SAP AG Patent applications |
Patent application number | Title | Published |
20150379585 | Single Sheet Planning - A system, a method, a device, and a computer program product for single sheet planning of business objects are provided. A trade promotion data relating to at least one product is generated. Based on the generated trade promotion data, data stored in a database is queried. The data relates to at least one parameter associated with the generated trade promotion data. Based on the querying, a trade promotion planning data for the at least one product is generated | 12-31-2015 |
20150356085 | Guided Predictive Analysis with the Use of Templates - A technique is described that simplifies the process for applying predictive analysis to a dataset. The technique can recommend multiple templates to a user. Each recommend template contains algorithms which can be applied to the dataset. When a template is selected, the technique can rank the available algorithms of the selected template based on factors such as values in the dataset, characteristics of the dataset, and the usage history of the dataset or the algorithms in prior instances. The technique can automatically select the highest ranked algorithm and apply it to the dataset. In some examples, input parameters used to configure the algorithm can also be automatically selected. | 12-10-2015 |
20150347410 | Cached Views - Embodiments relate to view caching techniques that cache for a limited time, some of the (intermediate) results of a previous query execution, in order to avoid expensive re-computation of query results. Particular embodiments may utilize a cache manager to determine whether information relevant to a subsequent user request can be satisfied by an existing cache instance or view, or whether creation of an additional cache instance is appropriate. At design time, cache defining columns of a view are defined, with user input parameters automatically being cache defining. Cache instances are created for each tuple of literals for the cache defining columns, and for each explicit or implicit group by clause. Certain embodiments may feature enhanced reuse between cache instances, in order to limit memory footprint. Over time a cache instances may be evicted from memory based upon implementation of a policy such as a Least Recently Used (LRU) strategy. | 12-03-2015 |
20150331911 | Intelligent Unmasking in an In-Memory Database - Database data is unmasked in order to facilitate its efficient handling by a database engine. In response to a request for data of a masked table including a masked element, an engine identifies a mask interval, and then performs a first join with unmasked elements sharing a common key. The table resulting from this first join is then grouped according to a highest level location of the mask. A second join is then performed between the results of this grouping and the mask interval, to produce a corresponding unmasked table including a plurality of unmasked elements corresponding to the masked element. Unmasking according to embodiments may be particularly useful in leveraging processing power of an in-memory database engine, allowing it to efficiently perform batch processing of requests for masked data received from software of an overlying application layer. | 11-19-2015 |
20150328550 | Context-Aware Gamification Platform - An advanced context-aware platform is integrated with a variety of other applications to allow processing of contextual information from various sources. One type of application may provide spatial and temporal context information for various actions. Another type of application may provide additional information for an action within a social and/or business context. These contextual information types are received and assimilated by the platform in order to enrich the data value chain. Processing large volumes of data and events may be facilitated in a scalable and rapid manner utilizing technologies such as in-memory databases (e.g., the HANA database available from SAP AG), and/or complex event processing (CEP) such as is available from Sybase ESP. Context-aware platforms according to embodiments may find particular use in providing context to systems implementing gamification in an enterprise environment. | 11-19-2015 |
20150317572 | On-Demand Enrichment of Business Data - Techniques for systems, methods, and devices for providing on-demand enrichment data are disclosed. In response to user input, a client computing device executing a client application and plug-in for communicating with a data enrichment service, can generate a data enrichment command. The command can include selected report data from one or more reports or summaries displayed to a user on the client computing device. The command can also include information about the context in which data enrichment was requested. Using the information included in the command, an enrichment data service can determine the type of enrichment data that may be useful and the sources from which to request the enrichment data. The enrichment data can then be retrieved from one or more enrichment data sources and sent to the requesting client computing device to be displayed to the user in a manner that enriches the original reporting data. | 11-05-2015 |
20150296010 | Asynchronous Download for Application Offline Support - A technique is described providing offline support to business applications. Offline support allows a business application running on a portable electronic device without connectivity to a backend server to operate as though the business application has access to a backend server. The technique receives a sync request for content from the portable electronic device. A sync task is generated from the sync requests and processed to generate a package that contains the desired content. Once the package is generated, the package is stored in a package repository and a download notification is transmitted to the portable electronic device to notify the user that the package is ready. The package can in turn be delivered to the portable electronic device when a download request is received from the portable electronic device. | 10-15-2015 |
20150295985 | Modification Free Extension of Web Based Applications - A system is described for creating a customized modification free extension of a software application. The software application can be an application configured to be executed in a runtime framework on a web browser. When the web browser launches the custom application, the base application can be identified and retrieved. Once retrieved, the web browser can merge the custom application and the base application and execute the resulting merged application. | 10-15-2015 |
20150293948 | Converting Data Objects from Single- to Multi-Source Database Environment - Embodiments relate to converting data object(s) from a single-source database environment into a multi-source database environment. An engine is configured to receive a single-source database universe from a repository. The engine analyzes that universe to identify details thereof for conversion, including but not limited to connections, tables, views, alias tables, etc. A new multi-source connection is registered, and then the multi-source universe is re-generated through a universe conversion algorithm, an automatic function mapping algorithm, and a query generation algorithm. Embodiments avoid labor intensive manual re-creation of the universe, and may be implemented as an automatic conversion wizard also updating dependent report queries per new multi-source query patterns. Particular embodiments converting a single-source database environment available from SAP AG, may utilize a Software Design Kit (SDK) to create a migration plug-in as part of an Information Design Tool (IDT). | 10-15-2015 |
20150278911 | System and Method for Apparel Size Suggestion Based on Sales Transaction Data Analysis - A system and method for apparel size suggestion based on sales transaction data analysis are presented. Historical sales data for a consumer is stored in a repository of a data management system, the historical sales data representing a purchase history and comprising size data for ordered items and size data for returned items. A body profile for the consumer is generated based on the size data for ordered items and the size data for returned items, the body profile including size data for one or more selected items, the one or more selected items being selected by the data management system based on the purchase history of the historical sales data for the consumer. An order from the consumer is received for an ordered item, and if the ordered item matches one of the one or more selected items, a recommended size is generated for the ordered item based on the body profile and historical sales data. | 10-01-2015 |
20150278738 | Operational Leading Indicator (OLI) Management Using In-Memory Database - Embodiments leverage capabilities of an in-memory database to manage measurement and modeling of Operational Leading Indicators (OLIs). An OLI template may comprise four model components: ratio calculation; factor calculation; predictive modeling; and cost estimation. Each model component is motivated and explained in terms of information sources, and analytical or statistical modelling tasks used in its definition. Embodiments combine analytical and statistical modelling utilizing in-memory computing, to process large amounts of unmodified source data, calculate cost measures rapidly without preaggregation, and/or run linear regression models on the same data set and in the same memory space without a need for separate hardware. An engine in communication with the in-memory database that comprises a large volume of available data, is configured to receive values for OLI factors as inputs. In response, the engine is configured to process these inputs according to the modeling template to provide corresponding cost measures as outputs. | 10-01-2015 |
20150269254 | Simplified Hierarchy Definition for Multidimensional Data Analysis - Techniques are described for allowing a user to define hierarchical relationships for a multidimensional data model without assistance from a data administrator. The hierarchical relationships can be stored as on the client device as part of report metadata so that they are customizable by the client. A graphical user interface is also described for generating reports using a reporting tool. Through move and select operations, a report along with its underlying hierarchical relationships can be customized by the client. | 09-24-2015 |
20150254812 | Automated Selection of Filter Parameters for Seismic Analysis - A filter selection technique is described for automatically selecting filters and filter parameters to apply to a given input data. The technique first receives input data and accesses a library storing information from previously analyzed data. The technique selects an entry from the library where the entry contains data that is correlated with the input data. The technique then applies a filter to the input data. The filter and filter parameters are determined by the selected entry. | 09-10-2015 |
20150248453 | Automated Logging for Object-Oriented Environments - Example systems and methods of logging information in an object-oriented system are presented. In one example, a first object including a plurality of first methods is received. The first object also includes an additional method to receive an identity of one of the first methods and to return metadata corresponding to the one of the first methods. A wrapper object is created for the first object and includes a plurality of second methods. Each second method includes an interface that is equivalent to an interface of a corresponding first method. Each of the second methods is configured to call the additional method of the first object to retrieve the metadata for the corresponding first method, call the corresponding first method, receive a return value from the corresponding first method, return the return value, and store information regarding the corresponding first method based on the retrieved metadata. | 09-03-2015 |
20150242515 | Mining Security Vulnerabilities Available from Social Media - Embodiments provide systems and methods configured to mine information available from informal sources (e.g., social media, blogs, and forums) regarding security vulnerabilities. Particular embodiments may comprise engine(s) of a backend in communication with a user through an interface of a frontend, and also in communication with an underlying database to store security information and related information (e.g. search parameters). Embodiments may allow creation of user-specific search phrases for searching information in one or more informal social media information sources. Search results may be consolidated, and users such as system administrators quickly alerted to possible security issues. Embodiments may refine data mining over time by tracking the reputation (e.g. for data accuracy, freshness) of various sources. Embodiments may also reference formal official and third party sources of security information. | 08-27-2015 |
20150239561 | DISPLAY OF PASSENGER INFORMATION FOR AN AIRPLANE FLIGHT - In general, the subject matter described in this disclosure can be embodied in methods, systems, and program products for generating a display of information regarding passengers of an airplane flight. The method includes displaying a graphical depiction of passenger seats for a particular airplane flight. The method includes identifying that multiple passengers booked to the particular airplane flight have a particular status. The method includes identifying that the multiple passengers that have been identified as having the particular status have been assigned to respective multiple passenger seats. The method includes displaying a graphical indication in association with each of the multiple passenger seats, concurrently with the display of the graphical depiction of the passenger seats. | 08-27-2015 |
20150227693 | HEALTHCARE INFORMATION DATABASE AFFORDING DYNAMIC PROVIDER INTERACTION - Embodiments relate to a patient-governed healthcare information database environment. The environment provides a central repository for receiving healthcare and related information of a patient, facilitating access by a plurality of authorized consumers (e.g. medical providers) of that information. The environment allows dynamic modification of the database to include many types of information, including data from smart devices, patient activity logs, and responses to customized assessments created by the patient or others. The environment also allows dynamic mining of database information according to flexible queries specifying parameters determined by the consumer of the healthcare information. Access to other patient environments may be granted, such that database modification permits data mining for patient cohorts sharing common characteristics. Some embodiments allow dynamic interaction between the environment and a provider, for example to issue an alert based upon database content (e.g. a medication log not timely updated), or to modify patient behavior via gamification. | 08-13-2015 |
20150227692 | PATIENT-GOVERNED HEALTHCARE INFORMATION DATABASE ENVIRONMENT - Embodiments relate to a patient-governed healthcare information database environment. The environment provides a central repository for receiving healthcare and related information of a patient, facilitating access by a plurality of authorized consumers (e.g. medical providers) of that information. The environment allows dynamic modification of the database to include many types of information, including data from smart devices, patient activity logs, and responses to customized assessments created by the patient or others. The environment also allows dynamic mining of database information according to flexible queries specifying parameters determined by the consumer of the healthcare information. Access to other patient environments may be granted, such that database modification permits data mining for patient cohorts sharing common characteristics. Some embodiments allow dynamic interaction between the environment and a provider, for example to issue an alert based upon database content (e.g. a medication log not timely updated), or to modify patient behavior via gamification. | 08-13-2015 |
20150227594 | Interval Based Fuzzy Database Search - A fuzzy database search technique is described for searching a database. The technique first prepares a database by first generating a reference hash value for each database entry to represent a value stored in a field of the database entry. The technique then receives search request to search for database entries in the database that have a value stored in the field that is within a provided range. The technique converts the search request into one or more search hash values and matches the search hash values to the reference hash values of the database to rapidly identify database entries that are likely relevant to the search. | 08-13-2015 |
20150205828 | METHODS, SYSTEMS, AND APPARATUS FOR AUTO-COMPLETE SUGGESTION LISTS - Methods, systems, and computer program products for generating an auto-complete list are described. A scope of a query and one or more characters of a search term may be obtained. One or more matching terms may be determined for each of one or more search term categories, each of the one or more search term categories being within the query scope, each of the one or more matching terms beginning with the obtained one or more characters. A user selection of at least one of the one or more matching terms may be obtained and a locked search term may be generated based on the user selection. | 07-23-2015 |
20150193094 | Space Constrained Ordered List Previews - Systems and methods for generating previews of list data in space constrained user interfaces are disclosed. In the available display area of a particular display device or user interface, a segment of a list of items are displayed. Values in the on-screen and off-screen portions of the list are analyzed and processed to generate previews of the list. One preview includes generating a box plot of the distribution of values in the list. An adaptively sized slider can then be generated relative to the box plot to indicate which part of the distribution is displayed in the list items that fit in the available display area. Another preview includes generating a composite row in the available display area that summarizes the data in one or more of the off-screen portions of the list. Such previews can include the sum or average of the values in the off-screen list items. | 07-09-2015 |
20150186960 | Multi-Item Access of Pricing Condition Tables - Various embodiments herein each include at least one of systems, methods, and software for multi-item access of pricing condition tables. Such embodiments generally retrieve applicable pricing conditions from each relevant pricing condition table in a single query for each product included in an order or invoicing document, or other document within which pricing data is provided. The retrieved pricing condition data may then be written to a buffer in memory and utilized in pricing products included in an order or invoice document. Such embodiments generally reduce a number of queries that are executed against pricing condition tables thereby increasing the efficiency of pricing activities. | 07-02-2015 |
20150181045 | FLEXIBILE EVENT RATING - Various embodiments herein each include at least one of systems, methods, and software that operate to provide flexible event data rating solutions. Some such solutions include embodiments that allow an invoicing system to receive and process data from one to many different rating system instances and types procured from multiple vendors or as may have been custom developed. Some such embodiments including multiple rating systems allow application of flexible rules to determine which event transactions are to be rated or rerated by which rating systems and when certain event transactions are to be rated or rerated. | 06-25-2015 |
20150180942 | MESSAGE-ORIENTED MIDDLEWARE - Various embodiments herein each include at least one of systems, methods, and software providing a message-oriented middleware infrastructure to integrate messaging between entities, such as software systems, processes therein, and other elements that may be connected to a network. Such embodiments may include pushing messages directly to entities upon receipt of a message or storing a message in an inbox for later retrieval. Additionally, various embodiments handle both message format transformations and message target determinations thereby alleviating considerable efforts to customize each constituent, integrated entity through one or both of custom coding and configuration. | 06-25-2015 |
20150178799 | SYSTEM AND METHOD OF FUEL FILLING TO MINIMIZE FUEL COST - In an example, a method for determining quantities of fuel to dispense at a plurality of terminals along a transit route of a vehicle includes identifying a plurality of terminals along the transit route, each terminal of the plurality of terminals have an associated cost-per-unit of fuel dispensed; initializing a set of candidate fueling scenarios, each candidate fueling scenario including an initial array of values, each value in the array of values indicating a quantity of fuel to dispense to the vehicle at one of the plurality of terminals along the transit route; iteratively, using at least one processor, modifying the set of candidate scenarios; identifying the candidate scenario of the set of candidate scenarios with the lowest total fuel cost; and transmitting for display, the quantity of fuel to dispense at each of the plurality of terminals according to the identified lowest total fuel cost candidate scenario. | 06-25-2015 |
20150178483 | SOFTWARE SYSTEM TEMPLATE PROTECTION - Various embodiments herein are in the form of at least one of systems, methods, and software for software system template protection. With the help of software system template protection, developments, configurations, and information technology (IT) infrastructure setup can be protected and controlled in an efficient manner during the change process, while building and configuring applications and IT Infrastructure as well during the whole Application Lifecycle Management process. When changes are made in an instance of a software system deployment, prior to committing (i.e., storing) the changes, a change management service is called to determine whether such changes are allowed in view of one or more templates deployed to the instance of the software system and change restrictions associated therewith. | 06-25-2015 |
20150178332 | TRANSFORMATION OF DOCUMENT FLOW TO CONTRIBUTORS NETWORK - Systems and methods are disclosed for processing data in an application platform. The method may include receiving at runtime a request for data about contributors to at least one document. Data may be determined for a set of contributors to the at least one document. The data for the set of contributors may be transformed based on at least one transformation rule. The transformed data for the set of contributors may be communicated in response to the request. The request may include context data indicating one or more of a user of a computing device, a user session of the computing device, a currently active application on the computing device, and an active screen of the computing device. The determining the data may include identifying, using at least some of the context data, a document associated with the currently active application. | 06-25-2015 |
20150161100 | METHODS, SYSTEMS, AND APPARATUS FOR OPTIMIZATION USING STATISTICAL ESTIMATION - Methods, apparatus, systems, and computer program products for utilizing a split dictionary are described. A mean and a standard deviation of a length of a plurality of records in a dictionary may be computed. A split condition may be determined based on the computed mean and the computed standard deviation. The dictionary may be split into a plurality of split dictionaries based on the split condition. | 06-11-2015 |
20150160810 | COMMON USER INTERFACE VIEW GROUPING AND SHARING FRAMEWORK IN ONLINE APPLICATIONS - A system and method for a common user interface view grouping and sharing framework is described. A user interface layer generates a custom view of a user interface of an application. The custom view comprises a plurality of common views. The custom view provides common view functions shared from the plurality of common views. Common view functions are performed using custom view information provided by the custom view to the plurality of common views in response to a call from the custom view. | 06-11-2015 |
20150149773 | AVERAGE-COMPLEXITY IDEAL-SECURITY ORDER-PRESERVING ENCRYPTION - Embodiments provide ideal security, order-preserving encryption (OPE) of data of average complexity, thereby allowing processing of the encrypted data (e.g. at a database server in response to received queries). Particular embodiments achieve high encryption efficiency by processing plaintext in the order preserved by an existing compression dictionary already available to a database. Encryption is based upon use of a binary search tree of n nodes, to construct an order-preserving encryption scheme having Ω(n) complexity and even O(n), in the average case. A probability of computationally intensive updating (which renders conventional OPE impractical for ideal security) is substantially reduced by leveraging the demonstrated tendency of a height of the binary search tree to be tightly centered around O(log n). An embodiment utilizing such an encryption scheme is described in the context of a column-store, in-memory database architecture comprising n elements. OPE according to embodiments is compatible with adjustable encryption approaches. | 05-28-2015 |
20150149427 | Encrypted In-Memory Column-Store - Embodiments relate to processing encrypted data, and in particular to identifying an appropriate layer of encryption useful for processing a query. Such identification (also known as the onion selection problem) is achieved utilizing an adjustable onion encryption procedure. Based upon defined requirements of policy configuration, alternative resolution, and conflict resolution, the adjustable onion encryption procedure entails translating a query comprising an expression in a database language (e.g. SQL) into an equivalent query on encrypted data. The onion may be configured in almost arbitrary ways directing the onion selection. An execution function introduces an execution split to allow local (e.g. client-side) query fulfillment that may otherwise not be possible in a secure manner on the server-side. A searchable encryption function may also be employed, and embodiments accommodate aggregation via homomorphic encryption. Embodiments may be implemented as an in-memory column store database system. | 05-28-2015 |
20150149400 | Method and Apparatus for Monitoring an In-memory Computer System - An in-memory computing system for conducting on-line transaction processing and on-line analytical processing includes system tables in main memory to store runtime information. A statistics services can access the runtime information using script procedures stored in the main memory to collect monitoring data and generate historical data and other system performance metrics while maintaining the runtime data and generated data in the main memory. | 05-28-2015 |
20150128133 | VIRTUAL APPLIANCE INTEGRATION WITH CLOUD MANAGEMENT SOFTWARE - Various embodiments here in provide systems, methods, and software for virtual appliance integration with cloud management software. Some embodiments include a landscape virtualization management application through which software systems in the form of virtual appliances may generated and deployed. Further, metadata included in a data structure of a virtual appliance enable integration with existing cloud management software to allow viewing and searching for available virtual appliances and selecting, deployment, and management thereof. | 05-07-2015 |
20150128132 | INTEGRATED MANAGEMENT OF CENTRALLY MODIFIED SOFTWARE SYSTEMS - Various embodiments here in provide systems, methods, and software for integrated management of centrally modified software systems. Some embodiments include a landscape virtualization management application through which software systems in the form of virtual appliances may be selected, deployed, and started. The virtual appliance in such embodiments may have been transported to an implementing organization, encapsulated in a virtual appliance, in a preconfigured and pre-modified form. | 05-07-2015 |
20150128105 | DYNAMIC CONTAINERIZATION - In an example embodiment, a container is downloaded, the container being an application natively executable by a first operating system of the user device, the container including: a container service including one or more libraries of functions designed by a container designer to natively operate on the first operating system; a browser; container metadata defining functions of the application, the functions compatible with the container service for the first operating system and also compatible with a container service for a second operating system; and a plug-in including one or more additional libraries of functions designed by an entity other than the container designer to perform additional native operations on the first operating system. Then, the container metadata can be executed using the browser, causing function calls to the container service and plug-in and thus controlling native functions of the user device. | 05-07-2015 |
20150127793 | BUILDING AND TRANSPORTING CENTRALLY MODIFIED SOFTWARE SYSTEMS - Various embodiments herein include at least one of systems, methods, and software for building and transporting centrally configured and modified software systems. Such embodiments provide for a virtual appliance to be configured and customized prior to transport of the virtual appliance to the target organization. Once configured and customized, the software system of the virtual appliance is reassembled into a virtual appliance, transported, and rapidly deployed in a form as needed by the organization. This results in significant cost, time, and risk exposure mitigation. | 05-07-2015 |
20150127785 | GATEWAY SERVICE MANAGER FOR BUSINESS OBJECT APPLICATIONS - A system includes a backend server with business applications within a business object processing framework. The business object processing framework includes a framework data format. The system also includes a generic gateway service manager coupled to the business object processing framework, and a gateway coupled to the generic gateway service manager. The gateway includes a gateway data format, and the generic gateway service manager is positioned between the business object processing framework and the gateway. The generic gateway service manager is configured to retrieve the framework data format from the business object processing format and store the framework data format in the gateway. The gateway is configured to transfer data between the business object processing framework and a user interface using the framework data format stored in the gateway. | 05-07-2015 |
20150121386 | INDICATING STATUS, DUE DATE, AND URGENCY FOR A LISTED TASK BY A TASK TRACKING CONTROL - Disclosed herein are representative embodiments of tools and techniques for displaying one or more task tracking controls to indicate respective progress statuses, urgency stages, and due dates for respective of one or more listed tasks of a procedure. According to one exemplary technique, a task list is received by a software. The task list including a listed task. In addition, a determination is made that the listed task is in an incomplete status. Also, an urgency stage is determined for the listed task. The listed task is associated with a due date for the listed task. Based on the determination that the listed task is in an incomplete status, a task tracking control is output for display. The task tracking control indicating the incomplete status of the listed task includes a visual indication of the due date and a visual indication of the urgency stage for the listed task. | 04-30-2015 |
20150121058 | Intelligent Real-time Optimization - In one embodiment, a method determines real-time information regarding changes to input data used to run an optimization. The optimization is run using a first computing system to generate a first optimization result within a first time window and the first computing system is configured to run the optimization periodically within subsequent time windows. The method determines when the changes to the input data indicate the optimization should be rerun. When the optimization should be rerun, the method causes a re-running of the optimization after the time window ends using a second computing system different from the first computing system. The re-running of the optimization using the changes and generating a second optimization result before a next time window for the first computing system to periodically run the optimization starts. | 04-30-2015 |
20150120945 | Push Channel Based Creation of Web-Based User Interface Sessions - Systems and methods for instantiating new web UI sessions and web UI agents using push channels are disclosed. When a new web UI session is created in an application server in response to a function request from an existing web UI agent, its network address is pushed to the existing web UI agent to create a new web UI agent. The new web UI agent can then be attached to the new web UI session using the address provided to the existing web UI agent. To push the network address to the original web UI agent, a dedicated bi-directional network connection is established between the existing web UI agent and an application push channel session. The new web UI session can push its address to the existing web UI agent through an AMC. | 04-30-2015 |
20150120809 | AUTOMATED PROCEDURE FOR KERNEL CHANGE - A kernel provides a mechanism allowing various applications (e.g. CRM, logistics, procurement, etc.) hosted on a plurality of different application servers, to share access to a common underlying system (e.g. database). An automated process for implementing a kernel change (e.g. for upgrade or replacement) may employ a “Stop-the-World” approach involving suspension of application server instances, coordinated by the start service of the last application server whose kernel is to be changed. As used herein, suspending refers to halting any processing prior to calling a central service (CS) as long as a CS instance is unavailable, and then to resuming processing once the CS instance becomes available. This suspension of relevant clients avoids errors from arising during the downtime of the CS instance. Once the application server instances are in a stopped state, the CS instance is restarted. Then, the application server instances are resumed, and their kernels are changed. | 04-30-2015 |
20150120805 | Bi-directional Channel-based Progress Indicator - In one embodiment a bi-directional channel bound to a messaging channel provides a connection allowing an application to send progress information created by a progress indicator program to a client computer over a network. The connection allows the progress information to be send upon the event of its creation. | 04-30-2015 |
20150120785 | ENHANCED REPORTING SYSTEM - A system receives database tables from a plurality of computer systems. Each of the database tables is associated with a particular computer system. Each particular computer system is associated with a particular schema. The database tables are stored in a computer storage device according to the particular schema of the computer system with which each database table is associated. Database views are created and stored. Each of the views is associated with a particular schema. A configuration table according to the particular schemas of each of the computer systems is generated. The configuration table is displayed on a display device. A selection of one or more schemas is received from the display on the computer display device. The database view from one of the selected database schemas is used as a template to generate a view for all of the selected schemas. | 04-30-2015 |
20150120635 | Routing Framework for Objects - Particular embodiments store a business object attachment in a specific storage location associated with a business object. In this embodiment a computer receives an attachment for the business object along with information regarding the business object. The information regarding the business object may include a business object identifier and a business object type identifier. With this information, the computer defines routing attribute fields for the attachment. Using the routing attribute fields and the business object type identifier, the computer calculates a target content repository and a target path for the attachment. The computer then determines which content management system contains the target repository and interfaces with that target content management system to direct that content management system to store the attachment in the target repository at the target path. | 04-30-2015 |
20150120600 | TIME AND LOCATION BASED DELIVERY OPTIMIZATION - Methods, systems, and computer program products for logistics management are described. A root node in a tree representing a home base may be established, the root node comprising a capacity of a corresponding delivery vehicle. One or more unassigned delivery points may be added as a child node of the root node if a path to the corresponding unassigned delivery point is feasible. A next level delivery point may be added as a child node of a node in a tree level | 04-30-2015 |
20150116363 | User Interface for Mobile Device Including Dynamic Orientation Display - Embodiments relate to a mobile device user interface (UI), which includes a dynamic orientation display. Based upon inputs to the mobile device, the user interface is configured to orient the display in a particular manner. For example, the nature of the dynamic display may be determined in part, based upon an input (e.g. from level sensors) indicating a physical orientation of the mobile device. Display may further be determined by additional inputs, for example a setting) locking a display changed according to position, or determining a responsiveness/speed of updating the display in response to changed position. The dynamic display according to embodiments can affect a variety of display attributes, including but not limited to the position/shape of individual display elements (e.g. images, text elements), as well as groupings of those display elements (e.g. within a tile). Physical orientation of the device may also determine an identity of information displayed. | 04-30-2015 |
20150113459 | METHODS, SYSTEMS, APPARATUS, AND STRUCTURED LANGUAGE FOR VISUALIZING DATA - Methods, systems, computer program products, and a structured language for defining and applying a view to a graph are described. A view comprising one or more rules, each rule comprising one or more actions for adjusting a presentation of one or more elements of a graph, may be defined. The rules may be defined using the structured language. The defined view may be applied to a selected graph. | 04-23-2015 |
20150113442 | User Interface Push Channel - Systems and methods for establishing UI push channels are disclosed. The UI push channels can be used to broadcast event notifications to multiple UIs whenever the information in an underlying data source is changed. In response to the event notifications, the UIs may update or refresh the displayed information so as to include the most current information in the data source. UI push channels are defined by associations between an application messaging channel (AMC) and the UI connection used to communicate with the client computing device and the application server. In particular, the UI push channels can be established by an AMC definition that defines a target data source, subscriber entities, and publisher entities. The listing of the publishers and the subscribers in the AMC definition infer the associations between the corresponding AMC and the UI connections. | 04-23-2015 |
20150113042 | OPEN USER INTERFACE - In an example embodiment, a definition is loaded into a client application for execution on a user device. Then, one or more classes defined in a central repository database of a server are loaded into the client application. It may then be determined that one or more custom classes not defined in the central repository database are contained in the definition. The one or more custom classes may be validated by ensuring that they contain one or more preset functions. The one or more custom classes may then be loaded into the client application, thereby overriding or extending at least one of the one or more classes defined in the central repository database. | 04-23-2015 |
20150113025 | SYSTEM FOR CUSTOMIZING SPECIFIC DATABASE MODELS USING SPECIFIC DATABASE VIEWS - A computer system is operable to receive a plurality of database tables from a plurality of clients, and store the database tables. The system permits a user to create a plurality of views for the database tables. Each of the plurality of views includes a plurality of fields. The system associates the plurality of views with a generic application, and presents to a user one or more configuration options. The configuration options include the plurality of fields. The system permits a user to define a generic field role for one or more of the plurality of fields. Finally, the system executes the generic application using the configuration options selected by the user and the defined generic field roles to create a user interface for a particular client. | 04-23-2015 |
20150112893 | Predicting Levels of Influence - Systems and method for identifying individuals who may be potentially influential on a particular identified contact for a particular sales opportunity are disclosed. The individuals identified as potential influencers are then ranked according to a predicted level of influence and displayed in a graphic representation. In one embodiment, the ranked potential influencers are displayed as icons in a spiral formation relative to an icon representing the identified contact. The closer an icon representing a particular potential influencer is to the icon representing the identified contact, the greater the level influence is that that influencer might have on the identified contact. | 04-23-2015 |
20150112764 | Automated Evaluation of Transaction Plays - In one embodiment, a computer-implemented method comprises generating, using a computer, recommendations of a first group of products of a plurality of products based on past transactions between a plurality of persons and a plurality of entities for the plurality of products, relationships between the persons, relationships between the entities, and relationships between the persons and the entities; generating, using the computer, a score for each recommendation of the plurality of recommendations; and generating, using the computer, a first success indicator of a first selected recommendation based on the score associated with the first selected recommendation. | 04-23-2015 |
20150112756 | Automated Software Tools for Improving Sales - A sales application is described that includes multiple automated sales tools that can be combined to help improve sales within a sales team. A deal finder sales tool is described to help identify sales opportunities. A deal playbook sales tool is also described to help structure the sales opportunity into a sales play by recommending products to sale in conjunction and also constructing a sales team. An influencer sales tool is also described to help identify business relationships that can be utilized to influence members of the sales team. | 04-23-2015 |
20150112755 | Automated Identification and Evaluation of Business Opportunity Prospects - Embodiments identify and evaluate business opportunity prospects in an automated fashion. An engine receives one or more inputs used to identify business opportunities. These input(s) can comprise recent events gathered from external sources, for example feeds from news websites, and/or publicly-available business information (e.g. compiled by third parties). Other inputs can comprise information from internal sources, such as Enterprise Resource Planning (ERM) and/or Customer Relationship Management (CRM) applications. Still other inputs can comprise personalized user preferences, for example an industry and/or territory assigned to a particular user. From these input(s), the engine automatically generates a business lead, together with a score reflecting a strength of that lead. To this existing lead information (e.g. score, lead name, lead contact information, etc.), a user can manually add further information, for example monetary value and/or an closing date, in order to create a deal pipeline for visualization. | 04-23-2015 |
20150106626 | SHARED ENCRYPTED STORAGE - An improved key encryption system is provided for encrypting sensitive data on a shared data store. Various embodiments contemplate a system where a plurality of data clients are connected to one or more shared data stores. A secure data storage facility is provided on one or more of the shared data stores by using an encryption scheme. Encryption keys for decrypting the sensitive data are stored on the same data store as sensitive data which may be decrypted using the encryption keys in question. To provide another layer of protection, the data encryption keys are themselves encrypted using a key encryption key (KEK), which is generated by, and stored in a local persistent data store associated with the data clients. | 04-16-2015 |
20150106483 | SYSTEM FOR BUSINESS SUITE AND NETWORK INTEGRATION - A system includes a suite of business applications and an add-on module coupled to the suite of business applications. The add-on module is configured with Commerce eXtensible Markup Language (cXML) and is operable to enable the suite of business applications to communicate with a network using cXML and a direct web service call to the network. The network is configured to operate using cXML. The direct web service call uses no middleware between the suite of business applications and the network. | 04-16-2015 |
20150106406 | COARSE GRAINED CLIENT INTERFACE - Various embodiments of the present disclosure provide a coarse grained client interface for accessing complex data structures in a storage system. Complex data structures may take the form of business objects (BOs), which may be hierarchically structured. Various embodiments allow for creating, accessing and manipulating one or more BO instances in a storage system using deeply structured data types corresponding to the entire hierarchy of a BO instance or to a substructures of a BO instance | 04-16-2015 |
20150106383 | Automatic Flagging of Frequently Accessed Data Objects for Business Application - Embodiments relate to management of data accessed from a database. A usage tracking engine of an application layer overlying a database, may automatically track (e.g. with a time stamp) access to specific data objects by particular users. This automatic tracking may be based upon one or more of the following: frequency of access, recency of access, user geographic location, and user calendar events. Based upon this data, the tracking engine applies an algorithm to automatically identify those data objects meriting special handling for quick access (e.g. for placement in a “shelf” or other construct readily accessible to the user). A heuristic learning module may generate a data object ranking based upon the usage data, and communicate that ranking to the usage tracking engine to determine a data object's eligibility for placement on the “shelf”. Such ranking may consider personalized settings, and/or a user's past manual shelf placement of data object(s). | 04-16-2015 |
20150101056 | Risk Assessment of Changing Computer System Within a Landscape - Embodiments assess risk posed by changing a computer system present within a landscape of other computer systems. Agents provide a central assessment engine with data relevant to considerations such as system criticality, correlation between related systems, and dependence between different systems. The criticality parameter reflects an importance of a system and a corresponding change risk impact. System correlation is measured to allow comparison between systems, and a risk of failure of a change to the systems. Dependencies between systems are measured to define a set of systems to be changed in a coordinated manner. Change statistics collected in a database, may allow correlating systems across various customers, improving accuracy of risk prediction. Embodiments may facilitate iterative planning, where a different dependency permits the definition of smaller sets of systems offering lower risk of failure upon change implementation. Embodiments may allow correlation measurement between systems and a copy created for testing. | 04-09-2015 |
20150100952 | Runtime Version Access Infrastructure - In one embodiment the present disclosure includes a runtime access component that receives requests specifying a particular version of a particular runtime program to be executed. The requests are converted and sent to destinations capable of executing the specified version of the runtime program. In one embodiment, a received request includes an address with version and runtime information. The version and runtime information are mapped to a destination address that is sent to execute the specified runtime version. In another embodiment, a version control system deploys executable code before the runtime version is executed. | 04-09-2015 |
20150100905 | USAGE DESCRIPTION LANGUAGE - A computer-implemented method includes incorporating a usage model in a business application hosted on a computing device. The usage model describes anticipated usages of the business application by a user and is specified using a formal machine readable language. The method includes providing an adapter configured to automatically translate the usage model in the business application to a UI profile consistent with a UI technology available on the computing device on which the business application is hosted. | 04-09-2015 |
20150100553 | Archival of Objects and Dynamic Search - In one embodiment, a method determines data stored in a plurality of tables in a first database for archiving. The data is combined from the plurality of tables into a set of objects in a readable format where an object in the set of objects includes terms from the plurality of tables associated with the object. The method then stores the set of objects in the text format in a second database where a search query processor is able to search terms in the set of objects in the readable format. Then, the data stored in the plurality of tables in the first database is deleted in response to the archiving. | 04-09-2015 |
20150100546 | Selective Synchronization in a Hierarchical Folder Structure - A technique is described to selectively synchronize content on a client database with content from a server database. As the user traverses a hierarchical folder structure of the client database, he may run into content that has been deleted or moved in the server database. If the content is something that the user wishes to store locally, the content can be stored as an orphan. An orphan is content stored on the client that cannot be traversed by the hierarchical folder structure. When the user traverses to a node in the hierarchical folder structure that is missing an object existing on the server, a determination can be made as to whether the orphan object is the missing object. If so, the orphan object can be connected once against to the hierarchical folder structure. This may minimize the content that needs to be re-downloaded from the server. | 04-09-2015 |
20150099496 | Automatic Account Information Retrieval and Display - Techniques for retrieving and displaying information from a business system on a mobile computing based on contextual details are disclosed. The contextual details can include caller identification information and contact identifiers associated with the caller identification information stored a contacts record in a mobile computing device. Contextual details may include caller identification information, contact identifiers, user preferences, job functions, time/date, and location. Based on the specific details of a particular context, an associated layout definition can be determined. The layout definition specifies the information and analysis to retrieve from the business system and the manner in which to display the information in a graphical user interface if a mobile computing device. | 04-09-2015 |
20150089389 | MULTIPLE MODE MESSAGING - Example systems and methods of facilitating multiple mode messaging are presented. In one example involving a first communication device, a user selection of one of a plurality of message input modes including a text input mode, a graphical input mode, and an audio input mode is received. A user input interface for the selected message input mode is presented. User messaging input is received via the user input interface for the selected message input mode. A user command is received to send the user messaging input as at least one communication service message to a second communication device. In response to the user command, the at least one communication service message is transmitted via a communication network to the second communication device. | 03-26-2015 |
20150088907 | METHOD AND SYSTEM FOR MANAGING DATABASES HAVING RECORDS WITH MISSING VALUES - The method includes selecting a target record from a dataset, the target record including a missing value, partitioning records of the dataset into at least two groups including co-related data, the partitioned records including records having a value for a same field as the missing value in the target record, predicting the missing value based on a relationship between fields in each of the at least two groups associated with the partitioned records, and setting the missing value of the target record to the predicted value. | 03-26-2015 |
20150088823 | TABLE ATTRIBUTE MANAGEMENT FOR REPLICATED DATA TABLES - A table selector may receive a selection of a replicated table storing data replicated from an original table of a first system, the replicated table being stored using a second system and currently executing a process of receiving the replicated data. A suspension manager may suspend the process of receiving the replicated data, and a table attribute manager may change a replicated table attribute of the replicated table, while the process of receiving the replicated data is suspended. The suspension manager may then resume the process of receiving the replicated data. | 03-26-2015 |
20150088808 | Dynamic Determination of Pattern Type and Chart Type for Visual Analytics - Systems and methods for determining alternative visual analytics are described. Visual analytics result from the application of visual analytic patterns that include instructions for generating visualizations of analytical data. Analytical data is the result of the execution of analytical operations specified in a report definition on an underlying business object. By analyzing the metadata associated with the report definition or visual analytic pattern, alternative visual analytic patterns may be determined that better represent the character of the analytical data. The metadata may include a mapping that associates alternative visual analytic pattern s with a business object, a report definition, or another visual analytic pattern. Accordingly, the determination of the alternative visual analytic patterns may be based on the mappings. The alternative visual analytic pattern s may then be applied to the analytic data to generate one or more alternative visual analytics that may be selected by a user. | 03-26-2015 |
20150088703 | Graphic Representations of Planograms - Systems and methods for generating and distributing graphic representations of planograms used for the configuration, maintenance, and compliance confirmation in the display of merchandise and advertisements, are disclosed. Based on predefined merchandizing agreements, planograms are designed to define specific configurations of products and advertising collateral in specific locations. By referencing an identifier associated with a location, a corresponding planogram can be retrieved and used to generate a graphic representation of the planogram. The graphic representation of the planogram can be adjusted and superimposed onto a live or captured image of the location to indicate where objects should be placed or rearranged. Each object specified in the planogram can be visually represented as a picture superimposed in a position over an image or live view of the location captured by a client computing device by a user. The user can reference the graphic representation to stock, rearrange, or maintain the location. | 03-26-2015 |
20150088571 | SYSTEM AND METHOD FOR TASK ASSIGNMENT IN WORKFLOWS - The method includes determining an assignment completion time distribution based on a task set defining a project, determining a project completion time distribution based on the assignment completion time distribution and the task set, determining a project cost based on assignments of the task set, and generating a list of project task assignments based on the project cost and the project completion time distribution. | 03-26-2015 |
20150088417 | System and Method for Dynamic Path Optimization - Techniques of dynamic path optimization are disclosed. In some embodiments, a method comprises receiving an instruction to determine an optimal path from a source geographical location to a destination geographical location, and determining an optimal path from the source geographical location to the destination geographical location using corresponding historical traffic information for each one of a plurality of sub-paths. The historical traffic information for each sub-path may correspond to an estimated arrival time at a start location for the corresponding sub-path and be used to select sub-paths from the plurality of sub-paths. The selected sub-paths may define the optimal path. In some embodiments, the historical traffic information comprises an indication of traffic flow for the corresponding sub-path. In some embodiments, the indication of traffic flow comprises an average speed of traffic flow. | 03-26-2015 |
20150082279 | SOFTWARE TESTING SYSTEM AND METHOD - A computer implemented system and method for testing code for implementation in web browsers, implements test class code defining test cases for testing operations on web applications implementable by different web browser types, and implements handler class code comprising code specific to each web browser and defining strategies to be used by test cases. The handler class code implements a handler interface and the test class code uses the handler interface to identify the methods to be used for test cases. A non-transient storage medium stores code for a handler template supporting different web browser types for use in a test environment, the code comprising code to identify browser specific strategies for implementation in the test environment; code to implement a strategy support interface for use by a handler factory to select a handler instance; and code to implement a handler interface for use by a test case to identify methods for testing web browser functions. | 03-19-2015 |
20150081911 | MIGRATION EVENT SCHEDULING MANAGEMENT - In accordance with aspects of the disclosure, systems and methods are provided for scheduling migration events for server resources in a server cluster relative to a time interval while considering load balance constraints and data transfer constraints of the server cluster. The systems and methods may include generating one or more potential migration scheduling schemes for migration of each server resource to at least one other server resource in the server cluster within the time interval while considering the load balance constraints and the data transfer constraints of the server cluster, and generating a migration event schedule for each migration event within the time interval based on the one or more potential migration scheduling schemes generated for migration of each server resource to at least one other server resource in the server cluster. | 03-19-2015 |
20150081656 | PROVISION OF SEARCH REFINEMENT SUGGESTIONS BASED ON MULTIPLE QUERIES - A query collector may be configured to receive a plurality of queries applied by a search engine to obtain corresponding search results. A graph manager may be configured to generate, based on the plurality of queries, a directed graph of nodes, each node corresponding to at least one query and connected to another node, and further configured to merge at least two of the nodes based on a similarity of corresponding queries thereof, to obtain a merged node, and generate at least one representative query representing the merged node. A suggestion generator may be configured to match a current query with a matching node of the nodes, determine that the merged node is a successor node of the matching node within the directed graph, and provide the at least one representative query as a suggested query for a future search to be conducted by the search engine. | 03-19-2015 |
20150081494 | CALIBRATION OF STRATEGIES FOR FRAUD DETECTION - A method of determining potentially fraudulent records in a database comprises defining a detection strategy. The detection strategy is targeted to detect existing records from the database and comprises multiple inputs. The detection strategy is executed on existing records and results are displayed for review by a user. The detection strategy is then dynamically calibrated as desired based on input received from the user, and any modified results are displayed. A calibrated detection strategy is set, and then it is executed on new records to detect potentially fraudulent records warranting investigation. A computer system having a processor and memory storing instructions for performing such methods is also described. A computer readable storage medium having computer-executable instructions for performing such methods is also described. | 03-19-2015 |
20150081471 | PERSONAL RECOMMENDATION SCHEME - A system may include a similarity measurement processing unit configured to determine a plurality of similar users that are similar to a user based on similarity values including calculating the similarity values for pairs of users based on an importance vector and differences between rated items. The importance vector may include importance values corresponding to a plurality of items, and each importance value may represent a similarity importance of a corresponding item. Each similarity value may represent a level of similarity between the user and another user. Also, the system may include a rating processor configured to estimate a rating value of an unrated item for potential recommendation based on recommendations from the plurality of similar users, and provide a recommendation for the item based on the rating value. | 03-19-2015 |
20150081360 | Order/Vehicle Assignment Based on Order Density - Example systems and methods of assigning shipping orders to delivery vehicles are presented. In one example, a delivery region may be segmented into delivery blocks. A shipping order density may be determined for each of the delivery blocks. Adjacent delivery blocks having corresponding shipping order densities may be merged to yield delivery areas. A cost of using each type of available delivery vehicle to transport a delivery job may be determined relative to a cargo capacity of the vehicle type, a delivery distance, and a shipping order density. Each of the delivery areas may be partitioned into delivery jobs based on the cost of using each of the vehicle types. Each of the delivery jobs may be assigned to one of the available delivery vehicles based on minimizing a total cost of using the vehicles to transport the delivery jobs. | 03-19-2015 |
20150081077 | PRODUCTION RESOURCE MANAGEMENT - In accordance with aspects of the disclosure, systems and methods are provided for managing production resources including scheduling production events for production resources used to manufacture products relative to time intervals while maintaining collaboration among the production resources. The systems and methods may include retrieving information related to each production resource, evaluating each production event for each product to determine a sequence of the production events, and generating potential production scheduling schemes for use of each production resource within the time intervals while maintaining collaboration among the production resources. The systems and methods may include generating a production schedule for the production events within the time intervals based on the potential production scheduling schemes for use of each production resource within the time intervals while maintaining collaboration among the production resources. | 03-19-2015 |
20150074686 | DATA MODELS CONTAINING HOST LANGUAGE EMBEDDED CONSTRAINTS - Techniques are described for expressing a constraint in a host language. A constraint can be defined in the host language as an event handler. The event handler can be registered to a built-in event associated with an object of the database that the constraint is intended to validate. When the object triggers the built-in event, the event handler is called to execute the constraint. Exemplary built-in events include onSave (trigger the event when the object is saved), onValidate (trigger the event when an explicit call to validate the object is detected), onInsert (trigger the event when the object is inserted), onUpdate (trigger the event when the object is updated), and onCheckBeforeSave (trigger the event when the object is checked prior to saving). | 03-12-2015 |
20150074685 | LOCAL BUFFERS FOR EVENT HANDLERS - A technique is described for generating error buffer that includes errors from both a program and event handlers called by the program. A program in an event-driven environment triggers an event. In response to the triggered event, the program calls event handlers related to the event. The event handlers are executed and error messages generated during the execution are stored in a local error buffer. Upon completion of the event handlers, the local error buffers are returned to the program and the program merges the local error buffers with an error buffer associated with the program. | 03-12-2015 |
20150074140 | SQL EXTENDED WITH TRANSIENT FIELDS FOR CALCULATION EXPRESSIONS IN ENHANCED DATA MODELS - A database language (e.g. SQL) is extended to define a transient field whose value is derived from data stored in a database. The value of the transient field is calculated by the database engine for consumption as needed by the application layer, for example as part of a particular data model. The value of the transient field may not be materialized as a persistent field in the underlying database table, or may be selectively materialized based upon a heuristic or hint. Certain embodiments may implement the transient field as a basic elaboration on standard SQL utilizing an identifier. Some embodiments may implement the transient field as an entity where SQL has been extended to accommodate concepts of a higher-level Entity Relationship Model (ERM). The use of constants and/or floating values (e.g. a current time) in connection with transient fields, is also disclosed. | 03-12-2015 |
20150074139 | Database Language Extended to Accommodate Entity-Relationship Models - Embodiments extend the relational model and language of standard SQL, to recognize features of higher level entity-relationship models (ERMs). SQL extensions implemented in the data design language (DDL) incorporate Entities (and Views) having custom-defined/semantic structure, rather than being limited to primitive types (e.g. flat tables as in standard SQL). Entities are defined similar to structured types with an underlying persistency, but with a uniquely identifying leading key. In DDL, these entities are combined with associations in the data model. The associations of the extended SQL reflect relationships between entities in the ERM. Associations are specified by adding an element to a source entity, with an association type pointing to a target entity. This may be complemented by providing optional information (e.g., cardinality, keys, filter conditions), up to a complete JOIN condition. In the query language (QL), JOINs may be replaced by the use of simple path expressions. | 03-12-2015 |
20150074136 | CORE DATA SERVICES EXTENSIBILITY FOR ENTITY-RELATIONSHIP MODELS - Embodiments extend the relational model and query language to recognize features of tables and higher level entity-relationship models (ERMs). Extension language is implemented in the data design language (DDL) to incorporate tables, entities (and views) having custom-defined/semantic structure, rather than being limited to primitive types (e.g. flat tables as in standard SQL). The extension language includes an indication that a query is to include all active elements for each table extension or entity extension that is active. The extension language can be chained to extend a table or entity that has been extended. | 03-12-2015 |
20150074083 | SQL ENHANCEMENTS SIMPLIFYING DATABASE QUERYING - Disclosed are techniques employed alone or in combination, to further enhance a database language and improve conciseness and comprehensiveness of query statements in application code. Embodiments may build upon an initial extension of database language to accommodate concepts of entity-relationship models (ERMs). That initial extension may include entities with structured types, and named associations. One technique modifies SQL to allow the SELECT command to specify element path expressions based upon a relationship (e.g. named associations between ERM elements). Another technique modifies SQL to introduce filter expressions suffixed to associations within path expressions, thus improving adherence to the principle of locality within query statements. Yet another technique allows a shorthand to “factor out” association path prefixes, thereby avoiding lengthy lists of path expressions in order to read several elements from the same nested structure or a same target entity behind a single association. Other techniques simplifying database querying are also disclosed. | 03-12-2015 |
20150074081 | ENTITY-RELATIONSHIP MODEL EXTENSIONS USING ANNOTATIONS - Embodiments extend the relational model and language of standard SQL, to recognize features of higher level entity-relationship models (ERMs). Annotation language is implemented in the data design language (DDL) to incorporate tables and entities Using DDL, annotations are typed structures of metadata. Annotations may be used for types, entities and elements. In the query language (QL), annotations may be added to the standard QL. A reflection program may use the metadata of the annotation language for reflection on the tables or entities. | 03-12-2015 |
20150074069 | ADVANCED DATA MODELS CONTAINING DECLARATIVE AND PROGRAMMATIC CONSTRAINTS - A database language is extended to define constraints on a data model (e.g., entity-relationship model) rather than the concrete database. The constraints can be declarative (e.g., constraints that are defined using expressions of the database language) or programmatic (e.g., constraints that are defined as a stored procedure implemented in a domain specific language). By storing the constraints at a higher level than the database level, the constraints can be performed without changing the persistency of the database. Also disclosed are techniques for handling of constraints on partially loaded entities. | 03-12-2015 |
20150074066 | DATABASE OPERATIONS ON A COLUMNAR TABLE DATABASE - A computer system includes at least one processor and at least one memory operably coupled to the at least one processor. The memory includes a memory pool and a database partitioned into multiple fragments. Each of the fragments is allocated a block of memory from the memory pool and the fragments store compressed data in a columnar table format. A database operation is applied in a compressed format to the compressed data in at least one of the fragments. | 03-12-2015 |
20150074053 | Cross System Analytics for In Memory Data Warehouse - A cross system analytics system includes sets of in memory database tables stored on random access memory of the system. Each set of tables corresponds to data from a different source system to provide separation of data from each source system. A separate in memory database schema for each set of tables corresponds to each source system. A replication system is coupled to provide replication of data from the source systems into the sets of in memory database tables. An analytics engine executes cross system views of data in the sets of tables to provide a cross system central and consistent view for reporting and analyzing data for an organization having multiple systems with different database schemas. | 03-12-2015 |
20150074038 | Historical Data for In Memory Data Warehouse - A method includes processing a transaction on an in memory database where data being processed has a validity time, updating a time dependent data view responsive to the transaction being processed to capture time validity information regarding the data, and storing the time validity information in a historization table to provide historical access to past time dependent data following expiration of the validity time. | 03-12-2015 |
20150074037 | In Memory Database Warehouse - An in memory database system includes a random access memory to store an in memory database table, a stored set of defined views over the database tables, a stored set of analytical services adapted to provide transaction services and database warehouse services, an engine to run the analytical services on the database table, and an interface to interact with users and provide access to the engine, analytical services, and views to perform transactions and data warehouse functions on the database table. | 03-12-2015 |
20150074014 | SYSTEM AND METHOD FOR AUTOMATED ROLE RE-FACTORING - In an example embodiment, roles within a job based security model are refactored to roles within a task oriented security model. The task oriented security model comprises task roles, which allow access to functionality and data, and enabler roles, which provide limits on the scope of the task roles. Data such as user assignment data, role to functionality mapping, functionality authorization objects, user identity and organizational data may be combined and normalized to create a mapping of users to functionality and organizational data. A refactoring engine may then examine the map to identify new candidate roles using contiguous regions of the map. Tuning parameters and constraints allow tuning of the candidate roles, and statistical metrics allow evaluation of the candidate roles. Candidate roles may be tested and applied in the new system. | 03-12-2015 |
20150073964 | MARKET DATA HANDLING BASED ON DERIVATIVE CONTRACT SPECIFICATIONS - In an example embodiment a market data management system allows users to track information regarding commodities. A representative market data management system comprises physical commodity objects including a plurality of fields that describe a real world commodity, market identifier objects including market identifier codes, and contract specification objects including a plurality of fields that describe a derivative contract specification for a particular commodity traded at a particular commodity market. In the data model, a one to many relationship may exist for a physical commodity object and contract specification objects (e.g., a given commodity may be traded according to different derivative contract specifications). The data model may also allow a many to many relationship between contract specification objects and market identifier objects (e.g., a given market may have multiple derivative contract specifications and/or a given derivative contract specification may have the same terms at different markets). | 03-12-2015 |
20150067637 | METHOD AND SYSTEM FOR SPECIFYING AND ENFORCING EXTENSIBILITY OF SOFTWARE APPLICATIONS - The method includes generating at least one base object, and generating at least one extendable object associated with the base object, the extendable object defining an insertion point and is configured to enable addition of new functionalities to an application including the at least one base object. | 03-05-2015 |
20150067565 | Dimension Based Dynamic Determination of Visual Analytics - Systems and methods for determining alternative visual analytics for a particular business object in response to user requests to change the dimensions of a previously generated visual analytic are disclosed herein. By analyzing the request to change the dimensions, an alternative visual analytic pattern that includes suitably dimensioned visualizations is determined. The alternative visual analytic pattern includes a description of a particular visualization and defines how to generate a corresponding visual analytic. Based on the alternative visual analytic pattern, a modified report definition can be generated. The Modified report definition, that includes analytical operations with dimensions corresponding to the request, can be executed on the business object to generate modified analytic data. A new modified visual analytic that comprises a visual representation of the modified analytic data is then generated based on the alternative visual analytic pattern. | 03-05-2015 |
20150066841 | TABLE-FORM PRESENTATION OF HIERARCHICAL DATA - Various embodiments herein each include at least one of systems, methods, and software for table-form presentation of hierarchical data. Some such embodiments include aggregating a hierarchical dataset as it may be stored in several rows of each of one to many tables or other similar data storage structures, grouping data according to the hierarchy, and writing the data in hierarchical groups to a table structure. | 03-05-2015 |
20150066576 | Collaborative Audit Management System - A method includes recording audit results from an audit being conducted on a computer searchable storage device, recording supporting documentation on the computer searchable storage device, searching the storage device for similar prior audits to reveal fraud patterns utilizing a database search engine, and correlating the fraud patterns with the audit being conducted. | 03-05-2015 |
20150066567 | NEWS MINING FOR ENTERPRISE RESOURCE PLANNING - A system may include a record generator to receive a plurality of documents associated with a plurality of suppliers and provide supplier-specific data records based thereon. The record generator may include an event classifier configured to execute a supplier-independent, event-based classification of each document, to thereby obtain event-classified documents. The record generator may include a supplier query generator configured to query the plurality of documents to obtain potential supplier matches from the plurality of suppliers, and a supplier match analyzer configured to analyze each potential supplier match of the potential supplier matches, to thereby obtain supplier matches. The record generator may include a supplier relevance analyzer configured to relate, for each event-classified document, any supplier identified therein to at least one event of the event-classified document, to thereby obtain supplier-event relationships. Thus, the record generator may provide supplier-specific data records, based on the supplier event relationship. | 03-05-2015 |
20150066555 | MEASURING USER PRODUCTIVITY IN PLATFORM DEVELOPMENT - The embodiments provide a system for measuring user productivity in developing a business process using one or more development tools. The system may include a productivity tacking unit configured to provide a user productivity model for measuring user productivity. The user productivity model may identify at least one business function associated with a process to be implemented by one or more development tools, at least one composition pattern, and a plurality of effort drivers associated with the at least one composition pattern. The productivity tracking unit is configured to receive development tracking information based on the user productivity model. The system may also include a report generator unit configured to generate at least one report characterizing the user productivity in developing at least a portion of the process based on the user productivity model and the development tracking information. | 03-05-2015 |
20150066552 | CREATION OF EVENT TYPES FOR NEWS MINING FOR ENTERPRISE RESOURCE PLANNING - An event type generator may provide a training set for classifying documents with respect to an event type. The event type generator may include a request handler to receive the event type and at least one example document, a text analyzer to extract first entities from the at least one example document, and a result manager to execute a first search against an indexed corpus of documents, to obtain first search results, and further to receive at least one selected document from the first search results. The request handler may extract second entities from the at least one selected document, and execute a second search against the indexed corpus of documents, to obtain second search results. The event type generator may thus provide the at least one example document, the first search results, and the second search results as the training set. | 03-05-2015 |
20150058484 | MULTI-STAGE FEEDBACK CONTROLLER FOR PRIORITIZING TENANTS FOR MULTI-TENANT APPLICATIONS - Methods, systems, and computer-readable storage media for determining weights for selecting requests from a plurality of tenant queues in a multi-tenant system receiving measured response time and measured throughput for each tenant in a set of tenants being considered in a current period, for each tenant in the set of tenants, determining a weight based on respective measured response times and respective measured throughput, the weight being determined based on one of a previous weight, an initialized weight, a modified proportional and integral (PI) control, and a volunteer weight increase, providing a set of weights that includes weight for each tenant in the set of tenants, and transmitting the set of weights to an access mechanism, the access mechanism selecting tenant requests for processing by a shared resource. | 02-26-2015 |
20150058052 | Map Based Routing from Bill of Materials - A method and system includes a bill of materials stored on a computer readable storage device, listing multiple components to be assembled. A mapping table is stored on a computer readable storage device having rows listing attributes of components of the bill of materials and a routing operation attribute identifying work centers or another unique attribute. A plurality of routing templates stored on a computer readable storage device, the routing templates identifying work centers and routing operations between work centers. A route generator utilizes the mapping table to map components from the bill of materials to a routing template and its operations. | 02-26-2015 |
20150052150 | On-Demand Hash Index - Disclosed herein are system, method, and computer program product embodiments for populating a hash index and returning a handle to the hash index. An embodiment operates by determining, by at least one processor, during query optimization that a first database query has a query execution plan comprising a sub-query which executes N times a correlated predicate having an operator being one of equal and not equal to a base column. A cost of creating and probing the hash index N times and a cost of fully scanning the base column N times are compared based on the correlated predicate. Based on the comparing, it is determined whether to create on-demand a hash index. | 02-19-2015 |
20150052017 | ONLINE STORE ENTITLEMENTS - A system receives input from a seller agent of a first business organization and a centralized purchasing agent of a second business organization. The second business organization includes a plurality of decentralized business departments. The system generates an entitlement for an online purchasing site using the input from the seller agent and the input from the purchasing agent. The entitlement includes a validity condition and an impact condition. The system receives an input from one of the decentralized business departments, examines the validity conditions of the purchased entitlement, and in response to a determination that the validity conditions of the purchased entitlement are met, executes the impact conditions of the selected entitlement. | 02-19-2015 |
20150047051 | Managing Access to Secured Content - Techniques for preventing unauthorized access to protected network resources include accessing, from a client appliance connected in a distributed network, a computing appliance through the world wide web, the computing appliance including a DNS server addressed by a particular domain name; receiving, from the computing appliance, a portion of code at the client appliance through a web browser of the client appliance, receiving, to a server appliance connected in the distributed network, a request to access secure content stored on the server appliance by the portion of code; comparing the domain name of the DNS server with a server-origin of the secure content; and based on the domain name of the DNS server being exclusive of a set of server-origin values that includes the server-origin, denying access to the request. | 02-12-2015 |
20150046904 | OBSERVING EVOLUTION OF SOFTWARE DEVELOPMENT ARTIFACTS - Methods, systems, and computer-readable storage media for providing notifications in distributed development. In some implementations, actions include receiving change information, the change information indicating one or more changes to source code, processing the change information to determine one or more entities associated with the change, comparing the one or more entities to one or more subscriptions, the one or more subscriptions being specific to a user, for each entity associated with a subscription, providing a notification in a set of notifications, and providing a sub-set of notifications for display to the user. | 02-12-2015 |
20150046881 | ARCHIVING BUSINESS OBJECTS - An identification of a business object may be received. Nodes of the business object may be displayed. In response to a selection of a node from the nodes, an archiving status of the node may be set. The selected node may be linked to a parent node. The selected node may be archived based on the archiving status. The nodes may be displayed in response to receiving an indication that the business object is to be partially archived. In an embodiment, the current respective archiving statuses of the nodes are displayed. In an embodiment, an identification of an archival object may be received. The archival status of the node may be saved in the identified archival object. | 02-12-2015 |
20150046413 | DELTA STORE GIVING ROW-LEVEL VERSIONING SEMANTICS TO A NON-ROW-LEVEL VERSIONING UNDERLYING STORE - A delta store giving row-level versioning semantics to a non-row-level versioning underlying store is described. An example method includes establishing a column-based in-memory database including a main store and a delta store, where the main store does not allow concurrent transactions on a same table and the delta store has a plurality of row-visibility bitmaps implementing a row-level versioning mechanism that allows concurrent transactions on the same table. A transaction associated with the column-based in-memory database is received. For each table read by the transaction, a version of the table in the delta store that represents a transaction-consistent snapshot of the database visible to the transaction is determined. Each table is represented in the main store and the delta store; and each version of the table is represented by one or more bitmaps. Upon execution of a DML as part of the transaction, for each table written by the transaction, the data changes generated by the transaction is recorded in the one or more bitmaps that represent a private version of the table. Upon commit of the transaction, for each table written by the transaction, a new public version of the table is generated based on the private version of the table, and the public version represents a new transaction-consistent snapshot of the database visible to subsequent transactions. | 02-12-2015 |
20150046411 | Managing and Querying Spatial Point Data in Column Stores - A query of spatial data is received by a database comprising a columnar data store storing data in a column-oriented structure. Thereafter, a spatial data set is mapped to physical storage in the database using a space-filling curve. The spatial data set is then compacted and such compacted data can be used to retrieve data from the database that is responsive to the query. Related apparatus, systems, techniques and articles are also described. | 02-12-2015 |
20150046390 | Storing Metadata in a Table-based Format from Metadata in a Serial Format - In one embodiment, a method receives a document including metadata in a serial format and parses the document to determine components in the metadata, a nested structure of the components, and an order of the components in the data. The metadata is stored in a table format where columns of the table define the nested structure of the components and the order of the components in the data. A query is received for the data. The method determines components from the metadata stored in the table format from the columns that satisfy the query where the components are determined based on the nested structure of the determined components and the order of the determined components from information in the columns of the table. A result for the query is output including the determined components based on the nested structure of the determined components and the order of the determined components. | 02-12-2015 |
20150046355 | INTEGRATED TEMPORARY LABOR PROVISIONING AND MONITORING - Various embodiments herein include temporary labor provisioning and monitoring integrated within systems and processes. Some embodiments include receiving a temporary employee hiring request including data identifying requirements for a temporary employee. The received data is then stored and an approval process is initiated. Upon receipt of approval input, candidates may then be identified within a computing system of at least one other entity based on the requirements in the stored data. A selection of an identified candidate may then be received and a purchase order for the identified candidate may be generated. Subsequently, items may be added to the stored data representative of orientation activities, equipment and supplies to be provided to the identified candidate upon start of temporary employment, and human resources activities to be performed with regard to the identified candidate following a start of temporary employment. | 02-12-2015 |
20150046309 | COMMODITY CURVES BASED ON DERIVATIVE CONTRACT SPECIFICATIONS - A system receives a commodity identification, a curve type, and a curve category. The system also receives an interpolation identification, an extrapolation identification, a read procedure, and a maximum number of days for a readback. The system further receives contract data, the contract data including a market identifier code, a derivative contract specification (DCS) identification, and a price type. The system uses the contract data to generate a commodity curve based on DCS, and displays the commodity curve based on DCS on an electronic display unit. | 02-12-2015 |
20150046299 | Inventory Assessment with Mobile Devices - In one embodiment, an inventory level assessment feature or service is provided for a camera-enabled mobile device such that a user of such mobile device can use the mobile device to measure inventory levels of a product in a physical location (e.g., a warehouse, a retail store or another context) pictured in one or more captured images from such device. Among other things, as the user points the mobile device's camera at one or more sections of the physical location, data relating to the captured image or images of such sections of the physical location are transmitted to and processed by a remote inventory assessment engine to determine a current inventory level of the product in the imaged section or sections. | 02-12-2015 |
20150046286 | PRODUCT CONTENT LIFECYCLE AND PRODUCT FEATURES - A holistic process is presented that may define a mature definition and management of product content over the entire lifecycle of the product. Product features may be used to describe business or technical details provided by functions for different releases of the product. The product features may be used to manage different product content types and provide links to additional information managed in various storage locations. The product features may be used to provide both transparency about the capabilities of the software product at a detailed level and a systematic way of documenting the relationship between the product features and related product content types such product documentation. | 02-12-2015 |
20150044643 | Nutrient Value Loss Tracking System and Method - A system and method include exploding a recipe via a computer system for a process to make an end food product into a set of hierarchical process steps, obtaining nutrient values for each input material to be used in making the end food product, obtaining loss profiles for input materials, the nutrient loss profiles including a process loss profile for steps in the process to make the end food product and a storage loss profile for storing intermediate food product resulting during the process, and performing a hierarchical based nutrient loss calculation using the nutrient values and loss profiles to quantify nutrients remaining in the end food product. | 02-12-2015 |
20150040201 | REGISTERING A MOBILE APPLICATION WITH A SERVER - In an example embodiment, a test request is sent to a server configured to provide data to the mobile device application. Then a response to the test request is received from the server. The response is analyzed to identify a pattern in the response indicative of a communication sent via a particular communication path. An available communication path between the mobile device application and the server corresponding to the pattern is identified. Then, a mobile device application is registered with the server via the identified communication path. | 02-05-2015 |
20150040116 | Method And System For Software Delivery Service - Provided herein are techniques for distributing software. An embodiment operates by receiving a software product request including a unique identification information, verifying the unique identification information, and distributing a software product associated with the unique identification information in response to the request. | 02-05-2015 |
20150040104 | TILES IN A MOBILE APPLICATION FRAMEWORK - In an example embodiment, a mobile application framework is added to a metadata-driven application. The mobile application framework includes generic libraries having one or more references to one or more configuration files stored on a platform server. Then the one or more configuration files can be updated to include one or more tiles, each tile comprising a user interface element or screen view, each tile being either a primitive tile or a tile embedding other nested tiles within it, thereby updating the metadata-driven mobile application without recompiling it. | 02-05-2015 |
20150040103 | DATA COMPONENT IN A MOBILE APPLICATION FRAMEWORK - In an example embodiment, one or more configuration files are defined for an extensible application, the one or more configuration files including metadata for the extensible application. Then code defining behavior of the extensible application is combined with a mobile application framework, the mobile application framework including a data component configured to obscure details of an underlying data source for the extensible application, the code including calls made to one or more of the generic components. The code is compiled and one or more of the configuration files can be uploaded to a mobile platform server for storage. Then the compiled code is uploaded to a platform server for distribution to one or more devices. One or more of the configuration files is configured to alter an aspect of the extensible application. Finally, the altered one or more configuration files is uploaded to the mobile platform server for storage. | 02-05-2015 |
20150040101 | Collaborative Awareness in Software Development - Methods, systems, and computer-readable storage media for supporting concurrent activities in distributed development processes. In some implementations, actions include providing source code for display to a first developer, receiving first status information associated with the source code, the first status information being received in response to a determination that a second developer is concurrently accessing the source code, and reflecting a first status of the source code, processing the first status information to provide first collaboration information, and providing the first collaboration information for display to the first developer. | 02-05-2015 |
20150040099 | EXTENSIBLE APPLICATIONS USING A MOBILE APPLICATION FRAMEWORK - In an example embodiment, a mobile application framework is provided. This includes a core component configured to expose one or more application program interfaces (APIs) that initialize the mobile application framework when executed. This also includes a user interface component configured to encapsulate a metadata-driven view for the mobile application. This also includes a data component configured to provide bindings to one or more business objects defining data for the mobile application. This also includes a configuration component configured to read and parse metadata in the one or more configuration files and transform the metadata to constructs native to the mobile application. | 02-05-2015 |
20150039732 | MOBILE APPLICATION FRAMEWORK EXTENSIBIILTY - In an example embodiment, extending an application distributed to a plurality of devices may be accomplied by receiving one or more configuration files. Then the configuration files on a platform server. Then the application may be distributed to the plurality of devices, the application containing code performing one or more calls to the one or more configuration files. Then an update to the one or more configuration files may be received. Then the update to the one or more configuration files may be stored on the platform, thereby altering the application distributed to the plurality of devices without recompiling the application. | 02-05-2015 |
20150039638 | ENHANCED REPORTING SYSTEM - A computer system includes a first database system that includes a plurality of tables, and a second database system that includes a subset of the tables in the first database system. The system identifies a plurality of reports that are currently generated using the second database system. The system also identifies a plurality of reports that are not currently generated using the second database system, but that are capable of being generated using the second database system, and displays a list of these reports on a computer display device. In an embodiment, the system further replicates one or more tables that are required for generation of additional reports from the first database system to the second database system. | 02-05-2015 |
20150039586 | Local Versus Remote Optimization in Encrypted Query Processing - Methods, systems, and computer-readable storage media for optimizing query processing in encrypted databases. In some implementations, actions include receiving a query that is to be used to query an encrypted database, generating a plurality of query plans based on the query, each query plan including a local query and one or more remote queries, the local query being executable at a client-side and the one or more remote queries being executable at a server-side, selecting an optimal query plan from the plurality of query plans, providing one or more remote queries of the optimal query plan to the server-side for execution, receiving one or more remote results, and processing a local query of the optimal query plan and the one or more remote results to provide a final query result. | 02-05-2015 |
20150039585 | Global Dictionary for Database Management Systems - A global dictionary is described that corresponds to a database or table stored across multiple partitions. The global dictionary can be used to identify which partitions of the database contain records that are relevant to a user's query on the database. The global dictionary is made up of variable tables. Each variable table corresponds to a column of the database. A given variable table includes value tables where each value table corresponds to a defined value that has been assigned to a record in the database. A value table can include a list of partitions that contain a record having the related defined value. | 02-05-2015 |
20150039478 | IN-MEMORY-DATABASE-DRIVEN BUSINESS CONSOLIDATION SYSTEM REPORTING - The present disclosure describes methods, systems, and computer program products for providing enhanced business consolidation system reporting functionality according to an implementation. One computer-implemented method includes retrieving financial journal entry data from a total record for consolidation into a consolidated financial report, the financial journal entry data classified as single company closing records, inter-company elimination records, and group-dependent elimination records, processing the single company closing records resulting in single company closing records result data, processing the inter-company elimination records resulting in inter-company elimination records result data, processing the group-dependent elimination records resulting in group-dependent elimination records result data, performing, by operation of a computer, a union of the single company closing records result data, the inter-company elimination records result data, and the group-dependent elimination records result data to generate consolidated financial report data, and generating a consolidated financial report based, at least in part, on the consolidated financial report data. | 02-05-2015 |
20150039376 | Real Time Allocation Engine For Merchandise Distribution - A system includes an allocation table configured for use in a push-driven retail allocation business. The configuration for the push-driven retail allocation business includes a centrally organized headquarter office and a plurality of distribution points. The merchandise is procured by the centrally organized headquarter office and distributed under guidance of the centrally organized headquarter office to the plurality of distribution points. The system also includes an allocation engine processor logically coupled to the allocation table, and an in-memory database logically coupled to the allocation engine processor. The system procures the merchandise from a vendor and distributes the merchandise to the plurality of distribution points by identifying an article of merchandise, determining a current stock status of the article of merchandise, determining one or more distribution points for the article of merchandise, and determining an allocation strategy to the one or more distribution points for the article of merchandise. | 02-05-2015 |
20150033346 | SECURITY TESTING FOR SOFTWARE APPLICATIONS - A mapping engine may be used to determine an attack model enumerating software attacks, the software attacks being represented by linked attack components, and may be used to determine a software architecture to be tested, the software architecture being represented by linked architectural components in an architecture diagram. The mapping engine may then associate each attack component and each architectural component with at least one attack tag characterizing attack requirements. A global test plan generator may be used to determine an attack test model, including associating attack components with corresponding architectural components, based on associated attack tags, and may thus generate attack test workflows from the attack test model, to thereby test the software architecture. | 01-29-2015 |
20150033205 | DEBUGGING REMOTE SOFTWARE APPLICATIONS ACROSS WAN CONNECTIONS - The present disclosure describes methods, systems, and computer program products for providing remote debugging of a software or cloud application across a wide area network. A method includes transmitting, from a remote communication device to a client or cloud computing device, instructions to adjust a running application to a debugging mode; receiving, at the remote communication device from a server, aggregated thread data in a data packet by using a second debugging data protocol different from the Java Debug Wire Protocol; receiving a debugging command and applying the debugging command to the application running in the debugging mode. | 01-29-2015 |
20150033189 | METHODS AND SYSTEMS OF SPIRAL NAVIGATION - Methods and systems of navigating through process steps of a guided procedure are described. A plurality of process step identifiers may be caused to be displayed in a spiral formation in a graphical user interface of a device. Each process step identifier may identify a corresponding process step of a guided procedure. The process step identifiers may be displayed in positions along the spiral formation that reflect an order of their corresponding process steps in the guided procedure. User input may be received for one of the process steps of the guided procedure using the process step identifier that corresponds to the one of the process steps for which the user input is received. The plurality of process step identifiers may be caused to be rotated within the graphical user interface of the device. | 01-29-2015 |
20150033173 | Interactive Composite Plot for Visualizing Multi-Variable Data - A technique is described for providing interactive features to a composite plot for visualizing a multi-variable dataset. The interactive features include the presentation of curved links and associative highlighting, both of which can assist a user in the exploration of possible relationships between different variables. | 01-29-2015 |
20150033104 | Smooth Navigation Between Content Oriented Pages - Smooth navigation can be provided when switching between content oriented pages by presenting an intermediate page while the requested page is being received and rendered. The intermediate page can be the current page but without navigational features. Alternatively, the intermediate page can be an advertisement provided by the source of the requested page. | 01-29-2015 |
20150033078 | DEBUGGING APPLICATIONS IN THE CLOUD - The present disclosure describes methods, systems, and computer program products for providing remote debugging of a cloud application across a wide area network. A method includes transmitting, from a remote communication device to a cloud computing device, instructions to adjust a running application to a debugging mode; receiving, at the remote communication device from a server coupled to the cloud, aggregated thread data in a data packet by using a second debugging data protocol different from the Java Debug Wire Protocol; receiving a debugging command and applying the debugging command to the cloud application running in the debugging mode. | 01-29-2015 |
20150032802 | SHARED DATA DE-DUPLICATION METHOD AND SYSTEM - This disclosure relates to synchronizing dictionaries of acceleration nodes in a computer network. For example, dictionaries of a plurality of acceleration nodes of a client-server network can be synchronized to each include one or more identical data items and data identifier pairs. Synchronization can include transmitting a particular data item, or a combination of a data item and an associated data identifier, to another acceleration node which includes it in its dictionary. A particular acceleration node can, instead of transmitting a data item, transmit an associated data identifier to another acceleration node. As all (or a subset) of the acceleration nodes can have an identical dictionary when employing the methods described herein, the particular acceleration node can use the same dictionary to communicate with all (or the subset of) other acceleration nodes of the computer network. | 01-29-2015 |
20150032777 | CANONICAL DATA MODEL FOR ITERATIVE EFFORT REDUCTION IN BUSINESS-TO-BUSINESS SCHEMA INTEGRATION - The present disclosure describes methods, systems, and computer program products for providing and maintaining an evolving canonical data model (CDM) which consolidates current knowledge of the correspondences of existing schemas. One computer-implemented method includes receiving the plurality of source hierarchical schemas, each source hierarchical schema being stored as a computer-readable document in computer-readable memory, processing, using a computer, the source hierarchical schemas to generate a merged graph, the merged graph comprising a plurality of merged nodes, each merged node being provided based on one or more nodes from at least two of the source hierarchical schemas, and determining, using the computer, that the merged graph includes one or more conflicts and, in response, resolving each conflict of the one or more conflicts to generate a computed-transitive-edge-free, conflict-free merged graph as a unified data model (UDM), wherein resolving comprises splitting one or more merged nodes into respective sub-sets of merged nodes. | 01-29-2015 |
20150032721 | SYSTEM AND METHOD FOR REPORT TO REPORT GENERATION - In an example embodiment a sender report containing multiple rows and/or columns of information drawn from a data table may be displayed to a user of a machine. A user may select a portion of the displayed information. A sender adaptor may extract report-to-report selection criteria from the selected information. A receiver adaptor may identify other data tables where information related to the report-to-report selection criteria resides. If such information resides in multiple data tables, the receiver adaptor may join the multiple data tables into one or more data tables. The receiver adaptor may convert the report-to-report selection criteria into selection criteria for the identified data table(s) or joined data table(s). The selection criteria may be passed to a generic receiver report adapted to retrieve any information from any data table(s). The generic receiver report may retrieve information according to the selection criteria and display the information to the user. | 01-29-2015 |
20150029865 | NETWORK TRAFFIC ROUTING OPTIMIZATION - The present disclosure describes methods, systems, and computer program products for providing network traffic routing optimizations. One computer-implemented method includes calculating a direct connection cost for network traffic between two points in a network, the network including one or more nodes of an accelerated application delivery (AccAD) network, calculating an AccAD connection cost for the network traffic between the two points in the network using at least one node of the AccAD network, comparing the calculated direct connection cost and the AccAD connection cost, and determining whether the direct connection cost is greater than the sum of the AccAD connection cost and a minimum cost threshold value. | 01-29-2015 |
20150029177 | Data Collection Visualization Facility - Disclosed herein are system, method, and computer program product embodiments for implementing a data collection visualization facility. An embodiment operates by adding a visualization component to an application, to create a three-dimensional (3D) user interface and implementing a data adaptor associated with the visualization component. This embodiment further implements an event handler configured to function with the visualization component. | 01-29-2015 |
20150026755 | ENTERPRISE COLLABORATION CONTENT GOVERNANCE FRAMEWORK - The present disclosure describes methods, systems, and computer program products for providing enterprise collaboration content governance. One computer-implemented method includes receiving a content creation request associated with particular content and a context, transmitting the particular content and context for validation of the content creation request. comparing, by operation of a computer, at least one rule and at least one pattern to the transmitted content and context to generate a rule result, determining at least one action result based on the generated rule result, and performing at least one application action based on the determined at least one action result. | 01-22-2015 |
20150026131 | DATA AVAILABILITY DURING COLUMNAR TABLE MERGES - Improved availability of data in columnar tables can be provided via use of additional data structures, such as for example a second delta part, a shadow second delta part, and a second main part, that are employed during a merge operation of a first delta part into a main part. Related apparatus, systems, techniques and articles are also described. | 01-22-2015 |
20150020164 | AUTOMATIC MANAGEMENT OF SECURE CONNECTIONS - In an example embodiment, on-premise systems have access to a cloud connector located on-premise. When the on-premise cloud connector is started, it may establish a secure connection to a notification service residing in the cloud. Applications running on the cloud have access to a connectivity agent. Cloud applications wishing to communicate with the on-premise systems send the communications through the connectivity agent. If a secure connection between the connectivity agent and the cloud connector does not exist, the connectivity agent sends a request to open a secure connection to the notification service. The notification service forwards the request to the cloud connector over its secure connection. The cloud connector may check the requested connection, and if authorized, open a secure connection to the connectivity agent. The connectivity agent then forwards the communication to the cloud connector, which then forwards it to the on-premise system. | 01-15-2015 |
20150020156 | MULTIPLE TRANSACTION INTERFACE FRAMEWORK - Example methods and systems are directed to a multiple transaction interface framework. A system may comprise three computing devices. The first computing device may be accessible to a plurality of users. The second computing device may be inaccessible to the plurality of users, but accessible by a user account of the first computing device. The third computing device may be inaccessible to the plurality of users, and inaccessible by the user account of the first computing device, but accessible by a user account of the second computing device. In some example embodiments, the first computing device causes a user interface to be presented. The user interface may include data retrieved from the second computing device. The data may have been retrieved by the second computing device from the third computing device, which may be configured to store the data. | 01-15-2015 |
20150019879 | Optimal Re-Encryption Strategy for Joins in Encrypted Databases - Methods, systems, and computer-readable storage media for selecting columns for re-encryption in join operations. In some implementations, actions include determining a first column and a second column to be joined, receiving a first key corresponding to the first column and a second key corresponding to the second column, receiving a first rank associated with the first key and a second rank associated with the second key, selecting the second column for re-encryption based on the first rank and the second rank, and providing the first column, the second column, and the first key for performing a join operation, the second column being re-encrypted based on the first key. | 01-15-2015 |
20150019760 | STAGING ENGINE - Example methods and systems are directed to a staging engine. A system may comprise two computing devices. The first computing device may be accessible to a plurality of users. The second computing device may be inaccessible to the plurality of users, but accessible by the first computing device. The first computing device may cause a user interface (“UI”) to be presented to a user accessing the first computing device. The UI may include data retrieved from the second computing device and may be operable to store data. The data entered into the UI for storage may be incomplete relative to the data structures expected by the second computing device. The first computing device or the second computing device may stage the data until additional data that completes the expected data structures is received. After the expected data is complete, the data may be stored. | 01-15-2015 |
20150019528 | PRIORITIZATION OF DATA FROM IN-MEMORY DATABASES - Column accesses to columns of one or more database tables may be determined based on database queries accessing the one or more database tables. Row accesses to rows of the one or more database tables may be determined based on the queries. A priority may be assigned to a column of a row from the one or more database tables based on the determined column accesses of the column and the row accesses of the row. The column of the row may be moved from random access memory to hard disk based on the assigned priority. | 01-15-2015 |
20150019451 | DECISION BASIS FOR BENEFITS PROGRAM - A computer implemented method including populating a data structure, stored on a computer readable storage device, with data for use in determining eligibility for benefits from a benefits program, performing a verification check on the data using evidence related to the data, making a decision regarding eligibility for benefits based on the verified data and rules for the benefits program, and storing the data utilized in the decision, including the evidence used in the verification check. | 01-15-2015 |
20150015404 | Renewable Energy Forecasting Socket - An electric socket can include a visual indicator capable of displaying time-series forecast information that forecasts a property or attribute related to the power being sourced from an energy provider. The information being displayed on the visual indicator can help an energy consumer decide whether to use an appliance now by plugging it into the electric socket or wait until some optimal time in the future to plug the appliance in. | 01-15-2015 |
20150013011 | MODULAR STATIC APPLICATION SECURITY TESTING - Methods, systems, and computer-readable storage media for analyzing source code of an application. In some implementations, actions include determining, for at least one procedure invoked by the source code, a procedure specification specifying one or more conditions under which one or more parameters of the procedure are exploitable according to a parameter security specification; performing static application security testing on the source code by using the procedure specification on reaching an invocation of the procedure in the source code, including: comparing one or more invoking parameters of the invocation of the procedure to the conditions of the procedure specification; and determining whether the invocation of the procedure is exploitable. | 01-08-2015 |
20150012906 | Forecast Monitor to Track Transport Supply in Development Environments - Systems and method for forecasting release times in a multisystem software development environment are disclosed. A forecast engine may analyze the system specific data for multiple systems in a particular transport chain of systems in the development environment to determine when object code should be released from a source system to reach a target system in time to be included in an event, such as a software build or quality assurance test. The system specific data may include event schedules for each system in the transport chain. By analyzing the system specific data and the transport chain, the forecast engine can generate a time by which object code needs to be released to traverse the transport chain so that it is available to the target system for a particular scheduled event. | 01-08-2015 |
20150012526 | Method and System for Limiting Database Access Results - A method includes generating a request for data sets in a database via a user interface, modifying the request as a function of a number, n, of data sets visible in the user interface, sending the modified request to the database for execution, and receiving n data sets from the database responsive to the modified request to display on the user interface. | 01-08-2015 |
20150012481 | Unified Master Report Generator - Methods, systems, and computer-readable mediums are provided for generating master reports. For example, a request to generate a master report may be received from a client device. Release data that includes a list of programs being developed is obtained from a program repository tool. Programs from the list of programs matching the search criteria are then identified. Business case data is then obtained from a business case tool for each matching program. Program process data is also obtained from a product and production tool for each matching program. Using an integrity rule, issues in the release data, the business case data, and the program process data are detected. The master report is generated such that the master report includes the release data, the business case data, the program process data, and the detected issues. The master report is then communicated to the client device. | 01-08-2015 |
20150012259 | LANGUAGE TRANSLATOR MODULE IN THE MIDDLEWARE TOOL PROCESS INTEGRATION - A process integration system to interface between a sender system and a receiver system is described. The process integration system has a sender adapter, an integration engine, a receiver adapter, and a language converter module. The sender adapter receives a communication in a first language from the sender system. The communication is in a first format of the sender system. The sender adapter converts the communication into a second format of the process integration system, and the integration engine identifies the receiver system from the communication in the second format. The receiver adapter converts the communication from the second format to a third format of the receiver system, and sends the communication in the third format and in a second language to the receiver system. The language converter module translates the communication in the third format to the second language associated with the receiver system. | 01-08-2015 |
20150011187 | LOCATION BASED APPLICATIONS - A server provides location-based applications to an application of a mobile device based on a geographic location of the mobile device. The server receives an application definition and metadata comprising a geographic area associated with the application definition. The server generates a location-based application based on the application definition and metadata. The server identifies a geographic location of the mobile device and one or more location-based applications based on the geographic location of the mobile device. One or more location-based applications are provided within the application in the mobile device. | 01-08-2015 |
20140380486 | Automated Detection and Validation of Sanitizers - Methods, systems, and computer-readable storage media for analyzing security of dataflows in programs. In some implementations, actions include processing source code using static analysis to: identify one or more dataflows and one or more candidate sanitizers, each candidate sanitizer being associated with a respective dataflow, and provide an executable sub-program for each candidate sanitizer to provide one or more executable sub-programs, processing the one or more executable sub-programs using dynamic analysis to: execute the one or more executable sub-programs, and provide dynamic analysis results, providing combined results based on the static analysis and the dynamic analysis, the combined results including the dynamic analysis results, and assigning a priority to each result in the combined results. | 12-25-2014 |
20140380322 | Task Scheduling for Highly Concurrent Analytical and Transaction Workloads - Systems and method for a task scheduler with dynamic adjustment of concurrency levels and task granularity are disclosed for improved execution of highly concurrent analytical and transactional systems. The task scheduler can avoid both over commitment and underutilization of computing resources by monitoring and controlling the number of active worker threads. The number of active worker threads can be adapted to avoid underutilization of computing resources by giving the OS control of additional worker threads processing blocked application tasks. The task scheduler can dynamically determine a number of parallel operations for a particular task based on the number of available threads. The number of available worker threads can be determined based on the average availability of worker threads in the recent history of the application. Based on the number of available worker threads, the partitionable operation can be partitioned into a number of sub operations and executed in parallel. | 12-25-2014 |
20140380272 | BUSINESS APPLICATION INSPECTION AND MODIFICATION - An inspection and modification window can be displayed within a user interface of a business application being executed in a business application inspection and modification environment. Application code relating to a current navigation point within the business application can be listed within the inspection and modification window. Modifications to the application code can be received via one or more user inputs, and the business application can be executed from the current navigation point to test how the received modifications to the application code affect operation of the business application. | 12-25-2014 |
20140380266 | Parallel Programming of In Memory Database Utilizing Extensible Skeletons - An execution framework allows developers to write sequential computational logic, constrained for the runtime system to efficiently parallelize execution of custom business logic. The framework can be leveraged to overcome limitations in executing low level procedural code, by empowering the system runtime environment to parallelize this code. Embodiments employ algorithmic skeletons in the realm of optimizing/executing data flow graphs of database management systems. By providing an extensible set of algorithmic skeletons the developer of custom logic can select the skeleton appropriate for new custom logic, and then fill in the corresponding computation logic according to the structural template of the skeleton. The skeleton provides a set of constraints known to the execution environment, that can be leveraged by the optimizer and the execution environment to generate parallel optimized execution plans containing custom logic, without the developer having to explicitly describe parallelization of the logic. | 12-25-2014 |
20140380265 | SOFTWARE CHANGE PROCESS ORCHESTRATION - Systems and methods to manage software change process orchestration are provided. In example embodiments, an indication to initiate a software change process is received. A process required to be performed for the software change process is identified in response to receiving the indication. Using a uniform software logistic protocol capable of accessing tools across different platforms and environments, a tool mapped to the process required to be performed for the software change process is triggered to be executed. | 12-25-2014 |
20140380182 | MULTI-TOUCH MULTI-USER INTERACTIVE CONTROL SYSTEM USING MOBILE DEVICES - A method for providing multi-touch, multi-user interactive control system using mobile devices. The method includes establishing socket connections with the mobile devices and receiving messages representing multi-touch user actions from the mobile devices through the socket connections. The messages are translated into predetermined parameters, and transmitted to an application for performing actions corresponding to the multi-touch user actions. Related apparatus, systems, techniques and articles are also described. | 12-25-2014 |
20140380181 | PRESENTING INFORMATION ON A MOBILE COMMUNICATION DEVICE - Techniques for presenting information on a mobile communication device to an employee of an organization include receiving an indication to present information associated with an organization to an employee of the organization; in response to receiving the indication, determining a current geographic location of the employee; identifying a facility of a plurality of facilities associated with the organization based on the determined current geographic location of the employee; retrieving information associated with the identified facility from a local memory of the mobile communication device; and presenting the retrieved information to the employee. | 12-25-2014 |
20140379914 | SERVICE CONSUMPTION BASED ON GAMIFICATION LEVEL CLASSIFICATION - Methods and systems of enabling service consumption based on gamification level classification are described. A request to use a first service of a service provider may be received from a user. A usage measure for the user and a first usage measure requirement for the first service of the service provider may be determined. The usage measure may be a measure of how much the user has used services of the service provider. It may be determined if the usage measure satisfies the first usage measure requirement. The user may be enabled to use the first service of the service provider in response to a determination that the usage measure satisfies the first usage measure requirement. The stored usage measure may be increased by a first amount in response to the user using the first service. The usage measure may be a level classification or a number of points. | 12-25-2014 |
20140379780 | DETERMINING A SUPPORT PACKAGE STATUS - Techniques for obtaining a support package status associated with a software component executing on a computing system include receiving a transport request that comprises metadata associated with a software component, and a support package start point that defines an updated support package status of the software component for receiving an updated support package for the software component; in response to receiving the transport request, creating a correction transport that comprises the support package start point and metadata associated with the updated support package; distributing the correction transport to a computing system; in response to distributing the correction transport, identifying a current support package status of the software component; comparing the current support package status of the software component with the updated support package status of the support package start point; and based on the comparison, updating the support package status of the software component. | 12-25-2014 |
20140379754 | Operators for Constants in Aggregated Formulas - In one embodiment, a method receives a query for analyzing data in a database. The method then determines a constant in the query and determines an operator applied to the constant in the query. The operator explicitly controls a behavior of the constant. The constant is represented as a scalar representation in the query instead of as a vectorial representation where the constant would have been used as the vectorial representation without the use of the operator due to a rule governing use of constants. Then, the method performs a calculation for the query to determine a query result using the constant as the scalar representation. | 12-25-2014 |
20140379706 | Content Management System with Chained Document Discovery - Data is received by a content management system that identifies a first document managed by the content management system. Thereafter, the first document is associated with a first user that authored or edited the first document. Subsequently, the first user is associated with at least one chained document different from the first document that has at least one pre-defined attribute associated with the first user. Data can then be provided that characterizes the at least one chained document. Related apparatus, systems, techniques and articles are also described. | 12-25-2014 |
20140379677 | TEST SANDBOX IN PRODUCTION SYSTEMS DURING PRODUCTIVE USE - Methods and systems are directed to controlling access to data in a production environment. Production data may be stored in a production database and test data may be stored in a test database. A production application may have access only to the data in the production database while a test application may have access to both the production database and the test database. The test application may have read-only access to the production database and read-write access to the test database. Data in the test database may be handled differently than data in the production database. A type of data may be associated with a range of valid values. The values assigned to the elements may differ depending on whether the elements are stored in the production database or the test database. | 12-25-2014 |
20140379670 | Data Item Deletion in a Database System - Example systems and methods of deleting data stored in a database system are presented. In one example, a plurality of data items is received from an application and stored at the database system. Also received from the application and stored at the database system is deletion timing information for each of the data items. The deletion timing information for a data item may indicate when the data item is to be deleted from the database system. At least one of the data items may be deleted at the database system at a time indicated by its corresponding deletion timing information without assistance from the application. | 12-25-2014 |
20140379669 | Feedback Optimized Checks for Database Migration - Example systems and methods of database migration optimized by feedback are presented. In one example, a migration of database data from a first to a second database by multiple concurrent processes may be initiated on a computing system. Processing time of at least some of the processes may be monitored during the migration. Based on this monitoring, at least one portion of the database data being migrated by one of the concurrent processes may be segmented into multiple segments, wherein each of the multiple segments may be migrated by a separate one of the concurrent processes. Also, a load on the computing system may be monitored during the migration. Based on this monitoring, a number of the concurrent processes may be adjusted. In other examples, consistency checking for subsequent database migrations may be based on consistency checking results for the current migration. | 12-25-2014 |
20140379656 | System and Method for Maintaining a Cluster Setup - Methods and systems are directed to a maintenance procedure in a production environment comprising a primary database and a secondary database. Production data may be stored in the primary database and failover data may be stored in the secondary database. Data from the primary database may be replicated to the secondary database. The maintenance procedure may provide for modification of the primary database and the secondary database to conform to one or more modified requirements of a modified version of the application. During the maintenance procedure, data in the databases may be duplicated, data structures may be modified, and modification of certain data elements may be prohibited. | 12-25-2014 |
20140379650 | MANAGING A FILE-BASED VERSIONING SYSTEM - Techniques for managing a file-based versioning of data objects include receiving, from a back-end computing system, a transport request that includes an updated transport object, the updated transport object including serialized database content of a data object; converting the serialized database content of the updated transport object to file-based content; storing the file-based content of the updated transport object in a repository over a previously-stored version of the transport object; and updating a database that includes a change history of the data object based on the storage of the file-based content in the repository. | 12-25-2014 |
20140379638 | CONCURRENT REQUEST HANDLING FOR DATABASE TRANSACTIONS - A request handler may receive transaction requests for transactions to be executed using data of a database, and may classify a first transaction request of the transaction requests as a simple transaction request, and a second transaction request of the transaction requests as a complex transaction request. A key-value store engine may execute a first transaction satisfying the first transaction request, using a key-value store of pre-calculated results determined prior to receipt of the first transaction request, and based on the data, and may update a key-value delta reflecting a change, if any, of the key-value store caused by the first transaction. A relational store engine may cause the at least one processor to execute a second transaction satisfying the second transaction request, using a relational store including a subset of the data, and may update a relational delta reflecting a change, if any, of the relational store caused by the second transaction. A synchronizer may execute a synchronization of the key-value store and the relational store, based on the key-value delta and the relational delta. | 12-25-2014 |
20140379636 | AUTOMATED RESOLUTION OF DATABASE DICTIONARY CONFLICTS - Copying data in a table from a source database to a target database is performed by copying the table into a conflicts schema. A first INSERT/SELECT statement is executed to copy data from the table. Then, in response to a determination that the table definition for the table in a source database dictionary is not compatible with a table definition for the table in a target database dictionary, the INSERT/SELECT statement execution is rolled back in response to a determination that the data from the first INSERT/SELECT statement did not fit in a table in the target schema of the target database. A second INSERT/SELECT statement is executed including a WHERE clause to copy data from the table to the target schema of the target database. In response to a determination that the second INSERT/SELECT statement did not copy data from the table to the target schema of the target database, a third INSERT/SELECT statement is executed forcing the data to fit. | 12-25-2014 |
20140379520 | DECISION MAKING CRITERIA-DRIVEN RECOMMENDATIONS - The embodiments provide a system for decision-making criteria-based recommendations. The system may include a decision engine configured to receive a request for recommendations for an option problem associated with a product or service category, and determine options among a plurality of options for the product or service category based on preference information. The preference information may include activated decision-making criteria and corresponding weight values. The corresponding weight values may represent a relative importance of each activated decision-making criterion. The decision engine may be configured to determine options among the plurality of options including calculating scores for the plurality of options based on, in part, the activated decision-making criteria and the corresponding weight values and selecting the options among the plurality of options based on the calculated scores. The decision engine may be configured to provide a display of the determined options as the recommendations for the product or service category. | 12-25-2014 |
20140379423 | Market Price based Raw Material Procurement - In one embodiment, a method determines pricing information for a raw material used in industrial production of a product for a company. The pricing information includes forecasted pricing information for the raw material. Also, the method determines demand and supply information describing a supply of the raw material for the company and a demand for the raw material of how much of the raw material the company plans to use. Then, the forecasted pricing information and the supply of the raw material and the demand for the raw material are analyzed to determine a point in time in which to order the raw material and an amount of the raw material to order at the point in time. The method automatically generates information for a purchase order for the raw material for the point in time in the amount and outputs the information for the purchase order. | 12-25-2014 |
20140379413 | GROUPING PROCESS STRUCTURES IN A SOLUTION MANAGER UNIFIED DIRECTORY - Techniques for managing business process functionality by grouping process structures in a solution manager unified directory (SMUD) include defining a group for a SMUD, the defined group including a group identification (ID) and a plurality of members of the group, each member including a business process structure; defining a plurality of generic functions of the group; receive a request for an adjustment to the plurality of generic functions of a particular member of the plurality of members of the group; and based on the received request, adjusting the plurality of generic functions of members of the group other than the particular member. | 12-25-2014 |
20140379396 | Carbon Dioxide Emissions Optimized Secure Cloud Computing - Systems and method for deploying CO | 12-25-2014 |
20140372924 | GRAPHICALLY MANAGING INTERACTIVE ANALYTIC DATA - Techniques for graphically managing interactive analytic data include presenting a virtual workspace to a user that includes a visual representation of a simulation analysis that includes a plurality of graphical analytic data modules, each graphical analytic data module including a plurality of variables that define a business process; identifying a change to a particular variable of a particular graphical analytic data module, the change defined by a user interface (UI) adjustment of a dimension of the particular graphical analytic data module that represents the particular variable; based on the identified change to the particular variable of the particular graphical analytic data module, adjusting at least one business process output of the simulation analysis; and presenting a revised virtual workspace to the user, the revised virtual workspace including the particular graphical analytic data module and at least one business process output of the simulation analysis. | 12-18-2014 |
20140372874 | RESPONSIVE RENDERING OF DATA SETS - Approaches are presented for rendering the content of a data set in a grid that changes depending on screen size and/or orientation. For example, a tool such as a rendering engine distributes groups and sub-groups of a data set differently depending on screen width, which can help use available screen space efficiently. Or, the tool determines the layout of a data set on a grid so as to guide reading in a reading direction. By adjusting distances between groups and sub-groups, the layout can guide the user along the intended direction for reading. Or, the tool wraps long text blocks of a group into multiple text columns in order to distribute text evenly across the available space. Or, the tool adjusts the width of a page and/or the widths of groups depending on the width of text, which can help manage available space when content is translated between languages. | 12-18-2014 |
20140372863 | TEMPORARY HIGHLIGHTING OF SELECTED FIELDS - Approaches are presented for temporary highlighting of selected fields of a document. For example, a user can select which fields of a document or class of documents he wishes to have highlighted. The user can also select (a) when he wishes the selected fields to be highlighted, for example, if a field exceeds a threshold and/or (b) how he wishes the selected fields to be highlighted, e.g., overlay the field with a contrasting color. When the user performs a specified action, for example, opens a document, the selected field is selectively highlighted according to the rules for when and how to highlight the selected field. This can help a user quickly recognize important fields in the context of the document. | 12-18-2014 |
20140372769 | Automatic Protocol Selection in Mixed-Protocol Secure Computation - Secure multi-party computation may be performed utilizing mixed protocols in order to improve performance. In particular, embodiments implementing mixed protocols can reduce run time and thereby lower the cost of performing secure computation. Algorithms for optimizing selection from mixed protocols are disclosed, including an algorithm based on integer programming or an efficient heuristic algorithm for the selection problem. According to certain embodiments a selection engine is configured to receive as inputs, a function description and cost parameter(s). Based upon execution of the integer programming algorithm and the application of heuristics, the selection engine is configured to generate an output comprising a single cryptographic protocol (e.g. garbled circuit or homomorphic encryption). By employing mixed protocol selection according to embodiments, a compiler responsible for implementing secure computations can identify and select the fastest underlying mixed cryptographic protocols. | 12-18-2014 |
20140372768 | MULTI-LAYER DATA SECURITY - Data may be encrypted using a public key. From a plurality of functions executable on the data, one or more functions may be selected. The selected one or more functions may be associated with the encrypted data. The selected one or more functions may provide exclusive access to the data. A data structure specifying conditions for access to the one or more functions may be created. An exclusive interface to provide access to the one or more functions may be created. The interface, upon determining that one or more conditions from the conditions are satisfied, may grant access to the one or more functions. The encrypted data, the associated one or more functions, the data structure, and the interface may be included into an object. | 12-18-2014 |
20140372550 | METADATA-DRIVEN DYNAMIC LOAD BALANCING IN MULTI-TENANT SYSTEMS - The disclosure generally describes computer-implemented methods, computer program products, and systems for providing metadata-driven dynamic load balancing in multi-tenant systems. A computer-implemented method includes: identifying a request related to a model-based application executing in a multi-tenant system associated with a plurality of application servers and identifying at least one object in the model-based application associated with the request. At least one application server is identified as associated with a locally-cached version of a runtime version of the identified object, and a determination of a particular one of the identified application servers to send the identified request for processing is based on a combination of the availability of a locally-cached version of the runtime version at the particular application server and the server's processing load. The request is then sent to the determined application server for processing. | 12-18-2014 |
20140372504 | PERFORMING OPERATIONS ON NODES OF DISTRIBUTED COMPUTER NETWORKS - Performing operations on nodes of distributed computer networks. A request to upgrade a first acceleration node in a computer network is identified. A second acceleration node that is linked to the first acceleration node is identified. A bypass link to the second acceleration node from the first acceleration node is established. The bypass link is configured to transmit new connections received for handling by the first acceleration node to the second acceleration node for handling by the second acceleration node during upgrading of the first acceleration node. Upon establishing the bypass link, the first acceleration node is upgraded in response to identifying the request. | 12-18-2014 |
20140372488 | GENERATING DATABASE PROCESSES FROM PROCESS MODELS - Methods and systems for generating and executing a database process are described. One example method includes identifying a database process within a database, the database process being generated based on an identified process model and including one or more procedures, an input location, an output location, and execution instructions configured to control execution of the one or more procedures, identifying a data set in the input location, the data set representing data to be processed by the database process, processing the data set within the database by each of the one or more procedures of the database process according to the execution instructions, and storing a result of the database process in the output location. | 12-18-2014 |
20140372466 | METHOD AND SYSTEM FOR OPERATING ON DATABASE QUERIES - The present disclosure involves systems, software, and computer implemented methods for operating on database queries. One example method includes identifying a parameterized input query in a first database query language. The parameterized input query includes one or more parameter placeholders. A random value is generated, for each parameter placeholder. A concrete instance of the parameterized input query in the first database query language is constructed. The concrete instance of the parameterized input query replaces each parameter placeholder with the corresponding generated random value. A translated output query in a second database query language is generated, from the concrete instance of the parameterized input query. The translated output query includes the generated random values. Each of the generated random values are replaced within the translated output query in the second database query language with a placeholder value associated with the second database query language. | 12-18-2014 |
20140372428 | INTEGRATION FLOW DATABASE RUNTIME - The present disclosure describes methods, systems, and computer program products for providing application integration functionality directly on a relational database according to an implementation. One computer-implemented method includes inserting relational data into a start table of a database, detecting a change in the start table, retrieving the inserted relational data from the start table, processing, using a computer, the relational data using a database integration flow runtime into result data, inserting the result data into an end table of the database, detecting a change in the end table, and retrieving the result data from the end table. | 12-18-2014 |
20140372398 | NATIVE LANGUAGE SUPPORT FOR INTRA-AND INTERLINKED DATA COLLECTIONS USING A MESH FRAMEWORK - A mesh structure can be a type concept that extends internal tables or other data structures of a business programming languages (e.g., ABAP) by associations, as known from a data object meta-model. A mesh can include a set of operations, such as for example iteration via an iterator object and selection of instances expressed by a path language. A mesh structure can be optimized for read access and traversal, and can provide a working area that is processed with statements in the business programming language to implement one or more core services directly from the mesh data structure. Related methods, computer program products, and systems are described. | 12-18-2014 |
20140372368 | Removing Group-By Characteristics in Formula Exception Aggregation - In one embodiment, a method receives a query for analyzing data in a database. The query includes a first level calculation that is performed before a second level calculation. The method determines an operator in the query configured to explicitly remove group by information for a reference characteristic in the first level calculation where the group by information is specified for the reference characteristic in the second level calculation. The first level calculation is performed by removing the group by information for the reference characteristic for the first level calculation to determine a first level calculation result and the second level calculation is performed using the first level calculation result using the group by information for the reference characteristic to determine a second level calculation result. | 12-18-2014 |
20140372098 | SELF-LEARNING LOCALIZATION SERVICE - The disclosure generally describes computer-implemented methods, software, and systems for self-learning localization services. A computer-implemented method includes: identifying, at a location remote from a first application, a request for localization of a string value associated with the first application from a source language to a target language, sending the string value to a translation request buffer in response to a determination that the localization of the string value in the target language is unavailable, and triggering, in response to satisfaction of at least one heuristic analysis, a translation process of the string value from the source language into the target language where the string value is retrieved from the translation request buffer. In some instances, the location remove from the first application is a centralized localization service accessible by remote requests from a plurality of applications. | 12-18-2014 |
20140367461 | QUICK RESPONSE IN SOFTWARE APPLICATIONS - Embodiments of the present invention may include an apparatus and method for automatically installing mobile versions of software applications on a mobile device using quick response (QR) code technology. A software application may initially be loaded on a personal computer in response to a user request. The personal computer may determine if there is a mobile version of the software application available. If there is a mobile version available, the personal computer may generate a QR code that represents an encoded version of a link for the mobile version of the software application. Subsequently, the QR code may be displayed on a display device of the personal computer for the user to scan and access the mobile version of the software application on his/her mobile device. | 12-18-2014 |
20140366002 | SEARCHING FOR AN ENTITY MOST SUITED TO PROVIDE KNOWLEDGE REGARDING AN OBJECT - In some example implementations, there is provided a method. The method may include receiving a message from a user interface, the message representing a request for an identity of an entity having information regarding a component of a system being developed; determining whether a cache includes the identity of the entity having the information regarding the component; accessing, from at least a repository, metadata including at least one of a version information for the component and an organization structure information, when the cache does not include the identity of the entity having the information regarding the component, and determining, based on the accessed metadata, the entity, when the cache does not include the identity of the entity having the information regarding the component. Related systems, methods, and articles of manufacture are also provided. | 12-11-2014 |
20140365659 | LOAD CONTROLLER FRAMEWORK - The present disclosure involves systems, software, and computer-implemented methods for controlling service load in a cloud-based system. An example method includes receiving a first request for the network service from a client, evaluating a load condition associated with the network service, the load condition indicating an availability of the network service to receive requests, returning a unique token associated with the first request to the client in response to the load condition indicating that the network service is not available to receive the requests, receiving a second request for the network service from the client, the second request including at least a portion of the first request and the unique token, evaluating the load condition associated with the network service, and prioritizing the second request based on the unique token in response to the load condition indicating that the network service is available to receive the requests. | 12-11-2014 |
20140365401 | SYSTEM FOR ACCELERATED PRICE MASTER DATABASE LOOKUP - A system generates a plurality of price master data lookup procedures that are capable of being executed in parallel. The plurality of price master data lookup procedures is stored in a repository in an in-memory system. The in-memory system includes a parallel processor. The system accesses the repository of price master data lookup procedures, and retrieves price master data in parallel using the price master data lookup procedures. The system then calculates a price using the price master data retrieved from the price master database in the in-system memory. | 12-11-2014 |
20140365367 | Peer-To-Peer Network For Master Purchase Agreements - A system, a method and a computer program product for peer-to-peer network for master purchase agreements are provided. A request sent by a user equipment associated with an entity to register with a network configured to enable sharing of a master agreement among a plurality of entities is received by a server. The server generates a notification representative of a master purchase agreement being available at the server for access by the plurality of entities and sends the generated notification to the plurality of entities registered with the network to notify that the master purchase agreement is available on the network. The server receives a message sent by the user equipment associated with the entity. The server then generates a response to the message request to enable the entity to perform viewing of the master purchase agreement or the authorization to make the purchase under the master purchase agreement. | 12-11-2014 |
20140361997 | MOTION-BASED INPUT METHOD AND SYSTEM FOR ELECTRONIC DEVICE - A method for efficient data input may include displaying a user interface, detecting a plurality of positions of an object, and, controlling a display screen to display a data content, in response to a plurality of movements of the object. If the controller determines the object moved substantially in a first direction, the display screen modifies the data content based on a group of data choices. If the controller determines the object moved substantially in a second direction, the controller stores, into a memory, the data content currently being displayed on the display screen. | 12-11-2014 |
20140359792 | Public Exposed Objects - A system, a method, and a computer program product for public exposed objects in packaged interfaces of business process applications are provided. A service provider of a service registers a public exposed object for use by a client of the service provider by identifying the public exposed object and associating a predetermined access protocol for accessing the registered public exposed object by the client. The registered public exposed object is accessible from the service provider only. The service provider provides the registered public exposed object to the client during a transaction. The client accesses the registered public exposed object using an identifier, an attribute, an access location of the registered public exposed object, and the predetermined access protocol. | 12-04-2014 |
20140359594 | REPOSITORY LAYER STRATEGY ADAPTATION FOR SOFTWARE SOLUTION HOSTING - Upon an installation of a new software release at a multitenant computing system, a list of layers of a pre-existing layer strategy in use at the multitenant computing system can be read. As part of the installation of the new release, an updated bottom layer in a repository of the multitenant computing system can also be installed. A target set of software components for a tenant of the multitenant computing system can be determined, for example by reading a metadata definition of the target set for a layer of a repository of the multitenant computing system to which the tenant is assigned. The tenant can be configured consistent with the target set of software components. | 12-04-2014 |
20140359581 | DATABASE CODE TESTING FRAMEWORK - The present disclosure involves systems, software, and computer-implemented methods for providing an integrated testing framework within a database system for testing database code. An example method includes identifying a test script associated with a database, identifying an expected result to be produced by the test script, the expected result stored in an expected results table in the database, executing the test script within the database, where executing the test script produces an actual result, and comparing, within the database, the actual result produced by the test script with the expected result from the expected results table to determine a success condition associated with the execution of the test script. | 12-04-2014 |
20140359576 | APPLICATION BUILDING BLOCKS FOR ON DEMAND AND ON PREMISE USAGE - The disclosure generally describes computer-implemented methods, software, and systems for enhancing visual applications. A computer-implemented method includes: identifying a map-based application for enhancement, identifying a configuration file defining one or more application parts for enhancing the map-based application, the one or more application parts associated with a second application, and incorporating the one or more application parts from the identified configuration file into the map-based application. In some instances, incorporating the one or more application parts into the map-based application includes identifying a symbol associated with each of the one or more application parts, accessing data from the second application associated with each of the one or more application parts, and inserting an instance of the symbol for each application part based on the accessed data from the second application. | 12-04-2014 |
20140359575 | ADAPTIVE CONTEXTUAL GRAPHICAL REPRESENTATION OF DEVELOPMENT ENTITIES - In some example implementations, there is provided a method. The method may include receiving, at an interface, a selection of one of a plurality of elements of a tool bar, the plurality of elements including an application structure element and a where-used element; obtaining, in response to the selected element, at least one view providing a graphical representation of context information for a component of a system; and providing to a user interface the at least one view as a stream to allow presentation at the user interface. Related systems, methods, and articles of manufacture are also provided. | 12-04-2014 |
20140359554 | SYNCHRONIZING REAL AND VIRTUAL SOFTWARE DEVELOPMENT - Synchronizing real and virtual software environments. A first input of an entity identifier that identifies a software development entity and a second input of an operation identifier that identifies a software development operation that has been performed on the entity in a physical environment are received. The entity identifier and the operation identifier are on a first and second physical medium, respectively. The entity and the operation are identified in response to receiving the inputs. A virtual software development environment is updated to reflect that the operation has been performed on the entity in the physical environment. The entity and the operation are associated with a software development model that is also associated with the virtual environment. | 12-04-2014 |
20140359527 | FLIP-THROUGH PRESENTATION OF A LIST - The disclosure generally describes computer-implemented methods, software, and systems for presenting list information. One method includes providing a series of controls for presentation representing a complete set of the elements, including first and last elements that are accessible without paging or scrolling to another screen. User input is received representing a traversal of the controls, including an uninterrupted selection of the controls. During the traversal and depending on a current position of the user input in relation to the controls, a position marker is displayed and continuously updated that identifies at least one element associated with a control at the current position. User input is received during the traversal indicating a selection of a particular control based on a termination of user input. The selection is based on a position relative to the series of controls. At least one particular element associated with the selected particular control is identified. | 12-04-2014 |