G06Q10/105

EMPLOYEE DATA REPLICATION SYSTEM

Disclosed herein are various embodiments for an employee data replication system. An embodiment operates by receiving a request to replicate employee data hosted by a host system. At least one of: a live date corresponding to when the employee data is to be live on the enterprise system or a selection of one or more applications to be used on the enterprise system is identified. A cutoff date for the employee data is calculated based on one or more of the live date and the selection of one or more applications, the cutoff date indicating an oldest date for which the employee data is to be replicated to the enterprise system. Employee data is replicated from the host system to the enterprise system based on the cutoff date, and an indication is provided that the replication has completed.

CONFLICT DE-ESCALATION TRAINING SYSTEM AND METHOD

A conflict de-escalation training system includes a reproducer of sound and images and at least one device adapted to detect speech, proximity, and movement of a human trainee relative to the reproducer. Database(s) store trigger event definitions and natural language understanding (NLU) rules. A trigger analyzer determines when one of the trigger event definitions is satisfied by trainee’s speech/actions. An intent analyzer ascertains intent of the trainee’s speech using the NLU rules. A compliancy state generator determines a state value based on at least one of the intent of the trainee’s speech, proximity, and movement. The state value indicates a level of compliance of an imaginary individual being subjected to the trainee’s speech/actions. An output generator generates facial images and speech responses for the imaginary individual based on the state value. The facial images and speech responses are provided to the reproducer for output thereby.

Methods and systems for automatic creation of in-application software guides based on machine learning and user tagging
11580876 · 2023-02-14 ·

In one aspect, A computerized method for implementing a virtualized training session user interface (UI) with respect to a production software UI includes the step of providing a production software application. The method includes displaying a guide on a production software UI. A workflow and a tutorial content of the guide is determined dynamically using one or more specified machine-learning algorithms. The method includes displaying the guide as a set of images with a virtual lab placed on top of each image of the guide. The method includes receiving a user input comprising a learning-related data inside a virtual environment of the guide.

Systems and methods for interactive electronic transactions based on GPS=based device proximity data
11580546 · 2023-02-14 · ·

Methods and apparatus consistent with the present disclosure allow a customer or payor to select from a plurality of nearby vendors or payees when a computing device of the payor is physically close to electronic devices of the payees. Payee devices and locations of those payee devices may be identified and displayed on a display of a payor device. Once displayed, a specific payee device may be selected by the customer and an order for a product or service may be sent to the selected payee device from the payor device. After the product or service has been provided to the customer, information that confirms that purchase may be sent to any of the selected payee device, the payor device, or a payment processing computer and funds to pay for the product or service may be deposited into an account of the payee based on the confirmation.

COMPLIANCE ENGINE
20230042345 · 2023-02-09 ·

Various aspects of the subject technology relate to systems, methods, and machine-readable media for compliance training. The method includes determining a compliance status of a user. The method also includes determining a curriculum for the user based at least in part on the determined compliance status of the user, the curriculum comprising a series of nudges. The method also includes setting a deadline for completion of the curriculum. The method also includes sending the user reminders regarding completion of the curriculum. The method also includes receiving confirmation of completion of the curriculum. The method also includes generating a compliance certificate for the user.

Replication of planned working time information

Technologies are described for replicating selected changes to planned working time from a first system, such as an HR system, to a second system, such as a payroll system. For example, upon receiving an indication of a change to a planned working time for one or more workers on one or more days, the first system can evaluate the change to determine whether it should be replicated to the second system. The determination can be based on whether the change is a temporary change, as well as based on information read from a data replication configuration object, a data replication period object, and/or an in-sync work schedule object. Upon determining that the change should be replicated to the second system, a data replication proxy object can be created based on the change and used to transmit data regarding the change for replication at the second system.

System Providing Self-Service Access to Locked Merchandise
20230008200 · 2023-01-12 ·

A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.

Never stale caching of effective properties
11593356 · 2023-02-28 · ·

The technology disclosed relates to maintaining a cache of effective properties in an identity management system employing a graph. In particular, it relates to handling vertex/edge and/or graph topology updates in accordance with update notification requirements configured from a schema and, in conjunction with detecting updating of vertex/edge attributes and/or graph topology, recalculating effective attributes in accordance with the configured notification requirements.

Never stale caching of effective properties
11593356 · 2023-02-28 · ·

The technology disclosed relates to maintaining a cache of effective properties in an identity management system employing a graph. In particular, it relates to handling vertex/edge and/or graph topology updates in accordance with update notification requirements configured from a schema and, in conjunction with detecting updating of vertex/edge attributes and/or graph topology, recalculating effective attributes in accordance with the configured notification requirements.

METHOD AND SYSTEM FOR ENABLING A USER TO BID ON A WORK ASSIGNMENT

A graphical user interface implemented on a computer for enabling a user to bid on a job assignment. The graphical user interface comprises an information display area for displaying a plurality of entries, each entry of the plurality of entries being indicative of a respective job grouping, each job grouping being associated with at least one job on which the user can bid. The graphical user interface further comprising a control component operable by the user at the computer to cause the graphical user interface to display additional information associated with a selected one of the job groupings.