Patent classifications
H04L67/34
Framework for explainability with recourse of black-box trained classifiers and assessment of fairness and robustness of black-box trained classifiers
A method, system and computer-readable storage medium for performing a counterfactual generation operation. The counterfactual generation operation includes: receiving a subject data point; classifying the data point via a trained classifier, the classifying providing a classified data point; identifying a counterfactual using the classified data point, the counterfactual comprising another datapoint, the another data point being close to the subject data point, the another data point resulting in production of a different outcome when provided to a model when compared to an outcome resulting from the subject data point being provided to the model; and, providing the counterfactual to a destination.
Mobile key enrollment and use
A computer system performs techniques related to enrolling and using a secure credential. In some embodiments, a computer system provides user interfaces for enrolling a secure credential on the computer system. In some embodiments, a computer system provides user interfaces for inviting a user account to use a secure credential.
Identifying applications with machine learning
A computing system includes a database and a discovery application that initiates discovery of software applications within a managed network by probing the computing devices for applications in stalled thereon. The discovery application executes discovery patterns in an attempt to classify a discovered application and determines that the discovered application is unclassified after executing the discovery patterns. In response to determining that the discovered application is unclassified, the discovery application (i) generates a configuration item representing the discovered application without classification and (ii) selects a characteristic file containing attributes of the discovered application. The discovery application provides the characteristic file to a machine learning (ML) classifier trained using a plurality of characteristic files. The discovery application receives, from the ML classifier, a classification of the discovered application, modifies the configuration item to include the classification of the discovered application, and stores, in the database, the configuration item as modified.
Phone appliance with display screen and methods of using the same
A phone appliance and method of use are provided where the phone appliance can be used to make VoIP communications calls. In a preferred embodiment, the phone appliance includes an RF connection for connecting to a computer or other computing device for facilitating the placement of the VoIP communications calls. The phone appliance further includes a display or portal for depicting advertisements provided by various advertisers. The advertisements provided can be used to defray all or part of the cost associated with making VoIP communications calls. The portal can also be used to communicate with businesses for ordering products, such as ordering a pizza, and to perform various services, such as purchasing stocks. In an exemplary system, the phone appliance is used to transmit to a control center information related to the user of the phone appliance, such as interests and buying habits, and queries for receiving additional information for various advertised products and services. The control center transmits the queries to the appropriate vendors for providing the user with additional information. Other functions and features are provided to the phone appliance, such as being able to download e-mail messages stored within or received by the computer.
Tunable chatbots
A contact center, communication system, and method of operating a contact center are provided. In one example, the contact center includes a tunable chatbot stored in memory and a chatbot tuning function that controls and adjusts a personality characteristic of the tunable chatbot while the tunable chatbot is interacting with a customer via a customer communication device.
Automated intelligent file conversion and execution
A method, system, and computer program product for intelligent file conversion is provided. The method receives a first workflow in a first tool format. The first workflow contains a set of first elements associated with a set of tasks. The set of first elements in the first tool format are mapped to a set of second elements in a second tool format. The method generates a second workflow in the second tool format based on the set of second elements. The second workflow is validated based on a file definition schema for the second tool format and the second workflow is routed to an execution server.
Systems and methods for low-latency initialization of streaming applications
The disclosed computer-implemented method may include identifying a video game configured to be available to stream from a server within a cloud gaming environment; pre-loading an instance of the video game on the server before receiving a request by a user to stream the video game to a client system; receiving the request by the user to stream the video game; and allocating the pre-loaded instance of the video game to the user for streaming to the client system in response to receiving the request by the user to stream the video game, thereby reducing a latency between the user submitting the request and the video game being ready for the user to stream. Various other methods, systems, and computer-readable media are also disclosed.
Cross-Platform Module for Loading Across a Plurality of Device Types
Methods for loading a module on a plurality of device types without modification includes initializing an application native to the client device, the application including a web browser; determining a module to be loaded on the application, the module written in a web-based format and having a set of dependencies indicated within a code thereof; and loading the determined module on the web browser for recognition by the application native to the client device. The loading the determined module on the web browser includes loading the set of dependencies of the module.
Capturing variable dependencies using a variable agnostic object
Capturing dependencies between variables using a variable agnostic object is disclosed. A system is configured to obtain an indication of a first dependency of a first variable to a second variable via a programming interface and depict the first dependency, the first variable, and the second variable in a first instance of a variable agnostic object in a source code. The system is also configured to obtain an indication of a second dependency of a third variable to a fourth variable via the programming interface and depict the second dependency, the third variable, and the fourth variable in a second instance of the variable agnostic object in the source code. The system is also configured to compile the source code to generate a computer-executable program capturing the first dependency and the second dependency based on the first instance and the second instance of the variable agnostic object.
WIRELESS ROUTER REMOTE FIRMWARE UPGRADE
A wireless router receives a firmware update from a remote server, and destructively overwrites router firmware in flash memory in a chunk-wise manner, and then writes a kernel memory before going live with upgraded firmware. Some routers authenticate the firmware image. In some cases, image chunks are re-ordered into an executable order after receipt and before finishing their final arrangement in the flash memory. In some routers, a maximum firmware image size is at least two chunk sizes smaller than the flash memory storage capacity. Some routers remap ROM to RAM memory. Some decompress data from flash into a RAM. Some save text file configuration settings in flash before rebooting. Some detect a user's inactive billing status and redirect a web browser to a billing activation page.