Class / Patent application number | Description | Number of patent applications / Date published |
707689000 | Detection of expired data | 63 |
20100153343 | SYSTEM AND METHOD FOR FILTERING EXCEPTIONS GENERATED BY FORECASTING AND REPLENISHMENT ENGINE - A system and method for storing, filtering, selecting and manipulating business exceptions generated by forecasting and replenishment processes and systems. When an exception is generated, it will be associated with attributes corresponding to those business objects and business areas to which the exception relates. Exceptions may also be associated with administrative attributes such as status, priority and generation date, as well as information identifying the specific business process that generated the exception. Generated forecasting and replenishment exceptions may be directed to a transitory dialog message. Alternatively, forecasting and replenishment exceptions may be logged or stored in a database for future review and treatment. Within an exceptions monitor or workbench tool, a business replenishment specialist may browse, search, select, review, filter, rearrange, edit, forward and/or respond to generated exceptions. Exceptions may be filtered tacitly according to a user profile associated with the business replenishment specialist. Alternatively, exceptions may be filtered according to explicitly supplied selection criteria. | 06-17-2010 |
20100153344 | INFORMATION EXTRACTION METHOD, EXTRACTOR REBUILDING METHOD, AND SYSTEM AND COMPUTER PROGRAM PRODUCT THEREOF - An information extraction method for extracting dynamic information is provided. The method includes using a plurality of information extractors extracting reference values corresponding to the dynamic information from a plurality of information sources, and determining a most reliable value corresponding to the dynamic information based on the reference values. The method further includes determining whether each of the information extractors is abnormal according to the most reliable value and removing the information extractors determined as abnormal. The method further includes rebuilding new information extractors for replacing the removed information extractors. In such a way, reliable dynamic information can be extracted and the information extractors can be maintained for normal operation. | 06-17-2010 |
20100169286 | Methods, Systems, and Products for Updating Web Content - Methods, systems, and products are disclosed for dynamically updating web content using W3C standards. One such method sends a request to a web server for a web page. A web browser receives and renders a static HTML web page. The web browser periodically sends a query to the web server and, in response, receives a latest date and time stamp indicating the latest update to the web page. The web browser compares the latest date and time stamp to a previously stored date and time stamp representing a previous update. If the latest date and time stamp matches the previously stored date and time stamp, then no update has occurred and no update is required. If, however, the date and time stamps do not match, then the web page has changed since the previous update and the web browser retrieves the latest update to the web page. | 07-01-2010 |
20100205155 | SYSTEM AND METHOD FOR CONTENT MANAGEMENT AND DETERMINATION OF SEARCH CONDITIONS - A system, method and article of manufacture for managing, e.g., extracting and displaying, search condition result data, which has been modified since a previous search. Embodiments of the present invention associate search conditions and modification programs with unique identifiers (e.g., a keyword) and log every use of thereof. Thereafter, contextual relationships (e.g., where a search conditions and a modification program are linked to the same unique identifier) between the data modifications and search conditions are identified using search condition and modification program usage logs, and based on the contextual relationships, embodiments of the present invention extracts and displays the result data that has been modified since the search condition was last executed. | 08-12-2010 |
20100293152 | MANAGING APPARATUS, RECORDING MEDIUM IN WHICH MANAGING PROGRAM IS RECORDED, AND EXPIRATION DATE DETERMINING METHOD - An apparatus includes: a storage unit storing page information located at a root, a node, and a leaf in a tree structure, and storing the plurality of page information including an expiration date of a record that is included in any page information; a search unit searching a record that has passed its expiration date; a determination unit determining whether or not the expiration date included in the page information has come; a first control unit configured to make the determination unit determine whether the expiration date included in predetermined page information stored as the tree structure has come; and a second control unit configured to make the search unit end the search of the record that has passed its expiration date, and configured to make the determination unit determine whether the expiration date included in page information located at a child of the predetermined page information has come. | 11-18-2010 |
20110060727 | HANDLING OF EXPIRED WEB PAGES - Information indicating a time of validity of content of a web page is maintained as meta data within the page itself. A content server, in response to receipt of a request for the web page, determines whether web page has expired. If the content is determined not to have expired, the content server forwards the web page to the requesting user without modification. However, if the content is determined to have expired, the content server adds a warning tag in the content section of the page specifying that the content has expired, and then forwards the page to the requesting user, thereby alert the user of the expiry. In addition, the content server may obtain an updated web page, which may then be provided in response to future requests for the web page. | 03-10-2011 |
20110066600 | FORWARD DECAY TEMPORAL DATA ANALYSIS - A disclosed method for implementing time decay in the analysis of streaming data objects is based on the age, referred to herein as the forward age, of a data object measured from a landmark time in the past to a time associated with the occurrence of the data object, e.g., an object's timestamp. A forward time decay function is parameterized on the forward age. Because a data object's forward age does not depend on the current time, a value of the forward time decay function is determined just once for each data object. A scaling factor or weight associated with a data object may be weighted according to its decay function value. Forward time decay functions are beneficial in determining decayed aggregates, including decayed counts, sums, and averages, decayed minimums and maximums, and for drawing decay-influenced samples. | 03-17-2011 |
20110093441 | Method for Detecting a Delinquent Customer Record in a CRM Database - The present invention relates to a method for detecting a delinquent or dormant customer record in a customer relationship management (CRM) database using a computer arrangement. The method includes the step of determining that the customer record does not relate to an existing customer for whom work is in progress. It is also determined that the customer record does not relate to a prospective customer. The method further includes the step of detecting the customer record when a future activity date associated with the customer record has passed. | 04-21-2011 |
20110099152 | ALTERNATE DATA STREAM CACHE FOR FILE CLASSIFICATION - Described is caching classification-related metadata for a file in an alternate data stream of that file. When a file is classified (e.g., for data management), the classification properties are cached in association with the file, along with classification-related metadata that indicates the state of the file at the time of caching. The classification-related metadata in the alternate data stream is then useable in determining whether the classification properties are valid and up-to-date when next accessed, or whether the file needs to be reclassified. If the properties are valid and up-to-date, they may be used without requiring the computationally costly steps of reclassification. Also described is using more than one alternate data stream for the cache, and extending the classification-related metadata through a defined extension mechanism. | 04-28-2011 |
20110218971 | System, Method And Computer Program Product For Managing Caches - Methods, systems and computer program products are provided for managing at least one cache for a database. In one method, an operation record is inserted in an operations log for each write operation to the database. The operation record includes a Log Sequence Number (LSN). At least one cache is updated using operation records in the operations log. To update a cache, unapplied operations in the operations log for the cache are identified using an applied LSN associated with the cache. The applied LSN denotes an LSN of a last operation applied to the cache. The unapplied operations are then applied to the cache and the applied LSN is updated with an LSN corresponding to the last unapplied operation of the unapplied operations that were applied to the cache during updating the cache. | 09-08-2011 |
20110225125 | REDIRECTING DOCUMENT REFERENCES TO A REPOSITORY - A method for automating the redirection of references that can include downloading an original document using an original uniform resource identifier (URI), storing the original document in a repository, parsing the original document to determine the existence of one or more dependent documents referred to in the original document and executing an automated redirection subprocess. The method can include parsing each dependent document to determine one or more dependent documents, and responsive to determining the existence of one or more dependent documents, conducting the automated redirection subprocess for each dependent document and further dependent document and repeating the parsing of dependent documents and conducting the automated redirection subprocess steps until all further dependent documents have been redirected. | 09-15-2011 |
20120023072 | SYSTEM AND METHOD FOR CONTROLLING THE DELETION OF DATA ASSOCIATED WITH ELECTRONIC GROUPS - A system and method are provided that utilize a mechanism for electronic communication group deletion based on the detection of the completion of the purpose of an event as specified upon creation of the electronic communication group. By specifying the expiry date of a group at the time of creation and notifying members of the expiry date, complete deletion of the group can be performed on the server side to conserve memory, while enabling group members to save content locally before the group is deleted. Upon creating a group, an expiry date can be set for the group and this expiry date and a purpose therefor notified to the members that join the group, and users are then able to join the group. Upon detecting the expiry date, the group members can be notified and permitted to perform a local save, extend the expiry date, etc. The server may then delete its copy of the data and the client devices enable or enforce deletion locally to recapture storage space. | 01-26-2012 |
20120109902 | CONTENT CACHING BASED ON REFRESH AND EXPIRATION TIMES - A device is configured to receive a request for particular content metadata; determine, in response to the request, whether information associated with the particular content metadata is stored in a local memory; present the particular content metadata for display without contacting a server when the information has been stored in the memory for less than a first amount of time; present the particular content metadata for display and contact a server to obtain new content metadata when the information has been stored in the memory for at least the first amount of time and less than a second amount of time; and contact a server to obtain new content metadata, relating to the particular content metadata, and present the new content metadata for display when the information has been stored in the memory for at least the second amount of time. | 05-03-2012 |
20120124009 | AUTOMATIC EXPIRATION OF DATA IN FILE SYSTEMS UNDER CERTAIN SCENARIOS - A system for ensuring data integrity, comprising a plurality of data servers configured in a GPFS configuration, the plurality of data servers comprising an application server comprising a application server fileset, a home server comprising a home server fileset and a gateway server comprising a gateway fileset, a connection monitor node (CMN) coupled to gateway server; and logic, executed by the CMN, for monitoring a connection between the home server and the application server; and if the connection is disconnected, executing logic for comparing a duration of the connection disconnect to a expiration timeout attribute corresponding to the application server fileset and if the duration exceeds the expiration timeout attribute, notifying the application server to set an expiration status attribute in the application fileset. | 05-17-2012 |
20120136837 | INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING APPARATUS - A first node apparatus included in a distributed data store acquires first operation information and a first timestamp corresponding to target data. The first operation information specifies a first operation to be executed on the target data. The first timestamp indicates a first receipt time of the first operation information. The first node apparatus determines whether the first receipt time is earlier than some of second receipt times on the basis of second timestamps and the acquired first timestamp. The second timestamp indicates the second receipt time of second operation information. The second operation information specifies a second operation executed on the target data. The first node apparatus re-executes the second operations together with the first operation on the target data in the order of the receipt time when it is determined that the first receipt time is earlier than some of the second receipt times. | 05-31-2012 |
20120158669 | DATA RETENTION COMPONENT AND FRAMEWORK - Systems and methods for dynamically managed data retention are described. The system comprises a tiered framework having a plurality of namespaces. The namespaces are configured by a user to have selected data retention attributes. Data including a manifest may be received by the system, processed, and directed to a namespace based upon the manifest. Data storage partitions may be created automatically in association with a namespace, and the data partitions may be assigned partition attributes. Data in a storage partition may be migrated automatically to another namespace based on the partition attributes. Code necessary for creating storage partitions and migrating data is generated by the data management system. | 06-21-2012 |
20120185444 | Clock Monitoring in a Data-Retention Storage System - A clustered storage system includes a machine arranged to check, using its own clock as a current time reference, for expiry of a retention period set for a dataset stored in the system. In order to monitor for any interference with its clock, the expiry-checking machine obtains from other machines of the system, the current times of their clocks, and then derives a value from these times which it compares with a current time value from its own clock; where the difference between these values exceeds a predetermined amount, the expiry-checking machine generates an alert. This monitoring process is carried out repeatedly. | 07-19-2012 |
20120226667 | DETERMINING A STALENESS STATE OF A DISPERSED STORAGE NETWORK LOCAL DIRECTORY - A method begins by a processing module determining a state of a dispersed storage network (DSN) local directory to be an unknown staleness state. When in the unknown staleness state, the method continues with the processing module comparing a local revision level of one of one or more local DSN directory files with a global revision level of a corresponding global DSN directory file. When the local revision level compares unfavorably to the global revision level, the method continues with the processing module updating the state of the DSN local directory to a stale state. When the local revision level compares favorably to the global revision level, the method continues with the processing module updating the state of the DSN local directory to a not-stale state. | 09-06-2012 |
20120254128 | SYSTEM AND METHOD FOR FAST FILE TRACKING AND CHANGE MONITORING - Embodiments are directed towards a dynamic change evaluation mechanism, whereby items having a detected possible change are scheduled for re-evaluation for possible changes at a higher frequency than items detected to not have previously changed, while those items detected as not to have changed are dynamically scheduled for re-evaluation based on an evaluation backlog that may be in turn based, in part, on a time from when an item is assigned an expiration time to when the item is evaluated. In one embodiment, a possibly changed item may be assigned a new expiration time independent of the evaluation backlog. In another embodiment, if no change is detected, then the item may be assigned a new expiration time as a function of a previous expiration time and on the evaluation backlog. | 10-04-2012 |
20120254129 | SYSTEM AND METHOD FOR MANAGING SENSITIVE DATA USING INTELLIGENT MOBILE AGENTS ON A NETWORK - In order to manage stale data on a network of computer systems, a file harvester agent may be configured with a list of stale data files to be deleted. The file harvester agent may be deployed to the computer systems of a network. When executed in a computer system, the file harvester agent searches the file system of the computer system to locate any files or data indicated in the file list. Any located data files are deleted. Once the agent has finished processing the file list on a computer system, the agent can copy or replicate itself to other computer systems of the network in accordance with a pre-configured itinerary. | 10-04-2012 |
20120310900 | Method and System for Managing the Lifetime of Semantically-Identified Data - A method and system for managing the lifetime of semantically-identified data is provided. A graph data structure is maintained in storage of a computing device. The graph data structure has data items and relationships therebetween that are semantically identified. Lifetime information is stored in the storage. The lifetime information describes the period during which at least one of the data items in the graph data structure is valid. | 12-06-2012 |
20130024429 | Multi-Jurisdiction Retention Scheduling For Record Management - A retention schedule is assigned to a record based on classification information associated with the record, wherein the retention schedule is linked to a plurality of jurisdiction triggers. Expiration dates for those jurisdiction triggers that correspond to jurisdiction information associated with the record are determined. A record expiration date for the record is selected from the determined expiration dates. | 01-24-2013 |
20130031060 | METHOD AND APPARATUS FOR CONTENT SYNCHRONIZATION - When requested content is available at a data center, the data center returns the requested content to the data center. When the requested content is locally unavailable at the data center, the requested content is retrieved from an origin server. The retrieval of the content from the origin server may be delayed based on the processing load at the origin server. When retrieval of the content is delayed, the request is prioritized and placed in a queue for handling by the origin server based on the priority of the request. Also, when retrieval of the content is delayed, a status page may be communicated to the browser to inform a user of the delay and provide alternate content and status information related to the request determined as a function of the request or the current state of the origin server. | 01-31-2013 |
20130086001 | AUTOMATIC FILE VERSION VERIFICATION WITHIN ELECTRONIC MAIL - A method can include determining metadata for a file responsive to initiating an operation on the file stored within a client system and determining a storage location within a file repository of a master version of the file from the metadata. The method also can include determining, from the storage location, whether the master version of the file is more recent than the file stored within the client system using a processor of the client system. | 04-04-2013 |
20130091100 | MANAGING AN ALIAS HOST AND DOMAIN NAMES ON A DNS SERVER - Embodiments of the invention provide a method of managing aliases on a server, including deleting unused aliases, while minimizing required administrator interaction. The server may include expirable alias records, containing an expiration value and an inactivity timer. An alias manager component may process the expirable records. If the alias manager component determines a particular record has expired, the alias manager component may delete that record. | 04-11-2013 |
20130097122 | Temporary File Storage System and Method - The present disclosure relates to occasions when a sender wishes to submit a file to a web server or the like with assurance the file will be temporarily posted and then systematically deleted in a secure manner, where it would not be possible for others to recover the file or data associated with the file, such as information that can be used to identify the sender. The disclosure includes, for example, a computerized system for temporarily storing files, including at least one computer. The computer may be configured to receive a file, store the file, allow the file to be accessed over a network, and securely delete the file when a rule defining when the file is to be securely deleted has been satisfied. | 04-18-2013 |
20130110791 | Method and Apparatus for Detecting an Address Update | 05-02-2013 |
20130226878 | SEAMLESS CONTEXT TRANSFERS FOR MOBILE APPLICATIONS - Methods and systems for seamless context transfers include receiving a context object from one or more applications, where the context object including updated context information for a user having an associated timestamp; entering the updated context information into a context information database; determining entries of the context information database for the user having a timestamp older than a predetermined threshold using a processor; purging the determined entries from the context information database; and sending an updated context object to one or more applications that reflects a current state of the context information for the user. | 08-29-2013 |
20130262401 | System and Method for License Reclamation - The present disclosure describes systems and methods for managing and implementing an asset license reclamation program across a network. The status of an asset, such as computer software, is automatically determined and if the asset does not meet particular use criteria, the asset may be flagged for reclamation and/or redeployment, either within the same network segment or in a separate network segment. | 10-03-2013 |
20130275391 | Data Expiry in a Non-Volatile Device - Apparatuses, systems, and methods are disclosed for data expiry. A method includes examining metadata associated with data in a non-volatile recording medium. A method includes expiring data from a non-volatile recording medium in response to metadata indicating that an expiration period for the data has been satisfied. | 10-17-2013 |
20140059012 | Management of Database Deployment - Apparatuses, computer readable media, methods, and systems are described for provisioning of databases, which may include processing a request to generate a database, wherein the request comprises a database parameter; determining a lease term for the database; generating the database based on the database parameter; and communicating a notification containing information regarding the database and the lease term. | 02-27-2014 |
20140074798 | PRO-ACTIVE SELF-HEALING IN A DISTRIBUTED FILE SYSTEM - A first storage server identifies a second storage server connecting to a cluster of storage servers in a file system. The first storage server locates a file in a replication directory hierarchy in the second storage server. The file has not been accessed by a client application. The first storage server determines, prior to the file being accessed by the client application, that the file on the second storage server has stale data and overwrites the stale data in the file on the second storage server with current data. | 03-13-2014 |
20140074799 | PRO-ACTIVE SELF-HEALING IN A DISTRIBUTED FILE SYSTEM - A first server identifies a second server connecting to a cluster of servers in a file system. The first server examines a file in a replication directory hierarchy in the second server. The file has not been accessed by a client application. The first server determines, prior to the file being accessed by the client application that the file on the second server has stale data and overwrites the stale data in the file on the second server with current data. | 03-13-2014 |
20140089269 | EFFICIENT FILE RECLAMATION IN DEDUPLICATING VIRTUAL MEDIA - Expired files in the deduplicating virtual media are selectively erased using a backup application for notifying a backup repository of which expired files are no longer required. The space of the expired files is reclaimed for reuse. Virtual space of the expired files is reserved for allowing the backup application to seek past the reclaimed space to subsequent data in the deduplicating virtual media. | 03-27-2014 |
20140136488 | System and Method for Fast File Tracking and Change Monitoring - Embodiments are directed towards a dynamic change evaluation mechanism, whereby items having a detected possible change are scheduled for re-evaluation for possible changes at a higher frequency than items detected to not have previously changed, while those items detected as not to have changed are dynamically scheduled for re-evaluation based on an evaluation backlog that may be in turn based, in part, on a time from when an item is assigned an expiration time to when the item is evaluated. In one embodiment, a possibly changed item may be assigned a new expiration time independent of the evaluation backlog. In another embodiment, if no change is detected, then the item may be assigned a new expiration time as a function of a previous expiration time and on the evaluation backlog. | 05-15-2014 |
20140188814 | PER-USER AGGREGATION OF DATABASE CONTENT - A method for providing per-user aggregation of content accessible via a personalized user site may generally include receiving a request for metadata and determining whether the requested metadata is expired. The method may further include returning at least a portion of queried metadata prior to verifying whether the metadata is expired. The method may then include querying a change log for metadata modifications. The method may further include, if metadata has been modified since a previous query, sending a query to a community site for metadata that meets change criteria. The method may also include receiving the changed metadata and returning the changed metadata to a content group container within the personalized user site. | 07-03-2014 |
20140188815 | Annotation of Resources in a Distributed Execution Environment - A distributed execution environment includes various resources, such as instances of computing resources, hardware resources, software resources, and others. A resource state viewing tool executing in conjunction with the distributed execution environment provides access to data regarding the state of each resource in the form of a resource page associated with the resource. The resource page for a resource might also include one or more annotations assigned to the resource by a user or by a component within the distributed execution environment. The annotations might have associated expiration data, such as an expiration time or event, which may be utilized to expire the annotations. The annotations might also have a namespace assigned thereto that is utilized when responding to requests to retrieve the annotations. The annotations might also have permissions assigned thereto that identify the rights of one or more users and/or components to read, modify, or delete the annotations. | 07-03-2014 |
20140207741 | DATA RETENTION COMPONENT AND FRAMEWORK - Systems and methods for dynamically managed data retention are described. The system comprises a tiered framework having a plurality of namespaces. The namespaces are configured by a user to have selected data retention attributes. Data including a manifest may be received by the system, processed, and directed to a namespace based upon the manifest. Data storage partitions may be created automatically in association with a namespace, and the data partitions may be assigned partition attributes. Data in a storage partition may be migrated automatically to another namespace based on the partition attributes. Code necessary for creating storage partitions and migrating data is generated by the data management system. | 07-24-2014 |
20140244595 | CONTEXT-AWARE TAGGING FOR AUGMENTED REALITY ENVIRONMENTS - A method for tag-based search includes capturing an image, extracting a tag from the image, identifying a location associated with the captured image, and querying stored content for information that matches the location and the tag. Local storage is checked for the information first, and remote storage may be checked subsequently. Any located information may be used to augment the image. Information located in the remote storage may be saved in the local storage until it reaches a certain age, until it fails to be accessed for a threshold period of time, or until the location moves outside a threshold radius associated with a location of the information located in the remote storage. | 08-28-2014 |
20140244596 | CONTEXT-AWARE TAGGING FOR AUGMENTED REALITY ENVIRONMENTS - A method for tag-based search includes capturing an image, extracting a tag from the image, identifying a location associated with the captured image, and querying stored content for information that matches the location and the tag. Local storage is checked for the information first, and remote storage may be checked subsequently. Any located information may be used to augment the image. Information located in the remote storage may be saved in the local storage until it reaches a certain age, until it fails to be accessed for a threshold period of time, or until the location moves outside a threshold radius associated with a location of the information located in the remote storage. | 08-28-2014 |
20140279937 | ELECTRONIC DOCUMENT CLASSIFICATION - An electronic document classification system disclosed herein classifies electronic documents. The classification of the documents may involve analyzing the document and the information attached to the document to generate a set of classification data and comparing the classification data with one or more classification rules to generate a set of classifying data. The system attaches the set of classifying data to the electronic document and displays the electronic document based on the set of classifying data. The classification data may also be used to prioritize the electronic documents and to assign a retention period to the electronic documents. The system is further adapted to receive user feedback regarding the classification of the electronic document and to update the classification rules. | 09-18-2014 |
20140324785 | EFFICIENT READ REPLICAS - A database system may receive a write request that specifies a modification to be made to a particular data record stored by the database system. A log record representing the modification to be made to the particular data record may be sent to a storage service of the database system. An indication (e.g., log record or other indication) that indicates a cached version of the particular data record stored in a read replica's cache is stale may be sent to a read replica. For a subsequent read of the particular data record received by the read replica, the read replica may request the particular data record from the storage service. | 10-30-2014 |
20140351224 | Making Publisher Content Available to Specific Users - Disclosed are various embodiments for making publisher content available to specific users. A directory describing media items that are remotely stored is presented via a user interface. Selection information corresponding to a particular media item is received via the user interface. The media item is requested and received from another computing device. Consumption data is collected during consumption of the media item. The consumption data is sent to another computing device. | 11-27-2014 |
20140351225 | ALTERNATE DATA STREAM CACHE FOR FILE CLASSIFICATION - Described is caching classification-related metadata for a file in an alternate data stream of that file. When a file is classified (e.g., for data management), the classification properties are cached in association with the file, along with classification-related metadata that indicates the state of the file at the time of caching. The classification-related metadata in the alternate data stream is then useable in determining whether the classification properties are valid and up-to-date when next accessed, or whether the file needs to be reclassified. If the properties are valid and up-to-date, they may be used without requiring the computationally costly steps of reclassification. Also described is using more than one alternate data stream for the cache, and extending the classification-related metadata through a defined extension mechanism. | 11-27-2014 |
20140372385 | DYNAMIC SOCIAL NETWORK RELATIONSHIP DETERMINATION METHOD AND APPARATUS - A method for a computer system includes receiving an identifier from a user, initiating a user session in response to the identifier, determining a social map for the user in response to the identifier and in response to a plurality of social network relationships, receiving a first change to the plurality of social network relationships from the user, receiving a second change to the plurality of network relationships from another user, determining a revised social map for the user during the user session in response to receiving the first change, but not in response to receiving the second change, wherein the revised social map for the user reflects the first change and the second change, and storing the revised social map for the user during the user session in a cache. | 12-18-2014 |
20150074062 | CAPTURING CHANGE DATA OF DEFERRED UPDATES - The capturing of change data of deferred updates begins with the receipt of an update request call for one or more changes to a database. A processing of the update request call is deferred until a commit point is issued, where call information associated with the update request call is determined, and the call information is stored and associated with the update request call. During a processing of the commit point, data information for the one or more changes to the database is determined. The data information for the one or more changes is combined with the stored call information associated with the update request call. | 03-12-2015 |
20150088834 | Method For Using Tags To Manage Client Software Across a Life Cycle - A computer-implemented method for using tags to manage software across a product life cycle, including storing by a server computer (i) a tag prototype database and (ii) a tag instance database, the method including the steps of creating a tag for a client software component, storing the tag in the tag instance database, receiving, by a client computer, the tag and the client software component, from an electronic software distribution computer, receiving a request from the client computer to initiate a session of the client software component, obtaining the tag, by the server computer, from the client computer, verifying the tag obtained from the client computer, updating the tag to include information about the session, and replacing the tag in the client computer with the updated tag. | 03-26-2015 |
20150134621 | SWAT COMMAND AND API FOR ATOMIC SWAP AND TRIM OF LBAS - Exemplary embodiments provide access to an updated file performed by a computer having at least one processor, wherein responsive to an application receiving an update comprising modified content of an old file, a new file is created into which the modified content is copied, while access to the old file is maintained, wherein old file logical block addresses (LBAs) are mapped to old file physical block addresses (PBAs), and new file LBAs are mapped to new file PBAs, the method, comprising: automatically swapping the mapping of the old file LBAs from the old file PBAs to the new file PBAs; trimming the mapping of the old file LBAs to the old file PBAs; and clearing the mapping of the new file LBAs to the new file PBAs. | 05-14-2015 |
20150302041 | MANAGEMENT OF A MESSAGE STORE - A method for managing a message store transmitted via a communication network. The method is implemented by a messaging server, and comprises the following steps: upon receiving a command for the expiry of a message intended for being received by a destination terminal of said message, detecting whether or not the terminal is connected to the messaging server, and according to said detection, optionally assigning an expiring message status to said message. | 10-22-2015 |
20150331881 | MANAGING MESSAGES BASED ON EXPIRATION DATES - Messages can be managed based on expiration dates. For instance, a message having an expiration date can be removed from the recipient's inbox until the expiration date becomes imminent, automatically restored to the inbox when the expiration date becomes imminent, and automatically expired from the inbox (e.g., by deleting the message) after the expiration date has passed. Expirable messages can be identified based on user input and/or automatic extraction of expiration-date information from the message. Visual indicators can be used to distinguish a message whose expiration date is imminent from other messages in the inbox. | 11-19-2015 |
20150339340 | METHODS AND APPARATUS FOR CONTROLLED REMOVAL OF CONTENT FROM A DISTRIBUTED NETWORK - Described herein are techniques for managing content stored on a distributed network. Content is initially placed onto the network and populated across one or more nodes. The content is distributed in association with decay parameters that define a lifetime for the population of the content on the network. Various communication nodes of the distributed network are configured to process the content decay parameters to determine whether to delete the content during subsequent time periods. | 11-26-2015 |
20150363457 | DEDUPLICATING STORAGE WITH ENHANCED FREQUENT-BLOCK DETECTION - Detecting data duplication includes maintaining a fingerprint directory including one or more entries. Each entry includes a data fingerprint and a data location for a data chunk. A shadow list including a record of fingerprint values not contained in the fingerprint directory is maintained. Each entry is associated with a seen-count attribute, which is an indication of how often a data fingerprint has been seen in arriving data chunks to be written in a storage system, and distinguishes multiply-seen entries for data fingerprints present in at least two data chunks from once-seen entries for data fingerprints present in no more than a single data chunk. Each entry retrieved from the shadow list relates to twice-seen fingerprints. | 12-17-2015 |
20150370846 | DELETION WORKFLOW THAT PRESERVES DATA INTEGRITY OF A RECORDS MANAGEMENT SYSTEM - Embodiments presented herein provide techniques for preserving data integrity of a records management deletion workflow. According to one embodiment, a records management system identifies a set of records subject to a document retention policy. The set of records includes electronic records and physical records. The records management system generates a disposal report listing the records and information associated with the records. The disposal report is associated with an identifier. The records management system performs a deletion workflow to remove the records listed in the report. After the records are removed, physical media corresponding to the deleted physical records are destroyed. | 12-24-2015 |
20150379065 | DATABASE SERVER STORING PLURALITY OF VERSIONS OF DATA, AND DATABASE MANAGEMENT METHOD - A database server includes a database capable of storing multi-version data with respect to various time-series data, and a database management server that manages the database. The database management server includes search means capable of designating a merge policy defining a policy whether mixing of the multi-version data is acceptable in addition to a search condition of the database. The search means generates a result of merging of the multi-version data in the time range contained in the search condition as the data acquisition history so as to be recorded in the database. | 12-31-2015 |
20160012099 | AGE-BASED POLICIES FOR DETERMINING DATABASE CACHE HITS | 01-14-2016 |
20160055167 | Composite Execution of Rename Operations in Wide Area File Systems - Methods, apparatuses, and systems directed to improving shared file access in wide area network file systems. In a particular implementation, one or more elements of a wide area file system cooperate to keep an original file intact on a remote file server until a new copy of the same file is completely flushed to the remote file server. In a particular implementation, rename operations identifying a source and a target in connection with application-level save operations are executed as two composite operations including creation of the target, and a delayed deletion of the source. The delay after which the source is deleted can be configured to be just large enough so that the application save operation on a local cache can be completed. | 02-25-2016 |
20160078095 | LOCATION-BASED UPDATING OF PROFILE DATA - A method of updating user profile data involves at least one processor receiving from a mobile device a user identifier and first current position data associated with a first current location of the mobile device. The processor(s) queries a search index with the identifier for a profile associated with the user identifier, determines from the first current position data that the mobile device is outside a default location defined in the profile, and incorporates into the search index profile data in association with first current location information derived from the first current position data. The processor(s) receive(s) from the mobile device the user identifier and second current position data associated with a second current location of the mobile device, determines from the second current position data that the device is within the default location, and removes from the search index the first current location information associated with the profile data. | 03-17-2016 |
20160085766 | COMPACTING DATA BASED ON DATA CONTENT - An example method for data compaction is disclosed in accordance with an aspect of the present disclosure. The method may include receiving, at a computing device, data files associated with an account. The method may also include determining, by the computing device, whether the account has expired. The method may also include, in response to determining that the account has expired, compacting, by the computing device, the data files associated with the account based on the content of the data files. | 03-24-2016 |
20160110451 | SYSTEM AND METHOD FOR AGGREGATING ARTIST-SPECIFIC CONTENT - A system and method is provided that facilitate artist-specified dynamic albums that include music that may be changed with or without intervention by a user at a user device at which a dynamic album has been stored, according to an implementation of the invention. A dynamic album may include a set of songs provided through an artist specific application installed at a user device. The system may modify the dynamic album based on one or more album parameters that specify a change to be made to the set of songs. For example, the one or more album parameters specify the removal of one or more songs from the dynamic album, the addition of one or more new songs, the replacement of one or more songs, a rearrangement of (e.g., shuffling) the order of one or more songs, and/or other change to the set of songs. | 04-21-2016 |
20160124974 | ACCESS CONTROL BASED ON OPERATION EXPIRY DATA - The controlling of access to a file system entity based on location of the requestor and operation expiry data of the file system entity. Operation expiry data and location data are associated with a file system entity (e.g., a file, a directory, a partition, or a disk) such that the file system entity and the operation expiry data and the location data are moved or copied atomically together. Upon receiving a request to perform an operation on the file system entity, the system identifies a location status of the requestor. The system then identifies expiry data that corresponds to the location status, and that is associated with the requested operation. The system then uses the identified expiry data to determine whether or not the requested file operation is to be permitted. | 05-05-2016 |
20160132502 | PRE-CACHING OF RELATIONAL DATABASE MANAGEMENT SYSTEM BASED ON DATA RETRIEVAL PATTERNS - A processor tracks a frequency of access requests of a first index corresponding to a first data page of a plurality of data pages stored in a database. The processor determines the first index corresponding to the first data page having a frequency of access requests that exceeds a configurable target, and the processor retains, with preference, the first data page that corresponds to the first index, within the cache memory. | 05-12-2016 |
20160188717 | NETWORK CRAWLING PRIORITIZATION - In some embodiments, an entry management module may receive a set of entries, each entry of the set of entries including a time-stamp value and a path identifier to a data object having content that may be changed. An entry selection module may select a first entry from the set of entries based on a first time-stamp value of the first entry, the first time-stamp value identifying a first time being no later than other times identified by time-stamp values of other entries. A crawler module may retrieve first content from a first data object using a first path identifier of the first entry. A freshness module may calculate a first updated timestamp value using a first freshness value, the first freshness value indicating a priority to retrieve possibly changed content from the first data object, the first updated time-stamp value replacing the first time-stamp value. | 06-30-2016 |
20160196296 | METHODS AND APPARATUS FOR DELETING A PLURALITY OF DOCUMENTS ASSOCIATED WITH AN ELECTRONIC DOCUMENT REVIEW APPLICATION | 07-07-2016 |