As described herein, a system, method, and computer program are provided for using a dynamic threshold mechanism that is utilizing a set of machine learning models to auto-complete user input fields. User access to a form having a plurality of user input fields is detected. One or more of the plurality of user input fields are auto-completed over a sequence of stages, utilizing at least one machine learning model.
As described herein, a system, method, and computer program are provided for using a dynamic threshold mechanism that is utilizing a set of machine learning models to auto-complete user input fields. User access to a form having a plurality of user input fields is detected. One or more of the plurality of user input fields are auto-completed over a sequence of stages, utilizing at least one machine learning model.
As described herein, a system, method, and computer program are provided for providing shard-aware bulk requests for a Cassandra No-SQL database system having a plurality of distributed nodes with replication. A request to perform a database operation on the Cassandra No-SQL database system is received from an application. Token ranges of partition keys included with the request are determined. The request is grouped with a plurality of additional database operation requests to form a bulk request, where requests are grouped by a target node in the Cassandra No-SQL database system such that the target node holds token ranges for all requests included in the bulk request. The bulk request is communicated to the target node of the Cassandra No-SQL database system for processing of the requests included in the bulk request.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
4.
System, method, and computer program for automated generation of feed loader applications
As described herein, a system, method, and computer program are provided for automatic generation of feed loader applications. An input defining configuration details for a target repository is received. The input is used to automatically generate an application configured to load data to the target repository. The application is deployed for use in loading data in one or more given data files to the target repository.
As described herein, a system, method, and computer program are provided for creating a new class of instances. A first dataset comprising a plurality of instances is obtained. A first AI engine is used to classify the plurality of instances into a plurality of classes. Each class of instances of the first dataset is associated with a respective action having a positive result or a lack of the positive result. A class is selected and the respective action is executed on instances of the class. Instances of the selected class for which the respective action resulted in a lack of the positive result are collected. The collection of instances are used to train an AI-model, and/or a second AI engine is used to classify the collection of instances, and/or a plurality of artificial instances are synthesized based on the collection of instances.
A system, method, and computer program are provided for unattended test execution based on impacted application code. A change made to an application is detected. One or more features of the application impacted by the change made to the application are determined. A plurality of existing tests associated with the one or more features of the application impacted by the change made to the application are identified. A probability of each existing test in the plurality of existing tests exposing a defect in the application is predicted. At least a portion of the plurality of existing tests are executed for the application in an order that based on the predicted probabilities.
As described herein, a system, method, and computer program are provided for intent translation to Topology and Orchestration Specification for Cloud Applications (TOSCA) in intent-based orchestration. A microservice of a service and network orchestrator receives an intent defined in a first format associated with a first standard used for modeling and management of network services. The microservice translates the intent defined in the first format to a second format associated with a TOSCA-based model used for modeling and management of network services, to form the intent defined in the second format. The microservice outputs the intent defined in the second format.
As described herein, a system, method, and computer program provide automatic content merging for an optimistic concurrency control mechanism. A concurrency error resulting from a first source requesting a first update to a resource concurrently with a second source requesting a second update to the resource is detected. Responsive to detecting the concurrency error, the first update and the second update are merged to form a merged update. The merged update is saved to the resource.
As described herein, a system, method, and computer program are provided for orchestrating asynchronous processes to prevent data corruption. An orchestrator identifies a first asynchronous process executing in a computer system, wherein the first asynchronous process is configured to update data. The orchestrator detects activation of a second asynchronous process in the computer system which is configured to update the data. The orchestrator prevents the second asynchronous process from executing in the computer system to update the data at least while the first asynchronous process is executing in the computer system, to avoid simultaneous updates to the data by the first asynchronous process and the second asynchronous process.
As described herein, a system, method, and computer program are provided for an exactly once messaging protocol in a publish-subscribe messaging system. A consumer (i.e. subscriber) of a publish-subscribe messaging system is identified. For each required consumer, and for each subscribed topic of the consumer, a new dedicated consumer is created for the topic in the publish-subscribe messaging system. The new dedicated consumer is used to ensure that messages published to the topic are delivered exactly once to each associated consumer.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
As described herein, a system, method, and computer program are provided for making a 5G private network deployment recommendation using machine learning. A plurality of parameter values associated with an enterprise for which a 5G private network is to be deployed are obtained. A machine learning model is used to infer, for the enterprise, an optimal deployment scenario for the 5G private network among a plurality of available deployment scenarios, based on the plurality of parameter values. An indication of the optimal deployment scenario is output as a recommendation for deploying the for the 5G private network for the enterprise.
As described herein, a system, method, and computer program are provided for providing automated management of electronic device inventory. An electronic device is triggered to emit at least one signal capable of being sensed by at least one sensor. The at least one signal emitted by the electronic device is sensed, using the at least one sensor. A physical location of the electronic device is determined, based on the sensed at least one signal. A discrepancy between the physical location of the electronic device and a specified location of the electronic device recorded in an inventory management system is detected. At least one action is performed to handle the discrepancy.
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
13.
System, method, and computer program for an unattended trap for a network brute force attack
As described herein, a system, method, and computer program are provided for an unattended trap for a brute force attack. A brute force attack on private data in a computer network is detected. Secret information expected by the brute force attack is generated. At least one honeypot having the secret information is created in the computer network. A state of the at least one honeypot is updated based on simulated activity.
As described herein, a system, method, and computer program are provided for intent to service mappings in intent-based orchestration. An intent orchestrator receives an intent specifying one or more parameters of a service required for a network. The intent orchestrator translates the intent to one or more basic data types of a plurality of predefined basic data types based on the one or more parameters. The intent orchestrator forms one or more abstract services using the one or more basic data types. The intent orchestrator determines one or more specific services of a network orchestrator that correlate with the one or more abstract services. The intent orchestrator causes the network orchestrator to fulfill the intent using the one or more specific services.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
15.
System, method, and computer program for transferring subscriber identity module (SIM) information for SIM card or eSIM activation
A system, method, and computer program are provided for activating an eSIM from a SIM card or another eSIM. In one implementation, a request to activate an eSIM from a SIM card or another eSIM is received. Additionally, responsive to the request, first information associated with the SIM card or the other eSIM and second information associated with the eSIM is accessed. Further, at least one action to activate the eSIM from the SIM card or the other eSIM is caused to be performed, where the at least one action is based on the first information and the second information.
As described herein, a system, method, and computer program are provided for test-related automatic tracing. A new requirement defined for an application is identified. The new requirement is processed, using a machine learning model, to predict each portion of the new requirement covered by existing test features. One or more new test features are caused to be created for the new requirement, based on the prediction of each portion of the new requirement covered by existing test features.
As described herein, a system, method, and computer program are provided for using machine learning to make intelligent vendor recommendations. In use, a service to be provided at a specified location is identified. A plurality of vendors available to provide the service at the specified location are identified. A plurality of machine learning models are used to make a plurality of predictions for each vendor of the plurality of vendors, the plurality of predictions being associated with the vendor providing the service at the specified location. A vendor of the plurality of vendors is selected for provisioning the service at the specified location, based on the plurality of predictions made for each vendor of the plurality of vendors.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
As described herein, a system, method, and computer program provide real-time language translation using generative artificial intelligence. An input in a first spoken language is received. The input in the first spoken language is processed, using a generative artificial intelligence model, to generate a translation of the input in a second spoken language. The translation is output.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
As described herein, a system, method, and computer program provide real- time language translation using generative artificial intelligence. An input in a first spoken language is received. The input in the first spoken language is processed, using a generative artificial intelligence model, to generate a translation of the input in a second spoken language. The translation is output.
As described herein, a system, method, and computer program are provided for a TOSCA modeling optimization for 5G network orchestration. A template catalog storing one or more network service instance templates is accessed, by a TOSCA-based orchestrator in a 5G network. A network service instance is deployed to the 5G network from the one or more network service instance templates, by the TOSCA-based orchestrator.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
21.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR A TOSCA MODELING OPTIMIZATION FOR 5G NETWORK ORCHESTRATION
As described herein, a system, method, and computer program are provided for a TOSCA modeling optimization for 5G network orchestration. A template catalog storing one or more network service instance templates is accessed, by a TOSCA-based orchestrator in a 5G network. A network service instance is deployed to the 5G network from the one or more network service instance templates, by the TOSCA-based orchestrator.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
22.
System, method, and computer program for unified management of multiple master-agent job execution environments
As described herein, a system, method, and computer program are provided for unified management of multiple master-agent job execution environments. Job scheduling information is accessed for a plurality of different environments each having a corresponding master that schedules job executions across a plurality of respective agents. Unified job scheduling management across the plurality of different environments is provided, using the job scheduling information.
As described herein, a system, method, and computer program are provided for a model driven Non-RT RIC design for O-RAN management and orchestration. One or more features of one or more onboarded Non-RT RIC applications are determined. During run-time of the Non-RT RIC, a set of components are deployed for the Non-RT RIC based on the one or more features of the one or more onboarded Non-RT RIC applications.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
24.
System, method, and computer program for handling business agreement updates requiring orchestration when an orchestration system is unavailable
As described herein, a system, method, and computer program are provided for handling business agreement updates requiring orchestration when an orchestration system is unavailable. A signed update to a business agreement requiring orchestration by an orchestration system is received. It is determined that the orchestration system is unavailable to orchestrate requirements of the signed update to the business agreement. One or more actions are performed to handle the signed update in response to determining that the orchestration system is unavailable.
As described herein, a system, method, and computer program are provided for a media service platform. A media content is parsed to a directed graph, where vertices of the directed graph correspond to entities in the media content and edges of the directed graph define relationships between the entities. One or more creative media capability services are provided, using the directed graph.
As described herein, a system, method, and computer program are provided for a machine-learning model-agnostic cloud-agnostic no-code onboarding platform. In use, a universal unified interface to a Model-Agnostic Onboarding Workflow (MAOW) platform is provided, wherein the MAOW platform is configured as a no-code, model-agnostic, cloud-agnostic platform. Additionally, at least one machine learning model is onboarded using the MAOW platform, based on the universal unified interface. Further, the at least one machine learning model is deployed from the MAOW platform to at least one target environment.
As described herein, a system, method, and computer program are provided for creating a computer program from natural language input. Input is received from a natural language processor. The input is processed, using a machine learning model, to predict an intent of the input. A validation of the intent is performed. The intent is automatically converted to one or more executable computer commands, based on a result of the validation of the intent. The one or more executable computer commands are executed to generate a computer program.
As described herein, a system, method, and computer program are provided for identifying foreign keys between distinct tables based on a statistical analysis of table values. In use, a plurality of candidate field combinations are determined between a first table and a second table. A statistical analysis of values stored in fields of each candidate field combination of the plurality of the candidate field combinations is performed. Foreign keys between the first table and the second table are identified, based on a result of the statistical analysis.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 17/18 - Complex mathematical operations for evaluating statistical data
29.
System, method, and computer program for managing navigational flows between application pages
As described herein, a system, method, and computer program are provided for managing a navigational flow of an application. A navigational flow defined for a plurality of user interfaces of an application is determined. The navigational flow is rendered in an editing tool. An update to the navigational flow is received, via the editing tool. The update is automatically translated into code of the application.
As described herein, a system, method, and computer program are provided for network experience optimization using a residential network router. In use, an electronic calendar is accessed by a residential network router. Additionally, the residential network router determines a plurality of events saved to the electronic calendar, wherein the plurality of events require, at least in part, simultaneous network resource (e.g. bandwidth) usage. Further, the plurality of events are prioritized, using the residential network router. Still yet, available network resources are assigned among the plurality of events, using the residential network router, based on the prioritization.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
31.
System, method, and computer program for dynamic charge computation
As described herein, a system, method, and computer program are provided for dynamic charge computation. In use, a change made to a subscription of a customer is detected, wherein the subscription is associated with a billing cycle. Further, responsive to detecting the change and prior to an end of the billing cycle, at least one charge is computed for the subscription.
As described herein, a system, method, and computer program are provided for blockchain-based entity group management. An instance of a blockchain is maintained for each entity group of a plurality of defined entity groups. Further, the instance of the blockchain maintained for each entity group of the plurality of defined entity groups is utilized to manage group membership for the entity group, and control access by members of the entity group to a plurality of services having functionality configured for the plurality of defined entity groups.
As described herein, a system, method, and computer program are provided for proactive 5G leg estimation. During an initial access procedure by a user equipment on a 4G leg of a 4G-LTE network, an eNodeB of the 4G-LTE network computes a parameter for the user equipment. Further, the eNodeB of the 4G-LTE network conditionally allows an addition of a 5G leg to the 4G-LTE network for the user equipment, based on the parameter computed for the user equipment.
As described herein, a system, method, and computer program are provided for presenting tree data structures in tables. In use, a forest data structure storing data is identified. Additionally, the forest data structure is converted to a plurality of matrices. Further, the plurality of matrices are used to present the data in a table.
As described herein service brokers are used to manage the lifecycle of backing services. In use, a service catalog of backing services available for use by an application is provided. Further, one or more service brokers are used to manage a lifecycle of the backing services.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
As described herein, a system, method, and computer program are provided for an exactly once messaging protocol in a publish-subscribe messaging system. A consumer (i.e. subscriber) of a publish-subscribe messaging system is identified. For each required consumer, and for each subscribed topic of the consumer, a new dedicated consumer is created for the topic in the publish-subscribe messaging system. The new dedicated consumer is used to ensure that messages published to the topic are delivered exactly once to each associated consumer.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
As described herein, a system, method, and computer program are provided for securing container images. In use, a request to access a container image is identified. In response to the request, a digest of the container image is retrieved. The digest is validated according to an execution and business context. A response to the request is provided, based on a result of the validating.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
38.
System, method, and computer program for AWS autoscaling of Tuxedo systems
As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.
H04L 61/3015 - Name registration, generation or assignment
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
39.
System, method, and computer program for generating a context visualization during test automation
As described herein, a system, method, and computer program are provided for generating a context visualization during test automation. In use, during automated testing of a user interface application, an inspection of an element within a user interface of the user interface application is detected. Additionally, in response to detecting the inspection of the element, a visualization of the element within the user interface is generated. Further, the visualization of the element within the user interface is presented with information associated with the inspection of the element.
As described herein, a system, method, and computer program are provided for a model driven Non-RT RIC design for O-RAN management and orchestration. One or more features of one or more onboarded Non-RT RIC applications are determined. During run-time of the Non-RT RIC, a set of components are deployed for the Non-RT RIC based on the one or more features of the one or more onboarded Non-RT RIC applications.
As described herein, a system, method, and computer program are provided for using metric valuations in anomaly scoring. In use, a score calculated for a metric used for anomaly detection is identified. Additionally, the score is weighted, based on a valuation defined for the metric, to form a weighted score. Further, at least one action is caused to be performed, based on the weighted score.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/142 - Network analysis or design using statistical or mathematical methods
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business management consulting and advisory services in the field of communications, utilities, global computer information network, access provider, financial, and application service provider industries in connection with business process optimization services, customer management, order management, resources management, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management; computer data processing services for artificial intelligence; computer data processing services for cognitive computing; computer data processing services for cloud computing; setting up and conducting commercial exhibitions in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management and electronic business transactions via a global computer network; business consulting services for companies regarding artificial intelligence; business consulting services for companies regarding computer systems that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; business consulting services for companies relating to cloud computing. Downloadable and recorded computer software for customer management, order management, revenue and billing management, service creation and delivery, service and resource management, service fulfillment and provisioning, service support and assurance, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable and recorded computer software that manages customer, product, service and network information, customer interactions, billing, payment and account information, and network usage data in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable computer programs and downloadable computer software for the artificial production of human speech and text; downloadable computer programs and downloadable computer software for natural language processing, generation, understanding and analysis; downloadable computer programs and downloadable computer software for machine-learning based language and speech processing software; downloadable computer chatbot software for simulating conversations; downloadable computer programs and downloadable computer software for creating and generating text; computer hardware and downloadable and recorded software for cognitive computing; computer hardware and downloadable and recorded software using artificial intelligence for machine learning; computer systems, namely, computer hardware and downloadable and recorded computer software for developing and integrating artificial intelligence, namely, machine learning, deep learning and natural language processing which are capable of collecting, organizing and analyzing data; computer systems, namely computer hardware and downloadable and recorded computer software that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions for understanding general human queries and formulating responses; electronic publications recorded on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and teaching materials in the field of computing, computer networks, computer storage, computer operating systems, information technology, database management, cloud computing and artificial intelligence. Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries; Providing temporary use of online non-downloadable software for use in processing and generating natural language queries; Providing temporary use of online non-downloadable software using AI (artificial intelligence) for the production of speech and text; Providing temporary use of online non-downloadable software for multi-modal machine-learning based language, text, and speech processing software; Providing temporary use of online non-downloadable software for facilitating interaction and communication between humans and AI (artificial intelligence) chatbots; Providing temporary use of online non-downloadable software for facilitating multi-modal natural language, speech, text, image, video, and sound input; Providing temporary use of online non-downloadable chatbot software for replying to questions from online customers; research and development services in the field of multi-modal computer natural language processing, artificial intelligence, and machine learning; Providing temporary use of online non-downloadable software using artificial intelligence for machine learning, natural language generation, statistical learning, mathematical learning, supervised learning, and unsupervised learning; providing information from searchable indexes and databases of information, including text, music, images, videos, software algorithms, mathematical equations, electronic documents, and databases, by means of non-downloadable chatbot software; software as a service (SaaS) services featuring software using artificial intelligence for use in software development and machine learning; software as a service (SaaS) services featuring software using cognitive computing for use in software development and machine learning; computer programming and computer programming consulting services for artificial intelligence; computer programming and computer programming consulting services for cognitive computing.
43.
System, method, and computer program for defect resolution
As described herein, a system, method, and computer program are provided for defect resolution. Information associated with a defect detected in a computer system is received. The information is processed, using a first machine learning model, to predict a source of the defect. The information and the source of the defect are processed, using a second machine learning model, to predict one or more parameters for handling the defect. One or more actions are caused to be performed to resolve the defect, based on the predicted one or more parameters for handling the defect.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
44.
System, method, and computer program for protecting against unintentional deletion of an eSIM from a mobile device
A system, method, and computer program are provided for protecting against unintentional deletion of an eSIM from a mobile device. In use, deletion of an eSIM from a mobile device is detected. Additionally, definitions of predefined scenarios indicative of unintentional deletions of eSIMs are accessed. Further, the detected deletion is analyzed, using the definitions, to determine that the detected deletion is unintentional. Still yet, a proactive care action is caused to be performed to address the unintentional deletion of the eSIM from the mobile device.
As described herein, a system, method, and computer program provide a computer attack response service. In use, a notification is received that a transfer of at least one electronic file to a computing device has been detected as a potential incoming threat to the computing device. Responsive to the receiving the notification, at least one honeypot is created. Additionally, data within the at least one electronic file is accessed, using the at least one honeypot. Responsive to accessing the data within the at least one electronic file, activity associated with the incoming threat is monitored.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Business management consulting and advisory services in the field of communications, utilities, global computer information network, access provider, financial, and application service provider industries in connection with business process optimization services, customer management, order management, resources management, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management.
(2) Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business management consulting and advisory services in the field of global computer information network, access provider, financial, and application service provider industries in connection with customer management, order management, resources management, service fulfillment and provisioning, and partner management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management, excluding advisory and consulting services in the field of advertising and marketing. Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries.
48.
System, method, and computer program for development driven test automation
A system, method, and computer program are provided for development driven test automation. Annotations are received for an application during development of the application. The annotations are processed to generate a test automation for the application.
As described herein, a system, method, and computer program are provided orchestrating patching of microservices. A plurality of microservice patches are detected, the plurality of microservice patches made available for a plurality of different cloud platforms each provided by a different cloud provider of a plurality of cloud providers. Further, installation of the plurality of microservice patches in a running production system is centrally managed.
As described herein, a system, method, and computer program are provided orchestrating patching of microservices. A plurality of microservice patches are detected, the plurality of microservice patches made available for a plurality of different cloud platforms each provided by a different cloud provider of a plurality of cloud providers. Further, installation of the plurality of microservice patches in a running production system is centrally managed.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
As described herein, a system, method, and computer program are provided for development driven test automation. Annotations are received for an application during development of the application. The annotations are processed to generate a test automation for the application.
As described herein, a system, method, and computer program are provided for dynamically generating assistance information for customer service agents. In use, presence of a customer at a physical retail store is identified. Additionally, information describing the customer is processed, using a machine learning model, to determine an expected outcome of an interaction with the customer occurring within the physical retail store. It is then determined that the customer is to be assisted by a customer service agent. Further, assistance information for the customer service agent is dynamically generated, based at least in part on the expected outcome of the interaction with the customer.
As described herein, a machine learning system, method, and computer program are provided for evaluation of customer service agents. In use, presence of a customer at retail store is identified. Additionally, information associated with the customer is processed, using a machine learning model, to determine an expected outcome of an interaction with the customer occurring within the retail store. Further, after the interaction by an agent of the retail store with the customer, an actual outcome of the interaction is determined. Still yet, the agent is evaluated by comparing the actual outcome with the expected outcome. A result of the evaluation is then output, such as for use in assigning the agent to future in-store customers.
A system, method, and computer program are provided for processing a billing item. In use, a first dataset is collected including a plurality of records. The first dataset includes customer records, billing records (with billing item(s)) for each of the customers, and call incident records (with calling customer identification, billing record identification, and billing item identification). Additionally, a first AI-model is trained using the first dataset to recognize at least one pair of a first customer type and a first billing item type, and an associated first probability that such pair results in a call to the call-center. Further, a second dataset is collected including new billing records. The first AI-model is used to detect at least one billing record in the second dataset having probability higher than a redefined threshold probability that the customer associated with the billing record will call a call-center.
As described herein, a system, method, and computer program are provided for online data transfer. Content to be transferred to a destination device over a network is identified, where the content is constructed from a plurality of components. The plurality of components of the content are determined. A plurality of links corresponding to the plurality of components are retrieved, where each link of the plurality of links corresponds to a different component of the plurality of components. The plurality of links are transferred to the destination device over the network.
As described herein, a system, method, and computer program are provided for anomaly detection in time-series data with mixed seasonality. In use, time-series data of a mixed seasonality type is received. Additionally, the time-series data is segmented, by a defined unit of time, to form a plurality of time-series data segments. Further, the plurality of time-series data segments are processed to determine one or more patterns across the plurality of time-series data segments. Still yet, the one or more patterns are stored and used to perform pattern matching for an input time-series.
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
57.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR GENERATING A NETWORK SLICE EXPERIENCE INDEX FOR EVALUATING A NETWORK SLICE
As described herein, a system, method, and computer program are provided for generating a network slice experience index for evaluating a network slice. In use, a guaranteed quality of experience (QoE) is determined for a slice of a network. For at least one point in time, an actual QoE of the network overall is measured. A slice experience index is generated based on a delta between the guaranteed QoE and the actual QoE. The slice of the network is evaluated using the slice experience index.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
58.
System, method, and computer program for unobtrusive propagation of solutions for detected incidents in computer applications
As described herein, a system, method, and computer program are provided for unobtrusive propagation of solutions for detected incidents in computer applications. A plurality of incidents detected in association with execution of at least one application are identified, the plurality of incidents being detected for the purpose of being addressed with a solution. The plurality of incidents are aggregated to identify one or more unique incidents. For each unique incident of the one or more unique incidents, at least one of machine learning or natural language processing is used to generate a plurality of ranked solutions for the unique incident, a selection of one solution of the plurality of ranked solutions is received, and the selected solution is deployed to one or more environments on which the unique incident was detected, utilizing a blockchain.
G06F 16/2457 - Query processing with adaptation to user needs
G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
59.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR INTELLIGENT SELF-HEALING OPTIMIZATION FOR FALLOUT REDUCTION
As described herein, a system, method, and computer program are provided for intelligent self-healing optimization for fallout reduction. A set of self-healing rules are stored that are configured to provide resolutions to failures detected in a computer process. Data associated with use of the self-healing rules is collected. The data is processed using a machine learning model to generate one or more recommendations for optimizing the set of self-healing rules. The one or more recommendations are output.
As described herein, a system, method, and computer program are provided for unobtrusive propagation of solutions for detected incidents in computer applications. A plurality of incidents detected in association with execution of at least one application are identified, the plurality of incidents being detected for the purpose of being addressed with a solution. The plurality of incidents are aggregated to identify one or more unique incidents. For each unique incident of the one or more unique incidents, at least one of machine learning or natural language processing is used to generate a plurality of ranked solutions for the unique incident, a selection of one solution of the plurality of ranked solutions is received, and the selected solution is deployed to one or more environments on which the unique incident was detected, utilizing a blockchain.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
As described herein, a system, method, and computer program are provided for using machine learning to make site specific 5G network recommendations. In use, data associated with a 5G network deployment at a particular site is collected. Further, the data is processed using a machine learning model to generate one or more recommendations for at least one of products or services capable of being used with the 5G network deployment.
As described herein, a system, method, and computer program are provided for intelligent self-healing optimization for fallout reduction. A set of self-healing rules are stored that are configured to provide resolutions to failures detected in a computer process. Data associated with use of the self-healing rules is collected. The data is processed using a machine learning model to generate one or more recommendations for optimizing the set of self-healing rules. The one or more recommendations are output.
As described herein, a system, method, and computer program are provided for using machine learning to make site specific 5G network recommendations. In use, data associated with a 5G network deployment at a particular site is collected. Further, the data is processed using a machine learning model to generate one or more recommendations for at least one of products or services capable of being used with the 5G network deployment.
As described herein, a system, method, and computer program are provided for intelligent value stream management. In use, a questionnaire is generated for a plurality of customers of an organization, wherein the organization provides a platform running a plurality of services for use by the customers. The plurality of customers are provided with access to the questionnaire. Answers to the questionnaire are received from at least one customer of the plurality of customers. Data associated with actual usage of the plurality of services is collected. The answers received from the at least one customer and the collected data are processed, using a machine learning model, to predict at least one change to be made with respect to the plurality of services.
As described herein, a system, method, and computer program are provided for intelligent value stream management. In use, a questionnaire is generated for a plurality of customers of an organization, wherein the organization provides a platform running a plurality of services for use by the customers. The plurality of customers are provided with access to the questionnaire. Answers to the questionnaire are received from at least one customer of the plurality of customers. Data associated with actual usage of the plurality of services is collected. The answers received from the at least one customer and the collected data are processed, using a machine learning model, to predict at least one change to be made with respect to the plurality of services.
As described herein, a system, method, and computer program are provided for using shared customer data and artificial intelligence to predict customer classifications. A first system of a first business entity receives an artificial intelligence model generated using output of a secure multi-party computation applied to: a first schema of first customer data stored by the first system, and a second schema of second customer data stored by a second system of a second business entity. Additionally, the first system executes the artificial intelligence model on the first customer data stored by the first system to generate a predictor, the predictor configured to receive input and process the input to predict a classification for the input. Further, the first system distributes the predictor for use by the second system of the second business entity to predict at least one classification for the second customer data.
As described herein, a system, method, and computer program are provided for smart user alert messaging. In use, raw information associated with usage of a communication service by a customer is identified. Additionally, the raw information is processed, using artificial intelligence, to infer one or more aspects of a status of the customer. Further, one or more alerts is generated for the customer, based on the raw information and the one or more aspects of the status of the customer.
A system, method, and computer program are provided for smart user alert messaging. In use, raw information associated with usage of a communication service by a customer is identified. Additionally, the raw information is processed, using artificial intelligence, to infer one or more aspects of a status of the customer. Further, one or more alerts are generated for the customer, based on the raw information and the one or more aspects of the status of the customer.
A system, method, and computer program product are provided for offering experience-based subscriptions to services. In use, a service package is created for a network service provider, the service package relating to a service experience specific at least to a subset of content accessible over a communication network via the network service provider. Additionally, a user subscription to the service package is received. Further, access to the subset of the content is provided based on the user subscription.
As described herein, a system, method, and computer program are provided for using artificial intelligence for online charging. A request for use of a network service by an entity is identified. Account allowances/balances to which the requested use of the network service can be charged are determined. Insights generated by an artificial intelligence system are accessed, where the insights predict future use of the network service (e.g. that will be charged to each account allowance/balance). A quota size to be requested in association with a select account allowance/balance is determined, based on the request for the use of the network service and the insights. A reservation request to reserve the quota size from the select account allowance/balance is generated. The use of the network service is authorized, when the quota size is reserved from the select account allowance/balance for the use of the network service.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer software for customer management, order management, revenue and billing management, service creation and delivery, service and resource management, service fulfillment and provisioning, service support and assurance, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; computer software that manages customer, product, service and network information, customer interactions, billing, payment and account information, and network usage data in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable computer programs and downloadable computer software for the artificial production of human speech and text; downloadable computer programs and downloadable computer software for natural language processing, generation, understanding and analysis; downloadable computer programs and downloadable computer software for machine-learning based language and speech processing software; downloadable computer chatbot software for simulating conversations; downloadable computer programs and downloadable computer software for creating and generating text; computer hardware and software for cognitive computing; computer hardware and software for artificial intelligence; computer systems, namely, computer hardware and computer software for developing and integrating artificial intelligence, namely, machine learning, deep learning and natural language processing which are capable of collecting, organizing and analyzing data; computer systems, namely computer hardware and computer software that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; electronic publications on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and teaching materials in the field of computing, computer networks, computer storage, computer operating systems, information technology, database management, cloud computing and artificial intelligence. (1) Business management consulting and advisory services in the field of communications, utilities, global computer information network, access provider, financial, and application service provider industries in connection with business process optimization services, customer management, order management, resources management, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management; computer data processing services for artificial intelligence; computer data processing services for cognitive computing; computer data processing services for cloud computing; setting up and conducting commercial exhibitions in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management and electronic business transactions via a global computer network; business consulting services for companies regarding artificial intelligence; business consulting services for companies regarding computer systems that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; business consulting services for companies relating to cloud computing.
(2) Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industrie; Providing online non-downloadable software for use in processing and generating natural language queries; Providing online non-downloadable software using AI (artificial intelligence) for the production of speech and text; Providing online non-downloadable software for multi-modal machine-learning based language, text, and speech processing software; Providing temporary use of online non-downloadable software for facilitating interaction and communication between humans and AI (artificial intelligence) chatbots; Providing temporary use of online non-downloadable software for facilitating multi-modal natural language, speech, text, image, video, and sound input; Providing online non-downloadable chatbot software; research and development services in the field of multi-modal computer natural language processing, artificial intelligence, and machine learning; Providing online non-downloadable software for use in the fields of artificial intelligence, machine learning, natural language generation, statistical learning, mathematical learning, supervised learning, and unsupervised learning; providing information from searchable indexes and databases of information, including text, music, images, videos, software algorithms, mathematical equations, electronic documents, and databases, by means of non-downloadable chatbot software; software as a service (SaaS) services featuring software for artificial intelligence; software as a service (SaaS) services featuring software for cognitive computing; computer programming and computer consulting services for artificial intelligence; computer programming and computer consulting services for cognitive computing.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable and recorded computer software for customer relationship management, order management, and revenue and billing management; Downloadable and recorded computer software for service creation and delivery, namely, for tracking service orders and scheduling delivery of the same; Downloadable and recorded computer software for service and resource management, namely, for managing resource allocation; Downloadable and recorded computer software for service fulfillment and provisioning, namely, for scheduling and managing fulfillment of service orders; Downloadable and recorded computer software for service support and assurance, namely, for tracking customer services and quality assurance metrics; Downloadable and recorded computer software for digital commerce, namely, e- commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable and recorded computer software for advertising management, namely, for disseminating advertising via the Internet; Downloadable and recorded computer software for partner management, namely, for managing the partner lifecycle in the field of 5G services; Downloadable and recorded computer software for business process management being project management software; all of the aforesaid goods in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable and recorded software that manages customer, product, service and network information, customer interactions, billing, payment and account information, and network usage data in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable computer programs and downloadable computer software for the artificial production of human speech and text; downloadable computer programs and downloadable computer software for natural language processing, generation, understanding and analysis; downloadable computer programs and downloadable computer software for machine-learning based language and speech processing software; downloadable computer chatbot software for simulating conversations; downloadable computer programs and downloadable computer software for creating and generating text; computer hardware and recorded software for cognitive computing, namely, utilizing computerized models to simulate the human thought process; computer hardware and recorded software using artificial intelligence for use in software development, machine learning, facial and speech recognition; computer systems, namely, computer hardware and recorded software for developing and integrating artificial intelligence, namely, machine learning, deep learning and natural language processing which are capable of collecting, organizing and analyzing data; computer systems, namely, computer hardware and recorded software that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; electronic publications recorded on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and teaching materials in the field of computing, computer networks, computer storage, computer operating systems, information technology, database management, cloud computing and artificial intelligence. Business management consulting and advisory services in the field of communications, utilities, global computer information network, access provider, financial, and application service provider industries in connection with business process optimization services, customer management, order management, resources management, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management; computer data processing services for artificial intelligence; computer data processing services for cognitive computing; computer data processing services for cloud computing; setting up and conducting commercial exhibitions in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management and electronic business transactions via a global computer network; business consulting services for companies regarding artificial intelligence; business consulting services for companies regarding computer systems that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; business consulting services for companies relating to cloud computing Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries; Providing online non-downloadable software for use in processing and generating natural language queries; Providing online non-downloadable software using artificial intelligence (AI) for the production of speech and text; Providing online non-downloadable software for facilitating multi-modal machine-learning based language, text, and speech processing; Providing temporary use of online non-downloadable software for facilitating interaction and communication between humans and artificial intelligence (AI) chatbots; Providing temporary use of online non-downloadable software for facilitating multi-modal natural language, speech, text, image, video, and sound input; Providing online non-downloadable chatbot software, namely, software for facilitating interaction and communication between humans and artificial intelligence (AI) chatbots; research and development services in the field of multi-modal computer natural language processing, artificial intelligence, and machine learning; Providing online non-downloadable software using artificial intelligence for facilitating machine learning, natural language generation, statistical machine learning, mathematical machine learning, supervised machine learning, and unsupervised machine learning; Providing customized computer searching services, namely, searching and retrieving information at the customer's specific request from searchable indexes and databases of information, including text, music, images, videos, software algorithms, mathematical equations, electronic documents, and databases, by means of non-downloadable online chatbot software; software as a service (SaaS) services featuring software for artificial intelligence for use in software development, machine learning, facial and speech recognition and artificial production of human speech and text; software as a service (SaaS) services featuring software for cognitive computing for use in software development, machine learning, facial and speech recognition and artificial production of human speech and text; computer programming and computer consulting services for artificial intelligence; computer programming and computer technology consulting services for cognitive computing
73.
Machine learning system, method, and computer program for household marketing segmentation
As described herein, a machine learning system, method, and computer program provide marketing segmentation of residential spaces. In use, network usage data is collected from each residential network router of a plurality of residential network routers operating in a different residential space of a plurality of residential spaces. Additionally, the network usage data is processed by a machine learning algorithm to segment the plurality of residential spaces into a plurality of segments. Further, the plurality of segments are output.
As described herein, a system, method, and computer program are provided for normalizing a JSON structure. In use, input defining at least one entity type of a target data structure is received. A source JSON structure is identified. The source JSON structure is traversed for a particular JSON data type to map values in the source JSON structure to corresponding entities of the target data structure based on the at least one entity type defined for the target data structure, where each entity of the target data structure is defined using a relative path between nodes of the source JSON structure.
A system, method, and computer program product are provided for a determining a network situation in a communication network. In use, at least one threshold value of at least one operational parameter of a communication network is obtained, the at least one operational parameter representing at least one operational status of at least one of a computational device or a communication device. Additionally, log data of the communication network is obtained, the log data containing at least one value of the at least one operational parameter reported by at least one network entity of the communication network. The at least one value of the at least one operational parameter of the log data is compared with a corresponding threshold value of the at least one threshold value to form a detection of a network situation. Further, the detection of the network situation is reported if the at least one value of the at least one operational parameter of the log data traverses the corresponding threshold value of the at least one threshold value.
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 12/24 - Arrangements for maintenance or administration
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
As described herein, an automated call distribution system, method, and computer program are provided that use multi-skill based routing. An opportunity to make customer service-related contact with a customer is detected. A plurality of skills required to handle the customer service-related contact is determined, where each required skill is defined as a skill type and one or more corresponding skill values. A plurality of skills of each customer service agent among one or more available customer service agents is determined. The customer service-related contact is managed based on the plurality of skills required to handle the customer service-related contact and the plurality of skills of each customer service agent among the one or more available customer service agents.
As described herein, a system, method, and computer program are provided for generating a network slice experience index for evaluating a network slice. In use, a guaranteed quality of experience (QoE) is determined for a slice of a network. For at least one point in time, an actual QoE of the network overall is measured. A slice experience index is generated based on a delta between the guaranteed QoE and the actual QoE. The slice of the network is evaluated using the slice experience index.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
As described herein, a system, method, and computer program are provided for evaluating third party AI models. A request is received from an interested party to evaluate an AI model created by a third party, where the request includes a portion of private data of the interested party, and an expected output of the AI model when applied to the portion of private data of the interested party. The AI model created by the third party is received. The AI model is evaluated by: causing the AI model to process the portion of private data of the interested party, accessing an actual output of the AI model resulting from the processing, and comparing the actual output with the expected output to generate an evaluation of the AI model. The evaluation of the AI model is then reported to the interested party.
As described herein, a collaborative filtering system, method, and computer program provide a model used to calculate ranked predictions for subscribers. In use, data is received which correlates subscribers of a service provider with offers provided to the subscribers by the service provider, wherein each correlation is associated in the data with an indication of whether the offer was accepted by the subscriber. From the data, a plurality of unique correlations between subscribers and offers are determined. An implicit ranking is calculated for each unique correlation, based on the associated indication of acceptance for correlations matching the unique correlation. Input data is generated that includes each unique correlation with the implicit ranking calculated for the unique correlation. The input data is processed utilizing a collaborative filtering algorithm to generate a model configured to provide predicted implicit rankings for new correlations between subscribers and offers.
As described herein, a system, method, and computer program are provided for blockchain-based entity group management. An instance of a blockchain is maintained for each entity group of a plurality of defined entity groups. Further, the instance of the blockchain maintained for each entity group of the plurality of defined entity groups is utilized to manage group membership for the entity group, and control access by members of the entity group to a plurality of services having functionality configured for the plurality of defined entity groups.
As described herein, a system, method, and computer program are provided for establishing an application interface in an echo system. In use, a plurality of end points in a plurality of applications installed on an echo system are identified. Each end point of the plurality of end points is analyzed to generate a classification for the end point according to one or more parameters. An interface is created between a pair of end points of the plurality of end points, based on the classification generated for each end point in the pair of end points. The interface is established in the echo system for enabling communication between the pair of end points.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
H04L 67/59 - Providing operational support to end devices by off-loading in the network or by emulation, e.g. when they are unavailable
82.
System, method, and computer program for combining results of event processing received from a plurality of virtual servers
A system, method, and computer program are provided for combining results of event processing received from a plurality of virtual processes or servers. In use, an event is sent to a plurality of virtual processes or virtual servers. Further, a result of processing of the event is received from each of the virtual processes or virtual servers. In addition, the results received from the plurality of virtual processes or virtual servers are combined.
As described herein, a system, method, and computer program are provided for preventing user mistakes when making database changes. In use, a user command to modify a database is received. The user command is validated against a plurality of predefined business rules. One or more actions are conditionally performed before executing the user command, based on a result of the validating.
A system, method, and computer program product are provided for centralized consent management. In operation, the consent management system receives user selections from a user indicating which user data is capable of being utilized for analysis by a company. The consent management system stores the user selections of which user data is capable of being utilized for analysis by the company in a consent database. The consent management system generates a consent vector corresponding to the user selections of which user data is capable of being utilized for analysis by the company. Additionally, the consent management system associates the consent vector with a consent vector identification. Further, the consent management system tags incoming data with the consent vector identification to associate a user consent with the incoming data. The consent management system stores and encodes the incoming data. Moreover, the consent management system enforces consent restrictions by conditionally allowing access to the stored data by the company based on corresponding consent vector identifications.
A system, method, and computer program product are provided for parental controls and recommendations based on artificial intelligence. In use, using an artificial intelligence (AI) server, explicit input is received associated with a first presentation of media. Additionally, the AI server is trained based on the explicit input, and using the AI server, implicit filters are created based on the training. Further, using the AI server, the implicit filters are applied to a second presentation of the media.
As described herein, a system, method, and computer program are provided for generating insights from home network router data. In use, network usage/connection data is collected from a home network router operating in a residential space. Additionally, the network usage/connection data is processed to generate insights for the network usage/connection data. Further, the insights are output for display to one or more users.
A system, method, and computer program product are provided for inventory management. In use, at least one order associated with a customer is identified, the order including an order of at least one service. Additionally, the at least one order is decomposed into one or more elements. Further, an infrastructure inventory layer is queried for the one or more elements. In addition, the one or more elements are allocated to the customer and the elements are marked as allocated in a local inventory repository. Furthermore, a service inventory layer is updated based on the allocation of the elements.
As described herein, a system, method, and computer program are provided for proactive 5G leg estimation. During an initial access procedure by a user equipment on a 4G leg of a 4G-LTE network, an eNodeB of the 4G-LTE network computes a parameter for the user equipment. Further, the eNodeB of the 4G-LTE network conditionally allows an addition of a 5G leg to the 4G-LTE network for the user equipment, based on the parameter computed for the user equipment.
As described herein, a system, method, and computer program are provided for network experience optimization using a residential network router. In use, an electronic calendar is accessed by a residential network router. Additionally, the residential network router determines a plurality of events saved to the electronic calendar, wherein the plurality of events require, at least in part, simultaneous network resource (e.g. bandwidth) usage. Further, the plurality of events are prioritized, using the residential network router. Still yet, available network resources are assigned among the plurality of events, using the residential network router, based on the prioritization.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
90.
System, method, and computer program for real-time bidding (RTB) for serving advertisements from edge storage
A method of serving Real Time Bidding (RTB) requests received from client devices based on availability of advertisements (ADs) at an edge storage, comprising using an RTB server for receiving RTB request(s) from one or more client devices for impression(s) in AD placement(s) offered by online content presented by the client device(s) to associated user(s), forwarding the RTB request(s) to AD exchange(s) and receiving in response a plurality of bid offers received from advertisers for purchasing the impression(s) for posting a plurality of ADs, identifying among the plurality of ADs cached AD(s) stored at an edge storage located at an edge of a network serving the client device(s), adjusting bid offers relating to non-cached ADs to reflect cost of network resources required for downloading the non-cached AD(s) and initiating service of AD(s) associated with highest bid offer(s) among the adjusted bid offers and bid offers relating to the cached AD(s).
As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.
H04L 61/3015 - Name registration, generation or assignment
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
92.
System, method, and computer program for identifying foreign keys between distinct tables
As described herein, a system, method, and computer program are provided for identifying foreign keys between distinct tables based on a statistical analysis of table values. In use, a plurality of candidate field combinations are determined between a first table and a second table. A statistical analysis of values stored in fields of each candidate field combination of the plurality of the candidate field combinations is performed. Foreign keys between the first table and the second table are identified, based on a result of the statistical analysis.
G06F 17/18 - Complex mathematical operations for evaluating statistical data
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
93.
Machine learning system, method, and computer program for making payment related customer predictions using remotely sourced data
As described herein, a machine learning system, method, and computer program are provided for making payment related customer predictions using remotely sourced data. A system of a communication service provider (CSP) identifies a customer of the CSP. Additionally, the system collects data from a plurality of data sources independent from the CSP, the data including telephone numbers and/or webpage URLs of other services providers that are associated with making payments. Further, the system processes the collected data to form input data indicating which of the telephone numbers were contacted by the customer and/or webpage URLs were accessed by the customer. Still yet, the system processes the input data using at least one machine learning algorithm to make at least one payment related prediction for the customer. Moreover, the system outputs the at least one payment related prediction made for the customer.
G06Q 20/00 - Payment architectures, schemes or protocols
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04M 15/00 - Arrangements for metering, time-control or time-indication
As described herein, a system, method, and computer program are provided for artificial intelligence (AI) driven automation of application testing. In use, one or more input data sources for an application are processed, using AI, to determine one or more automation objects or nuggets of the application. Supported application or platforms includes Web, API, Mobile devices, Windows or desktop application, power builder applications. Additionally, automated testing is created for the application, based on one or more elements displayed in the application. The system also supports detecting a failure of the automated testing, by identifying the changes in the application elements or nuggets. Failures of the automation can be automatically fixed and deployed to all the impacted automation scripts.
As described herein, a system, method, and computer program are provided for a unified messaging platform deployed on an ephemeral mesh network. A first mobile device identifies an environment category to which the first mobile device is registered is identified. The first mobile device detects a second mobile device that is within a connectivity range of the first mobile device and that is registered to the environment category. The first mobile device establishes a connection with a decentralized ad-hoc mesh network via the second mobile device. The first mobile device uses a unified messaging protocol associated with the decentralized ad-hoc mesh network to communicate with at least the second mobile device.
As described herein, a system, method, and computer program are provided for artificial intelligence (AI) driven automation of application testing. In use, one or more input data sources for an application are processed, using AI, to determine one or more automation objects or nuggets of the application. Supported application or platforms includes Web, API, Mobile devices, Windows or desktop application, power builder applications. Additionally, automated testing is created for the application, based on one or more elements displayed in the application. The system also supports detecting a failure of the automated testing, by identifying the changes in the application elements or nuggets. Failures of the automation can be automatically fixed and deployed to all the impacted automation scripts.
As described herein, a system, method, and computer program are provided for a unified messaging platform deployed on an ephemeral mesh network. A first mobile device identifies an environment category to which the first mobile device is registered is identified. The first mobile device detects a second mobile device that is within a connectivity range of the first mobile device and that is registered to the environment category. The first mobile device establishes a connection with a decentralized ad-hoc mesh network via the second mobile device. The first mobile device uses a unified messaging protocol associated with the decentralized ad-hoc mesh network to communicate with at least the second mobile device.
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H04W 4/02 - Services making use of location information
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
As described herein, a system, method, and computer program are provided for orchestrating re-provisioning of network subscriber dedicated network slices. A request is received from an entity for use of a network. Network slice information indicating a plurality of slices of the network dedicated to a plurality of network subscribers is accessed. Provisioning of one of more slices of the plurality of slices to the entity is orchestrated, according to the request.
As described herein, a system, method, and computer program are provided for orchestrating re-provisioning of network subscriber dedicated network slices. A request is received from an entity for use of a network. Network slice information indicating a plurality of slices of the network dedicated to a plurality of network subscribers is accessed. Provisioning of one of more slices of the plurality of slices to the entity is orchestrated, according to the request.
H04L 41/342 - Signalling channels for network management communication between virtual entities, e.g. orchestrators, SDN or NFV entities
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/0896 - Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
H04L 41/147 - Network analysis or design for predicting network behaviour
100.
System, method, and computer program for dynamic switching between online and offline charging for a network session
As described herein, a system, method, and computer program are provided for dynamic switching between online and offline charging for a network session. In use, a network session is monitored. Additionally, during the network session, one or more characteristics of the network session are determined, based on the monitoring of the network session. Further, a dynamic selection is made between offline charging and online charging for the network session, based on the one or more characteristics of the network session.