Abstract: The technology disclosed relates to maintaining throughput of a stream processing framework while increasing processing load. In particular, it relates to defining a container over at least one worker node that has a plurality workers, with one worker utilizing a whole core within a worker node, and queuing data from one or more incoming near real-time (NRT) data streams in multiple pipelines that run in the container and have connections to at least one common resource external to the container. It further relates to concurrently executing the pipelines at a number of workers as batches, and limiting simultaneous connections to the common resource to the number of workers by providing a shared connection to a set of batches running on a same worker regardless of the pipelines to which the batches in the set belong.
Abstract: An encryption platform may identify language characters in database fields and determine which of multiple encoding schemes more efficiently encodes the language characters. The encryption platform may use the selected encoding scheme to encode plaintext into a byte array and then encrypt the byte array into ciphertext. The encryption platform may assign encoding flags to the ciphertext identifying the encoding scheme used for encoding the plaintext. The encryption platform then may use the encoding flag to determine which encoding schemes to use for decoding the data back into plaintext. Using the different encoding schemes allows encrypted data to fit better into database storage structures. The encryption platform also may enable users to select different fields for different selectable objects for encoding and encrypting.
Abstract: Systems and methods which provide metering of postage value using accumulated postage information are shown. Embodiments implement an accumulated postage register in a postage security device which is incremented each time a postage indicium is generated and which is reset when a postage value settlement operation is performed. Accumulated postage may be paid for using various accounts, including pre-funded or pre-paid accounts, credit accounts, debit accounts, and billing accounts. Accordingly, embodiments may be used with respect to a post-paid metering model, a pre-paid metering model, and combinations thereof.
Abstract: Disclosed is an apparatus for controlling access to a security content using near field network communication of mobile devices. A policy issuance provider registration unit requests a content security policy for a first content, a security content, to a service server, receives the content security policy for the first content, requests to the service server for a first mobile device to be registered as a content security policy issuance provider, and receives a result of registration and a provider policy from the service server. A policy issuance provider converting unit converts the first mobile device to the content security policy issuance provider when receiving a request for access for browsing the first content through near-field network communication from another mobile device in which a DRM client application is being executed.
Abstract: This invention discloses a novel system and method for providing retail point of sale terminals that are connected securely over the Internet to a back-office service that manages the retailer's data as a service using a system that supports more than one retailer, each of which will have one or more point of sale terminals. The system is adapted to provide transaction reconciliation with an accounting system whenever a user ends a shift and logs out of the register instance they are operating.
Abstract: Approaches are described for enabling a user to create an accurate perspective rendering of a source (e.g., a scene, object, subject, point of interest, etc.) on a drawing surface. For example, various approaches enable superimposition of the source being viewed upon a drawing surface upon which a user is drawing. In this way, the user can view both the source and drawing surface simultaneously. This allows the user to duplicate key points of the source on the drawing surface by viewing a display of a device, thus aiding in the accurate rendering of perspective.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for query optimization in a database system. These mechanisms and methods for query optimization in a database system can enable embodiments to optimize OR expression filters referencing different logical tables. The ability of embodiments to optimize OR expression filters referencing different logical tables can enable optimization that is dynamic and specific to the particular tenant for whom the query is run and improve the performance and efficiency of the database system in response to query requests.
Abstract: Systems and methods are described to validate user connections to one or more application servers within a multi-tenant application system. A domain-level cookie at the client identifies any active connections for that client. As the client requests a connection to a particular application, the cookie is provided to a validation server that determines if any previously-established sessions with the multi-tenant system exist, and/or if such sessions remain active. If an active session already exists, then the client can be redirected to a particular server to continue the previously-established session. If no valid prior sessions are available, then the client can be validated and a new connection to an appropriate server can be established, as appropriate.
Abstract: A method for building and managing send jobs with restricted information, the method comprising constructing at least one email with at least one reference to a restricted information and injecting each of the at least one emails to one or more send centers, wherein each of the one or more send centers is authorized to receive the restricted information.
Type:
Grant
Filed:
April 9, 2013
Date of Patent:
May 8, 2018
Assignee:
SALESFORCE.COM, INC.
Inventors:
James Michael Ciancio-Bunch, Tom Waltz, Jerry Seilar, Kevin Stark, Jonathan Bennett
Abstract: A method, apparatus and computer program product for policy-based access control in association with a sorted, distributed key-value data store in which keys comprise n-tuple structure that includes a cell-level access control. In this approach, an information security policy is used to create a set of pluggable policies. A pluggable policy may be used during data ingest time, when data is being ingested into the data store, and a pluggable policy may be used during query time, when a query to the data store is received for processing against data stored therein. Generally, a pluggable policy associates one or more user-centric attributes (or some function thereof), to a particular data-centric label. By using pluggable policies, preferably at both ingest time and query time, the data store is enhanced to provide a seamless and secure policy-based access control mechanism in association with the cell-level access control enabled by the data store.
Type:
Grant
Filed:
December 15, 2014
Date of Patent:
May 8, 2018
Assignee:
A9.com
Inventors:
Michael R. Allen, John W. Vines, Adam P. Fuchs
Abstract: The technology disclosed relates to automatic generation of tuples from a record set for outlier analysis. Applying this new technology, user need not specify which 1-tuples to combine into n-tuples. The tuples are generated from structured records organized into features (that also could be fields, objects or attributes.) Tuples are generated from combinations of feature values in the records. Thresholding is applied to manage the number of tuples generated. The technology disclosed further relates to indexing and searching high dimensional tuple spaces in a computer-implemented system.
Abstract: A spectrometer and method for determining an emitted light spectrum. An input light signal is received and directed to an array of interferometers using waveguides. A plurality of self-interfering signals are detected from a first plurality of interferometers in the array of interferometers. The first plurality of interferometers has fewer interferometers than required to satisfy the Nyquist criterion for reconstructing the emitted light spectrum. The emitted light spectrum is reconstructed from the plurality of self-interfering signals using compressive sensing. The plurality of self-interfering signals can provide an interference pattern used to reconstruct the emitted light spectrum. A second plurality of interferometers may output a second plurality of self-interfering signals to reconstruct a low resolution spectrum of the input light signal satisfying the Nyquist criterion. Low resolution signal components can be detected from the low resolution spectrum and used to pre-process the interference pattern.
Abstract: The technology disclosed provides a so-called “joint many-task neural network model” to solve a variety of increasingly complex natural language processing (NLP) tasks using growing depth of layers in a single end-to-end model. The model is successively trained by considering linguistic hierarchies, directly connecting word representations to all model layers, explicitly using predictions in lower tasks, and applying a so-called “successive regularization” technique to prevent catastrophic forgetting. Three examples of lower level model layers are part-of-speech (POS) tagging layer, chunking layer, and dependency parsing layer. Two examples of higher level model layers are semantic relatedness layer and textual entailment layer. The model achieves the state-of-the-art results on chunking, dependency parsing, semantic relatedness and textual entailment.
Type:
Application
Filed:
January 31, 2017
Publication date:
May 3, 2018
Applicant:
salesforce.com, inc.
Inventors:
Kazuma HASHIMOTO, Caiming XIONG, Richard SOCHER
Abstract: The technology disclosed provides a so-called “joint many-task neural network model” to solve a variety of increasingly complex natural language processing (NLP) tasks using growing depth of layers in a single end-to-end model. The model is successively trained by considering linguistic hierarchies, directly connecting word representations to all model layers, explicitly using predictions in lower tasks, and applying a so-called “successive regularization” technique to prevent catastrophic forgetting. Three examples of lower level model layers are part-of-speech (POS) tagging layer, chunking layer, and dependency parsing layer. Two examples of higher level model layers are semantic relatedness layer and textual entailment layer. The model achieves the state-of-the-art results on chunking, dependency parsing, semantic relatedness and textual entailment.
Type:
Application
Filed:
January 31, 2017
Publication date:
May 3, 2018
Applicant:
salesforce.com, inc.
Inventors:
Kazuma HASHIMOTO, Caiming XIONG, Richard SOCHER
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
Abstract: A computer implemented method includes receiving, at the browser application, a first request for web resources based on user selection of a first hyperlink outside of the web application; determining if the first hyperlink is associated with a record accessible by the web application from the database system; determining, when the first hyperlink is associated with the record for the web application, if a web application interface for the web application is active in at least one navigation tab of the browser application; and presenting, when the first hyperlink is associated with the record for the web application and the web application interface for the web application is active in the at least one navigation tab, the record within a console tab of the web application interface in the at least one navigation tab.
Abstract: The technology disclosed provides a so-called “joint many-task neural network model” to solve a variety of increasingly complex natural language processing (NLP) tasks using growing depth of layers in a single end-to-end model. The model is successively trained by considering linguistic hierarchies, directly connecting word representations to all model layers, explicitly using predictions in lower tasks, and applying a so-called “successive regularization” technique to prevent catastrophic forgetting. Three examples of lower level model layers are part-of-speech (POS) tagging layer, chunking layer, and dependency parsing layer. Two examples of higher level model layers are semantic relatedness layer and textual entailment layer. The model achieves the state-of-the-art results on chunking, dependency parsing, semantic relatedness and textual entailment.
Type:
Application
Filed:
January 31, 2017
Publication date:
May 3, 2018
Applicant:
salesforce.com, inc.
Inventors:
Kazuma HASHIMOTO, Caiming XIONG, Richard SOCHER