Entries |
Document | Title | Date |
20100131474 | SYSTEM AND METHOD FOR VERIFYING AND RESTORING THE CONSISTENCY OF INODE TO PATHNAME MAPPINGS IN A FILESYSTEM - A system and method verifies and restores the consistency of inode to pathname mappings. In a first embodiment, an off-line verification procedure is modified to verify and correct the primary name inode to pathname mapping information within inodes of a file system. In a second embodiment, an on-line file system verification process is modified to verify inode to pathname mapping information upon the loading of each inode within the file system. | 05-27-2010 |
20100153347 | METHOD AND SYSTEM FOR PREVENTING CORRUPTION OF HARD DISK DRIVE FILE SYSTEM - The present principles provide methods and apparatus for preventing data corruption on a storage device by integrating a journaling file system with a cache system. To ensure journal accuracy with respect to data that is most likely to affect file system integrity, a method in accordance with an aspect of the present principles includes bypassing the cache when writing such data to a main platter of a storage device. Furthermore, to ensure overall efficiency in reading and writing data, a method in accordance with an aspect of the present principles includes writing to a cache, in addition to writing to the platter, data that has a relatively less damaging effect on file system integrity. Thus, aspects of the present principles optimally integrate a cache system with a journaling file system to provide both a robust file system integrity and an efficient reading and writing mechanism. | 06-17-2010 |
20100228702 | FILE HANDLING FOR NAMING CONFLICTS - A file operations engine is provided that manages many user interactions with their files via a computer system. The operation engine may provide a user with the option to keep both files that have a file name conflict. It may further permit the user to rename a file involved with a file name conflict. The operations engine may also automatically rename one of the files of a file name conflict by appending a character to a root of the filename. The character may include the lowest integer available for the root in a destination for the files. The operations engine may provide the option to keep both files as part of a pre-calculation of potential errors for a requested operation. The operations engine may place file name conflicts in an error queue and permit the user to select an option to keep both files after the conflict is encountered. | 09-09-2010 |
20110055170 | METHOD AND APPARATUS FOR IDENTIFYING DATA INCONSISTENCY IN A DISPERSED STORAGE NETWORK - A method for execution by a DS processing unit begins with the DS processing unit receiving a plurality of integrity data, which was generated by a plurality of DS storage units regarding one or more data slices of one or more pluralities of data slices. The method continues with the DS processing unit evaluating the received integrity data. The method continues with the DS processing unit requesting naming information of the one or more pluralities of data slices when the evaluation of the received integrity data yields unfavorable results. The method continues with the DS processing unit receiving the naming information from the plurality of DS storage units. The method continues with the DS processing unit evaluating the received naming information to identify at least one data slice of the one or more of pluralities of data slices having a data inconsistency. | 03-03-2011 |
20110071988 | DATA REVISION SYNCHRONIZATION IN A DISPERSED STORAGE NETWORK - A method begins by a processing module determining dispersed storage (DS) units that are storing a set of encoded data slices associated with a data segment and sending a revision level check request message to each of the DS units. The method continues with the processing module receiving revision level check response messages from at least some of the DS units within a time period to produce received revision level check response messages and determining concurrency of a revision level of the set of encoded data slices stored by the DS units based on the received revision level check response messages. The method continues with the processing module initiating a revision concurrency process when less than a threshold number of encoded data slices have concurrency of the revision level. | 03-24-2011 |
20110099153 | METHOD AND APPARATUS FOR GENERATING A POLYMORPHIC NOTE - An approach is provided for generating a polymorphic note. A polymorphic note manager receives a request, from a device, to generate a polymorphic note, wherein the polymorphic note includes information of a plurality of application types that is developed over a period of time. The polymorphic note manager then generates the polymorphic note in response to the request and stores the polymorphic note for access by the device. | 04-28-2011 |
20110161303 | SYSTEM AND METHOD FOR ANALYZING OFFICIAL NOTICES OF ELECTRONICALLY FILED PATENT APPLICATIONS - A system and method for analyzing official notices of an electronically filed patent application are based on a file server that connects to patent office websites, a database, and client computers. An official notice of the patent application is downloaded from one of the patent office websites according to a download command from one of the client computers, and is converted to an image format document. Character data of the image format document are identified, and patent information of the electronically filed patent application are extracted from the character data using a regular expression. In addition, the patent information are analyzed to generate analysis results of the official notice according to the comparison. | 06-30-2011 |
20110213758 | METHOD, APPARATUS, AND SYSTEM FOR SUBSCRIPTION AND NOTIFICATION - A method, an apparatus, and a system for subscription and notification are disclosed. The method includes the following steps: a Home Subscriber Server Front-End (HSS FE) receives a first subscription request which is sent by an Application Server (AS) and carries data content that the AS requests to subscribe to; the HSS FE sends a second subscription request to a convergent database, where the first subscription request and the second subscription request have a subscription relation; the HSS FE receives a notification sent by the convergent database according to the second subscription request; and the HSS FE sends data content carried in the notification to the AS according to the subscription relation. The present invention enables the AS to obtain the subscribed data from the HSS FE. | 09-01-2011 |
20110225127 | INVESTMENT PORTFOLIO MANAGEMENT FACILITY - An investment portfolio management facility is disclosed. The facility is a computerized system for providing data integrity for investment portfolios. When an entry is made, the entry is checked for consistency with previously-made entries and with rules for portfolio entries. If an error is detected, the system alerts users to the error and also provides signals to check for further errors. The user may be made aware of the error or errors through a user interface. | 09-15-2011 |
20110252006 | OFFLINE SHARING CAPABILITY FOR CLIENT APPLICATION - Application Programming Interfaces (APIs) and UI modifications for existing applications are used to implement efficient methods for taking content offline with full synchronization, incremental synchronization, in the case of document libraries per-folder synchronization, and the like. The APIs provide support for synchronizing changes to attachments, the ability to download a document library's complete contents or only a list of the available documents, and read-only folder hierarchy replication in the case of document libraries. These abilities coupled with corresponding user interface features enable easier browsing and searching of large document library structures, making edits to those documents offline, being able to see an up-to-date version of those documents in a preview mode, and receiving reminders when offline edits remain on the local computer and need to be updated to a server. | 10-13-2011 |
20120059803 | DISK SCRUBBING - A method, a system, and a computer program product are provided for data management. The method may comprise identifying a predefined set of data storage parameters and a predefined set of data scrubbing parameters. The method further may comprise determining the predefined set of data scrubbing parameters for first data in a first data storage based on the predefined set of data storage parameters for the first data and performing data scrubbing for the first data using the determined predefined set of data scrubbing parameters. Furthermore, the method may comprise comparing first data in the first data storage and corresponding second data in a second data storage. If a mismatch is determined between the first data and the second data, the method further may comprise synchronizing the first data with the second data as a result of the comparison. | 03-08-2012 |
20120066186 | Systems and Methods to Select Media Content - A method includes accessing, at a device, data identifying a plurality of categories of media content. The data includes a first value associated with a first category of the plurality of categories of media content and a second value associated with a second category of the plurality of categories of media content. The method also includes modifying the data to remove the first category in response to determining that the first value does not satisfy a threshold. The method further includes adjusting the second value after modifying the data to remove the first category. | 03-15-2012 |
20120166398 | Asynchronous Data Processing - A method, a system, and computer-readable medium for processing of data are disclosed. An acknowledgement is received to store business object data. Based on the acknowledgement, an indication that the business object data is stored in a repository is generated. Processing of the business object data to enable storage in the repository continues while generating such indication. | 06-28-2012 |
20120203745 | SYSTEM AND METHOD FOR RANGE SEARCH OVER DISTRIBUTIVE STORAGE SYSTEMS - A computer implemented method is provided for resolving eventual consistency conflicts when using a Prefix Hash Tree (“PHT”) and Distributed Hash Table (“DHT”). A prefix hash tree having multiple nodes is created that relates to a distributed hash table. The nodes comprise leaf nodes and internal nodes. All distinct records are aggregated across all conflicting nodes, wherein conflicting nodes are nodes that have identical data records. Records returned are counted. If the count of aggregated records exceeds a max record count, nodes are split such that the aggregated records are divided by a prefix into each new node resulting in the consolidation of duplicate data that were in conflicting nodes into a single data record in a single node. If one or more of the returned conflicting nodes is an internal node, the internal node is split regardless of the number of aggregated records. | 08-09-2012 |
20120226669 | MERGING A STORAGE CLUSTER INTO ANOTHER STORAGE CLUSTER - A method for merging a source electronic memory storage cluster into a destination electronic memory storage cluster may include designating a source storage cluster having a first configuration; designating a destination storage cluster having a second configuration; receiving a configuration database including mapping information associated with the first configuration of the source storage cluster; merging the configuration database for the source storage cluster into the destination storage cluster; identifying a conflict between the source storage cluster configuration and the destination storage cluster configuration by comparing mapping information for the imported configuration database for the source storage cluster to mapping information for a configuration database associated with the second configuration of the destination storage cluster; resolving the identified conflict between the source storage cluster configuration and the destination storage cluster configuration; and merging the configuration database for the source storage cluster into the destination storage cluster after resolving the identified conflict. | 09-06-2012 |
20120233133 | CONTACTLESS IC MEMORY ON REMOVEABLE MEDIA - Method, system, and computer program product embodiments for recording data on a contactless integrated circuit (IC) memory associated with a data storage cartridge are provided. In one exemplary embodiment, an index of a plurality of files to be recorded on a storage media of the data storage cartridge is parsed with a table of contents (TOC) profile file to build a table of contents (TOC) specific to an owning application of the plurality of files. The TOC is written to the contactless IC memory. | 09-13-2012 |
20120246123 | AUTOMATIC CORRECTION OF CONTACT LIST ERRORS IN A COLLABORATION SYSTEM - Managing a contact list in a collaboration system, by detecting if a contact has been offline for at least a predefined period of time and/or detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from a target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and replacing the target identifier with the replacement identifier in the contact list of the first user. | 09-27-2012 |
20120278290 | DATABASE ARCHIVING MODEL ERROR DETECTION AND CORRECTION SYSTEM - A database archiving model error detection and correction system including an error detection module to detect a referential integrity error in a database archiving model. A column in a foreign key and/or a corresponding unique key column to the foreign key column may include an assigned data mask operation. The error detection module may detect the referential integrity error if a corresponding other column in a foreign key-unique key relationship does not have an identical assigned data mask operation, or if the assigned data mask operation will not result in a unique output value for a unique input value. | 11-01-2012 |
20120296879 | Guided data repair - A computer implemented method for correcting records in a database comprising generating, using a processor, respective candidate replacement entries for multiple inconsistent records of the database, grouping the candidate replacement entries to provide multiple groups of related candidate updates for the database, ranking the groups according to a loss function to quantify database quality, receiving input for a selected group, sorting candidate replacement entries in the selected group, and applying updates from the selected group to the database to correct entries of the inconsistent records. | 11-22-2012 |
20120303593 | Geo-Verification And Repair - Presented herein are methods of continuously verifying data and repairing errors introduced during replication. In a particular embodiment, a primary data store sends out information sufficient to create a checkpoint together with a checksum for the data being verified at that checkpoint. At the secondary data store, a checkpoint is created in accordance with the checkpointing information, and a checksum is calculated over the indicated data at the created checkpoint. If the calculated checksum disagrees with the received checksum, additional checksums are calculated over subranges of the indicated data and compared with corresponding checksums over the data at the primary data store. The checksums at the primary data store may be requested from the primary data store or calculated locally based on the received overall checksum. Once an erroneous entry is identified, it can then be re-replicated from the primary data store to restore data consistency. | 11-29-2012 |
20120330902 | METHOD FOR ORDER INVARIANT CORRELATED ENCRYPTING OF DATA AND SQL QUERIES FOR MAINTAINING DATA PRIVACY AND SECURELY RESOLVING CUSTOMER DEFECTS - According to one embodiment of the present invention, a method for debugging a computer system is provided. According to one embodiment of the invention, a method includes encrypting data and query program instructions using correlated order invariant encrypting, the data and query program instructions operating in a customer computer system. The encrypted data and encrypted query program instructions are then transferred to a servicing entity having a test system. The encrypted data and encrypted query program instructions are run on the test system to generate a set of results. The set of results are then used to generate a diagnosis of a problem with the customer computer system. Thus the customer problem can be resolved without the servicing entity having access to the customer's data and query program instructions. | 12-27-2012 |
20130046739 | SYSTEM AND METHOD FOR RECONCILING DUPLICATE CONFIGURATION ITEMS IN A CONFIGURATION MANAGEMENT DATABASE - The system and method described herein may be used to reconcile duplicate configuration items in a configuration management database. In particular, corresponding properties that represent relationships with a trial configuration item and an existing configuration item may be compared to reconcile whether the trial configuration item corresponds to the existing configuration item and should therefore be combined with the existing configuration item, or alternatively whether the trial configuration item represents a new configuration item that can be added to the configuration management database. If comparing the properties associated with the trial configuration item and the existing configuration item results in an indeterminate outcome, a reconciliation engine may inspect a table stored directly on the trial configuration item and/or the existing configuration item to reconcile whether the trial configuration item and the existing configuration item are indeed different or identical. | 02-21-2013 |
20130054539 | Database Record Repair - A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, modifying records in the first set to make them consistent with the functional dependency to provide an output consistent database instance, determining a second set of records of the output consistent database instance comprising duplicate records, merging duplicate records in the second set in dependence on the functional dependencies of the records to provide a modified database instance. | 02-28-2013 |
20130073525 | Systems and Methods for Content Collection Validation - Electronic data file and content capturing systems and methods enable enhanced accessibility and reduced complexity for clients managing large volumes of digital data files. According to one aspect, a system and method provided for validation and tracking of content collection tasks. According to another aspect, systems and methods are disclosed for error management through integrated interfaces that are capable of interacting with and correcting the results of content collection tasks. | 03-21-2013 |
20130166517 | SYSTEMS AND METHODS FOR LOCATING APPLICATION SPECIFIC DATA - A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data. | 06-27-2013 |
20130185266 | LOCATION INDEPENDENT FILES - Managing data units by converting the data units into data segments and access files describing how to retrieve the data segments using hash values for the data segments. In a data store operation, the data unit is divided into data segments and an access file is generated. The access file includes segmenting scheme information for the data segments, hashing scheme information for the hash values, hash identification information describing the hash values, and location information identifying the locations at which the data segments are available. In a data retrieval operation, data from the data unit is retrieved by accessing the data segments and extracting the data therefrom, where the data segments are retrieved based on the access file for the data unit. | 07-18-2013 |
20130204847 | SMART GRID ONTOLOGY UPDATE DEVICE - According to one embodiment, an ontology update device, which updates a smart grid ontology including an equipment class and individual properties of the class is provided. A storage stores two or three higher-order layers within a domain ontology (DO) layer including specs of the equipment class and the properties, a meta-ontology (MO) layer including specs of metadata of the class and the properties, and an axiomatic ontology (AO) layer including the metadata specs. An access controller controls access to the smart grid ontology so that access is allowed only from a database (DB) or an adapter of a lower-order layer existing in a limited number of specific nodes for a higher-order node. An updater updates the DO layer so that the DO layer is consistent with the MO layer. | 08-08-2013 |
20130262403 | UNIQUE ATTRIBUTE CONSTRAINTS FOR VERSIONED DATABASE OBJECTS - Methods and apparatus for ensuring uniqueness of database object attributes are disclosed. An example computer-implemented method includes receiving a request to insert, update or delete a versioned database object having a first identifier (ID) in a main database table. The method further includes determining, based on the request, whether to fire an insert trigger, a delete trigger or an update trigger for the main database table. In the event an insert trigger is fired, the method includes performing, in a secondary database table, a record insertion process. In the event a delete trigger is fired, the method includes performing, in the secondary database table, a record deletion process. In the event an update trigger is fired, the method includes performing, in the secondary database table, at least one of the record insertion process for a post-update versioned database object and the record deletion process for a pre-update versioned database object. | 10-03-2013 |
20130268495 | SPLIT BRAIN PROTECTION IN COMPUTER CLUSTERS - A computer cluster can be divided into a plurality of failure scopes and a voting constraint can be enforced. The voting constraint can allow a portion of the cluster to provide the service if a majority of health votes from cluster members is obtained by that portion. A loss of connectivity between a first failure scope, which has a majority of cluster members in the cluster, and one or more other failure scopes in the cluster can be detected. The loss of connectivity can be such that the first failure scope does not have connectivity to a member in any other failure scope in the cluster. In response to detecting the loss of connectivity, a split brain situation in the cluster can be automatically protected against by preventing the first failure scope from providing the service. | 10-10-2013 |
20130282668 | AUTOMATIC REPAIR OF CORRUPT HBASES - Systems and methods for checking for region consistency and table integrity problems and automatically repairing a corrupted HBase cluster. The methods and systems operate in a diagnostic mode and a diagnostic and repair mode. The methods include fixing table integrity problems, such as backwards table regions, table region holes, table region overlap, and the like to restore table integrity invariant. Once the table integrity has been restored, each row key resolves to exactly one region. The methods further include fixing region inconsistencies, such as bad region assignment, no region present in the meta table, region information not in the Hadoop Distributed File System (HDFS), and the like to restore region consistency invariant. The information in the HDFS is taken as ground truth and any meta table or assignment problems that are inconsistent with the HDFS is deemed wrong and removed. | 10-24-2013 |
20130325820 | VERIFYING DATA INTEGRITY UTILIZING DISPERSED STORAGE - A method begins by a processing module retrieving at least a threshold number of error coded data slices of a set of error coded data slices from storage units of a dispersed storage network (DSN) and identifying, based on an intentional error pattern, error coded data slices that were intentionally altered to produce identified error coded data slices. The method continues with the processing module decoding the set of error coded data slices to produce a recovered data segment and encoding the recovered data segment using an altered dispersed storage error encoding function to produce a test set of error coded data slices for comparing with corresponding error coded data slices. When the test set of error coded data slices substantially match the corresponding error coded data slices, the method continues with the processing module indicating that the recovered data segment has not been corrupted. | 12-05-2013 |
20130339313 | GUARDED FILE DESCRIPTORS - Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation. | 12-19-2013 |
20140006361 | CONFLICT RESOLUTION VIA METADATA EXAMINATION | 01-02-2014 |
20140012820 | DATA PROCESSING - Disclosed are methods and apparatus for processing correlated metadata (e.g. programmatic metadata relating to one or more episodes of a television show). Mappings, or correlations, between chunks of metadata that originated from a particular data source and metadata clusters may be determined. Inconsistencies in the correlated metadata may then be detected by a processor. An inconsistency may be an incorrect mapping, the mapping of more than one of the metadata chunks that originated from the same data source to the same metadata cluster, or that one or more of the metadata chunk have not been mapped to a metadata cluster. The mappings may then be edited so as to remove detected inconsistencies by the processor. | 01-09-2014 |
20140012821 | RELIABLE PROFILING FOR MONITORING SYSTEMS - The present invention relates to an apparatus and method for analyzing building auditing information to identify irregular usage patterns and incorrect audit information. The auditing information, such as energy consumption, is analyzed using presence information at room or zone level. Based on pre-selected expectations, clustering is applied to data sets. By using different criteria, the clustering results are examined within every cluster and among clusters to find irregular information. Furthermore, through cross-checking with other background information, irregular usage pattern can be found and incorrect audit information can be identified, so that succeeding energy prediction and decision-support algorithms can work on a reliable set of profiles. | 01-09-2014 |
20140025645 | Resolving Database Integration Conflicts Using Data Provenance - A method, a system and a computer program product for resolving conflicts between data for database integration. Data is integrated from first and second data sources to produce integrated data, and the presence of a conflict is determined between data from the first data source and data from the second data source, where one or more sets of prioritized policies for resolving conflicts is associated with data of the first and second data sources. A policy is selected from the set of prioritized policies associated with the conflicted data, where the selected policy is appropriate to resolve the conflict and includes the greatest priority. The selected policy is applied to resolve the conflict and to produce a resulting data value for the integrated data. | 01-23-2014 |
20140025646 | DATA MANAGEMENT IN A DATA VIRTUALIZATION ENVIRONMENT - The invention relates to a system handling a plurality of data sets stored in different repositories ( | 01-23-2014 |
20140025647 | Normalization Engine to Manage Configuration Management Database Integrity - Data is often populated into Configuration Management Databases (CMDBs) from different sources. Because the data can come from a variety of sources, it may have inconsistencies—and may even be incomplete. A Normalization Engine (NE) may be able to automatically clean up the incoming data based on certain rules and knowledge. In one embodiment, the NE takes each Configuration Item (CI) or group of CIs that are to be normalized and applies a rule or a set of rules to see if the data may be cleaned up, and, if so, updates the CI or group of CIs accordingly. In particular, one embodiment may allow for the CI's data to be normalized by doing a look up against a Product Catalog and/or an Alias Catalog. In another embodiment, the NE architecture could be fully extensible, allowing for the creation of custom, rules-based plug-ins by users and/or third parties. | 01-23-2014 |
20140032505 | METHOD, COMPUTER READABLE MEDIUM AND A DEVICE FOR NEUTRALIZATION OF ATTACKS - A method and a non-transitory computer readable medium that stores instructions for converting a first file of a first format to a second file of a second format that differs from the first format; wherein the converting comprises converting first file fields having invalid values with second file fields having valid values; and converting the second file to a third file of the first file format, if the converting of the first file to the second file succeeds. | 01-30-2014 |
20140032506 | SYSTEM AND METHODS FOR REAL-TIME DETECTION, CORRECTION, AND TRANSFORMATION OF TIME SERIES DATA - Systems and methods for time series data error detection, correction, and transformation may detect gaps and anomalies in time series data, such as from a meter device, and may correct the gaps and adjust the anomalies prior to long-term record storage. Data forecasting may be used to correct the errors in the time series data. The error corrected data may be regarded as an actual set of time series data and become a base data set against which additional heuristic projections are generated. In addition, the time series data may be transformed into any number of physical and virtual device hierarchies that represent the underlying data source configurations, and may then be stored in an analytical database for further analysis. The hierarchies may be irregular and may change over time. | 01-30-2014 |
20140052695 | SYSTEMS AND METHODS FOR CAPTURING DATA REFINEMENT ACTIONS BASED ON VISUALIZED SEARCH OF INFORMATION - A method for refining data discrepancies in data loads from multiple data stores includes receiving a data set containing data records from one or more data sources, comparing the received data set with a prior data set to identify delta records among corresponding records of the received and the prior data sets, recalculating a best record for data located in each of the corresponding delta records, and if a discrepancy exists in a data value for corresponding delta records, executing a refinement action rule. The refinement action rule includes at least one replace statement and search criteria. The method also includes capturing a user's interaction with a user interface presenting the data set, and storing the interaction in a data store as a refinement action rule. A system for implementing the method and a computer readable medium are also described. | 02-20-2014 |
20140052696 | SYSTEMS AND METHODS FOR VISUAL CATEGORIZATION OF MULTIMEDIA DATA - Systems and methods for presenting a visual representation of the multimedia genres in multimedia content over time are provided. In particular, a user may be presented with a temporal genre chart that depicts the amount of each multimedia genre contained in a selected multimedia content. The temporal genre chart may also depict the variation in the amount of each multimedia genre over the duration of the multimedia content. Such temporal genre charts may provide a more accurate overview of multimedia content to the user than typical single genre tags or limited content previews. | 02-20-2014 |
20140052697 | CORRECTION OF CHECK PROCESSING DEFECTS - Apparatus, methods and media for correcting a defective check processing datum. The apparatus may include, and the methods and media may involve, a receiver that is configured to receive from memory a first transaction record. The transaction record may include Magnetic Ink Character Recognition (MICR) line data. The MICR line data may be electronically read from a check. The transaction record may include non-MICR data. The non-MICR data may be electronically read from the check. The apparatus may include, and the methods and media may involve, a processor that is configured to identify a defective datum among the MICR line data. The processor may identify a portion of the non-MICR data that corresponds to the defective datum. The processor may store in memory a second transaction record. The second transaction record may include corrected data that includes an element that is derived from the identified portion of the non-MICR data. | 02-20-2014 |
20140067773 | TRANSIENT DETECTION FOR PREDICTIVE HEALTH MANAGEMENT OF DATA PROCESSING SYSTEMS - Systems, methods, and other embodiments associated with transient detection for predictive health management are described. In one embodiment, a method includes receiving a health signal from a data outlet. The health signal corresponds to a derivative variable derived from a combination of data processing system metrics not exposed beyond the data outlet. A transient is detected in the health signal. In response to detecting the transient, the method includes performing a corrective action. The example method may also include detecting the transient in a health signal from a data processing system by collecting historical values of the health signal; selecting a first statistical model that best fits the historical values; receiving a present value of the health signal; and applying the first statistical model to the present value of the health signal to determine whether the present value of the health signal is a transient. | 03-06-2014 |
20140074800 | SYSTEM AND AUDITING DEVICE FROM REMOVAL OF CUSTOMER PERSONAL INFORMATION ON ELECTRONIC DEVICES - A system, method, and auditing device for tracking removal of CPI. The auditing device includes a processor for executing a set of instructions and a memory for storing the set of instructions. The set of instructions are executed to receive one or more electronic devices for verification of CPI removal, the one or more electronic devices being one or more of a plurality of makes and models of electronic devices, determine whether CPI is included on the one or more electronic devices, record an identification and metadata of the one or more electronic devices in response to determining CPI is included on the one or more electronic devices, quarantine the one or more electronic devices until the CPI is verifiably removed, and record the identification and metadata for the one or more electronic devices to a database in response to determining the CPI was included on the one or more electronic devices. | 03-13-2014 |
20140101112 | METHOD AND SYSTEM FOR MANAGING METADATA - A computer-based method and scoring system for management of metadata is provided. | 04-10-2014 |
20140122446 | System and Method of Assessing the State of a Database Product for Installation Consistency - A computer-implemented system and method performs an iterative process to assess the installation of an upgrade version of a database product for consistency with a baseline version of the database product. To assess the installation, the baseline version and the upgrade version are reconciled by modifying one or both of the baseline and upgrade versions. The modified baseline and upgrade versions are then analyzed to determine whether any remaining inconsistencies exist. Any remaining inconsistencies are then identified and classified, and reconciled. Thereafter, the process is repeated iteratively until the upgrade version is reconciled with the baseline version. | 05-01-2014 |
20140129528 | Semantics Mismatch in Service Information - A method for correcting service manual textual inconsistencies. Extracting textual procedures from service documents stored in a memory of a service document storage device. Each term of an extracted textual procedure terminology is compared to a correlating target name terminology for identifying any matching terms by a processor. An overlap similarity is computed as a function of the identified matching terms from the extracted textual procedure terminology and the correlating target name terminology. A determination is made whether the overlap similarity is greater than a predetermined similarity threshold. The service documents are modified to change the extracted textual procedure terminology to the correlating target name terminology in response to the overlap similarity being greater than the predetermined similarity threshold and the extracted textual procedure terminology not exactly matching the correlating target name terminology. | 05-08-2014 |
20140136489 | DASHBOARD COLLABORATOR - Described herein is a technology for designing a dashboard. In some embodiments, first and second dashboards are provided. Conflict analysis on the first and second dashboard is performed. The conflicts are resolved if any conflicts are detected. The first and second dashboards are merged to form a merged dashboard if no conflicts are detected or after resolving the conflicts. | 05-15-2014 |
20140143211 | Managing and Reconciling Information Technology Assets in a Configuration Database - A method and system for managing and reconciling naming conflicts in a configuration database. Attributes are collected about a detected resource in a network. Valid names for the detected resource are created based on the collected attributes and a set of naming rules. A valid name is created for each naming rule, and the naming rules have a priority order. A master-alias table is search to locate a match between existing names of known resources recorded in the master-alias table and any of the valid names. A partial match of resource attributes is determined to exist when all of the valid names in the set of valid names do not match an existing name in a matching entry. The detected resource is determined to be a new resource or an existing resource based on a priority of the naming rules used to create the valid names. | 05-22-2014 |
20140149362 | AUTOMATICALLY GENERATING A CUSTOMER NOTIFICATION FILE STATUS REPORT - A customer communication system of a mobile communication network automatically generates a report concerning the location of a customer notification file within the customer communication system to allow for easier file review in response to an error message. In the examples, a file information database is accessed to obtain information regarding the expected file name or expected location of the customer notification file. Using the file information, a search is conducted for the location of the customer notification file. Error correction information is also collected regarding the customer notification file. The system then generates a report combining the information regarding the location of the customer notification file with the reference information regarding any error correction instructions. The report is published, thereby allowing any user responsible for the correction of an error message to access the file location information and the associated error correction instructions. | 05-29-2014 |
20140149363 | METHODS AND APPARATUS FOR AUTOMATED REDACTION OF CONTENT IN A DOCUMENT - A redaction process obtains redaction data indicating content to be redacted in a document. In addition, the redaction process obtains non-redaction data indicating content not to be redacted in the document. Furthermore, the redaction process obtains proximity data indicating proximate expressions to be matched against the document. In this manner, the redaction process processes the redaction data, non-redaction data and proximity data against the document to produce a redact list and a potential list. Upon receiving user selections from both the redact and the potential lists, the redaction process applies a redaction function to the document to produce a redacted version of the document. | 05-29-2014 |
20140156605 | PROCESSING DATA FROM GENOTYPING CHIPS - Processing genetic data includes receiving two or more genetic data sets for an individual from one or more genetic data sources, wherein the genetic data sets comprises data pertaining to the individual's deoxyribonucleic acid (DNA); merging the genetic data sets from the one or more genetic data sources to obtain a set of merged genetic data for the individual, including: identifying data in the genetic data sets that is conflicting, the identified data corresponding to a genetic marker associated with a variation that occurs at a region in the individual's genome; analyzing the identified data to resolve a discrepancy attributed to the identified conflicting data and automatically determine an appropriate value that corresponds to the genetic marker, the analysis and the determination being based at least in part on contextual information; and storing the appropriate value in the set of merged genetic data. | 06-05-2014 |
20140188816 | DETECTING DEVIATION BETWEEN REPLICAS USING BLOOM FILTERS - Techniques are provided for using near-full bloom filters for efficiently identifying hash slices in which the deviation between replicas is sufficient to justify remedial measures. Techniques are also described for adjusting the size of slices and the size of the bloom filters, so that the bloom-filter-to-bloom-filter comparison serves as an accurate indicator of the degree to which the contents of the slices of a slice pair have deviated. Slice size may vary from slice pair to slice pair, so that relatively sparsely populated portions of the ring (access key ranges into which fewer chunks fall) are represented by relatively larger slices, while relatively densely populated portions of the ring (access key ranges into which more chunks fall) are represented by relatively smaller slices. | 07-03-2014 |
20140207742 | METHOD AND DEVICE FOR GENERATING SPECIAL TOPIC PAGES - Embodiments of the present application relate to a method for generating special topic pages, a device for generating special topic pages, and a computer program product for generating special topic pages. A method for generating special topic pages is provided. The method includes determining a configuration file bound to a special topic category corresponding to a received keyword, determining sub-categories that are under a category associated with the keyword in a quantity equal to the special topic content page module quantity in the configuration file, regarding the sub-categories as sub-category keywords in special topic content page modules, looking up product information that meets the query condition for the special topic content page modules in a database, regarding the looked up product information as content in the special topic content page modules, and generating the special topic content page modules within the special topic page. | 07-24-2014 |
20140279946 | System and Method for Automatic Integrity Checks in a Key/Value Store - System and method embodiments are provided for integrity check and recovery in a key/value store. An embodiment method includes receiving a command to retrieve a data block stored in the key-value store system, the command indicating a key associated with the data block. The method further includes retrieving one or more copies of the stored data block including the key, a value, a data integrity check algorithm, and an integrity value, and performing data integrity check on the retrieved one or more copies of the data block using the data integrity check algorithm, the integrity value, and at least one of the key and the value. Upon one or more copies of the data block failing the data integrity check, the one or more copies of the data block are repaired and the data block is delivered. | 09-18-2014 |
20140279947 | MASTER DATA GOVERNANCE PROCESS DRIVEN BY SOURCE DATA ACCURACY METRIC - A method, apparatus, and computer program product for processing data is disclosed. In one aspect of the invention, a computer implemented method comprises receiving, on one or more computers, a record having one or more attributes from a source system. The method also comprises measuring, on one or more computers, a data accuracy of the received record as compared to a golden record stored in a master data management system. One or more remediation actions are performed, on one or more computers, to enforce improvements to the measured data accuracy of the received record in the source system. In one or more embodiments, measurement of data accuracy comprises calculating, on one or more computers, an accuracy score defined by a closeness of the received record to the golden record. | 09-18-2014 |
20140304237 | Apparatus and Method for Handling Partially Inconsistent States Among Members of a Cluster in an Erratic Storage Network - A method, for handling partially inconsistent states among members of a cluster in an erratic storage network that responds to requests from a client, includes assigning a unique commit identifier corresponding to each successive modification of state of the cluster when an update request has been successfully completed and correlating an incoming request to a given member of the cluster with any commit identifiers necessary to satisfy the request. The method further includes detecting, on the incoming request to the given member of the cluster, whether the commit identifiers necessary to satisfy the request have been applied to the given member, and processing the incoming request based on whether the commit identifiers necessary to satisfy the request have been applied to the given member. Operation of the members can be asynchronous. | 10-09-2014 |
20140344226 | METHOD AND APPARATUS FOR NORMALIZING AND PREDICTING TIME SERIES DATA - A computer implemented method and apparatus for normalizing and predicting time series data. The method comprises accessing collected data comprising a plurality of intervals; defining a variation for each interval in the plurality of intervals, wherein each variation is a cost value; clustering the cost values, wherein clustering identifies anomalies in the collected data; correcting the anomalies in the collected data; and creating a set of normalized data from the corrected data. | 11-20-2014 |
20140344227 | Streaming Content Storage - A computing system includes a plurality of dispersed storage (DS) processing units operable to receive a continuous data stream, simultaneously disperse storage error encode the continuous data stream to produce a plurality of encoded data slices and store the plurality of encoded data slices in a DS memory. | 11-20-2014 |
20140344228 | Multiple Revision Mailbox - A method begins by determining slice names of encoded data slices stored within a dispersed storage network (DSN). The method continues by determining dispersed storage (DS) units within the DSN storing a set of the encoded data slices associated with the slice names. The method continues by determining one or more revision numbers associated with the slice names. The method continues by determining if same slice names have different associated revision numbers and, when the same slice names have different associated revision numbers, adding the slice names to a revision mailbox for subsequent correction. | 11-20-2014 |
20140358866 | FULL FILE REPAIR USING SCHEDULE DESCRIPTION FRAGMENT IN EMBMS - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus determines that a file of interest is transmitted within a service, determines a failure to download the file of interest, and triggers a repair procedure of the file of interest at a time corresponding to an end of a file delivery event, wherein the time is derived from one or more information elements included in broadcast schedule description. | 12-04-2014 |
20150012502 | Big Data Centralized Intelligence System - Embodiments of the present invention are directed to a system and method for a central intelligence system for managing, analyzing, and maintaining large scale, connected information systems. The centralized information system may receive data from servers, databases, mainframes, processes, and other technological assets. A user is able to use the centralized information system to run analyses on the data associated with the connected systems, including: historical analysis, real-time analysis, and predictive modeling. The system can monitor the data and automatically correct identified errors without the need of human intervention. The centralized information system can also generate risk management profiles and automatically modify data to conform to the risk management profiles. | 01-08-2015 |
20150039569 | PROTECTING STORAGE DATA DURING SYSTEM MIGRATION - Provided are techniques for determining whether a character code point value of a first plurality of character code point values corresponds to a second character code point value from a second plurality of character code point values, first value associated with a first encoding version and the second value associated with a second encoding. In response to the first value does not corresponding to any of the second character code point values, a determination is made as to whether the value corresponds to a third character code point value of a third plurality of code point values stored in a character value record table (CVRT). In response the value corresponding to the third value, an entry in the CVRT that associates the character with the third value is made; and the character is stored in conjunction with an application associated with the second encoding using the third value. | 02-05-2015 |
20150046407 | Systems and Methods for Preserving Content in Digital Files - Described are systems and methods for preserving digital assets, which assets comprise one or more files. The system and methods prepare a digital file for ingest into an asset management system, store a plurality of copies of the digital file based on a set of storage policies for the digital file, and perform a health check on each copy of the digital file. The system and method may include performing an asset repair on the copies of the digital file that failed the health check as well as the exporting of a digital file. | 02-12-2015 |
20150142754 | REPAIRING A LINK BASED ON AN ISSUE - Repairing a link based on an issue includes associating at least one metadata segment with a link, identifying, in a resource repository, at least one resource that matches the at least one metadata segment, determining if there is an issue between the link and the at least one resource, and repairing the link based on the issue between the link and at least one resource. | 05-21-2015 |
20150310057 | DATA CONSISTENCY MANAGEMENT - A data consistency management system may include a memory storing machine readable instructions to receive a query, and determine a suitability of the query for processing by a NoSQL data store, or a RDBMS. The memory may further include machine readable instructions to rank data tables based on a combination of read queries and query patterns suitable for the NoSQL data store. Based on the ranking, the memory may further include machine readable instructions to determine data tables that are to be managed by the NoSQL data store, or by the RDBMS, determine whether the query is for a data table managed by the NoSQL data store, and based on a determination that the query is for a data table managed by the NoSQL data store, translate the query to NoSQL API calls for using the NoSQL data store to respond to the query. | 10-29-2015 |
20150331889 | Method of Image Tagging for Identifying Regions and Behavior Relationship between Different Objects - A method of image tagging for identifying regions and behavior relationship between different objects, the method comprising: providing a photo database downloaded a photo to a graphical user interface of an electronic device; providing a graphic module which comprises a graphic interface that overlapped on said photo, said graphic module further comprises one or more tagging tools to generate one or more Icons on said graphic interface; said tagging tools comprise at least a selecting tool to allow a user select a first object and a second object of said photo, and a linking tool to allow said user combine said first object with said second object; wherein, appearing a text input to input a message related to said first object and said second object when using said tagging tool; and appearing a validation window on said graphic user interface to verify said label of said photo tagged by said user after tagging completely. | 11-19-2015 |
20150331900 | MULTIMEDIA SCHEDULING FOR AIRPLAY WITH ALTERNATE CATEGORY SUPPORT - A device and method for resolving a conflict in a chronological scheduling order for airplay while with constant order of the multimedia. A scheduling order can be designated for the delivery and playback of multimedia content (e.g., music, news, other audio, advertising, etc) with respect to particular slots within the scheduling order. Conflict resolution between multimedia content is based upon exchanging a slot position of either of one of a first set and one of a second set of a category of multimedia content identifiers with another corresponding one of either of the first set and the second set of the multimedia content identifiers based upon a predetermined number of slot value to resolve the conflict and to modify at least the portion of the chronological scheduling order while adhering to constant order for the multimedia content. Modified portions of the chronological scheduling order are produced for eventual airplay of multimedia content corresponding to the multimedia content identifiers. | 11-19-2015 |
20150347493 | SYSTEM AND METHOD FOR PROCESSING DATA - Disclosed are a system and method for processing data. The system for processing data according to an embodiment of the present disclosure includes a determiner configured to receive one or more sets of input data and a set of metadata about a structure of each of the sets of input data and to determine whether the input data is normal data or abnormal data based on the metadata; a first storage configured to store the normal data; a second storage configured to store the abnormal data; and a data processor configured to correct the abnormal data stored in the second storage such that the abnormal data has the same structure as the normal data and store the corrected abnormal data in the first storage. | 12-03-2015 |
20150370847 | SERVICE PROVIDING SYSTEM AND LOG INFORMATION PROVIDING METHOD - A service providing system provides a service to a service usage device connected via a network. The service providing system is constituted by at least one information processing apparatus. The service providing system includes at least one log information storage unit configured to store log information relating to the service provided to the service usage device, in association with organization identification information of the service usage device; an organization information storage unit configured to store a standard time of an organization identified by the organization identification information; and a log information providing unit configured to collect the log information from the log information storage unit based on the organization identification information, correct time and date information included in the log information according to the standard time of the organization identified by the organization identification information, and subsequently provide the log information to a request source of the log information. | 12-24-2015 |
20150370850 | Addressing Cross-Allocated Blocks in a File System - A mechanism is provided for cross-allocated block repair in a mounted file system. A set of cross-allocated blocks are identified from a plurality of blocks within an inode of the mounted file system, based on a corresponding bit associated with each cross-allocated block in a duplicated block information bitmap being in a first identified state. The set of cross-allocated blocks are repaired using a user-defined repair process. Then one or more of the set of cross-allocated blocks are deallocated based on results of the user-defined repair process. | 12-24-2015 |
20150371180 | PROCESSING DEVICE, PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM - After a keyword is entered, an acquirer ( | 12-24-2015 |
20150379051 | METHODS AND SYSTEMS FOR DATA CLEANING - A method for cleaning data stored in a database, the method comprising providing a set of fixing rules. Each fixing rule incorporates a set of attribute values that capture an error in a plurality of semantically related attribute values, and a deterministic correction which is operable to replace one of the set of attribute values with a correct attribute value to correct the error. The method further comprises comparing at least two of the fixing rules with one another to check that the error correction carried out by one fixing rule is consistent with the error correction carried out by another fixing rule. | 12-31-2015 |
20150379062 | MULTI-DATABASE LOG WITH MULTI-ITEM TRANSACTION SUPPORT - At a logging service, a representation of a transaction requested by a client is received. The transaction includes at least a first write operation directed to a data object at a first data store. Based at least in part on the contents of the representation and contents of a persistent log of the logging service, a determination is made that the requested transaction is to be committed. A log record corresponding to the first write operation is inserted into the persistent log. The first write is propagated to the first data store after the record has been inserted in the persistent log. | 12-31-2015 |
20160004743 | METHODS AND SYSTEMS FOR DATA CLEANING - A method for cleaning data stored in a database which utilises a data fixing rule. The data fixing rule comprises a set of attribute values that capture an error in a plurality of semantically related attribute values. The data fixing rule also comprises a deterministic correction which is operable to replace one of the set of attribute values with a correct attribute value to correct the error. The method comprises applying the data fixing rule to the database to detect if the set of attribute values that captures the error is stored in the database and, if the set of attribute values is detected, the method applies the deterministic correction to correct the error in the attribute values. | 01-07-2016 |
20160004753 | METHOD AND APPARATUS FOR INTEGRATION OF COMMUNITY-PROVIDED PLACE DATA - An approach is provided for integrating place metadata provided by a community of metadata builders, including receiving registration data that indicates one or more values for a corresponding one or more attributes that describe a place. A place is associated with a geographic location. Providing an indication of match between the registration data and metadata for a predetermined place is also initiated. In some embodiments, a new entry for a set of predetermined places is generated based on validating the registration data and a negligible degree of match. In some embodiments, a unique identifier for the place is included in indication of match for either a new place represented by the registration data or a matching predetermined place. | 01-07-2016 |
20160012096 | System and Method for Recognizing and Generating Consistent Identification Keys | 01-14-2016 |
20160034515 | Assessing Risk of Inaccuracies in Address Components of Map Features - To generate address components for a selected map feature, all polygonal map features containing or near the location of a selected map feature are identified. The error bounds of each identified polygon are modeled based on the quality of the boundary of the polygon. Then, the error bounds of the polygon are compared to the location of the selected map feature to determine the strength of the match. The address components corresponding to the identified polygons are suggested to be components of the address of the selected map feature based on the strength of the matches. In another embodiment, a risk of inaccuracy of a combination of address components in an edited map feature is determined from comparison to other map data and can be adjusted based in part on the magnitude of an inconsistency between address components. | 02-04-2016 |
20160048513 | AUTOMATIC DETECTION OF PROBLEMS IN A LARGE-SCALE MULTI-RECORD UPDATE SYSTEM AND METHOD - A method, computer program product, and computer system for identifying, by a computing device, a change to at least one record of a plurality of records in a multi-record update. At least one problem condition associated with the change to the at least one record is determined, wherein the at least one problem condition is determined via at least one problem definition object before the change is saved. The at least one problem condition is organized on a display. An action is executed on the at least one problem condition displayed. | 02-18-2016 |
20160048550 | AUTOMATIC DETECTION OF PROBLEMS IN A LARGE-SCALE MULTI-RECORD UPDATE SYSTEM AND METHOD - A method, computer program product, and computer system for identifying, by a computing device, a change to at least one record of a plurality of records in a multi-record update. At least one problem condition associated with the change to the at least one record is determined, wherein the at least one problem condition is determined via at least one problem definition object before the change is saved. The at least one problem condition is organized on a display. An action is executed on the at least one problem condition displayed. | 02-18-2016 |
20160048555 | SYSTEMS AND METHODS FOR LOCATING APPLICATION SPECIFIC DATA - A system and a method for locating application-specific data that has been previously deleted and located in an address of the data storage device marked as being available for storing new data. The method includes accessing unidentified data from at least one data storage device; examining the unidentified data to detect at least one application-specific data pattern associated with at least one application; for each detected application-specific data pattern, executing an application-specific validation process to determine whether the unidentified data includes valid data associated with a corresponding application; and if it is determined that the unidentified data includes valid data associated with the corresponding application, then recovering the valid data. | 02-18-2016 |
20160063052 | METHOD AND SYSTEM FOR VALIDATING INFORMATION - A method for maintaining the validity of data includes receiving, by a master data management (MDM) system and from a requesting system, a request to view information stored in master data of the MDM system. The MDM system communicates the information to the requesting system. Data that defines a score that represents a validity of the information is received from the requesting system. The MDM system updates a validity score associated with the information. When the validity score indicates to the MDM system that the information is invalid, the MDM system corrects the information. | 03-03-2016 |
20160070726 | AUTOMATIC VERIFICATION AND TRIAGE OF QUERY RESULTS - Techniques are provided for automatic verification of query results obtained from data formatted different from row-major format. Techniques are also provided for automatic triage of query results obtained from data formatted different from row-major format. In an embodiment, the query results may be obtained from querying data formatted in column-major format. In an embodiment, when the query results are determined to be incorrect, a cause of the error in the query results can be automatically identified. | 03-10-2016 |
20160078081 | SYSTEMS AND METHODS FOR CONTENT COLLECTION VALIDATION - Electronic data file and content capturing systems and methods enable enhanced accessibility and reduced complexity for clients managing large volumes of digital data files. According to one aspect, a system and method provided for validation and tracking of content collection tasks. According to another aspect, systems and methods are disclosed for error management through integrated interfaces that are capable of interacting with and correcting the results of content collection tasks. | 03-17-2016 |
20160085789 | ERROR CHECKING DATABASE RECORDS - An error checking technique for database records. A record is selected and its entities are compared with the entities of other records stored in the database to determine a likelihood that the labels associated with the entities of the selected record are correct. The likelihood for each entity of the selected record being correctly labeled can be determined by comparing the number of times that the entity appears in the database records with that label to the number of times that the entity appears in the database records with any other label. If the likelihood does not exceed a threshold, then an error is likely, and action can be taken to correct the record. | 03-24-2016 |
20160092502 | GRAPHICAL MODELING OF DATABASE QUERY STATEMENTS - Example embodiments involve a system, computer-readable storage medium storing at least one program, and computer-implemented method for graphical modeling and editing of database query statements. The method may include accessing a database query statement, and generating an abstract syntax tree (AST) representing a syntactic structure of the database query statement. The method may further include generating a graphical model of the database query statement based on the AST, and rendering the graphical model. | 03-31-2016 |
20160147815 | System and Methods for Matching Identifiable Patterns and Enabling Associated Actions - A system and method are provided, the method comprising: receiving, at a registry service, a request to register an identifiable pattern for matching patterns in text; registering, in a registry, the identifiable pattern and a corresponding handler for performing an action; and updating at least one client library accessible to a corresponding client process with the identifiable pattern. | 05-26-2016 |
20160154892 | Method of Improving NLP Processing of Real-World Forms via Element-Level Template Correlation | 06-02-2016 |
20160164971 | REGISTRY SYNCHRONIZER AND INTEGRITY MONITOR - According to one general aspect, a method may include determining the validity of a registry entry, wherein the registry entry is included in a deleted items registry, the deleted items registry including registry entries previously determined to be invalid. Upon determining the registry entry is valid, moving the registry entry to a valid items registry, and upon determining the registry entry is invalid, determine if the registry entry has been invalid more than a threshold number of times, upon determining the registry entry has not been invalid more than the threshold number of times, increase a period of time before a next determination as to whether the registry entry in the deleted items registry is valid, and upon determining the registry entry has been invalid more than the threshold number of times, remove the second registry entry from the deleted items registry. | 06-09-2016 |
20160171066 | INTERPRETING INVALID DATA AS VALID DATA | 06-16-2016 |
20160179851 | METHOD AND SYSTEM OF PROCESS RECONSTRUCTION | 06-23-2016 |
20160188650 | UPDATING WEB FILES BASED ON DETECTED LEGACY MODEL FILE CHANGES - According to an aspect, a content fragment of a legacy model file is mapped via a processor to a plurality of web files. A change to the content fragment of the legacy model file is detected by the processor. One or more modified web files corresponding to the changed content fragment is generated by the processor. The one or more modified web files corresponding to the detected changes in the content fragment of the legacy model file are sent via the processor to a remote computing device. | 06-30-2016 |
20160188651 | UPDATING WEB FILES BASED ON DETECTED LEGACY MODEL FILE CHANGES - According to an aspect, a content fragment of a legacy model file is mapped via a processor to a plurality of web files. A change to the content fragment of the legacy model file is detected by the processor. One or more modified web files corresponding to the changed content fragment is generated by the processor. The one or more modified web files corresponding to the detected changes in the content fragment of the legacy model file are sent via the processor to a remote computing device. | 06-30-2016 |
20160188654 | RULE BASED DATA NORMALIZATION UTILIZING MULTI-KEY SORTING - Methods and systems for efficient retrieval of neighboring measurement values in order to enable fast execution of rule-based error correction are disclosed. In one aspect, a method for data normalization using multi-key sorting is disclosed. In some embodiments, the method includes receiving, by a data organization engine, a set of uncorrected data including corresponding neighboring data. In various embodiments, the data organization engine organizes the uncorrected data by construction of a directed acyclic graph (DAG), where the DAG includes a plurality of nodes. In some embodiments, the data organization engine may traverse the plurality of nodes to retrieve the corresponding neighboring data. Upon retrieval of the neighboring data, a rule-based correction engine may correct the uncorrected data utilizing the retrieved corresponding neighboring data. | 06-30-2016 |
20160188655 | DETERMINING AN ERROR DURING DATA EXTRACTING - Examples of determining an error during data extracting are disclosed. According to aspects of the present disclosure, one example system may include one or more processors, a memory, and an error data store. The system may also include a capture module stored in the memory and executing on at least one of the one or more processors to capture a document in an original file format from a document repository. Further, the system may include an extraction module stored in the memory and executing on at least one of the one or more processors to extract document data from the captured document. The system may include an extraction error module stored in the memory and executing on at least one of the one or more processors to determine whether an error occurred during the data extracting and to store the captured document causing the error into the error data store. | 06-30-2016 |
20160196294 | OPERATION ANALYTIC REPOSITORY CENTRAL MONITORING SYSTEM | 07-07-2016 |
20160378849 | OPTIMIZED METHOD OF AND SYSTEM FOR SUMMARIZING UTILIZING FACT CHECKING AND A TEMPLATE - An optimized fact checking system analyzes and determines the factual accuracy of information and/or characterizes the information by comparing the information with source information. The optimized fact checking system automatically monitors information, processes the information, fact checks the information in an optimized manner and/or provides a status of the information. In some embodiments, the optimized fact checking system generates, aggregates, and/or summarizes content. | 12-29-2016 |
20170235783 | RULES EXECUTION SYSTEM FOR IOT DEVICES | 08-17-2017 |
20170235784 | SYSTEM AND METHOD FOR IMPROVING PERFORMANCE OF UNSTRUCTURED TEXT EXTRACTION | 08-17-2017 |
20180025017 | DATABASE CONTROL METHOD, DATABASE CONTROL APPARATUS, AND RECORDING MEDIUM | 01-25-2018 |
20220138229 | TECHNOLOGIES FOR UNSUPERVISED DATA CLASSIFICATION WITH TOPOLOGICAL METHODS - Technologies for unsupervised data classification include a computing device that generates a high dimensional profile for each column of a data store that is indicative of topological features of the column. The computing device also analyzes each column using multiple predetermined profiling rules and generates an initial classification for the columns based on profiling rule results. The initial classification may be applied to related columns based on clustering of the columns using the high dimensional profile. The computing device may train a machine learning model based on the initial classification and the high dimensional profile. Input features for training may include the profiling rule results and the high dimensional profile. Classifications may be provided to client devices via a predetermined interface. Other embodiments are described and claimed. | 05-05-2022 |