G06F16/24573

Computer-based platforms configured for automated early-stage application security monitoring and methods of use thereof

The systems and methods disclosed herein comprise computer-based platforms configured for automated early-stage application security monitoring for allowing users (e.g., application developers) to make decisions at the early stage of the application development.

Data-determinant query terms

Systems and methods are disclosed for flexibly applying a query term to heterogeneous data. A query system can receive a query that includes a data-determinant query term. As the system executes the query it can generate interim search results. As the system query processes the interim search results based on the query, it can apply the data-determinant query term to records of the interims search results based on the structure of the records.

Apparatuses, methods, and computer program products for triggering component workflows within a multi-component system

Methods, apparatuses, or computer program products provide for triggering component workflows within a multi-component system. An update to one or more component metadata records of a component metadata vector associated with a first component identifier may be received. The component metadata vector may include a plurality of records. Each record of the plurality of records may include a unique component metadata record identifier and a component metadata value. The component metadata vector associated with the first component identifier may be traversed after updating the one or more component metadata records. Based at least in part on detecting a component metadata condition associated with a component workflow trigger associated with the first component identifier, a first component workflow action of a first component workflow action series comprising a plurality of component workflow actions may be executed. Furthermore, a component workflow trigger notification may be transmitted to a first computing device.

Editor for generating computational graphs
11593380 · 2023-02-28 · ·

Techniques for generating a dataflow graph include generating a first dataflow graph with a plurality of first nodes representing first computer operations in processing data, with at least one of the first computer operations being a declarative operation that specifies one or more characteristics of one or more results of processing of data, and transforming the first dataflow graph into a second dataflow graph for processing data in accordance with the first computer operations, the second dataflow graph including a plurality of second nodes representing second computer operations, with at least one of the second nodes representing one or more imperative operations that implement the logic specified by the declarative operation, where the one or more imperative operations are unrepresented by the first nodes in the first dataflow graph.

Using stored execution plans for efficient execution of natural language questions
11709827 · 2023-07-25 · ·

An analysis system connects to a set of data sources and perform natural language questions based on the data sources. The analysis system connects with the data sources and retrieves metadata describing data assets stored in each data source. The analysis system generates an execution plan for the natural language question. The analysis system finds data assets that match the received question based on the metadata. The analysis system ranks the data assets and presents the ranked data assets to users for allowing users to modify the execution plan. The analysis system may use execution plans of previously stored questions for executing new questions. The analysis system supports selective preprocessing of data to increase the data quality.

METHOD AND APPARATUS FOR VERIFICATION OF MEDICATION ADMINISTRATION ADHERENCE
20230238129 · 2023-07-27 ·

A system and method of confirming administration of medication is provided. The method comprises the steps of receiving information identifying a particular medication prescription regimen, determining one or more procedures for administering such prescription regimen and identifying one or more activity sequences associated with such procedures. Activity sequences of actual administration of such prescription regimen are captured and then compared to the identified activity sequences to determine differences therebetween. A notice is provided if differences are determined.

GATHERING AND CONTRIBUTING CONTENT ACROSS DIVERSE SOURCES

A content unification system is described herein that aligns related content from various sources into one unified stream. The system leverages tagging (e.g., hashtags or other added metadata associated with content) to filter and connect related content across sites, formats, and sources. One component of the system is a user-friendly and customizable “dash board” view of the various topics, called a “tagboard”. Tagboards can be quickly and easily created by users and can be embedded on any website. Users can interact with various content sources such as blogs, forums, or services without leaving the tagboard they are viewing. The content unification system provides users the tools to make the web efficient, increase user interaction, and increase the signal to noise ratio. The system also allows site owners and publishers to monetize their traffic better by directing advertisements to their content in real time.

SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

ALGORITHMIC SUGGESTIONS BASED ON A UNIVERSAL DATA SCAFFOLD

User information is protected by providing a protective layer between a provider and a user device. A server receives a suggestion to present to the user device from a third party, such as a provider of goods or services that wants to push the suggestion to the user device. The suggestion includes a request for user information. The server then determines a likelihood that the request for user information is a necessary component of the suggestion. When the likelihood is low, the request is removed from the suggestion. When the likelihood is high, the server creates an executable computer code that includes the request. The executable computer code can be transmitted to the user device to present the suggestion to the user device without disclosing the user's information to the server.

Reduction of data stored on a block processing storage system
11567901 · 2023-01-31 · ·

Techniques and systems for reducing data stored on a block processing storage system are described. A losslessly reduced representation of a data block can include references to one or more prime data element blocks, and optionally a description of a reconstitution program which, when applied to the one or more prime data element blocks, results in the data block.