US20200134523A1 - Systems and methods for distributed risk analysis - Google Patents
Systems and methods for distributed risk analysis Download PDFInfo
- Publication number
- US20200134523A1 US20200134523A1 US16/670,704 US201916670704A US2020134523A1 US 20200134523 A1 US20200134523 A1 US 20200134523A1 US 201916670704 A US201916670704 A US 201916670704A US 2020134523 A1 US2020134523 A1 US 2020134523A1
- Authority
- US
- United States
- Prior art keywords
- user
- risk
- articles
- data files
- article
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Definitions
- Businesses typically assess and/or mitigate risk to assets, such as people or facilities, caused by a variety of factors, such as security threats or transportation issues.
- FIG. 1 is an exemplary networked environment for distributed risk analysis, in accordance with embodiments of the present disclosure
- FIG. 2 is an exemplary architecture of a distributed risk analysis system for distributed risk analysis, in accordance with an exemplary embodiment
- FIG. 3 illustrates a method for performing distributed risk analysis, in accordance with an exemplary embodiment
- FIG. 4 illustrates an article feed interface for a user dashboard, in accordance with an exemplary embodiment
- FIG. 5 illustrates an events list interface for the user dashboard, in accordance with an exemplary embodiment
- FIG. 6 illustrates a risk-related heat map for the user dashboard, in accordance with an exemplary embodiment
- FIG. 7 illustrates a article-related map for the user dashboard, in accordance with an exemplary embodiment
- FIG. 8 is a block diagram of an exemplary computing device that can be used to perform one or more steps of the methods provided by exemplary embodiments.
- the system includes a database configured to store data files and a risk analysis module executable by at least one processor.
- the data files are associated with news articles and risk scores from third parties, such as global risk subscription services.
- the risk analysis module is communicatively coupled to sources (e.g., the third parties) associated with various geographical locations.
- the risk analysis module when executed, aggregates data files from the sources, classifies the data files based on subject matter, and stores the data files into the database.
- the system further includes a user dashboard executing on a computing device and communicatively coupled to the risk analysis module.
- the user dashboard is configured to display at least one article associated with a subject matter based on a data file, receive a user selection of the at least one article to initiate an event, receive user comments associated with the event, and display the user comments in association with the event.
- the system further includes a database server coupled to the database and configured to retrieve information from the database for display on the user dashboard.
- An event enables a user to provide commentary and analysis regarding the at least one article.
- the user can use the user dashboard to create, save, view, edit, and share events.
- users that did not create the event can still provide commentary and/or analysis within the event.
- the risk analysis module when executed, is further configured to group articles based on related subject matter.
- the user dashboard displays the grouped articles in a single-story feed.
- the articles may be grouped and displayed based on a particular region or country.
- the risk analysis module displays articles to a user based on the user's assigned or identified location or address or business area (for example, if a user is identified as being a resident of California, the user may receive articles associated with the western United States as news associated with the western United States may be more relevant to the user than news associated with the east coast).
- the displayed articles are based on geo-fencing, in which the displayed articles are based on the user's location determined, for example, using a global positioning system (GPS) associated with the user (for example, via a smart phone associated with the user). For example, if, via geofencing, the risk analysis module determines the user to be in China, the user may be displayed articles associated with China.
- GPS global positioning system
- the user dashboard generates and displays a risk-related heat map that indicates risk trends.
- the risk-related heat map may display risk over a given time to allow for trend determination.
- the risk-heated map may display risk over a specific time period, for example the past 24 hours.
- a user may select an interval to view the risk-heated map at discrete times over a time period (for example, every hour over a 24 hour period).
- the user dashboard displays an article-related map that displays markers or pins at locations associated with articles and/or created events. For example, if a user creates an event associated with Austin, Tex., a marker for the event appears on Austin, Tex. on the article-related map. A user can then select the marker to be directed to a page on the user dashboard displaying the event.
- the user can use the user dashboard to tag other users in an event.
- the user dashboard can include an executive mode, where the articles and/or events are filtered to display particular information, for example, sensitive information, to authorized users and not to unauthorized users.
- the risk analysis module may monitor social media for articles to display on the user dashboard.
- the system further includes a notification module that generates notifications (e.g., emails, text messages, etc.) to users based on predefined criteria.
- the predefined criteria may include new articles or risk scores received by the risk analysis module.
- the predefined criteria can be further defined to new articles or risk scores associated with a particular country, a particular region, a particular subject matter, etc.
- the notification module uses a user's assigned or identified location or business area, in which the notification process is based on the user location or a business area assigned to the user (for example, news in the western United States may not be as relevant to a user on the east coast).
- the notification module uses geo-fencing, in which the notification process is based on the user's location determined, for example, using a global positioning system (GPS) associated with the user (for example, via a smart phone associated with the user). For example, if, via geofencing, the notification module determines the user to be in China, the user may receive notifications regarding articles or risk scores associated with China.
- GPS global positioning system
- the system further includes a machine learning module to use machine learning to suggest articles for a given user based on the user's history of reading articles or creating events.
- the described systems and methods enable the aggregation of articles from throughout the world.
- the articles are associated with potential risks to users, facilities, and/or businesses.
- the described systems and methods enables the presentation of the articles to users using a user dashboard, where the users can view the articles on a user dashboard and provide analysis based on the articles that other users can view and provide comment.
- FIG. 1 is an exemplary networked environment 100 for distributed risk analysis, in accordance with embodiments of the present disclosure.
- the environment 100 includes a distributed risk analysis (DRA) computing system 102 communicatively coupled, via communications network 103 , to at least computing device 104 , computing device 106 , computing device 108 , and computing device 110 .
- the computing devices 104 , 106 , 108 , and 110 transmit to the DRA computing system 102 news articles, risk scores, and/or risk analysis for different geographical locations (e.g., different states, regions, countries, etc.).
- the DRA computing system 102 may use pull coding or client pull where the initial request for the data files originates from the DRA computing system 102 , and then is responded to by a server among the computing devices 104 , 106 , 108 , and/or 110 . Alternatively, a server among computing devices 104 , 106 , 108 , and/or 110 may push the data files to the DRA computing system 102 .
- the DRA computing system 102 includes at least one processor 114 executing at least one risk analysis module 115 . In some embodiments, the DRA computing system 102 may further include a notification module 116 , a machine learning module 117 , database(s) 118 , and/or a database server 119 .
- the DRA computing system 102 is communicatively coupled to at least one user computing device 120 .
- the user computing device 120 may be, for example, a desktop computer or a mobile computing device (i.e., a smartphone).
- the user computing device 120 includes a web browser 122 and/or an application 124 (i.e., a desktop application and/or a mobile application) to enable a user to view and interact with a user dashboard displayed on the web browser 122 and/or the application 124 .
- Database 118 can include one or more databases.
- a database is a structured set of data held in a computer device, such as a server.
- database 118 is held within the DRA computing device 102 that may include the database server 119 .
- one or more databases 118 can be present on one or more database systems physically separate from one another and/or separate from the DRA computing device 102 .
- Database software provides functionalities that allow building, modifying, accessing, and updating both databases and the underlying data. Databases and database software reside on the database server 119 .
- the database server 119 is a collection of hardware and software that provide storage and access to the database 118 and enable execution of the database software.
- the communications network 103 can be any network over which information can be transmitted between devices communicatively coupled to the network.
- one or more portions of communications network 103 may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless wide area network (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, a wireless network, a WiFi network, a WiMax network, any other type of network, or a combination of two or more such networks.
- VPN virtual private network
- LAN local area network
- WLAN wireless LAN
- WAN wide area network
- WWAN wireless wide area network
- MAN metropolitan area network
- PSTN Public Switched Telephone Network
- PSTN Public Switched Telephone Network
- FIG. 2 is an exemplary architecture 200 of a distributed risk analysis system for distributed risk analysis, in accordance with an exemplary embodiment.
- the architecture 200 includes the risk analysis module 115 .
- the risk analysis module 115 includes a front end 212 , a NodeJS REST based API 214 , and a python-based module 216 , as explained below.
- the risk analysis module 115 is communicatively coupled to a backend database 218 (e.g., an Apache Solr or ElasticSeach database) and/or a MongoDB Cluster 220 .
- the backend database 218 holds searchable data.
- the MongoDB Cluster 220 holds user input (e.g., comments and events), and articles obtained from third party vendors or created in-house (also referred to as ADS data).
- ADS data also referred to as ADS data.
- the architecture 200 is broken down into five tiers: a thin client tier 202 , a services tier 204 , an analytics tier 206 , an extract, transform, and load (ETL) tier 208 , and an enterprise information system (EIS) tier 210 which are discussed further below. It should be appreciated that the architecture may be arranged in different tiers than those specifically shown without departing from the scope of the present invention.
- the thin client tier 202 includes the front end 212 used to communicate with users via a user dashboard, as described herein.
- the front end 212 may use, for example, Angular6 (built with typescript) with HTML5 and CSS3.
- the front end 212 pushes results, such as articles and events, to users as well as accepts input (e.g., requests) from the users.
- the services tier 204 includes the NodeJS REST based API 214 .
- the NodeJS REST based API 214 may use Django/NodeJS and SocketIO.
- the NodeJS REST based API 214 is used for exchanging data between applications or systems. For example, the NodeJS REST based API 214 performs searches on the backend database 218 and/or requests data from the MongoDB cluster 220 .
- the NodeJS REST based API 214 may also store user inputs, such as comments and events, into the MongoDB cluster 220 . Based on user input requests, the NodeJS REST based API 214 fetches search results from the backend database 218 . The results are displayed to the user in the user dashboard via the front end 212 .
- the front end 212 communicates with the NodeJS REST based API 214 .
- the analytics tier 206 fetches, via an API, data files (e.g., news articles and risk scores) from third parties.
- the data files are associated with news articles and risk scores from third parties, such as global risk subscription services.
- the analytics tier 206 performs data manipulation, data normalization, and ADS data creation to prepare the fetched data to be stored in the backend database 218 and/or the MongoDB cluster 220 . At least part of the normalized data is stored in the backend database 218 for search purposes.
- the ADS data is stored into the MongoDB cluster 220 .
- the analytics tier 206 includes the python-based module 216 for performing the data manipulation, data normalization, and ADS creation.
- the data fetched through APIs is manipulated by the python-based module 216 to bring all articles to a standard JSON structure containing same keys.
- the python-based module 216 classifies the data files based on the subject matter.
- the python-based module 216 communicates with the NodeJS REST based API 214 .
- the extract, transform, and load (ETL) tier 208 retrieves data from third party source systems and stores the data into data storage.
- the EIS tier 210 includes the data retrieved from the third party source systems and placed into data storage.
- the EIS tier 210 includes the backend database 218 , the MongoBD cluster 220 , and an API 222 for accessing the Internet and retrieving the data from the third party source systems.
- the EIS tier 210 may include database servers, enterprise resource planning systems, and other data sources, like mainframes.
- the system performs at least seven (7) steps associated with fetching, storing, and displaying information from the data files.
- API data is leveraged to fetch data files (e.g., news articles and risk scores) from third parties.
- data files e.g., news articles and risk scores
- the python-based module 216 stores at least part of the normalized data in the backend database 218 for search purposes.
- the python-based module 216 stores ADS data into the MongoDB cluster 220 .
- a user interface deployed on One Ops and the NodeJS REST based API 214 request data from the MongoDB cluster 220 .
- cleaned/derived results are pushed to a user.
- the user can also input a request.
- the NodeJS REST based API 214 stores user inputs, such as comments and events, in the MongoDB cluster 220 .
- search results are fetched from the backend database 218 and displayed in the user dashboard.
- FIG. 3 illustrates a method for performing distributed risk analysis, in accordance with an exemplary embodiment.
- a risk analysis module that is coupled to third party sources, where each third party source is associated with a geographical location, aggregates data files received from the sources.
- the risk analysis module classifies the data files based on subject matter.
- the risk analysis module stores the data files into a database.
- a user dashboard displays at least one article associated with a subject matter based on a data file.
- the user dashboard is executing on a computing device and is communicatively coupled to a risk analysis module.
- the user dashboard receives a user selection of the at least one article to initiate an event.
- the user dashboard receives user comments associated with the event.
- the user dashboard displays the user comments in association with the event.
- FIG. 4 illustrates an article feed interface 400 for the user dashboard, in accordance with embodiments of the present disclosure.
- a user can view a feed 402 of aggregated articles.
- the feed 402 provides users with frequently updated articles.
- the articles are stored in a database (i.e., database 118 ).
- Each article may include one or more of an image 404 , a title 406 , a date of the article 408 , an originator of the article 410 , location(s) associated with the article 412 , and/or a summary of the article 414 . It will be appreciated that other arrangements of articles are also within the scope of the present invention.
- the user is able to select options 416 via the article feed interface 400 to filter the articles based on predefined criteria, such as category, geography, and/or time frame.
- predefined criteria such as category, geography, and/or time frame.
- the user can select multiple filters (for example, the user can check one or more boxes to select filters).
- the user may then view the feed 402 of articles based on the selected filters.
- there may be N articles per page, for example, sorted by date.
- the user may also be able to sort articles by, for example, by newest articles first.
- FIG. 5 illustrates an events list interface 500 for the user dashboard, in accordance with embodiments of the present disclosure.
- the interface 500 displays a list 502 of created events.
- Each event includes an event name 504 , a category 506 , a status of the event 508 (e.g., started, not started, completed), an assignment of the event to a user 510 , a date that the event was assigned to the user 512 , and/or a date that the event was last updated 514 .
- the user can select an event and view information 516 associated with the event.
- the information 516 may include a summary of the article associated with the event, links to related articles, links to related reports, user(s) assigned to the event, and user comments associated with the event.
- FIG. 6 illustrates a risk-related heat map 600 for the user dashboard, in accordance with embodiments of the present disclosure.
- the risk-related heat map 600 represents risk in a form of a map in which risk values are represented as colors.
- the map 600 can display a first color for a high risk area 602 and a second color for a low risk area 504 .
- the risk may be from civil unrest, protests, corruption, war, risk of mortality, diseases, etc.
- high risk areas are displayed in a red color while low risk areas are displayed in a blue color.
- the risk analysis module receives risk scores from third party sources. Each risk score is associated with a state, region, country, etc.
- the risk score is a calculated number (the score) that reflects the level of risk in the presence of some risk factors (e.g., civil unrest, protests, corruption, war, risk of mortality or disease).
- FIG. 7 illustrates an article-related map 700 for the user dashboard, in accordance with embodiments of the present disclosure.
- the risk analysis module collects and assembles data on articles, which is used to display locations associated with the articles and/or events on the article-related map 700 that highlights the locations of articles.
- article-related map may indicate the presence of a large number of articles related to the Middle East.
- the risk analysis module may load data from a data file or create a javascript object to load into a map template.
- the user dashboard displays an article-related map that displays markers or pins at locations associated with articles and/or created events. For example, if a user creates an event associated with Austin, Tex., a marker for the event appears on Austin, Tex. on the article-related map. A user can then select the marker to be directed to a page on the user dashboard displaying the event. For example, United States, Canada, Central America, and Mexico may have location specific articles that are available to select and download (for example, Mexico BTR, CAM, item information template, etc.).
- FIG. 8 is a block diagram of an exemplary computing device 800 that can be used to perform one or more steps of the methods provided by exemplary embodiments.
- computing device 800 includes DRA computing system 102 .
- Computing device 800 includes one or more non-transitory computer-readable media for storing one or more computer-executable instructions or software for implementing exemplary embodiments.
- the non-transitory computer-readable media can include, but are not limited to, one or more varieties of hardware memory, non-transitory tangible media (for example, one or more magnetic storage disks, one or more optical disks, one or more USB flashdrives), and the like.
- a memory 806 included in computing device 800 can store computer-readable and computer-executable instructions or software for implementing exemplary embodiments.
- Computing device 800 also includes a processor 802 and an associated core 804 , and optionally, one or more additional processor(s) 802 ′ and associated core(s) 804 ′ (for example, in the case of computer systems having multiple processors/cores), for executing computer-readable and computer-executable instructions or software stored in memory 806 and other programs for controlling system hardware.
- Processor 802 and processor(s) 802 ′ can each be a single core processor or multiple core ( 804 and 804 ′) processor.
- Computing device 800 may include at least one module 807 , such as a risk analysis module 115 .
- Computing device 800 also includes and/or is communicatively coupled to one or more computing devices, as described in FIG. 1 .
- Virtualization can be employed in computing device 800 so that infrastructure and resources in the computing device can be shared dynamically.
- a virtual machine 814 can be provided to handle a process running on multiple processors so that the process appears to be using only one computing resource rather than multiple computing resources. Multiple virtual machines can also be used with one processor.
- Memory 806 can include a computer system memory or random access memory, such as DRAM, SRAM, EDO RAM, and the like. Memory 806 can include other varieties of memory as well, or combinations thereof.
- a user can interact with computing device 800 through a visual display device 818 , such as a touch screen display or computer monitor, which can display one or more user interfaces 819 that can be provided in accordance with exemplary embodiments, for example, the exemplary user dashboard.
- Visual display device 818 may also display other aspects, elements and/or information or data associated with exemplary embodiments.
- Computing device 800 may include other I/O devices for receiving input from a user, for example, a keyboard or any suitable multi-point touch interface 808 , a pointing device 810 (e.g., a pen, stylus, mouse, or trackpad).
- the keyboard 808 and pointing device 810 may be coupled to visual display device 818 .
- Computing device 800 may include other suitable conventional I/O peripherals.
- Computing device 800 can also include one or more databases devices 824 , such as a hard-drive, CD-ROM, or other computer readable media, for storing data and computer-readable instructions and/or software that implements embodiments of the system, as described herein, or portions thereof.
- databases devices 824 can also store one or more storage devices for storing any suitable information required to implement exemplary embodiments.
- Database 824 may include one or more databases as described herein, such as a backend database 218 and a MongoBD cluster 220 .
- Computing device 800 can include a network interface 812 configured to interface via one or more network devices 820 with one or more networks, for example, Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (for example, 802.11, T1, T3, 56 kb, X.25), broadband connections (for example, ISDN, Frame Relay, ATM), wireless connections, controller area network (CAN), or some combination of any or all of the above.
- LAN Local Area Network
- WAN Wide Area Network
- the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (for example, 802.11, T1, T3, 56 kb, X.25), broadband connections (for example, ISDN, Frame Relay, ATM), wireless connections, controller area network (CAN), or some combination of any or all of the above.
- the network interface 812 can include a built-in network adapter, network interface card, PCMCIA network card, card bus network adapter, wireless network adapter, USB network adapter, modem or any other device suitable for interfacing computing device 800 to any variety of networks capable of communication and performing the operations described herein.
- computing device 800 can be any computer system, such as a workstation, desktop computer, server, laptop, handheld computer, tablet computer (e.g., the iPad® tablet computer), mobile computing or communication device (e.g., the iPhone® communication device), or other form of computing or telecommunications device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein.
- Computing device 800 can run any operating system 816 , such as any of the versions of the Microsoft® Windows® operating systems, the different releases of the Unix and Linux operating systems, any version of the MacOS® for Macintosh computers, any embedded operating system, any real-time operating system, any open source operating system, any proprietary operating system, any operating systems for mobile computing devices, or any other operating system capable of running on the computing device and performing the operations described herein.
- the operating system 816 can be run in native mode or emulated mode.
- the operating system 816 can be run on one or more cloud machine instances.
- Exemplary flowcharts are provided herein for illustrative purposes and are non-limiting examples of methods.
- One of ordinary skill in the art will recognize that exemplary methods can include more or fewer steps than those illustrated in the exemplary flowcharts, and that the steps in the exemplary flowcharts can be performed in a different order than the order shown in the illustrative flowcharts.
Abstract
Description
- This application is related to and claims the benefit of priority to U.S. Provisional Patent Application No. 62/753,636, filed Oct. 31, 2018, the entire contents of which are expressly incorporated herein in their entirety by reference.
- Businesses typically assess and/or mitigate risk to assets, such as people or facilities, caused by a variety of factors, such as security threats or transportation issues.
- The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one or more embodiments and, together with the description, help to explain the embodiments. The embodiments are illustrated by way of example and should not be construed to limit the present disclosure. In the drawings:
-
FIG. 1 is an exemplary networked environment for distributed risk analysis, in accordance with embodiments of the present disclosure; -
FIG. 2 is an exemplary architecture of a distributed risk analysis system for distributed risk analysis, in accordance with an exemplary embodiment; -
FIG. 3 illustrates a method for performing distributed risk analysis, in accordance with an exemplary embodiment; -
FIG. 4 illustrates an article feed interface for a user dashboard, in accordance with an exemplary embodiment; -
FIG. 5 illustrates an events list interface for the user dashboard, in accordance with an exemplary embodiment; -
FIG. 6 illustrates a risk-related heat map for the user dashboard, in accordance with an exemplary embodiment; -
FIG. 7 illustrates a article-related map for the user dashboard, in accordance with an exemplary embodiment; and -
FIG. 8 is a block diagram of an exemplary computing device that can be used to perform one or more steps of the methods provided by exemplary embodiments. - The features and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
- Systems and methods are described herein for distributed risk analysis. The system includes a database configured to store data files and a risk analysis module executable by at least one processor. In an exemplary embodiment, the data files are associated with news articles and risk scores from third parties, such as global risk subscription services. The risk analysis module is communicatively coupled to sources (e.g., the third parties) associated with various geographical locations. The risk analysis module, when executed, aggregates data files from the sources, classifies the data files based on subject matter, and stores the data files into the database. The system further includes a user dashboard executing on a computing device and communicatively coupled to the risk analysis module. The user dashboard is configured to display at least one article associated with a subject matter based on a data file, receive a user selection of the at least one article to initiate an event, receive user comments associated with the event, and display the user comments in association with the event. In some embodiments, the system further includes a database server coupled to the database and configured to retrieve information from the database for display on the user dashboard.
- An event enables a user to provide commentary and analysis regarding the at least one article. The user can use the user dashboard to create, save, view, edit, and share events. In some embodiments, users that did not create the event can still provide commentary and/or analysis within the event.
- In some embodiments, the risk analysis module, when executed, is further configured to group articles based on related subject matter. In such an embodiment, the user dashboard displays the grouped articles in a single-story feed. For example, the articles may be grouped and displayed based on a particular region or country. In further embodiments, the risk analysis module displays articles to a user based on the user's assigned or identified location or address or business area (for example, if a user is identified as being a resident of California, the user may receive articles associated with the western United States as news associated with the western United States may be more relevant to the user than news associated with the east coast). In additional embodiments, the displayed articles are based on geo-fencing, in which the displayed articles are based on the user's location determined, for example, using a global positioning system (GPS) associated with the user (for example, via a smart phone associated with the user). For example, if, via geofencing, the risk analysis module determines the user to be in China, the user may be displayed articles associated with China.
- In some embodiments, the user dashboard generates and displays a risk-related heat map that indicates risk trends. The risk-related heat map may display risk over a given time to allow for trend determination. For example, in one embodiment, the risk-heated map may display risk over a specific time period, for example the past 24 hours. In another embodiment, a user may select an interval to view the risk-heated map at discrete times over a time period (for example, every hour over a 24 hour period).
- In some embodiments, the user dashboard displays an article-related map that displays markers or pins at locations associated with articles and/or created events. For example, if a user creates an event associated with Austin, Tex., a marker for the event appears on Austin, Tex. on the article-related map. A user can then select the marker to be directed to a page on the user dashboard displaying the event.
- In some embodiments, the user can use the user dashboard to tag other users in an event. In further embodiments, the user dashboard can include an executive mode, where the articles and/or events are filtered to display particular information, for example, sensitive information, to authorized users and not to unauthorized users. In still further embodiments, the risk analysis module may monitor social media for articles to display on the user dashboard.
- In some embodiments, the system further includes a notification module that generates notifications (e.g., emails, text messages, etc.) to users based on predefined criteria. The predefined criteria may include new articles or risk scores received by the risk analysis module. The predefined criteria can be further defined to new articles or risk scores associated with a particular country, a particular region, a particular subject matter, etc. In further embodiments, the notification module uses a user's assigned or identified location or business area, in which the notification process is based on the user location or a business area assigned to the user (for example, news in the western United States may not be as relevant to a user on the east coast). In additional embodiments, the notification module uses geo-fencing, in which the notification process is based on the user's location determined, for example, using a global positioning system (GPS) associated with the user (for example, via a smart phone associated with the user). For example, if, via geofencing, the notification module determines the user to be in China, the user may receive notifications regarding articles or risk scores associated with China.
- In some embodiments, the system further includes a machine learning module to use machine learning to suggest articles for a given user based on the user's history of reading articles or creating events.
- The described systems and methods enable the aggregation of articles from throughout the world. The articles are associated with potential risks to users, facilities, and/or businesses. The described systems and methods enables the presentation of the articles to users using a user dashboard, where the users can view the articles on a user dashboard and provide analysis based on the articles that other users can view and provide comment.
-
FIG. 1 is an exemplarynetworked environment 100 for distributed risk analysis, in accordance with embodiments of the present disclosure. Theenvironment 100 includes a distributed risk analysis (DRA)computing system 102 communicatively coupled, viacommunications network 103, to at leastcomputing device 104,computing device 106,computing device 108, andcomputing device 110. Thecomputing devices DRA computing system 102 news articles, risk scores, and/or risk analysis for different geographical locations (e.g., different states, regions, countries, etc.). The DRAcomputing system 102 may use pull coding or client pull where the initial request for the data files originates from theDRA computing system 102, and then is responded to by a server among thecomputing devices computing devices DRA computing system 102. The DRAcomputing system 102 includes at least oneprocessor 114 executing at least onerisk analysis module 115. In some embodiments, theDRA computing system 102 may further include anotification module 116, amachine learning module 117, database(s) 118, and/or adatabase server 119. - In an exemplary embodiment, the
DRA computing system 102 is communicatively coupled to at least oneuser computing device 120. Theuser computing device 120 may be, for example, a desktop computer or a mobile computing device (i.e., a smartphone). Theuser computing device 120 includes aweb browser 122 and/or an application 124 (i.e., a desktop application and/or a mobile application) to enable a user to view and interact with a user dashboard displayed on theweb browser 122 and/or theapplication 124. -
Database 118 can include one or more databases. A database is a structured set of data held in a computer device, such as a server. In some embodiments,database 118 is held within theDRA computing device 102 that may include thedatabase server 119. In other embodiments, one ormore databases 118 can be present on one or more database systems physically separate from one another and/or separate from theDRA computing device 102. Database software provides functionalities that allow building, modifying, accessing, and updating both databases and the underlying data. Databases and database software reside on thedatabase server 119. Thedatabase server 119 is a collection of hardware and software that provide storage and access to thedatabase 118 and enable execution of the database software. - The
communications network 103 can be any network over which information can be transmitted between devices communicatively coupled to the network. For example, one or more portions ofcommunications network 103 may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless wide area network (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, a wireless network, a WiFi network, a WiMax network, any other type of network, or a combination of two or more such networks. -
FIG. 2 is anexemplary architecture 200 of a distributed risk analysis system for distributed risk analysis, in accordance with an exemplary embodiment. Thearchitecture 200 includes therisk analysis module 115. Therisk analysis module 115 includes afront end 212, a NodeJS REST basedAPI 214, and a python-basedmodule 216, as explained below. Therisk analysis module 115 is communicatively coupled to a backend database 218 (e.g., an Apache Solr or ElasticSeach database) and/or aMongoDB Cluster 220. Thebackend database 218 holds searchable data. TheMongoDB Cluster 220 holds user input (e.g., comments and events), and articles obtained from third party vendors or created in-house (also referred to as ADS data). For illustration purposes, thearchitecture 200 is broken down into five tiers: athin client tier 202, a services tier 204, ananalytics tier 206, an extract, transform, and load (ETL)tier 208, and an enterprise information system (EIS)tier 210 which are discussed further below. It should be appreciated that the architecture may be arranged in different tiers than those specifically shown without departing from the scope of the present invention. - In an exemplary embodiment, the
thin client tier 202 includes thefront end 212 used to communicate with users via a user dashboard, as described herein. Thefront end 212 may use, for example, Angular6 (built with typescript) with HTML5 and CSS3. Thefront end 212 pushes results, such as articles and events, to users as well as accepts input (e.g., requests) from the users. - In an exemplary embodiment, the services tier 204 includes the NodeJS REST based
API 214. The NodeJS REST basedAPI 214 may use Django/NodeJS and SocketIO. The NodeJS REST basedAPI 214 is used for exchanging data between applications or systems. For example, the NodeJS REST basedAPI 214 performs searches on thebackend database 218 and/or requests data from theMongoDB cluster 220. The NodeJS REST basedAPI 214 may also store user inputs, such as comments and events, into theMongoDB cluster 220. Based on user input requests, the NodeJS REST basedAPI 214 fetches search results from thebackend database 218. The results are displayed to the user in the user dashboard via thefront end 212. Thefront end 212 communicates with the NodeJS REST basedAPI 214. - In an exemplary embodiment, the
analytics tier 206 fetches, via an API, data files (e.g., news articles and risk scores) from third parties. In an exemplary embodiment, the data files are associated with news articles and risk scores from third parties, such as global risk subscription services. Theanalytics tier 206 performs data manipulation, data normalization, and ADS data creation to prepare the fetched data to be stored in thebackend database 218 and/or theMongoDB cluster 220. At least part of the normalized data is stored in thebackend database 218 for search purposes. The ADS data is stored into theMongoDB cluster 220. In an exemplary embodiment, theanalytics tier 206 includes the python-basedmodule 216 for performing the data manipulation, data normalization, and ADS creation. For example, the data fetched through APIs is manipulated by the python-basedmodule 216 to bring all articles to a standard JSON structure containing same keys. In another example, during data manipulation, the python-basedmodule 216 classifies the data files based on the subject matter. The python-basedmodule 216 communicates with the NodeJS REST basedAPI 214. - The data manipulation and data normalization is used since article categories are performed differently in different sources and need to be normalized to internal standard categories. Likewise, risk scores for geographical locations are obtained on different scales from different sources, which are again normalized to a standard scale before using them to display in a risk map.
- In an exemplary embodiment, the extract, transform, and load (ETL)
tier 208 retrieves data from third party source systems and stores the data into data storage. - In an exemplary embodiment, the
EIS tier 210 includes the data retrieved from the third party source systems and placed into data storage. TheEIS tier 210 includes thebackend database 218, theMongoBD cluster 220, and anAPI 222 for accessing the Internet and retrieving the data from the third party source systems. TheEIS tier 210 may include database servers, enterprise resource planning systems, and other data sources, like mainframes. - In an exemplary operation, the system performs at least seven (7) steps associated with fetching, storing, and displaying information from the data files.
- At step one (1), API data is leveraged to fetch data files (e.g., news articles and risk scores) from third parties.
- At step two (2), the python-based
module 216 stores at least part of the normalized data in thebackend database 218 for search purposes. - At step three (3), the python-based
module 216 stores ADS data into theMongoDB cluster 220. - At step four (4), a user interface deployed on One Ops and the NodeJS REST based
API 214 request data from theMongoDB cluster 220. - At step five (5), cleaned/derived results are pushed to a user. The user can also input a request.
- At step six (6), the NodeJS REST based
API 214 stores user inputs, such as comments and events, in theMongoDB cluster 220. - At step seven (7), based on user input request, search results are fetched from the
backend database 218 and displayed in the user dashboard. -
FIG. 3 illustrates a method for performing distributed risk analysis, in accordance with an exemplary embodiment. Instep 302, a risk analysis module that is coupled to third party sources, where each third party source is associated with a geographical location, aggregates data files received from the sources. Instep 304, the risk analysis module classifies the data files based on subject matter. Instep 306, the risk analysis module stores the data files into a database. Instep 308, a user dashboard displays at least one article associated with a subject matter based on a data file. The user dashboard is executing on a computing device and is communicatively coupled to a risk analysis module. Instep 310, the user dashboard receives a user selection of the at least one article to initiate an event. Instep 312, the user dashboard receives user comments associated with the event. Instep 314, the user dashboard displays the user comments in association with the event. -
FIG. 4 illustrates anarticle feed interface 400 for the user dashboard, in accordance with embodiments of the present disclosure. Using thearticle feed interface 400, a user can view afeed 402 of aggregated articles. Thefeed 402 provides users with frequently updated articles. The articles are stored in a database (i.e., database 118). Each article may include one or more of animage 404, atitle 406, a date of thearticle 408, an originator of thearticle 410, location(s) associated with thearticle 412, and/or a summary of thearticle 414. It will be appreciated that other arrangements of articles are also within the scope of the present invention. - The user is able to select
options 416 via thearticle feed interface 400 to filter the articles based on predefined criteria, such as category, geography, and/or time frame. In some embodiments, the user can select multiple filters (for example, the user can check one or more boxes to select filters). The user may then view thefeed 402 of articles based on the selected filters. By default, there may be N articles per page, for example, sorted by date. The user may also be able to sort articles by, for example, by newest articles first. -
FIG. 5 illustrates anevents list interface 500 for the user dashboard, in accordance with embodiments of the present disclosure. Theinterface 500 displays alist 502 of created events. Each event includes anevent name 504, acategory 506, a status of the event 508 (e.g., started, not started, completed), an assignment of the event to auser 510, a date that the event was assigned to theuser 512, and/or a date that the event was last updated 514. The user can select an event andview information 516 associated with the event. Theinformation 516 may include a summary of the article associated with the event, links to related articles, links to related reports, user(s) assigned to the event, and user comments associated with the event. -
FIG. 6 illustrates a risk-relatedheat map 600 for the user dashboard, in accordance with embodiments of the present disclosure. The risk-relatedheat map 600 represents risk in a form of a map in which risk values are represented as colors. For example, themap 600 can display a first color for ahigh risk area 602 and a second color for alow risk area 504. The risk may be from civil unrest, protests, corruption, war, risk of mortality, diseases, etc. For example, high risk areas are displayed in a red color while low risk areas are displayed in a blue color. As described herein, the risk analysis module receives risk scores from third party sources. Each risk score is associated with a state, region, country, etc. The risk score is a calculated number (the score) that reflects the level of risk in the presence of some risk factors (e.g., civil unrest, protests, corruption, war, risk of mortality or disease). -
FIG. 7 illustrates an article-relatedmap 700 for the user dashboard, in accordance with embodiments of the present disclosure. The risk analysis module collects and assembles data on articles, which is used to display locations associated with the articles and/or events on the article-relatedmap 700 that highlights the locations of articles. For example, article-related map may indicate the presence of a large number of articles related to the Middle East. The risk analysis module may load data from a data file or create a javascript object to load into a map template. - In some embodiments, the user dashboard displays an article-related map that displays markers or pins at locations associated with articles and/or created events. For example, if a user creates an event associated with Austin, Tex., a marker for the event appears on Austin, Tex. on the article-related map. A user can then select the marker to be directed to a page on the user dashboard displaying the event. For example, United States, Canada, Central America, and Mexico may have location specific articles that are available to select and download (for example, Mexico BTR, CAM, item information template, etc.).
-
FIG. 8 is a block diagram of anexemplary computing device 800 that can be used to perform one or more steps of the methods provided by exemplary embodiments. In an exemplary embodiment,computing device 800 includesDRA computing system 102.Computing device 800 includes one or more non-transitory computer-readable media for storing one or more computer-executable instructions or software for implementing exemplary embodiments. The non-transitory computer-readable media can include, but are not limited to, one or more varieties of hardware memory, non-transitory tangible media (for example, one or more magnetic storage disks, one or more optical disks, one or more USB flashdrives), and the like. For example, amemory 806 included incomputing device 800 can store computer-readable and computer-executable instructions or software for implementing exemplary embodiments.Computing device 800 also includes aprocessor 802 and an associatedcore 804, and optionally, one or more additional processor(s) 802′ and associated core(s) 804′ (for example, in the case of computer systems having multiple processors/cores), for executing computer-readable and computer-executable instructions or software stored inmemory 806 and other programs for controlling system hardware.Processor 802 and processor(s) 802′ can each be a single core processor or multiple core (804 and 804′) processor.Computing device 800 may include at least onemodule 807, such as arisk analysis module 115.Computing device 800 also includes and/or is communicatively coupled to one or more computing devices, as described inFIG. 1 . - Virtualization can be employed in
computing device 800 so that infrastructure and resources in the computing device can be shared dynamically. Avirtual machine 814 can be provided to handle a process running on multiple processors so that the process appears to be using only one computing resource rather than multiple computing resources. Multiple virtual machines can also be used with one processor. -
Memory 806 can include a computer system memory or random access memory, such as DRAM, SRAM, EDO RAM, and the like.Memory 806 can include other varieties of memory as well, or combinations thereof. In some embodiments, a user can interact withcomputing device 800 through avisual display device 818, such as a touch screen display or computer monitor, which can display one ormore user interfaces 819 that can be provided in accordance with exemplary embodiments, for example, the exemplary user dashboard.Visual display device 818 may also display other aspects, elements and/or information or data associated with exemplary embodiments.Computing device 800 may include other I/O devices for receiving input from a user, for example, a keyboard or any suitablemulti-point touch interface 808, a pointing device 810 (e.g., a pen, stylus, mouse, or trackpad). Thekeyboard 808 andpointing device 810 may be coupled tovisual display device 818.Computing device 800 may include other suitable conventional I/O peripherals. -
Computing device 800 can also include one ormore databases devices 824, such as a hard-drive, CD-ROM, or other computer readable media, for storing data and computer-readable instructions and/or software that implements embodiments of the system, as described herein, or portions thereof.Exemplary storage device 824 can also store one or more storage devices for storing any suitable information required to implement exemplary embodiments.Database 824 may include one or more databases as described herein, such as abackend database 218 and aMongoBD cluster 220. -
Computing device 800 can include anetwork interface 812 configured to interface via one ormore network devices 820 with one or more networks, for example, Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (for example, 802.11, T1, T3, 56 kb, X.25), broadband connections (for example, ISDN, Frame Relay, ATM), wireless connections, controller area network (CAN), or some combination of any or all of the above. Thenetwork interface 812 can include a built-in network adapter, network interface card, PCMCIA network card, card bus network adapter, wireless network adapter, USB network adapter, modem or any other device suitable for interfacingcomputing device 800 to any variety of networks capable of communication and performing the operations described herein. Moreover,computing device 800 can be any computer system, such as a workstation, desktop computer, server, laptop, handheld computer, tablet computer (e.g., the iPad® tablet computer), mobile computing or communication device (e.g., the iPhone® communication device), or other form of computing or telecommunications device that is capable of communication and that has sufficient processor power and memory capacity to perform the operations described herein. -
Computing device 800 can run anyoperating system 816, such as any of the versions of the Microsoft® Windows® operating systems, the different releases of the Unix and Linux operating systems, any version of the MacOS® for Macintosh computers, any embedded operating system, any real-time operating system, any open source operating system, any proprietary operating system, any operating systems for mobile computing devices, or any other operating system capable of running on the computing device and performing the operations described herein. In exemplary embodiments, theoperating system 816 can be run in native mode or emulated mode. In an exemplary embodiment, theoperating system 816 can be run on one or more cloud machine instances. - The following description is presented to enable any person skilled in the art to create and use a computer system configuration and related method and systems for distributed risk analysis. Various modifications to the example embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Moreover, in the following description, numerous details are set forth for the purpose of explanation. However, one of ordinary skill in the art will realize that the invention may be practiced without the use of these specific details. In other instances, well-known structures and processes are shown in block diagram form in order not to obscure the description of the invention with unnecessary detail. Thus, the present disclosure is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
- In describing exemplary embodiments, specific terminology is used for the sake of clarity. For purposes of description, each specific term is intended to at least include all technical and functional equivalents that operate in a similar manner to accomplish a similar purpose. Additionally, in some instances where a particular exemplary embodiment includes a plurality of system elements, device components or method steps, those elements, components or steps can be replaced with a single element, component, or step. Likewise, a single element, component, or step can be replaced with a plurality of elements, components, or steps that serve the same purpose. Moreover, while exemplary embodiments have been shown and described with references to particular embodiments thereof, those of ordinary skill in the art will understand that various substitutions and alterations in form and detail can be made therein without departing from the scope of the invention. Further still, other aspects, functions, and advantages are also within the scope of the invention.
- Exemplary flowcharts are provided herein for illustrative purposes and are non-limiting examples of methods. One of ordinary skill in the art will recognize that exemplary methods can include more or fewer steps than those illustrated in the exemplary flowcharts, and that the steps in the exemplary flowcharts can be performed in a different order than the order shown in the illustrative flowcharts.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/670,704 US20200134523A1 (en) | 2018-10-31 | 2019-10-31 | Systems and methods for distributed risk analysis |
US17/670,839 US11676088B2 (en) | 2018-10-31 | 2022-02-14 | Systems and methods for distributed risk analysis |
US18/140,036 US20240078491A1 (en) | 2018-10-31 | 2023-04-27 | Systems and methods for distributed risk analysis |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862753636P | 2018-10-31 | 2018-10-31 | |
US16/670,704 US20200134523A1 (en) | 2018-10-31 | 2019-10-31 | Systems and methods for distributed risk analysis |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/670,839 Continuation US11676088B2 (en) | 2018-10-31 | 2022-02-14 | Systems and methods for distributed risk analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200134523A1 true US20200134523A1 (en) | 2020-04-30 |
Family
ID=70326296
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/670,704 Abandoned US20200134523A1 (en) | 2018-10-31 | 2019-10-31 | Systems and methods for distributed risk analysis |
US17/670,839 Active US11676088B2 (en) | 2018-10-31 | 2022-02-14 | Systems and methods for distributed risk analysis |
US18/140,036 Pending US20240078491A1 (en) | 2018-10-31 | 2023-04-27 | Systems and methods for distributed risk analysis |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/670,839 Active US11676088B2 (en) | 2018-10-31 | 2022-02-14 | Systems and methods for distributed risk analysis |
US18/140,036 Pending US20240078491A1 (en) | 2018-10-31 | 2023-04-27 | Systems and methods for distributed risk analysis |
Country Status (1)
Country | Link |
---|---|
US (3) | US20200134523A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220156655A1 (en) * | 2020-11-18 | 2022-05-19 | Acuity Technologies LLC | Systems and methods for automated document review |
US11676088B2 (en) | 2018-10-31 | 2023-06-13 | Walmart Apollo, Llc | Systems and methods for distributed risk analysis |
Family Cites Families (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7403922B1 (en) | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US7389265B2 (en) | 2001-01-30 | 2008-06-17 | Goldman Sachs & Co. | Systems and methods for automated political risk management |
US7181428B2 (en) | 2001-01-30 | 2007-02-20 | Goldman, Sachs & Co. | Automated political risk management |
US20030018513A1 (en) | 2001-04-13 | 2003-01-23 | Hoffman George Harry | System, method and computer program product for benchmarking in a supply chain management framework |
CA2445704A1 (en) | 2001-04-26 | 2002-11-07 | Newsgrade Corporation | Dynamic generation of personalized presentations of domain-specific information content |
EP1490802B1 (en) | 2002-02-27 | 2008-10-01 | Industrial Interfaces Limited | A risk mapping system |
JP2007500915A (en) | 2003-06-09 | 2007-01-18 | グリーンライン・システムズ・インコーポレーテッド | System and method for risk detection, reporting and infrastructure |
US9495652B1 (en) | 2003-06-23 | 2016-11-15 | Daniel M. Cook | Autonomic discrete business activity management method |
US8676837B2 (en) | 2003-12-31 | 2014-03-18 | Google Inc. | Systems and methods for personalizing aggregated news content |
US20050289147A1 (en) | 2004-06-25 | 2005-12-29 | Jessica Kahn | News feed viewer |
US9760629B1 (en) | 2004-12-29 | 2017-09-12 | Google Inc. | Systems and methods for implementing a news round table |
US20060265489A1 (en) | 2005-02-01 | 2006-11-23 | Moore James F | Disaster management using an enhanced syndication platform |
US8880499B1 (en) | 2005-12-28 | 2014-11-04 | Google Inc. | Personalizing aggregated news content |
US20080140514A1 (en) | 2006-12-11 | 2008-06-12 | Grant Thornton Llp | Method and system for risk evaluation and management |
US20080281832A1 (en) | 2007-05-08 | 2008-11-13 | Pulver Jeffrey L | System and method for processing really simple syndication (rss) feeds |
US7917840B2 (en) | 2007-06-05 | 2011-03-29 | Aol Inc. | Dynamic aggregation and display of contextually relevant content |
US8375073B1 (en) | 2007-11-12 | 2013-02-12 | Google Inc. | Identification and ranking of news stories of interest |
US9817637B2 (en) | 2010-07-01 | 2017-11-14 | Salesforce.Com, Inc. | Methods and systems for providing enhancements to a business networking feed |
US9031957B2 (en) | 2010-10-08 | 2015-05-12 | Salesforce.Com, Inc. | Structured data in a business networking feed |
US20120102420A1 (en) | 2010-10-25 | 2012-04-26 | Salesforce.Com, Inc. | Multiple Views in an Information Feed |
US9183307B2 (en) | 2010-12-15 | 2015-11-10 | Facebook, Inc. | Comment ordering system |
US20120179692A1 (en) | 2011-01-12 | 2012-07-12 | Alexandria Investment Research and Technology, Inc. | System and Method for Visualizing Sentiment Assessment from Content |
CA2823720C (en) | 2011-01-21 | 2014-12-09 | Ginger Tetreault | Systems and method for displaying and categorizing news feed posts |
AU2011202182B1 (en) | 2011-05-11 | 2011-10-13 | Frequency Ip Holdings, Llc | Creation and presentation of selective digital content feeds |
US8843554B2 (en) | 2011-05-26 | 2014-09-23 | Facebook, Inc. | Social data overlay |
US9443225B2 (en) | 2011-07-18 | 2016-09-13 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for presentation of feed items in an information feed to be displayed on a display device |
US20130061156A1 (en) | 2011-07-18 | 2013-03-07 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for filtering information updates to display in a feed of an online social network |
US20130024511A1 (en) | 2011-07-18 | 2013-01-24 | Salesforce.Com, Inc. | Computer implemented methods and apparatus for presentation of feed items in an information feed to be displayed on a display device |
US20130211872A1 (en) | 2011-08-13 | 2013-08-15 | William Jay Cherry | Assessing Risk Associated with a Vendor |
US9665834B2 (en) | 2011-12-23 | 2017-05-30 | Ijet International, Inc. | System for managing risk in employee travel |
WO2013186519A2 (en) | 2012-06-11 | 2013-12-19 | Georeach Limited | Monitoring system, server, mobile device and method |
US8886836B2 (en) | 2012-06-12 | 2014-11-11 | Facebook, Inc. | Providing a multi-column newsfeed of content on a social networking system |
US10489802B1 (en) * | 2012-06-15 | 2019-11-26 | Amazon Technologies, Inc. | Cluster-based demand forecasting procedure |
EP2881904A1 (en) | 2012-07-05 | 2015-06-10 | Elementum SCM (Cayman) Ltd. | Method and system for controlling supply chains |
US20140019293A1 (en) | 2012-07-10 | 2014-01-16 | International Business Machines Corporation | Automated Technique For Generating Recommendations Of Potential Supplier Candidates |
US20140052644A1 (en) | 2012-08-17 | 2014-02-20 | Vitil Solutions, Inc. | System, software and method for service management |
US10061760B2 (en) | 2012-09-12 | 2018-08-28 | Flipboard, Inc. | Adaptive layout of content in a digital magazine |
US9208460B2 (en) | 2012-10-19 | 2015-12-08 | Lexisnexis, A Division Of Reed Elsevier Inc. | System and methods to facilitate analytics with a tagged corpus |
US20140122163A1 (en) | 2012-10-31 | 2014-05-01 | Bank Of America Corporation | External operational risk analysis |
US10356135B2 (en) | 2013-01-22 | 2019-07-16 | Facebook, Inc. | Categorizing stories in a social networking system news feed |
US8712907B1 (en) | 2013-03-14 | 2014-04-29 | Credibility Corp. | Multi-dimensional credibility scoring |
US9881077B1 (en) | 2013-08-08 | 2018-01-30 | Google Llc | Relevance determination and summary generation for news objects |
US9936346B2 (en) | 2013-11-28 | 2018-04-03 | Microsoft Technology Licensing, Llc | Geofences from context and crowd-sourcing |
WO2015108705A1 (en) | 2014-01-16 | 2015-07-23 | Baird David A | System, method, device and product for compiling aggregated media in a time-based playlist |
US20150242776A1 (en) | 2014-02-24 | 2015-08-27 | Bank Of America Corporation | Vendor Risk And Performance Profile |
US20160379326A1 (en) | 2015-06-25 | 2016-12-29 | Marie N. Chan-Gove | Risk modeling system |
US10339484B2 (en) | 2015-10-23 | 2019-07-02 | Kpmg Llp | System and method for performing signal processing and dynamic analysis and forecasting of risk of third parties |
US20200265357A1 (en) * | 2015-12-30 | 2020-08-20 | Atul Vashistha | Systems and methods to quantify risk associated with suppliers or geographic locations |
US10057206B2 (en) * | 2016-04-18 | 2018-08-21 | Salesforce.Com, Inc. | Combining updates of a social network feed |
US9774993B1 (en) | 2016-05-17 | 2017-09-26 | International Business Machines Corporation | System, method, and recording medium for geofence filtering |
US20200143314A1 (en) | 2017-05-22 | 2020-05-07 | Jabil Inc. | Systems and methods for interfaces to a supply chain management system |
US11636501B2 (en) | 2017-06-04 | 2023-04-25 | Apple Inc. | Techniques for delivering relevant news articles to users |
US10613905B2 (en) * | 2017-07-26 | 2020-04-07 | Bank Of America Corporation | Systems for analyzing historical events to determine multi-system events and the reallocation of resources impacted by the multi system event |
US11195401B2 (en) | 2017-09-27 | 2021-12-07 | Johnson Controls Tyco IP Holdings LLP | Building risk analysis system with natural language processing for threat ingestion |
US10931702B2 (en) | 2018-04-24 | 2021-02-23 | Cyberfortress, Inc. | Vulnerability profiling based on time series analysis of data streams |
US11164133B2 (en) | 2018-08-22 | 2021-11-02 | Jpmorgan Chase Bank, N.A. | System and method for a supplier risk index |
US20200134523A1 (en) | 2018-10-31 | 2020-04-30 | Walmart Apollo, Llc | Systems and methods for distributed risk analysis |
-
2019
- 2019-10-31 US US16/670,704 patent/US20200134523A1/en not_active Abandoned
-
2022
- 2022-02-14 US US17/670,839 patent/US11676088B2/en active Active
-
2023
- 2023-04-27 US US18/140,036 patent/US20240078491A1/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11676088B2 (en) | 2018-10-31 | 2023-06-13 | Walmart Apollo, Llc | Systems and methods for distributed risk analysis |
US20240078491A1 (en) * | 2018-10-31 | 2024-03-07 | Walmart Apollo, Llc | Systems and methods for distributed risk analysis |
US20220156655A1 (en) * | 2020-11-18 | 2022-05-19 | Acuity Technologies LLC | Systems and methods for automated document review |
Also Published As
Publication number | Publication date |
---|---|
US20240078491A1 (en) | 2024-03-07 |
US20220253764A1 (en) | 2022-08-11 |
US11676088B2 (en) | 2023-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240078491A1 (en) | Systems and methods for distributed risk analysis | |
US9613322B2 (en) | Data center analytics and dashboard | |
US8762408B2 (en) | Optimizing software applications | |
CN109997126A (en) | Event-driven is extracted, transformation, loads (ETL) processing | |
US9773010B1 (en) | Information-driven file system navigation | |
CN103198090A (en) | A method and a system for optimizing storage allocation in a virtual desktop environment | |
US20180232433A1 (en) | System and Method for Dynamically Refactoring Business Data Objects | |
US20120144340A1 (en) | Interactive data forecasting features for a graphical user interface | |
US9652203B1 (en) | Application development framework using configurable data types | |
EP3188051B1 (en) | Systems and methods for search template generation | |
CN110249312B (en) | Method and system for converting data integration jobs from a source framework to a target framework | |
US10241777B2 (en) | Method and system for managing delivery of analytics assets to users of organizations using operating system containers | |
US20160162448A1 (en) | Methods and systems for applying responsive design to subframes on a web page | |
US20150142727A1 (en) | Analytic operations for data services | |
CN113157947A (en) | Knowledge graph construction method, tool, device and server | |
US9846635B2 (en) | Making production data available for testing in a non-production environment | |
US11860870B2 (en) | High efficiency data querying | |
US20210233094A1 (en) | Dynamic asset management system and methods for generating actions in response to interaction with assets | |
US20130346405A1 (en) | Systems and methods for managing data items using structured tags | |
US20180357100A1 (en) | System and method in a database system for creating a field service work order | |
US20240070347A1 (en) | Dynamic asset management system and methods for generating interactive simulations representing assets based on automatically generated asset records | |
US10884765B1 (en) | Object configuration dynamic graphical user interface | |
KR20130126012A (en) | Method and apparatusfor providing report of business intelligence | |
US11663169B2 (en) | Dynamic asset management system and methods for automatically tracking assets, generating asset records for assets, and linking asset records to other types of records in a database of a cloud computing system | |
US20170061361A1 (en) | On-line fellowship enhancement system for off-line company organization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: WALMART APOLLO, LLC, ARKANSAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NELSON, CHRISTINA;VENKATESH, KSHITHI;PRESTON, CLINTON;AND OTHERS;SIGNING DATES FROM 20181105 TO 20191106;REEL/FRAME:051181/0349 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |