture can implement row access policy or dynamic data masking for row and column based restrictions of data provided through the clean room. The data clean room architecture can provide a limited set of data that does not require obfuscation of data for direction matching and correlation of data in the different datasets, such as matching user identifiers or emails.

TECHNIQUES FOR ALIGNMENT OF SOURCE INFRASTRUCTURE DATA WITH A BIS CONCEPTUAL SCHEMA
20220350781 · 2022-11-03 ·

In one embodiment, techniques are provided for aligning source infrastructure data to be compatible with a conceptual schema (e.g., BIS) implemented through an underlying database schema (e.g., DgnDb). Data aligned according to the conceptual schema may serve as a “digital twin” of real-world infrastructure usable throughout various phases of an infrastructure project, with physical information serving as a “backbone”, and non-physical information maintained relative thereto, forming a cohesive whole, while avoiding unwanted data redundancies. Source-format-specific bridge software processes may be provided that that know how to read and interpret source data of a respective source format, and express it in terms of the conceptual schema. The aligned data may be sent to an update agent that interprets the aligned data and computes a changeset therefrom, which may be stored for eventual application to a particular instance of a database maintained according to an underlying database schema of the conceptual schema.

Methods and apparatus for generating causality matrix and impacts using graph processing
09811588 · 2017-11-07 · ·

Methods and apparatus for generating a causality matrix using vertex-centric processing framework to be used by a codebook correlation engine to determine a set of problems to explain active symptoms in a system. Methods and apparatus for calculating impacts of problems using vertex-centric processing framework.

Application topology recognition method for distribution networks

The present invention relates to a method for automatic identification of an application network topology for power distribution network control which belongs to the field of electric power automation. The method comprises the following steps: 1. statically configuring attributes of a switch; 2. determining, by a power distribution network intelligent terminal STU, whether a query trigger condition is satisfied; 3. sending, by an inquirer, a query command to initiate the query into an application network topology; 4. replying to the query command; 5. receiving the query command; 6. checking the integrity of the switch attribute information; and 7. forming an application network topology. The present method for automatic identification of an application network topology for a power distribution network control has few calculations and can be executed with high speed, ensures the integrity and reliability of information, and is particularly suitable for distributed intelligent control of the power distribution network. The establishment of the application network topology is distributed to each power distribution network intelligent terminal STU, thus reducing heavy calculation, and is suitable for applications having relatively few embedded system software and hardware resources.

DIGITAL PROCESSING SYSTEMS AND METHODS FOR THIRD PARTY BLOCKS IN AUTOMATIONS IN COLLABORATIVE WORK SYSTEMS

Systems, methods, and computer-readable media for remotely automating changes to third party applications from within a primary application are disclosed. The systems and methods may involve maintaining in the primary application, a table having rows, columns, and cells at intersections of the rows and columns, wherein the primary application is configured to enable the construction of automations defined by conditional rules for altering internal information in the primary application and external information in the third party applications; receiving an automation definition conditional on specific information input into at least one specific cell in the table of the primary application, wherein the automation definition is constructed using internal blocks and external blocks, the external blocks having links to the external third party applications; monitoring the at least one specific cell of the primary application for an occurrence of the specific information.

Enhancing a message by providing supplemental content in the message

The present technology relates to enhancing a message with supplemental content. The system may enhance a message based on topics identified in past correspondence messages or topics anticipated based on an intended recipient of a correspondence message being drafted. The system can operate in combination or conjunction with a language prediction system, an optimizing language model, and a text input method. The systems and methods provide users with supplemental content at a time and in a specific situation, which allows for effective targeting of content.

Dynamic location search suggestions based on travel itineraries
11256731 · 2022-02-22 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for retrieving local information on a user device include detecting itinerary information stored by a first application on a user device, and identifying a travel destination based on the detected itinerary information. The travel destination is communicated to a second application executable on a user device, and the travel destination is stored in association with the second application. The second application is adapted to retrieve local information based on an identified geographic location, and local information for the travel destination is provided through the second application in response to a user interaction with the second application and based on a triggering threshold associated with the itinerary information.

World knowledge triggers
11256700 · 2022-02-22 · ·

Methods, systems, and apparatus, for associating actions with events that are determined independent of the action type of the action. A system receives, from a user device, identification of an action to be taken, the action being one of a plurality of action types, and an identification of a first event that is determined independent of the action type and for which the occurrence of the first event may be determined by the system. They system associates the action and the first event with instructions for determining if the first event has occurred, and then determines whether the first event has occurred. In response to determining that the first event has occurred, the system causes the action to occur.

Distributed stream-based database triggers

Information describing changes to a collection of items maintained by a database may be stored in a log file. The information in the log file may be converted into a stream of records describing the changes. The records may be directed to a computing node selected for performing a trigger function in response to the change, based on applying a hash function to a portion of the record, identifying a hash space associated with a value output by the hash function, and mapping from the hash space to the selected computing node.