Patent application number | Description | Published |
20080215516 | Systems and Methods for Predicting Consequences of Misinterpretation of User Commands in Automated Systems - Systems and methods are provided for processing and executing commands in automated systems. For example, command processing systems and methods are provided which can automatically determine, evaluate or otherwise predict consequences of execution of misrecognized or misinterpreted user commands in automated systems and thus prevent undesirable or dangerous consequences that can result from execution of misrecognized/misinterpreted commands. | 09-04-2008 |
20080221903 | Hierarchical Methods and Apparatus for Extracting User Intent from Spoken Utterances - Improved techniques are disclosed for permitting a user to employ more human-based grammar (i.e., free form or conversational input) while addressing a target system via a voice system. For example, a technique for determining intent associated with a spoken utterance of a user comprises the following steps/operations. Decoded speech uttered by the user is obtained. An intent is then extracted from the decoded speech uttered by the user. The intent is extracted in an iterative manner such that a first class is determined after a first iteration and a sub-class of the first class is determined after a second iteration. The first class and the sub-class of the first class are hierarchically indicative of the intent of the user, e.g., a target and data that may be associated with the target. The multi-stage intent extraction approach may have more than two iterations. By way of example only, the user intent extracting step may further determine a sub-class of the sub-class of the first class after a third iteration, such that the first class, the sub-class of the first class, and the sub-class of the sub-class of the first class are hierarchically indicative of the intent of the user. | 09-11-2008 |
20080270136 | Methods and Apparatus for Use in Speech Recognition Systems for Identifying Unknown Words and for Adding Previously Unknown Words to Vocabularies and Grammars of Speech Recognition Systems - The present invention concerns methods and apparatus for identifying and assigning meaning to words not recognized by a vocabulary or grammar of a speech recognition system. In an embodiment of the invention, the word may be in an acoustic vocabulary of the speech recognition system, but may be unrecognized by an embedded grammar of a language model of the speech recognition system. In another embodiment of the invention, the word may not be recognized by any vocabulary associated with the speech recognition system. In embodiments of the invention, at least one hypothesis is generated for an utterance not recognized by the speech recognition system. If the at least one hypothesis meets at least one predetermined criterion, a sword or more corresponding to the at least one hypothesis is added to the vocabulary of the speech recognition system. In other embodiments of the invention, before adding the word to the vocabulary of the speech recognition system, the at least one hypothesis may be presented to the user of the speech recognition system to determine if that is what the used intended when the user spoke. | 10-30-2008 |
20090083037 | INTERACTIVE DEBUGGING AND TUNING OF METHODS FOR CTTS VOICE BUILDING - A method, a system, and an apparatus for identifying and correcting sources of problems in synthesized speech which is generated using a concatenative text-to-speech (CTTS) technique. The method can include the step of displaying a waveform corresponding to synthesized speech generated from concatenated phonetic units. The synthesized speech can be generated from text input received from a user. The method further can include the step of displaying parameters corresponding to at least one of the phonetic units. The method can include the step of displaying the original recordings containing selected phonetic units. An editing input can be received from the user and the parameters can be adjusted in accordance with the editing input. | 03-26-2009 |
20090132230 | MULTI-HOP NATURAL LANGUAGE TRANSLATION - Illustrative embodiments provide a computer implemented method and apparatus, in the form of a data processing system, and a computer program product for optimizing a natural language translation. In one illustrative embodiment, the computer implemented method comprises receiving a request from a requester, wherein the request comprises source language data, an indication of a source language and a destination language, and determining whether a translation between the source language and the destination language is needed. Identifying a mapping between the source language and the destination language includes a set of hops, the method, responsive to a determination that the translation is needed, translates the source language data into a destination language data associated with each successive hop in the set of hops in the mapping and returns the destination language data to the requester at a destination hop. | 05-21-2009 |
20090132419 | OBFUSCATING SENSITIVE DATA WHILE PRESERVING DATA USABILITY - A method and system for obfuscating sensitive data while preserving data usability. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed. | 05-21-2009 |
20090132575 | MASKING RELATED SENSITIVE DATA IN GROUPS - A method and system of masking a group of related data values. A record in an unmasked data file of n records is read. The record includes a first set of data values of data elements included in a related data group (RDG) and one or more data values of one or more data elements external to the RDG. A random number k is received. A second set of data values is retrieved from a lookup table that associates n key values with n sets of data values. Retrieving the second set of data values includes identifying that the second set of data values is associated with a key value of k. The n sets of data values are included in the umnasked data file's n records. The record is masked by replacing the first set of data values with the retrieved second set of data values. | 05-21-2009 |
20100184011 | MACHINE, SYSTEM AND METHOD FOR USER-GUIDED TEACHING OF DEICTIC REFERENCES AND REFERENT OBJECTS OF DEICTIC REFERENCES TO A CONVERSATIONAL COMMAND AND CONTROL SYSTEM - A machine, system and method for user-guided teaching of deictic references and referent objects of deictic references to a conversational system. The machine includes a system bus for communicating data and control signals received from the conversational system to the computer system, a data and control bus for connecting devices and sensors in the machine, a bridge module for connecting the data and control bus to the system bus, respective machine subsystems coupled to the data and control bus, the respective machine subsystems having a respective user interface for receiving a deictic reference from a user, a memory coupled to the system bus for storing deictic references and objects of the deictic references learned by the conversational system and a central processing unit coupled to the system bus for executing the deictic references with respect to the objects of the deictic references learned. | 07-22-2010 |
20100185445 | MACHINE, SYSTEM AND METHOD FOR USER-GUIDED TEACHING AND MODIFYING OF VOICE COMMANDS AND ACTIONS EXECUTED BY A CONVERSATIONAL LEARNING SYSTEM - A machine, system and method for user-guided teaching and modifications of voice commands and actions to be executed by a conversational learning system. The machine includes a system bus for communicating data and control signals received from the conversational learning system to a computer system, a vehicle data and control bus for connecting devices and sensors in the machine, a bridge module for connecting the vehicle data and control bus to the system bus, machine subsystems coupled to the vehicle data and control bus having a respective user interface for receiving a voice command or input signal from a user, a memory coupled to the system bus for storing action command sequences learned for a new voice command and a processing unit coupled to the system bus for automatically executing the action command sequences learned when the new voice command is spoken. | 07-22-2010 |
20110077993 | REMOTE MANAGED SERVICES IN MARKETPLACE ENVIRONMENT - Registration of a plurality of customers, each having an information technology infrastructure, with a manager of remote services is facilitated. Registration of a plurality of service partners with the manager is also facilitated. The manager detects an issue with a given one of the information technology infrastructures of a given one of the customers. Responsive to the detecting, responses from a subset of the service partners for potential selection to address the issue are facilitated. The partners in the subset are ranked based at least in part on ratings of the service partners in a rating database. A top-ranked one of the service partners is assigned to address the issue. | 03-31-2011 |
20110138047 | PROVISIONING SERVICES USING A CLOUD SERVICES CATALOG - The present invention provides a system and method for provisioning Cloud services by establishing a Cloud services catalog using a Cloud service bus within a Cloud computing environment. In one embodiment, there is a Cloud services catalog manager configured to connect a plurality of Clouds in a Cloud computing environment; maintain a catalog of integrated Cloud services from the plurality of connected Clouds; and display an index of the integrated services on a user interface. Using this system and method will allow for multiple disparate services, offered by different partners, across unrelated, physically distinct Clouds to be presented as an index of integrated services. | 06-09-2011 |
20110235544 | Method For Optimizing Network Mapping Tool Discovery - In accordance with one aspect of the embodiments of this invention there is a method to operate a network mapping tool. The method includes performing a network mapping operation over a first set of ports to generate a list of hosts that are found to be alive; performing a sequential scan on only those hosts in the list to detect the operating system of each host in the list; and performing a parallel port scan to detect characteristics of only those hosts in the list. The characteristics can include an identification of at least applications and services running on the hosts in the list. The second set of ports can be a full set of ports. | 09-29-2011 |
20110238582 | Service Method For Customer Self-Service And Rapid On-Boarding For Remote Information Technology Infrastructure Monitoring And Management - In accordance with one aspect of the embodiments of this invention there is a method to initiate remote managed infrastructure services for a customer infrastructure site. The method includes, in response to an inquiry from a potential customer, provisioning the potential customer with a remote managed infrastructure services software client; using the provisioned software client, performing an automated process to detect specifics of a customer information technology infrastructure; in response to the customer confirming the detected specifics of customer information technology infrastructure, configuring a remote managed infrastructure service to monitor and manage all or a subset of the detected and confirmed customer information technology infrastructure. | 09-29-2011 |
20120044183 | MULTIMODAL AGGREGATING UNIT - In a voice processing system, a multimodal request is received from a plurality of modality input devices, and the requested application is run to provide a user with the feedback of the multimodal request. In the voice processing system, a multimodal aggregating unit is provided which receives a multimodal input from a plurality of modality input devices, and provides an aggregated result to an application control based on the interpretation of the interaction ergonomics of the multimodal input within the temporal constraints of the multimodal input. Thus, the multimodal input from the user is recognized within a temporal window. Interpretation of the interaction ergonomics of the multimodal input include interpretation of interaction biometrics and interaction mechani-metrics, wherein the interaction input of at least one modality may be used to bring meaning to at least one other input of another modality. | 02-23-2012 |
20120046945 | MULTIMODAL AGGREGATING UNIT - In a voice processing system, a multimodal request is received from a plurality of modality input devices, and the requested application is run to provide a user with the feedback of the multimodal request. In the voice processing system, a multimodal aggregating unit is provided which receives a multimodal input from a plurality of modality input devices, and provides an aggregated result to an application control based on the interpretation of the interaction ergonomics of the multimodal input within the temporal constraints of the multimodal input. Thus, the multimodal input from the user is recognized within a temporal window. Interpretation of the interaction ergonomics of the multimodal input include interpretation of interaction biometrics and interaction mechani-metrics, wherein the interaction input of at least one modality may be used to bring meaning to at least one other input of another modality. | 02-23-2012 |
20120059930 | REACTIVE MONITORING OF GUESTS IN A HYPERVISOR ENVIRONMENT - A system, method and computer program product for detecting and reacting to a network discrepancy within a data center network environment. The method comprises monitoring network traffic between a first computer configured as a first hypervisor inter-networked within the data center network environment and a second computer inter-networked within the data center network environment in order to detect a presence of a predetermined condition representing a presence of the network discrepancy in the data center network environment between a recorded state of the data center network environment and an observed state of the data center network environment. The monitoring includes determining the observed state of the data center network environment using one of: polling, event-based or a combination thereof. The method also comprises rectifying, upon the detection of the presence of the predetermined condition, an effect associated with the presence of the predetermined condition in the data center network environment. | 03-08-2012 |
20120151272 | ADDING SCALABILITY AND FAULT TOLERANCE TO GENERIC FINITE STATE MACHINE FRAMEWORKS FOR USE IN AUTOMATED INCIDENT MANAGEMENT OF CLOUD COMPUTING INFRASTRUCTURES - A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution. | 06-14-2012 |
20120272329 | OBFUSCATING SENSITIVE DATA WHILE PRESERVING DATA USABILITY - An approach for obfuscating sensitive data while preserving data usability is presented. The in-scope data files of an application are identified. The in-scope data files include sensitive data that must be masked to preserve its confidentiality. Data definitions are collected. Primary sensitive data fields are identified. Data names for the primary sensitive data fields are normalized. The primary sensitive data fields are classified according to sensitivity. Appropriate masking methods are selected from a pre-defined set to be applied to each data element based on rules exercised on the data. The data being masked is profiled to detect invalid data. Masking software is developed and input considerations are applied. The selected masking method is executed and operational and functional validation is performed. | 10-25-2012 |
20120278386 | ASSET SHARING WITHIN AN ENTERPRISE USING A PEER-TO-PEER NETWORK - A method and system for sharing an asset in a peer-to-peer network. Meta data and a source node identification are received. The meta data specifies properties and content of the asset to be shared by the source node. The received source node identification and the meta data are locally stored as a couple in a catalog. Subsequently, content specifying the asset and a request to search for and retrieve the asset based on the content is received. The locally stored catalog is loaded and searched to detect the couple that includes the source node identification and meta data, where the received content matches the meta data. The source node is identified based on the detected couple. A request is sent to the source node to retrieve and share the asset, and in response, the asset is received. | 11-01-2012 |
20120297054 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 11-22-2012 |
20120331342 | ADDING SCALABILITY AND FAULT TOLERANCE TO GENERIC FINITE STATE MACHINE FRAMEWORKS FOR USE IN AUTOMATED INCIDENT MANAGEMENT OF CLOUD COMPUTING INFRASTRUCTURES - A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution. | 12-27-2012 |
20130006637 | HIERARCHICAL METHODS AND APPARATUS FOR EXTRACTING USER INTENT FROM SPOKEN UTTERANCES - Improved techniques are disclosed for permitting a user to employ more human-based grammar (i.e., free form or conversational input) while addressing a target system via a voice system. For example, a technique for determining intent associated with a spoken utterance of a user comprises the following steps/operations. Decoded speech uttered by the user is obtained. An intent is then extracted from the decoded speech uttered by the user. The intent is extracted in an iterative manner such that a first class is determined after a first iteration and a sub-class of the first class is determined after a second iteration. The first class and the sub-class of the first class are hierarchically indicative of the intent of the user, e.g., a target and data that may be associated with the target. | 01-03-2013 |
20130007268 | Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics. | 01-03-2013 |
20130013320 | MULTIMODAL AGGREGATING UNIT - In a voice processing system, a multimodal request is received from a plurality of modality input devices, and the requested application is run to provide a user with the feedback of the multimodal request. In the voice processing system, a multimodal aggregating unit is provided which receives a multimodal input from a plurality of modality input devices, and provides an aggregated result to an application control based on the interpretation of the interaction ergonomics of the multimodal input within the temporal constraints of the multimodal input. Thus, the multimodal input from the user is recognized within a temporal window. Interpretation of the interaction ergonomics of the multimodal input include interpretation of interaction biometrics and interaction mechani-metrics, wherein the interaction input of at least one modality may be used to bring meaning to at least one other input of another modality. | 01-10-2013 |
20130179174 | MACHINE, SYSTEM AND METHOD FOR USER-GUIDED TEACHING AND MODIFYING OF VOICE COMMANDS AND ACTIONS EXECUTED BY A CONVERSATIONAL LEARNING SYSTEM - A machine, system and method for user-guided teaching and modifications of voice commands and actions to be executed by a conversational learning system. The machine includes a system bus for communicating data and control signals received from the conversational learning system to a computer system, a vehicle data and control bus for connecting devices and sensors in the machine, a bridge module for connecting the vehicle data and control bus to the system bus, machine subsystems coupled to the vehicle data and control bus having a respective user interface for receiving a voice command or input signal from a user, a memory coupled to the system bus for storing action command sequences learned for a new voice command and a processing unit coupled to the system bus for automatically executing the action command sequences learned when the new voice command is spoken. | 07-11-2013 |
20130247136 | Automated Validation of Configuration and Compliance in Cloud Servers - A method, an apparatus and an article of manufacture for automated validation of compliance in a cloud server. The method includes remotely accessing a target cloud server to discover at least one configuration setting of the target cloud server, integrating the at least one configuration setting from the target cloud server with information from at least one back-end tool to produce compliance evidence, and automatically answering a set of at least one checklist question for activation compliance validation of the target cloud server based on the compliance evidence. | 09-19-2013 |
20130268488 | LARGE VOLUME DATA REPLICATION USING JOB REPLICATION - An approach for replicating data is provided. A job that modifies data objects in a first system to generate a first set of changed data objects is determined to be a candidate for a job replication. Based on the job being a candidate for job replication, attributes of the job are retrieved, the retrieved attributes are sent to a second system, and an execution of the job by the second system is initiated as part of the job replication. The execution of the job causes data objects included in the second system to be modified to generate a second set of changed data objects as a replication of the first set of changed data objects. | 10-10-2013 |
20130283087 | Automated Fault and Recovery System - A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource. | 10-24-2013 |
20130283088 | Automated Fault and Recovery System - A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource. | 10-24-2013 |
20130305080 | Real-Time Event Storm Detection in a Cloud Environment - A method, an apparatus and an article of manufacture for detecting an event storm in a networked environment. The method includes receiving a plurality of events via a plurality of probes in a networked environment, each of the plurality of probes monitoring a monitored information technology (IT) element, aggregating the plurality of events received into an event set, and correlating the plurality of events in the event set to determine whether the plurality of events are part of an event storm by determining if the plurality of events in the event set meet one or more event storm criteria. | 11-14-2013 |
20140130043 | AUTOMATED AND OPTIMAL DEACTIVATION OF SERVICE TO ENABLE EFFECTIVE RESOURCE REUSABILITY - Automated deactivation of service to enable effective resource reusability in a computing system, may include receiving a request to destroy a virtual machine, the virtual machine running in a virtual data center comprising one or more software components allocated for servicing a customer. In response, a provisioning module may be notified to remove the virtual machine. Based on the number of resources determined to be left as available, deactivation of pending actions on the virtual machine may be performed at the time the virtual machine is being removed or as an automatic scheduled job to be performed at a scheduled time. | 05-08-2014 |
20140317298 | ASSET SHARING WITHIN AN ENTERPRISE USING A PEER-TO-PEER NETWORK - An approach for sharing an asset in a peer-to-peer network is provided. After determining a locally stored first list does not include meta data specifying the asset, a new node is identified. In response to receiving a subscription from the new node, a second list locally stored at the new node is received. The second list includes the meta data and an identification of a source node that has the asset. The first list is updated to include the meta data and the identification of the source node. The updated first list is searched and in response, the meta data and the identification of the source node are detected. Based on the detected meta data and identification, the source node is identified. A request to retrieve the asset is sent to the source node, and in response, the asset is received. | 10-23-2014 |
20140366119 | REGIONAL FIREWALL CLUSTERING IN A NETWORKED COMPUTING ENVIRONMENT - An approach for regional firewall clustering for optimal state-sharing of different sites in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, each firewall in a given region is informed of its peer firewalls via a registration process with a centralized server. Each firewall opens up an Internet protocol (IP)-based communication channel to each of its peers in the region to share state table information. This allows for asymmetrical firewall flows through the network and allows routing protocols to ascertain the best path to a given destination without having to take firewall placement into consideration. | 12-11-2014 |