Abstract:
In example implementations, a method executed by a processor is provided. The method collects historical sales data. The historical sales data is divided into a training data set and a testing data set. A classification model is calculated based on the training data set and validated with the testing data set. Information associated with a pending sale is received. The information comprises a plurality of factors. Based upon the classification model, a prediction is made whether the pending sale will successfully close. An action plan that includes changing at least one of the plurality of factors based on the predicting is generated.
Abstract:
According to an example, usage of a plurality of features of an application by users in each of a plurality of tenants may be accessed. Popularities of the plurality of features among the users in each of the plurality of tenants may be determined and a feature of the plurality of features to be promoted to the users in the first tenant may be identified based upon the determined popularities of the features. Additionally, a visual callout to the identified feature may be caused to be displayed to the users in the first tenant to promote the identified feature to the users in the first tenant.
Abstract:
According to examples, an apparatus may include a processor that may internationalize an automated test script that was generated to test a Graphical User Interface (GUI) in the first human language. When the GUI is internationalized into a second human language, the automated test script may no longer function. As such, the system may employ computer vision techniques to analyze the GUI in the first human language and the GUI in the second human language to identify text and GUI elements that correlate with one another. Based on the correlation, the system may internationalize the automated test script to function on the GUI in the second human language.
Abstract:
An apparatus (100) may include a processor (102) that may identify and execute workflows based on simulated network addresses such as simulated uniform resource locations ("URLs" ). The system (200) may generate recorded automation scripts that automatically complete some or all of the tasks of a workflow. The system (200) may store the automation scripts in association with the workflow and a simulated URL. The simulated URL may include a string that does not literally resolve to a document on a networked resource. Rather, the simulated URL may instead identify and indicate that a corresponding workflow is to be executed. A browser extension (214) of a browser (212) may intercept URLs that are provided to a browser (212), determine that a simulated URL has been entered, and provide the simulated URL to a replay engine (302) that identifies and executes the automated script associated with the simulated URL.
Abstract:
In some examples, a system represents tasks of a project as feature nodes of a force-directed graph, and connects, in the force-directed graph, sub-feature nodes representing sub-features associated by links to the feature nodes in the force-directed graph. The system sets a size of each respective sub-feature node of the sub-feature nodes based on an amount of resource usage expended on a respective sub-feature represented by the respective sub-feature node. The system causes display of the force-directed graph, and collapses or expands a portion of the force-directed graph responsive to user interaction with the force-directed graph.
Abstract:
A technique includes receiving, by a computer, user input representing creation of a first programmatic description of a first test object of source code to be tested. The technique includes, in response to receiving the user input, determining, by the computer, based on other programmatic descriptions of other test objects, a recommendation of a parameter to be used in the first programmatic description to identify the first test object. The technique includes causing, by the computer, a display of the recommendation.
Abstract:
In one example, a system for gesture buttons can include a processing resource and a non-transitory computer readable medium having stored thereon instructions to cause the processing resource to perform a first function in response to a gesture provided to the user interface, display a gesture button on the user interface, and perform a second function that is different than the first function in response to the gesture provided on the gesture button displayed on the user interface.
Abstract:
In one example in accordance with the present disclosure, a method may include separating a list of keywords into a set of word tokens and a set of wildcard tokens. The method may also include removing each wildcard token in the set of wildcard tokens that is inferred by at least one word token in the set of word tokens and removing each wildcard token in the set of wildcard tokens that is inferred by at least one other wildcard token in the set of wildcard tokens. The method may also include executing a search query comprising a new list of keywords that includes each wildcard token not removed from the set of wildcard tokens.
Abstract:
Examples discussed herein disclose, among other things, an encrypting device. The encrypting device may include a key engine to obtain a first key associated with a first access level, and a second key associated with a second access level. The encrypting device may also include a multi-key encryption engine to encrypt a first portion of the plaintext with the first key, and encrypt a second portion of the plaintext with the second key, where the first portion may include more detailed information than the second portion, and where the first access level may be higher than the second access level.
Abstract:
Examples discussed herein disclose, among other things, a method. The method includes, among other things, obtaining a plaintext, obtaining a key from a plurality of keys, and determining whether the plaintext is longer than a predefined threshold length. If the plaintext is longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a first ciphertext having a length of the plaintext, where the character at a predefined position within the first ciphertext belongs to a first subset of characters. And if the plaintext is not longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a second ciphertext, which is longer than the plaintext, where the character at the same predefined position in the second ciphertext belongs to a second subset of characters.