According to one aspect of the present invention there is provided a system, method, and computer program product for recovering from a network failure in a communication network using network function virtualization (NFV-based network), the method including: selecting a first network component of the NFV-based network, detecting at least one probable failure of the first network component, selecting a second network component to be used for replacing the instance of the VNF in the first network component prior to a failure of the first network component, and securing at least one resource of the selected second network component for the other instance of the VNF and maintaining, in the selected second network component, an updated copy of data associated with the instance of the VNF in the first network component.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/0659 - Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
2.
System, method, and computer program for orchestrating time-limited AI-inferencing
As described herein, a system, method, and computer program are provided for processing a dataset. In one embodiment, an AI-model to inference the dataset is selected. A plurality of inferencing engines each using the AI-model are initiated, where a number of the inferencing engines that are initiated is calculated according to a predetermined time constraint. The dataset is divided between the plurality of inferencing engines.
As described herein, a system, method, and computer program provide explainability of entity data segmentation based on Boolean friction points. A dataset is processed, using a machine learning model, to calculate a plurality of Shapley values for the dataset, wherein the dataset includes friction points and explanatory variables. The dataset is clustered to generate a plurality of segments, based on the Shapley values. For each segment of the plurality of segments, a global explanation is generated for the segment using a predefined list of Boolean friction columns and the Shapley values.
As described herein, a system, method, and computer program are provided for code customization. A customization of existing code or metadata defining a software application is received, to form a customized version of the software application. The customization is tagged with a label that differentiates the customization from the existing code or metadata. During runtime or compilation time, a conditional logical selection between the existing code or metadata and the customization is made, using the label.
As described herein, a system, method, and computer program are provided for scraping POM data from webpages. A plug-in tool of a web browser receives input defining one or more parameters for extracting page object model (POM) data from a webpage. The plug-in tool automatically extracts the POM data from the webpage based on the one or more parameters defined in the input.
As described herein, a system, method, and computer program are provided for selectively amending a large customer agreement. A written contract for a customer representing an agreement to provision a plurality of telecommunication services at a plurality of sites of the customer is accessed. A user interface is provided presenting, as a plurality of selectable elements, a plurality of items in the written contract. An update to the written contract is received via the user interface. The update is processed as a selective amendment to the written contract to form an amended version of the written contract.
As described herein, an LLM-based chatbot is evolved over at least one iteration. The iteration includes presenting, by a LLM-based evaluator, a question to a LLM-based chatbot during a dialog with the LLM-based chatbot comprised of a sequence of question and answer pairs. The iteration includes receiving, by the LLM- based evaluator, an answer to the question from the LLM-based chatbot. The iteration includes evaluating, by the LLM-based evaluator, the answer according to one or more evaluation metrics and a ground truth. The iteration includes determining, by the LLM-based evaluator, that a result of the evaluation is unsatisfactory. The iteration includes presenting, by the LLM-based evaluator, a follow-up question to the LLM-based chatbot designed to encourage a new answer of the LLM-based chatbot to be satisfactory with respect to the ground truth and to cause an optimization of the LLM-based chatbot.
As described herein, an LLM-based chatbot is evolved over at least one iteration. The iteration includes presenting, by a LLM-based evaluator, a question to a LLM-based chatbot during a dialog with the LLM-based chatbot comprised of a sequence of question and answer pairs. The iteration includes receiving, by the LLM-based evaluator, an answer to the question from the LLM-based chatbot. The iteration includes evaluating, by the LLM-based evaluator, the answer according to one or more evaluation metrics and a ground truth. The iteration includes determining, by the LLM-based evaluator, that a result of the evaluation is unsatisfactory. The iteration includes presenting, by the LLM-based evaluator, a follow-up question to the LLM-based chatbot designed to encourage a new answer of the LLM-based chatbot to be satisfactory with respect to the ground truth and to cause an optimization of the LLM-based chatbot.
As described herein, a system, method, and computer program are provided for optimization of allocation of compute job resources in a multi-cloud environment. A compute job to be run is identified. An optimization target for the compute job is determined. Resource requirements of the compute job and resource availability for a plurality of cloud networks are processed to determine a resource allocation across the plurality of cloud networks that satisfies the optimization target for the compute job. The resource allocation is orchestrated for the compute job.
As described herein, a system, method, and computer program are provided for optimization of allocation of compute job resources in a multi-cloud environment. A compute job to be run is identified. An optimization target for the compute job is determined. Resource requirements of the compute job and resource availability for a plurality of cloud networks are processed to determine a resource allocation across the plurality of cloud networks that satisfies the optimization target for the compute job. The resource allocation is orchestrated for the compute job.
As described herein, a system, method, and computer program are provided for transferring a user subscription between mobile devices of different OEMs. A request to transfer a subscription to a carrier service of a service provider from a first mobile device having a first operating system to a second mobile device having a second operating system is received. A flow for transferring the subscription from the first mobile device having the first operating system to the second mobile device having the second operating system is performed.
As described herein, a system, method, and computer program are provided for intent-based communication service orchestration with generative AI assistance. An intent describing properties of a required service is processed, using a large language model (LLM), to translate the intent into a communication service capable of being orchestrated in a network. The communication service is orchestrated in the network.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
13.
System, method, and computer program for orchestrating time-limited AI-inferencing
As described herein, a system, method, and computer program are provided for processing a dataset. In one embodiment, an AI-model to inference the dataset is selected. A plurality of inferencing engines each using the AI-model are initiated, where a number of the inferencing engines that are initiated is calculated according to a predetermined time constraint. The dataset is divided between the plurality of inferencing engines.
As described herein, a system, method, and computer program are provided for transferring a user subscription between mobile devices of different OEMs. A request to transfer a subscription to a carrier service of a service provider from a first mobile device having a first operating system to a second mobile device having a second operating system is received. A flow for transferring the subscription from the first mobile device having the first operating system to the second mobile device having the second operating system is performed.
As described herein, a system, method, and computer program are provided for intent-based communication service orchestration with generative AI assistance. An intent describing properties of a required service is processed, using a large language model (LLM), to translate the intent into a communication service capable of being orchestrated in a network. The communication service is orchestrated in the network.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
As described herein, a system, method, and computer program are provided for direct API call authentication during an end-to-end test flow. During use of an end-to-end testing framework, a network log is stored that includes an authentication token issued by an identity provider. The authentication token is then used for making a direct API call during a test flow of the end-to-end testing framework.
As described herein, a system, method, and computer program are provided for batching a collection of elements in local memory for processing. A single collection of elements of data is stored in a local memory across a plurality of sub-collections. The single collection of elements is processed on a sub-collection basis, where each sub-collection is removed from the local memory upon completion of the processing of the elements in the sub-collection.
As described herein, a system, method, and computer program are provided for batching a collection of elements in local memory for processing. A single collection of elements of data is stored in a local memory across a plurality of sub-collections. The single collection of elements is processed on a sub-collection basis, where each sub-collection is removed from the local memory upon completion of the processing of the elements in the sub-collection.
As described herein, a system, method, and computer program are provided for leveraging network state information when exposing network capabilities. A request for one or more capabilities of a network is received from an application by a platform that interfaces the network. The platform communicates with an active inventory of the network for handling the request.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/12 - Discovery or management of network topologies
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
20.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR LEVERAGING NETWORK STATE INFORMATION WHEN EXPOSING CORE NETWORK CAPABILITIES
As described herein, a system, method, and computer program are provided for leveraging network state information when exposing network capabilities. A request for one or more capabilities of a network is received from an application by a platform that interfaces the network. The platform communicates with an active inventory of the network for handling the request.
As described herein, a system, method, and computer program are provided for securing a network whose capabilities are accessible by external applications via an API. A request for one or more capabilities of a network is received from an application by an API Gateway of a platform that interfaces the network. Information associated with the request is input to a machine learning model to cause the machine learning model to predict whether the request is at least potentially malicious. The request is prevented from being sent to the network when the machine learning model predicts that the request is at least potentially malicious. The request is sent to the network when the machine learning model predicts that the request is not at least potentially malicious.
As described herein, a system, method, and computer program are provided for securing a network whose capabilities are accessible by external applications via an API. A request for one or more capabilities of a network is received from an application by an API Gateway of a platform that interfaces the network. Information associated with the request is input to a machine learning model to cause the machine learning model to predict whether the request is at least potentially malicious. The request is prevented from being sent to the network when the machine learning model predicts that the request is at least potentially malicious. The request is sent to the network when the machine learning model predicts that the request is not at least potentially malicious.
As described herein, a system, method, and computer program are provided for autoscaling data lake connections. One or more metrics defining a load on one or more data sources included in a data lake are collected. A plurality of processes configured to connect to the data lake to retrieve data therefrom are automatically scaled, as a function of the one or more metrics.
As described herein, a system, method, and computer program are provided for managing quality of 5G network slice services. A latency issue in a 5G network is detected. Information associated with the 5G network is collected. The information is analyzed to determine a network slice provisioned in the 5G network having a quality requirement that is not met as a result of the latency issue. The network slice is reengineered, using the information associated with the 5G network. The reengineered network slice is deployed in the 5G network.
As described herein, a system, method, and computer program provide explainability of entity data segmentation based on Boolean friction points. A dataset is processed, using a machine learning model, to calculate a plurality of Shapley values for the dataset, wherein the dataset includes friction points and explanatory variables. The dataset is clustered to generate a plurality of segments, based on the Shapley values. For each segment of the plurality of segments, a global explanation is generated for the segment using a predefined list of Boolean friction columns and the Shapley values.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR USING A GENERATIVE MODEL TO PROVIDE SEAMLESS ADAPTATION OF CONTENT TO THE REQUIREMENTS OF AN AREA OF JURISDICTION
As described herein, a system, method, and computer program are provided for using a generative model to adapt a content. The content and an indication of one or more content requirements are processed to determine one or more elements of the content that are not in compliance with the content requirements. A generative model is used to adapt the one or more elements of the content to the one or more content requirements. The content having the one or more adapted elements is output.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR USING A GENERATIVE MODEL TO PROVIDE SEAMLESS ADAPTATION OF CONTENT TO THE REQUIREMENTS OF AN AREA OF JURISDICTION
As described herein, a system, method, and computer program are provided for using a generative model to adapt a content. The content and an indication of one or more content requirements are processed to determine one or more elements of the content that are not in compliance with the content requirements. A generative model is used to adapt the one or more elements of the content to the one or more content requirements. The content having the one or more adapted elements is output.
As described herein, a system, method, and computer program are provided for multi-channel application testing using generative AI. A test automation flow generated for an application is accessed. Generative artificial intelligence (AI) is used to automatically adapt the test automation flow to a plurality of versions of the application corresponding to different channels. The plurality of versions of the application are tested using the adapted test automation flows.
As described herein, a system, method, and computer program are provided for multi-channel application testing using generative AI. A test automation flow generated for an application is accessed. Generative artificial intelligence (AI) is used to automatically adapt the test automation flow to a plurality of versions of the application corresponding to different channels. The plurality of versions of the application are tested using the adapted test automation flows.
As described herein, a system, method, and computer program are provided for unifying deployment of microservices. A plurality of microservices to be deployed to a system are determined. Deployments of the plurality of microservices are unified into a single deployment of the plurality of microservices to the system.
As described herein, a system, method, and computer program are provided for data validation during transfer of data from source to target. A transfer of data from a source to a target is detected. The data transferred from the source is compared to data at the target resulting from the transfer. The transfer is validated based on a result of the comparison. A result of the validation is output.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
32.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR UNIFIED DEPLOYMENT OF MICROSEVICES
As described herein, a system, method, and computer program are provided for unifying deployment of microservices. A plurality of microservices to be deployed to a system are determined. Deployments of the plurality of microservices are unified into a single deployment of the plurality of microservices to the system.
As described herein, a system, method, and computer program are provided for using a dynamic threshold mechanism that is utilizing a set of machine learning models to auto-complete user input fields. User access to a form having a plurality of user input fields is detected. One or more of the plurality of user input fields are auto-completed over a sequence of stages, utilizing at least one machine learning model.
As described herein, a system, method, and computer program are provided for using a dynamic threshold mechanism that is utilizing a set of machine learning models to auto-complete user input fields. User access to a form having a plurality of user input fields is detected. One or more of the plurality of user input fields are auto-completed over a sequence of stages, utilizing at least one machine learning model.
As described herein, a system, method, and computer program are provided for providing shard-aware bulk requests for a Cassandra No-SQL database system having a plurality of distributed nodes with replication. A request to perform a database operation on the Cassandra No-SQL database system is received from an application. Token ranges of partition keys included with the request are determined. The request is grouped with a plurality of additional database operation requests to form a bulk request, where requests are grouped by a target node in the Cassandra No-SQL database system such that the target node holds token ranges for all requests included in the bulk request. The bulk request is communicated to the target node of the Cassandra No-SQL database system for processing of the requests included in the bulk request.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
36.
System, method, and computer program for automated generation of feed loader applications
As described herein, a system, method, and computer program are provided for automatic generation of feed loader applications. An input defining configuration details for a target repository is received. The input is used to automatically generate an application configured to load data to the target repository. The application is deployed for use in loading data in one or more given data files to the target repository.
As described herein, a system, method, and computer program are provided for creating a new class of instances. A first dataset comprising a plurality of instances is obtained. A first AI engine is used to classify the plurality of instances into a plurality of classes. Each class of instances of the first dataset is associated with a respective action having a positive result or a lack of the positive result. A class is selected and the respective action is executed on instances of the class. Instances of the selected class for which the respective action resulted in a lack of the positive result are collected. The collection of instances are used to train an AI-model, and/or a second AI engine is used to classify the collection of instances, and/or a plurality of artificial instances are synthesized based on the collection of instances.
A system, method, and computer program are provided for unattended test execution based on impacted application code. A change made to an application is detected. One or more features of the application impacted by the change made to the application are determined. A plurality of existing tests associated with the one or more features of the application impacted by the change made to the application are identified. A probability of each existing test in the plurality of existing tests exposing a defect in the application is predicted. At least a portion of the plurality of existing tests are executed for the application in an order that based on the predicted probabilities.
As described herein, a system, method, and computer program are provided for intent translation to Topology and Orchestration Specification for Cloud Applications (TOSCA) in intent-based orchestration. A microservice of a service and network orchestrator receives an intent defined in a first format associated with a first standard used for modeling and management of network services. The microservice translates the intent defined in the first format to a second format associated with a TOSCA-based model used for modeling and management of network services, to form the intent defined in the second format. The microservice outputs the intent defined in the second format.
As described herein, a system, method, and computer program provide automatic content merging for an optimistic concurrency control mechanism. A concurrency error resulting from a first source requesting a first update to a resource concurrently with a second source requesting a second update to the resource is detected. Responsive to detecting the concurrency error, the first update and the second update are merged to form a merged update. The merged update is saved to the resource.
As described herein, a system, method, and computer program are provided for orchestrating asynchronous processes to prevent data corruption. An orchestrator identifies a first asynchronous process executing in a computer system, wherein the first asynchronous process is configured to update data. The orchestrator detects activation of a second asynchronous process in the computer system which is configured to update the data. The orchestrator prevents the second asynchronous process from executing in the computer system to update the data at least while the first asynchronous process is executing in the computer system, to avoid simultaneous updates to the data by the first asynchronous process and the second asynchronous process.
As described herein, a system, method, and computer program are provided for an exactly once messaging protocol in a publish-subscribe messaging system. A consumer (i.e. subscriber) of a publish-subscribe messaging system is identified. For each required consumer, and for each subscribed topic of the consumer, a new dedicated consumer is created for the topic in the publish-subscribe messaging system. The new dedicated consumer is used to ensure that messages published to the topic are delivered exactly once to each associated consumer.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
As described herein, a system, method, and computer program are provided for making a 5G private network deployment recommendation using machine learning. A plurality of parameter values associated with an enterprise for which a 5G private network is to be deployed are obtained. A machine learning model is used to infer, for the enterprise, an optimal deployment scenario for the 5G private network among a plurality of available deployment scenarios, based on the plurality of parameter values. An indication of the optimal deployment scenario is output as a recommendation for deploying the for the 5G private network for the enterprise.
As described herein, a system, method, and computer program are provided for providing automated management of electronic device inventory. An electronic device is triggered to emit at least one signal capable of being sensed by at least one sensor. The at least one signal emitted by the electronic device is sensed, using the at least one sensor. A physical location of the electronic device is determined, based on the sensed at least one signal. A discrepancy between the physical location of the electronic device and a specified location of the electronic device recorded in an inventory management system is detected. At least one action is performed to handle the discrepancy.
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
45.
System, method, and computer program for an unattended trap for a network brute force attack
As described herein, a system, method, and computer program are provided for an unattended trap for a brute force attack. A brute force attack on private data in a computer network is detected. Secret information expected by the brute force attack is generated. At least one honeypot having the secret information is created in the computer network. A state of the at least one honeypot is updated based on simulated activity.
As described herein, a system, method, and computer program are provided for intent to service mappings in intent-based orchestration. An intent orchestrator receives an intent specifying one or more parameters of a service required for a network. The intent orchestrator translates the intent to one or more basic data types of a plurality of predefined basic data types based on the one or more parameters. The intent orchestrator forms one or more abstract services using the one or more basic data types. The intent orchestrator determines one or more specific services of a network orchestrator that correlate with the one or more abstract services. The intent orchestrator causes the network orchestrator to fulfill the intent using the one or more specific services.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
47.
System, method, and computer program for transferring subscriber identity module (SIM) information for SIM card or eSIM activation
A system, method, and computer program are provided for activating an eSIM from a SIM card or another eSIM. In one implementation, a request to activate an eSIM from a SIM card or another eSIM is received. Additionally, responsive to the request, first information associated with the SIM card or the other eSIM and second information associated with the eSIM is accessed. Further, at least one action to activate the eSIM from the SIM card or the other eSIM is caused to be performed, where the at least one action is based on the first information and the second information.
As described herein, a system, method, and computer program are provided for test-related automatic tracing. A new requirement defined for an application is identified. The new requirement is processed, using a machine learning model, to predict each portion of the new requirement covered by existing test features. One or more new test features are caused to be created for the new requirement, based on the prediction of each portion of the new requirement covered by existing test features.
As described herein, a system, method, and computer program are provided for using machine learning to make intelligent vendor recommendations. In use, a service to be provided at a specified location is identified. A plurality of vendors available to provide the service at the specified location are identified. A plurality of machine learning models are used to make a plurality of predictions for each vendor of the plurality of vendors, the plurality of predictions being associated with the vendor providing the service at the specified location. A vendor of the plurality of vendors is selected for provisioning the service at the specified location, based on the plurality of predictions made for each vendor of the plurality of vendors.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
As described herein, a system, method, and computer program provide real-time language translation using generative artificial intelligence. An input in a first spoken language is received. The input in the first spoken language is processed, using a generative artificial intelligence model, to generate a translation of the input in a second spoken language. The translation is output.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
As described herein, a system, method, and computer program provide real- time language translation using generative artificial intelligence. An input in a first spoken language is received. The input in the first spoken language is processed, using a generative artificial intelligence model, to generate a translation of the input in a second spoken language. The translation is output.
As described herein, a system, method, and computer program are provided for a TOSCA modeling optimization for 5G network orchestration. A template catalog storing one or more network service instance templates is accessed, by a TOSCA-based orchestrator in a 5G network. A network service instance is deployed to the 5G network from the one or more network service instance templates, by the TOSCA-based orchestrator.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
53.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR A TOSCA MODELING OPTIMIZATION FOR 5G NETWORK ORCHESTRATION
As described herein, a system, method, and computer program are provided for a TOSCA modeling optimization for 5G network orchestration. A template catalog storing one or more network service instance templates is accessed, by a TOSCA-based orchestrator in a 5G network. A network service instance is deployed to the 5G network from the one or more network service instance templates, by the TOSCA-based orchestrator.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
54.
System, method, and computer program for unified management of multiple master-agent job execution environments
As described herein, a system, method, and computer program are provided for unified management of multiple master-agent job execution environments. Job scheduling information is accessed for a plurality of different environments each having a corresponding master that schedules job executions across a plurality of respective agents. Unified job scheduling management across the plurality of different environments is provided, using the job scheduling information.
As described herein, a system, method, and computer program are provided for a model driven Non-RT RIC design for O-RAN management and orchestration. One or more features of one or more onboarded Non-RT RIC applications are determined. During run-time of the Non-RT RIC, a set of components are deployed for the Non-RT RIC based on the one or more features of the one or more onboarded Non-RT RIC applications.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
56.
System, method, and computer program for handling business agreement updates requiring orchestration when an orchestration system is unavailable
As described herein, a system, method, and computer program are provided for handling business agreement updates requiring orchestration when an orchestration system is unavailable. A signed update to a business agreement requiring orchestration by an orchestration system is received. It is determined that the orchestration system is unavailable to orchestrate requirements of the signed update to the business agreement. One or more actions are performed to handle the signed update in response to determining that the orchestration system is unavailable.
As described herein, a system, method, and computer program are provided for a media service platform. A media content is parsed to a directed graph, where vertices of the directed graph correspond to entities in the media content and edges of the directed graph define relationships between the entities. One or more creative media capability services are provided, using the directed graph.
As described herein, a system, method, and computer program are provided for a machine-learning model-agnostic cloud-agnostic no-code onboarding platform. In use, a universal unified interface to a Model-Agnostic Onboarding Workflow (MAOW) platform is provided, wherein the MAOW platform is configured as a no-code, model-agnostic, cloud-agnostic platform. Additionally, at least one machine learning model is onboarded using the MAOW platform, based on the universal unified interface. Further, the at least one machine learning model is deployed from the MAOW platform to at least one target environment.
As described herein, a system, method, and computer program are provided for creating a computer program from natural language input. Input is received from a natural language processor. The input is processed, using a machine learning model, to predict an intent of the input. A validation of the intent is performed. The intent is automatically converted to one or more executable computer commands, based on a result of the validation of the intent. The one or more executable computer commands are executed to generate a computer program.
As described herein, a system, method, and computer program are provided for identifying foreign keys between distinct tables based on a statistical analysis of table values. In use, a plurality of candidate field combinations are determined between a first table and a second table. A statistical analysis of values stored in fields of each candidate field combination of the plurality of the candidate field combinations is performed. Foreign keys between the first table and the second table are identified, based on a result of the statistical analysis.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 17/18 - Complex mathematical operations for evaluating statistical data
61.
System, method, and computer program for managing navigational flows between application pages
As described herein, a system, method, and computer program are provided for managing a navigational flow of an application. A navigational flow defined for a plurality of user interfaces of an application is determined. The navigational flow is rendered in an editing tool. An update to the navigational flow is received, via the editing tool. The update is automatically translated into code of the application.
As described herein, a system, method, and computer program are provided for network experience optimization using a residential network router. In use, an electronic calendar is accessed by a residential network router. Additionally, the residential network router determines a plurality of events saved to the electronic calendar, wherein the plurality of events require, at least in part, simultaneous network resource (e.g. bandwidth) usage. Further, the plurality of events are prioritized, using the residential network router. Still yet, available network resources are assigned among the plurality of events, using the residential network router, based on the prioritization.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
63.
System, method, and computer program for dynamic charge computation
As described herein, a system, method, and computer program are provided for dynamic charge computation. In use, a change made to a subscription of a customer is detected, wherein the subscription is associated with a billing cycle. Further, responsive to detecting the change and prior to an end of the billing cycle, at least one charge is computed for the subscription.
As described herein, a system, method, and computer program are provided for blockchain-based entity group management. An instance of a blockchain is maintained for each entity group of a plurality of defined entity groups. Further, the instance of the blockchain maintained for each entity group of the plurality of defined entity groups is utilized to manage group membership for the entity group, and control access by members of the entity group to a plurality of services having functionality configured for the plurality of defined entity groups.
As described herein, a system, method, and computer program are provided for proactive 5G leg estimation. During an initial access procedure by a user equipment on a 4G leg of a 4G-LTE network, an eNodeB of the 4G-LTE network computes a parameter for the user equipment. Further, the eNodeB of the 4G-LTE network conditionally allows an addition of a 5G leg to the 4G-LTE network for the user equipment, based on the parameter computed for the user equipment.
As described herein, a system, method, and computer program are provided for presenting tree data structures in tables. In use, a forest data structure storing data is identified. Additionally, the forest data structure is converted to a plurality of matrices. Further, the plurality of matrices are used to present the data in a table.
As described herein service brokers are used to manage the lifecycle of backing services. In use, a service catalog of backing services available for use by an application is provided. Further, one or more service brokers are used to manage a lifecycle of the backing services.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
As described herein, a system, method, and computer program are provided for an exactly once messaging protocol in a publish-subscribe messaging system. A consumer (i.e. subscriber) of a publish-subscribe messaging system is identified. For each required consumer, and for each subscribed topic of the consumer, a new dedicated consumer is created for the topic in the publish-subscribe messaging system. The new dedicated consumer is used to ensure that messages published to the topic are delivered exactly once to each associated consumer.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
As described herein, a system, method, and computer program are provided for securing container images. In use, a request to access a container image is identified. In response to the request, a digest of the container image is retrieved. The digest is validated according to an execution and business context. A response to the request is provided, based on a result of the validating.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
70.
System, method, and computer program for AWS autoscaling of Tuxedo systems
As described herein, a system, method, and computer program are provided for AWS autoscaling of Tuxedo systems. In use, an AWS cloud based deployment of a Tuxedo system is identified. Further, autoscaling of the Tuxedo system is provided in accordance with an autoscaling configuration of the AWS, using a Tuxedo registrar that maps AWS EC2 DNS names or internet protocol (IP) addresses with Tuxedo-compliant names capable of being used by the Tuxedo system.
H04L 61/3015 - Name registration, generation or assignment
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
71.
System, method, and computer program for generating a context visualization during test automation
As described herein, a system, method, and computer program are provided for generating a context visualization during test automation. In use, during automated testing of a user interface application, an inspection of an element within a user interface of the user interface application is detected. Additionally, in response to detecting the inspection of the element, a visualization of the element within the user interface is generated. Further, the visualization of the element within the user interface is presented with information associated with the inspection of the element.
As described herein, a system, method, and computer program are provided for a model driven Non-RT RIC design for O-RAN management and orchestration. One or more features of one or more onboarded Non-RT RIC applications are determined. During run-time of the Non-RT RIC, a set of components are deployed for the Non-RT RIC based on the one or more features of the one or more onboarded Non-RT RIC applications.
As described herein, a system, method, and computer program are provided for using metric valuations in anomaly scoring. In use, a score calculated for a metric used for anomaly detection is identified. Additionally, the score is weighted, based on a valuation defined for the metric, to form a weighted score. Further, at least one action is caused to be performed, based on the weighted score.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/142 - Network analysis or design using statistical or mathematical methods
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business management consulting and advisory services in the field of communications, utilities, global computer information network, access provider, financial, and application service provider industries in connection with business process optimization services, customer management, order management, resources management, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management; computer data processing services for artificial intelligence; computer data processing services for cognitive computing; computer data processing services for cloud computing; setting up and conducting commercial exhibitions in the field of computers, computer services, information technology, artificial intelligence, cloud computing, blockchain technology, quantum computing, database management and electronic business transactions via a global computer network; business consulting services for companies regarding artificial intelligence; business consulting services for companies regarding computer systems that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions and capable of understanding general human queries and formulating responses; business consulting services for companies relating to cloud computing. Downloadable and recorded computer software for customer management, order management, revenue and billing management, service creation and delivery, service and resource management, service fulfillment and provisioning, service support and assurance, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable and recorded computer software that manages customer, product, service and network information, customer interactions, billing, payment and account information, and network usage data in the communications, utilities, global computer information network, access provider, financial, and application service provider industries; Downloadable computer programs and downloadable computer software for the artificial production of human speech and text; downloadable computer programs and downloadable computer software for natural language processing, generation, understanding and analysis; downloadable computer programs and downloadable computer software for machine-learning based language and speech processing software; downloadable computer chatbot software for simulating conversations; downloadable computer programs and downloadable computer software for creating and generating text; computer hardware and downloadable and recorded software for cognitive computing; computer hardware and downloadable and recorded software using artificial intelligence for machine learning; computer systems, namely, computer hardware and downloadable and recorded computer software for developing and integrating artificial intelligence, namely, machine learning, deep learning and natural language processing which are capable of collecting, organizing and analyzing data; computer systems, namely computer hardware and downloadable and recorded computer software that integrate Natural Language Processing (NLP), Computational Linguistics (CL), Information Retrieval (IR) and Machine Learning (ML) functions for understanding general human queries and formulating responses; electronic publications recorded on computer media, namely, user manuals, guide books, brochures, information sheets, written presentations and teaching materials in the field of computing, computer networks, computer storage, computer operating systems, information technology, database management, cloud computing and artificial intelligence. Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, digital commerce and advertising management, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries; Providing temporary use of online non-downloadable software for use in processing and generating natural language queries; Providing temporary use of online non-downloadable software using AI (artificial intelligence) for the production of speech and text; Providing temporary use of online non-downloadable software for multi-modal machine-learning based language, text, and speech processing software; Providing temporary use of online non-downloadable software for facilitating interaction and communication between humans and AI (artificial intelligence) chatbots; Providing temporary use of online non-downloadable software for facilitating multi-modal natural language, speech, text, image, video, and sound input; Providing temporary use of online non-downloadable chatbot software for replying to questions from online customers; research and development services in the field of multi-modal computer natural language processing, artificial intelligence, and machine learning; Providing temporary use of online non-downloadable software using artificial intelligence for machine learning, natural language generation, statistical learning, mathematical learning, supervised learning, and unsupervised learning; providing information from searchable indexes and databases of information, including text, music, images, videos, software algorithms, mathematical equations, electronic documents, and databases, by means of non-downloadable chatbot software; software as a service (SaaS) services featuring software using artificial intelligence for use in software development and machine learning; software as a service (SaaS) services featuring software using cognitive computing for use in software development and machine learning; computer programming and computer programming consulting services for artificial intelligence; computer programming and computer programming consulting services for cognitive computing.
75.
System, method, and computer program for defect resolution
As described herein, a system, method, and computer program are provided for defect resolution. Information associated with a defect detected in a computer system is received. The information is processed, using a first machine learning model, to predict a source of the defect. The information and the source of the defect are processed, using a second machine learning model, to predict one or more parameters for handling the defect. One or more actions are caused to be performed to resolve the defect, based on the predicted one or more parameters for handling the defect.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
76.
System, method, and computer program for protecting against unintentional deletion of an eSIM from a mobile device
A system, method, and computer program are provided for protecting against unintentional deletion of an eSIM from a mobile device. In use, deletion of an eSIM from a mobile device is detected. Additionally, definitions of predefined scenarios indicative of unintentional deletions of eSIMs are accessed. Further, the detected deletion is analyzed, using the definitions, to determine that the detected deletion is unintentional. Still yet, a proactive care action is caused to be performed to address the unintentional deletion of the eSIM from the mobile device.
As described herein, a system, method, and computer program provide a computer attack response service. In use, a notification is received that a transfer of at least one electronic file to a computing device has been detected as a potential incoming threat to the computing device. Responsive to the receiving the notification, at least one honeypot is created. Additionally, data within the at least one electronic file is accessed, using the at least one honeypot. Responsive to accessing the data within the at least one electronic file, activity associated with the incoming threat is monitored.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Business management consulting and advisory services in the field of global computer information network, access provider, financial, and application service provider industries in connection with customer management, order management, resources management, service fulfillment and provisioning and partner management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management excluding advisory and consulting services in the field of advertising and marketing.
(2) Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Business management consulting and advisory services in the field of global computer information network, access provider, financial, and application service provider industries in connection with customer management, order management, resources management, service fulfillment and provisioning, and partner management; business management consulting and business management advisory services in the field of computer hardware and software system implementation and integration for others; business management consulting and advisory services in the field of revenue and billing management, excluding advisory and consulting services in the field of advertising and marketing. Technical support services, namely, troubleshooting of computer software problems in connection with customer management, order management, revenue and billing management, service creation and delivery, service fulfillment and provisioning, partner management, and business process management in the communications, utilities, global computer information network, access provider, financial and application service provider industries.
80.
System, method, and computer program for development driven test automation
A system, method, and computer program are provided for development driven test automation. Annotations are received for an application during development of the application. The annotations are processed to generate a test automation for the application.
As described herein, a system, method, and computer program are provided orchestrating patching of microservices. A plurality of microservice patches are detected, the plurality of microservice patches made available for a plurality of different cloud platforms each provided by a different cloud provider of a plurality of cloud providers. Further, installation of the plurality of microservice patches in a running production system is centrally managed.
As described herein, a system, method, and computer program are provided orchestrating patching of microservices. A plurality of microservice patches are detected, the plurality of microservice patches made available for a plurality of different cloud platforms each provided by a different cloud provider of a plurality of cloud providers. Further, installation of the plurality of microservice patches in a running production system is centrally managed.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
As described herein, a system, method, and computer program are provided for development driven test automation. Annotations are received for an application during development of the application. The annotations are processed to generate a test automation for the application.
As described herein, a system, method, and computer program are provided for dynamically generating assistance information for customer service agents. In use, presence of a customer at a physical retail store is identified. Additionally, information describing the customer is processed, using a machine learning model, to determine an expected outcome of an interaction with the customer occurring within the physical retail store. It is then determined that the customer is to be assisted by a customer service agent. Further, assistance information for the customer service agent is dynamically generated, based at least in part on the expected outcome of the interaction with the customer.
As described herein, a machine learning system, method, and computer program are provided for evaluation of customer service agents. In use, presence of a customer at retail store is identified. Additionally, information associated with the customer is processed, using a machine learning model, to determine an expected outcome of an interaction with the customer occurring within the retail store. Further, after the interaction by an agent of the retail store with the customer, an actual outcome of the interaction is determined. Still yet, the agent is evaluated by comparing the actual outcome with the expected outcome. A result of the evaluation is then output, such as for use in assigning the agent to future in-store customers.
A system, method, and computer program are provided for processing a billing item. In use, a first dataset is collected including a plurality of records. The first dataset includes customer records, billing records (with billing item(s)) for each of the customers, and call incident records (with calling customer identification, billing record identification, and billing item identification). Additionally, a first AI-model is trained using the first dataset to recognize at least one pair of a first customer type and a first billing item type, and an associated first probability that such pair results in a call to the call-center. Further, a second dataset is collected including new billing records. The first AI-model is used to detect at least one billing record in the second dataset having probability higher than a redefined threshold probability that the customer associated with the billing record will call a call-center.
As described herein, a system, method, and computer program are provided for online data transfer. Content to be transferred to a destination device over a network is identified, where the content is constructed from a plurality of components. The plurality of components of the content are determined. A plurality of links corresponding to the plurality of components are retrieved, where each link of the plurality of links corresponds to a different component of the plurality of components. The plurality of links are transferred to the destination device over the network.
As described herein, a system, method, and computer program are provided for anomaly detection in time-series data with mixed seasonality. In use, time-series data of a mixed seasonality type is received. Additionally, the time-series data is segmented, by a defined unit of time, to form a plurality of time-series data segments. Further, the plurality of time-series data segments are processed to determine one or more patterns across the plurality of time-series data segments. Still yet, the one or more patterns are stored and used to perform pattern matching for an input time-series.
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
89.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR GENERATING A NETWORK SLICE EXPERIENCE INDEX FOR EVALUATING A NETWORK SLICE
As described herein, a system, method, and computer program are provided for generating a network slice experience index for evaluating a network slice. In use, a guaranteed quality of experience (QoE) is determined for a slice of a network. For at least one point in time, an actual QoE of the network overall is measured. A slice experience index is generated based on a delta between the guaranteed QoE and the actual QoE. The slice of the network is evaluated using the slice experience index.
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
90.
System, method, and computer program for unobtrusive propagation of solutions for detected incidents in computer applications
As described herein, a system, method, and computer program are provided for unobtrusive propagation of solutions for detected incidents in computer applications. A plurality of incidents detected in association with execution of at least one application are identified, the plurality of incidents being detected for the purpose of being addressed with a solution. The plurality of incidents are aggregated to identify one or more unique incidents. For each unique incident of the one or more unique incidents, at least one of machine learning or natural language processing is used to generate a plurality of ranked solutions for the unique incident, a selection of one solution of the plurality of ranked solutions is received, and the selected solution is deployed to one or more environments on which the unique incident was detected, utilizing a blockchain.
G06F 16/2457 - Query processing with adaptation to user needs
G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
91.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR INTELLIGENT SELF-HEALING OPTIMIZATION FOR FALLOUT REDUCTION
As described herein, a system, method, and computer program are provided for intelligent self-healing optimization for fallout reduction. A set of self-healing rules are stored that are configured to provide resolutions to failures detected in a computer process. Data associated with use of the self-healing rules is collected. The data is processed using a machine learning model to generate one or more recommendations for optimizing the set of self-healing rules. The one or more recommendations are output.
As described herein, a system, method, and computer program are provided for unobtrusive propagation of solutions for detected incidents in computer applications. A plurality of incidents detected in association with execution of at least one application are identified, the plurality of incidents being detected for the purpose of being addressed with a solution. The plurality of incidents are aggregated to identify one or more unique incidents. For each unique incident of the one or more unique incidents, at least one of machine learning or natural language processing is used to generate a plurality of ranked solutions for the unique incident, a selection of one solution of the plurality of ranked solutions is received, and the selected solution is deployed to one or more environments on which the unique incident was detected, utilizing a blockchain.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
As described herein, a system, method, and computer program are provided for using machine learning to make site specific 5G network recommendations. In use, data associated with a 5G network deployment at a particular site is collected. Further, the data is processed using a machine learning model to generate one or more recommendations for at least one of products or services capable of being used with the 5G network deployment.
As described herein, a system, method, and computer program are provided for intelligent self-healing optimization for fallout reduction. A set of self-healing rules are stored that are configured to provide resolutions to failures detected in a computer process. Data associated with use of the self-healing rules is collected. The data is processed using a machine learning model to generate one or more recommendations for optimizing the set of self-healing rules. The one or more recommendations are output.
As described herein, a system, method, and computer program are provided for using machine learning to make site specific 5G network recommendations. In use, data associated with a 5G network deployment at a particular site is collected. Further, the data is processed using a machine learning model to generate one or more recommendations for at least one of products or services capable of being used with the 5G network deployment.
As described herein, a system, method, and computer program are provided for intelligent value stream management. In use, a questionnaire is generated for a plurality of customers of an organization, wherein the organization provides a platform running a plurality of services for use by the customers. The plurality of customers are provided with access to the questionnaire. Answers to the questionnaire are received from at least one customer of the plurality of customers. Data associated with actual usage of the plurality of services is collected. The answers received from the at least one customer and the collected data are processed, using a machine learning model, to predict at least one change to be made with respect to the plurality of services.
As described herein, a system, method, and computer program are provided for intelligent value stream management. In use, a questionnaire is generated for a plurality of customers of an organization, wherein the organization provides a platform running a plurality of services for use by the customers. The plurality of customers are provided with access to the questionnaire. Answers to the questionnaire are received from at least one customer of the plurality of customers. Data associated with actual usage of the plurality of services is collected. The answers received from the at least one customer and the collected data are processed, using a machine learning model, to predict at least one change to be made with respect to the plurality of services.
As described herein, a system, method, and computer program are provided for using shared customer data and artificial intelligence to predict customer classifications. A first system of a first business entity receives an artificial intelligence model generated using output of a secure multi-party computation applied to: a first schema of first customer data stored by the first system, and a second schema of second customer data stored by a second system of a second business entity. Additionally, the first system executes the artificial intelligence model on the first customer data stored by the first system to generate a predictor, the predictor configured to receive input and process the input to predict a classification for the input. Further, the first system distributes the predictor for use by the second system of the second business entity to predict at least one classification for the second customer data.
As described herein, a system, method, and computer program are provided for smart user alert messaging. In use, raw information associated with usage of a communication service by a customer is identified. Additionally, the raw information is processed, using artificial intelligence, to infer one or more aspects of a status of the customer. Further, one or more alerts is generated for the customer, based on the raw information and the one or more aspects of the status of the customer.
A system, method, and computer program are provided for smart user alert messaging. In use, raw information associated with usage of a communication service by a customer is identified. Additionally, the raw information is processed, using artificial intelligence, to infer one or more aspects of a status of the customer. Further, one or more alerts are generated for the customer, based on the raw information and the one or more aspects of the status of the customer.