Entries |
Document | Title | Date |
20100082557 | SYSTEM AND METHOD FOR ENABLING COMMUNICATION SESSIONS IN A NETWORK ENVIRONMENT - A method is provided in one example implementation and the method includes receiving a query for a policy (e.g., a multi-media session) that pertains to a selected one of first and second endpoints. Each endpoint interfaces with their respective session initiation protocol entity, which interacts with a session border controller (SBC). The method further includes negotiating credentials via a policy element and a selected SBC and determining, via a selected policy within the policy element, whether a requested communication session is prohibited or conducted between the endpoints. In more specific embodiments, each SBC makes a mapping between signaling entity information and pre-configured SBC virtual private network (VPN) information used for dynamic configuration of the communication session, and wherein a SIP [or other communication protocol] adjacency configuration is created, where adjacency characteristics are defined for each enterprise in which the endpoints reside. | 04-01-2010 |
20100082558 | POLICY-BASED SHARING OF REDUNDANT DATA ACROSS STORAGE POOLS IN A DEDUPLICATING SYSTEM - One aspect of the present invention includes enabling data chunks to be shared among different storage pools within a storage management system, according the use of deduplication and storage information kept at the system level, and applied with policy-based rules that define the scope of deduplication. In one embodiment, the parameters of performing deduplication are defined within the policy, particularly which of the plurality of storage pools allow deduplication to which other pools. Accordingly, a data object may be linked to deduplicated data chunks existent within other storage pools, and the transfer of a data object may occur by simply creating references to existing data chunks in other pools provided the policy allows the pool to reference chunks in these other pools. Additionally, a group of storage pools may be defined within the policy to perform a common set of deduplication activities across all pools within the group. | 04-01-2010 |
20100088288 | Apparatus and Method for Resolving Security Association Database Update Coherency in High-Speed Systems Having Multiple Security Channels - An apparatus and method for updating security association database entries in a system having multiple security channels by selectively granting access to the entries by a plurality of the multiple security channels that may need to update the same entry using a first-come, first-served scheme. The apparatus includes a controller circuit that functions to carry out the method which, for each of the multiple security channels, includes determining whether another of the security channels has a higher priority to access a particular security association database entry. If no other channel has a higher priority, then the channel requesting access to the entry retrieves it from its address location, modifies it, and writes the modified entry back to its address location. The controller prevents other channels from simultaneously, or substantially simultaneously, retrieving and modifying the same entry. | 04-08-2010 |
20100094814 | Assessment Generation Using the Semantic Web - This invention is a method of generating an assessment items. It comprises configuring an assessment generation engine running on a database or an information network such as the Web to produce when a topic is specified a) an incomplete statement or a question about said topic, which are called the semantic context; and b) a right answer and at least one wrong answer, each answer in a form suitable to complete the incomplete statement or to answer the question; The method also comprises operating the assessment generation engine to produce an assessment item comprising the semantic context, the true answer and the wrong answers. The method yet comprises producing the assessment item in a material form configured to be administered to an assessment taker. | 04-15-2010 |
20100106693 | IMAGE APPLIANCE SYSTEM AND METHOD - Systems (and corresponding methodologies) that provide an image appliance which alleviates enterprises from custom designing each appliance for specific business processing purposes are disclosed. Enterprises and organizations can easily capture, consolidate, organize and process image files and electronic documents/content from a variety of input sources such as facsimile, electronic mail, multi-function printer devices (MFDs), desktop files, etc. without a need to custom code specific appliances. | 04-29-2010 |
20100106694 | METHOD FOR AUTONOMIC LARGE FILE MARKING - A method is disclosed for autonomic large file marking. A threshold module sets the file size threshold. An identification module identifies each file with a file size that exceeds the file size threshold and that is unmarked with a limited backup status. A marking module marks with the limited backup status each identified file that satisfies a marking policy and exceeds the file size threshold and is unmarked for the limited backup status. Each file marked with the limited backup status is backed up with a single backup instance of the file and excluded from subsequent backup operations. | 04-29-2010 |
20100121827 | CIM DATA QUARANTINE - One aspect of the present invention includes performing a quarantine of inaccessible data within a CIM dataset that is managed by a storage service, and a recovery of this data within the CIM dataset once it becomes accessible. In one embodiment, after a first request is made through a CIM agent to the inaccessible data managed by a storage service, the storage service is quarantined within the CIM dataset. This includes terminating any active threads to the service and preventing new threads from accessing the service. Accordingly, the data is hidden from subsequent requests with the CIM agent and any requests to the inaccessible data are prevented. The storage service is then queried so that when the data becomes accessible, the device services for the storage service are restarted. Once restarted, new threads within the CIM agent are able to access the data within the storage service. | 05-13-2010 |
20100121828 | RESOURCE CONSTRAINT AWARE NETWORK FILE SYSTEM - A system and method for presenting a uniform file system interface for accessing multiple storage devices where at least one of the storage devices has some resource constraints. The system includes an intermediary device abstracting the individual storage devices and aggregating the storage available on each device into a single volume while accounting for each individual storage device's resource constraints. | 05-13-2010 |
20100131477 | VERSIONING FILE SYSTEM - An apparatus and a method for versioning a file of a file system is described. A versioning module stores multiple versions of the file. The file is opened for write access. The versioning module identifies an file mapping structure of a block associated with the file, copies the content of the file mapping structure of the file to a new file mapping structure of the file, and allocates a new block to the file as represented by the file mapping structure. | 05-27-2010 |
20100145917 | SYSTEM, METHOD AND APPARATUS FOR ENTERPRISE POLICY MANAGEMENT - Disclosed are systems, methods and apparatuses for managing objects (files and directories) in network file systems according to policies. Each policy may have one or more rules, each of which ties a condition to an action. Each condition can be expressed in terms of metadata harvested across file systems and stored in a metadata repository. The actions are user-programmable. Users can apply and/or enforce a policy by manipulating the metadata stored in the metadata repository. For example, suppose a policy prohibits storing MP3 files in corporate storage, a user can specify a rule that ties the condition “no MP3 files in volumes A-Z” to an action “delete MP3 files from volumes A-Z.” A file management application may apply a filter to the metadata repository to produce metadata records having values that meet the specified condition and take the corresponding action on managed objects associated with those metadata records. | 06-10-2010 |
20100153350 | METHODS AND SYSTEMS FOR VALIDATING ACCESSIBILITY AND CURRENCY OF REPLICATED DATA - Systems and processes for determining and validating accessibility and currency, i.e., the actual status, of data replicated in a networked environment are disclosed. According to the disclosed process, a replicated-data policy for replicating data is defined, and access paths between network devices or between applications running on the network devices are monitored, for example, by a replicated-data monitor. Also monitored are the data replication activities in the network. The currency, i.e., timeliness, and accessibility of a replica by a network device is then compared with the requirements in the replicated-data policy and discrepancies with the replicated-data policy are identified, optionally accompanied by a notification. | 06-17-2010 |
20100174689 | DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT SYSTEM, DOCUMENT MANAGEMENT METHOD, AND COMPUTER PROGRAM - A folder or a file managed in a document management apparatus includes a document with a high confidentiality or personal information, on which only a specific user has an access right. These are frequently stored in a personal folder, and there is a problem that the file or the like within the personal folder cannot be accessed at all when a user account has been deleted because of user's transfer or the like. When a user account has been deleted, the file, on which a user, the user account of whom has been deleted, has the access right, is encrypted and stored in a common area. The user is informed of a guest account for accessing the common area, a password for decrypting the encrypted file and the like. The former user can obtain the file by logging-in to the document management apparatus using the guest account. | 07-08-2010 |
20100179945 | Normalization Engine to Manage Configuration Management Database Integrity - Data is often populated into Configuration Management Databases (CMDBs) from different sources. Because the data can come from a variety of sources, it may have inconsistencies—and may even be incomplete. A Normalization Engine (NE) may be able to automatically clean up the incoming data based on certain rules and knowledge. In one embodiment, the NE takes each Configuration Item (CI) or group of CIs that are to be normalized and applies a rule or a set of rules to see if the data may be cleaned up, and, if so, updates the CI or group of CIs accordingly. In particular, one embodiment may allow for the CI's data to be normalized by doing a look up against a Product Catalog and/or an Alias Catalog. In another embodiment, the NE architecture could be fully extensible, allowing for the creation of custom, rules-based plug-ins by users and/or third parties. | 07-15-2010 |
20100205159 | SYSTEM AND METHOD FOR MANAGING DATA - A system and method for managing data are presented herein. The system includes a plurality of data sets, a plurality of data access policies, and a policy enforcer. The plurality of data sets can be stored in a data store on a server. The data access policies can each be associated with a single data set and can be captured in a workflow template and encapsulated with the data set. At least one of the data policies can use human evaluation. The policy enforcer can be configured to receive requests for data, to interpret the associated data policy, and to comply with the human evaluation of the data policies by spawning a child workflow defined in the data policy to initiate the human evaluation across a network. | 08-12-2010 |
20100235334 | TIME IN DATABASES AND APPLICATIONS OF DATABASES - A database having data entries with attributes having values that can vary over system time (the time according to a computer clock) and also over valid time (the start time and end time of an interval during which the values of the attributes are true). All logical operations of updates and deletes of values are performed by insert operations that insert new entries into the database, so that all old entries that were present at previous systems still exist and still include their previously-assigned start times and end times for the value of the attribute. | 09-16-2010 |
20100268696 | Advanced Warning - The present invention is directed to a system, method and server to assist account issuers in managing risk, fraud and unauthorized use. A system, method and server for use in pushing advanced warning alerts to issuers based on consumer data element level triggering events and fraud and unauthorized use reports is disclosed. The ability to the push the alerts to issuers with a permissible purpose for receiving the information in the alerts provides a real-time, online and cost effective way of providing issuers with valuable risk management tools. | 10-21-2010 |
20100268697 | SYSTEMS AND METHODS FOR USING MULTIPLE HYPOTHESES IN A VISUAL SIMULTANEOUS LOCALIZATION AND MAPPING SYSTEM - The invention is related to methods and apparatus that use a visual sensor and dead reckoning sensors to process Simultaneous Localization and Mapping (SLAM). These techniques can be used in robot navigation. Advantageously, such visual techniques can be used to autonomously generate and update a map. Unlike with laser rangefinders, the visual techniques are economically practical in a wide range of applications and can be used in relatively dynamic environments, such as environments in which people move. One embodiment further advantageously uses multiple particles to maintain multiple hypotheses with respect to localization and mapping. Further advantageously, one embodiment maintains the particles in a relatively computationally-efficient manner, thereby permitting the SLAM processes to be performed in software using relatively inexpensive microprocessor-based computer systems. | 10-21-2010 |
20100318501 | METHODS AND SYSTEMS FOR RULE-BASED WORM ENFORCEMENT - Systems and methods for storing and accessing data on a removable media having a changeable data set and an immutable data set. In one embodiment, a system can comprise a removable media storage system adapted to determine whether a host system running one or more applications is configured to enforce Write Once Read Many (WORM) policies. The host system can be communicatively coupled with the removable media storage system and configured to execute instructions causing the host system to determine whether to allow or deny a request to access data on the removable media. The host system can use rules to determine if an access request is to access data of a changeable data set or a immutable data set. If the request is to access data of the changeable data set, access is allowed. If the request is to access data of the immutable data set, reads are allowed, as well as writes of new data. Access requests to rename, delete, and/or write to existing data of the immutable data set are denied. | 12-16-2010 |
20110010348 | RULE-BASED RECORD PROFILES TO AUTOMATE RECORD DECLARATION OF ELECTRONIC DOCUMENTS - According to one embodiment of the present invention, a method for automatic record declaration is provided. The method includes providing a plurality of record profiles including information that uniquely defines how a new record is to be declared. A plurality of mapping definitions are provided including a set of rules to select a particular record profile, each mapping definition being associated with only one document class. A new document is received and the set of rules applied to the new document until a matching record profile is found. The matching record profile is used to declare a new record for the new document. | 01-13-2011 |
20110029493 | Generic Method To Build Catalogs For Change Management - A generic catalog build process which takes information and combines and displays the information in a number of ways, such that the process allows incorporation of a plurality of different builds in an organized and extensible way. Such a generic catalog build process advantageously lowers maintenance cost and development cost of for generating catalogs. | 02-03-2011 |
20110029494 | Techniques for determining an implemented data protection policy - Described are techniques for determining an implemented data protection policy. One or more recovery points corresponding to each of one or more storage objects are determined. A data protection method determined in accordance with a facility and replication type associated with said each recovery point is selected for each of said one or more recovery points. A data protection category for each of said one or more recovery points is determined in accordance with said data protection method, a recovery point type, and a recovery point location associated with said each recovery point. A data protection policy indicating an implemented data protection policy for each of said one or more storage objects for at least one data protection category is stored. | 02-03-2011 |
20110040736 | Personal Data Platform - Receive a plurality of data management policies from a user. Store in a memory the data management policies in association with a context and an identifier of the user. Receive personal data of the user collected in one or more contexts by one or more collection devices. Determine whether the personal data complies with one or more of the data management policies with respect to collecting personal data of the user. If the personal data complies with the data management policies with respect to collecting personal data on the user, then storing in the memory the personal data in association with the identifier of the user. Provide a centralized interface to the user for managing the personal data stored in the memory. | 02-17-2011 |
20110047131 | MEDIA PLAYBACK METHOD FOR A PORTABLE DEVICE AND PORTABLE DEVICE THEREOF - Before a portable device playbacks the media files or during the playback of one media file, a rule of generating a playlist is selected first by operating a user's interface of the portable device or by the portable device's default setting. The playlist including some multiple media files is then generated according to an anchor file and the selected rule. A rule for how to play the media files in the playlist is selected (or by system's default setting if not selected) to decide the playing sequence of the media files in the playlist from the anchor file. | 02-24-2011 |
20110047132 | CONSISTENT RETENTION AND DISPOSITION OF MANAGED CONTENT AND ASSOCIATED METADATA - Consistent retention and disposition of managed content and associated metadata is disclosed. An indication that a retention policy is to be applied to a selected item of content comprising a body of managed content is received. The selected item of content and its associated metadata are retained automatically in parallel in accordance with the retention policy. | 02-24-2011 |
20110055175 | SYSTEM, METHOD, AND APPARATUS FOR MANAGEMENT OF MEDIA OBJECTS - A computer program product that includes a computer useable storage medium to store a computer readable program for tracking media object data that, when executed on a computer, causes the computer to perform operations. The operations include storing usage data for a media object which is used in a first message. The usage data indicates historical usage of the media object by a user. The operations also include recalling the stored usage data for the media object in response to associating the media object with a second message. The operations also include communicating to the user the stored usage data corresponding to the media object prior to sending the second message with the media object to a recipient. | 03-03-2011 |
20110055176 | MEDIA MEDIATOR SYSTEM AND METHOD FOR MANAGING CONTENTS OF VARIOUS FORMATS - Provided is a system and method that may encode various formats of contents to a single format and thereby manage the contents, and may transform the contents to a format corresponding to a request of a third party or an end user to distribute the content. A media mediator system of managing various formats of contents may include: a service manager to receive a content and metadata of the content from a content provider; a metadata manager to register the content using the metadata, and to store the metadata of the registered content; a database manager to store and manage information associated with the content; and an encoding manager to schedule an encoding sequence of the content, and to sequentially encode the content based on a scheduling result. | 03-03-2011 |
20110071992 | ATTRIBUTE RULE ENFORCER FOR A DIRECTORY - An attribute rule enforcer evaluates the attributes of a call to add, modify, or delete information in a directory, such as a lightweight directory access protocol (LDAP) directory. The attribute rule enforcer determines if the attributes of the call comply with predetermined rules governing the directory's content. The directory attribute rule enforcer may be located at the front end of the directory's access server, and intercepts calls to the directory access server. If the directory attribute rule enforcer determines that the attributes of a call complies with the rules governing the content of the directory, it will forward the call to the directory's access server for action. If, on the other hand, the directory attribute rule enforcer determines that the attributes of a call do not comply with the rules governing the content of the directory, the attribute rule enforcer will reject the call. Further, it may forward an appropriate error message to the source of the call. | 03-24-2011 |
20110078125 | METHOD AND DEVICE FOR CONTENT PERSONALISATION USING FILE REPAIR REQUESTS - The invention relates to a method for generating a personalized content file for a user entity using a file repair request for identifying a user. The file repair request is initiated by generating a preliminary file that is transmitted to the user entity, the preliminary file containing a predetermined placeholder. The preliminary file is transmitted to the user entity, the user entity starting the file repair request. The personalized content file is generated by replacing the predetermined placeholder in the preliminary file by a personalized content. | 03-31-2011 |
20110087641 | SYSTEM FOR PROCESSING AND USING ELECTRONIC DOCUMENTS - The illustrative embodiments provide a system and method for processing a document. A data storage unit is provided to store data corresponding to the document, several documents processed at a previous time, and a set of rules. A rule in the set of rules may include a rule identifier, a directive to proceed to a second rule based on a condition, a specification of a data component, the specification configured to include a data component identifier, a data component attribute, and a directive to proceed to a second specification of a second data component based on a second condition. A rules-based engine is provided that may communicate with the data storage unit and may execute a rule in the set of rules. The set of rules may include rules for parsing, validating, identifying, relating, selecting, extracting, transforming, generating, analyzing, error correcting, reporting, and sending. | 04-14-2011 |
20110106773 | System and Method to Manage Electronic Data Related to a Legal Matter - A method includes receiving input at an online electronic data discovery system from a source device via a private network. The input indicates that data related to a legal matter is to be preserved, and identifies a custodian associated with the data. The method includes automatically accessing a directory via the private network and receiving information from the directory indicating a location of the identified custodian. The method includes sending a preservation notice to the identified custodian when the information received from the directory indicates that the custodian is accessible via the private network. The preservation notice indicates that data related to the legal matter is not to be discarded. The method includes sending the preservation notice to another custodian when the information received from the directory indicates that the identified custodian is not accessible. | 05-05-2011 |
20110137876 | DATA QUALITY ENHANCEMENT FOR SMART GRID APPLICATIONS - A method, in one embodiment, can include encoding knowledge about a topic domain into a data modeling technique. Additionally, a set of candidate conditional functional dependencies can be generated based on a data set of the topic domain. Moreover, the set of candidate conditional functional dependencies and the data modeling technique encoded with the topic domain knowledge can be applied to the data set to obtain a plurality of data quality rules for the data set. | 06-09-2011 |
20110137877 | APPARATUS AND METHOD FOR CREATING AND MANAGING PERSONALIZED SERVICES IN COMMUNICATION SYSTEM - An apparatus for creating and managing personalized services includes: a pre-processing unit for converting vendor- and device-specific sensor data into a normalized form; an analysis unit for determining a current state of entities being managed based on the normalized sensor data to thereby determine whether current services and/or resources that have been allocated to a user are being satisfied or not; and a personalization unit for examining state-related context data to determine what action to take. The personalization of the services and/or resources provided to a user or set of users is managed by context-sensitive policy rules. In addition, a set of abstractions, in the form of preferences, profiles, and subscriptions, are collectively used to determine the set of services and/or resources, as a function of context, that a user or set of users are entitled to receive. | 06-09-2011 |
20110145208 | POLICY DRIVEN DISTRIBUTED DATA RESILIENCY - A data resiliency layer provides manageable data resiliency policy options for email related applications. Through one or more APIs such applications are enabled to query whether a data resiliency policy is satisfied for a given mailbox or database at a given point in time. Email related applications may consume this information to modify their behavior such as to wait, repeat, or fail the actions at hand to the point where data committal is guaranteed to a degree specified by the data resiliency policy. | 06-16-2011 |
20110153578 | Method And Apparatus For Propagation Of File Plans From Enterprise Retention Management Applications To Records Management Systems - Integration between Enterprise Records Management systems (ERMs) and Records Management Systems (RMSs) is provided, thus providing a robust record classification and retention schedule enforcement process in large enterprises. Typically, ERMs have been designed from the ground up to be highly scalable across multiple national and regional jurisdictions, whereas RMS's were primarily departmental. Proper integration between ERMs and RMSs, as provided by the invention, allows corporations to deploy larger scale multi-organizational instances of RMSs, thus achieving a better level of control and significant economies of scale. | 06-23-2011 |
20110153579 | Method and Apparatus for Policy Distribution - A computer apparatus and computer implemented method for policy distribution provides a Records Management System (RMS) that is configured for setting up and maintaining local record classification and disposition policies. An Enterprise Retention Management (ERM) application comprises a centralized workflow configured for managing retention policies for an entity. An application layer in the ERM comprises a propagation workflow that is configured for managing retention policy integration between the ERM and the RMS. The propagation workflow thus provides automated retention policy propagation from the ERM to the RMS. | 06-23-2011 |
20110161304 | DEPLOYMENT AND COMPLIANCE MANAGER - A system includes a first database configured to store agreement information corresponding to terms of an agreement between a service provider and a third party. A second database is configured to store records related to the agreement. A computing device is configured to compare the records to the agreement information to determine whether the service provider is in compliance with the terms of the agreement. | 06-30-2011 |
20110178997 | METHOD AND SYSTEM FOR ATTRIBUTE ENCAPSULATED DATA RESOLUTION AND TRANSCODING - A computer readable medium having software instructions that, when executed, perform a method for preserving data stored in a file system with a plurality of files. The method involves determining whether storage capacity of the file system has reached a threshold level, wherein the threshold level is stored in at least one of a plurality of size-reducing policies, obtaining a criterion from the at least one size-reducing policy, identifying a subset of the plurality of files that match the criterion, accessing metadata of each of the identified subset of files, wherein the metadata of each of the identified subset of files comprises at least one option for reducing a size of the file, and performing a size-reducing action to reduce a size of each of the identified subset of files based on the option for reducing the size of each of the identified subset of files and the criterion. | 07-21-2011 |
20110178998 | System and Method for Data Management - A system, method, and computer program product for data transfer. The method includes receiving a request to transfer a principal object from a source location to a target location. The method also includes receiving at least one closure rule corresponding to the principal object, and transferring the principal object from the source location to be stored in the target location. The method also includes identifying at least one secondary object to be transferred with the principal object, according to the at least one closure rule. The method also includes selectively transferring the secondary object from the source location to be stored in the target location. | 07-21-2011 |
20110191307 | Computerized Hazardous Material Response Tool - A computer-based method and apparatus for identifying hazardous materials based on observable physical properties and signs and systems of exposure to the hazardous materials. The observable physical properties are obtained by preprocessing plain language data to obtain normalized descriptors and modifiers pertaining to a plurality of properties and signs and symptoms. The normalized descriptors and signs and symptoms are presented to a user in lists for comparison with a sample in the field. Once a material is identified, information can be obtained from the apparatus which is necessary for response to an incident involving the hazardous material. The preferred embodiments of the invention are particularly useful to responders to a hazardous waste incident. | 08-04-2011 |
20110218978 | OPERATING ON TIME SEQUENCES OF DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for operating on time sequences of data. In one aspect, a method includes a database management system storing and updating information in records in a table of a database, the records being associated with respective times that are spaced apart by time intervals, the database management system responding to a query that is phrased to imply a putative record with respect to a time interval that is not among the time intervals with which the records of the table are associated, and the response of the database management system to the query including a computation of a value of an attribute of the putative record from at least one non-null value of the attribute for one of the records of the table, the computation being based on an interpolation policy. | 09-08-2011 |
20110231378 | METHOD AND SYSTEM FOR SECURITY OF FILE INPUT AND OUTPUT OF APPLICATION PROGRAMS - Provided herein is a method and system for the security of the file input and output of application programs. At a security process running step, an application program and an security process are executed independent of a main process of the application program. The security process is connected to a filter driver to control the filter driver. At an event generation step, the filter driver checks an event being processed by the application program, stops the processing of the event, and transfers event information regarding the event to the security process. At a control policy checking step, the security process compares the event information with a corresponding security control policy, and transfers the determination of the comparison to the filter driver. At an execution step, the filter driver continues the following processing of the corresponding event in conformity with the determination of the security process. | 09-22-2011 |
20110238637 | Statistical Identification of Instances During Reconciliation Process - A system for reconciling object for a configuration management databases employs statistical rules to reduce the amount of manual identification required by conventional reconciliation techniques. As users manually identify matches between source and target datasets, statistical rules are developed based on the criteria used for matching. Those statistical rules are then used for future matching. A threshold value is adjusted as the statistical rules are used, incrementing the threshold value when the rule successfully matches source and target objects. If the threshold value exceeds a predetermined acceptance value, the system may automatically accept a match made by a statistical rule. Otherwise, suggestions of possibly applicable rules may be presented to a user, who may use the suggested rules to match objects, causing adjustment of the threshold value associated with the suggested rules used. | 09-29-2011 |
20110252009 | COMBINED SAVE AND VALIDATION LOGIC - Methods, systems, and computer-readable media for combined saving and validation are disclosed. A particular method includes receiving a command to save changes associated with a change set to a data storage device. Entities of the change set are validated and one or more pre-operation commands are executed on the change set. When a pre-operation command modifies one or more first entities of the change set, the first entities are revalidated. The method also includes executing a data operation based on the change set and executing one or more post-operation commands on the change set. When a post-operation command modifies one or more second entities of the change set, the second entities are re-validated. | 10-13-2011 |
20110313981 | Data Privacy, Redaction and Integrity for Relational Databases - A method, a data processing system, and a computer program product for protecting data in a database. A query to a database in a data processing system is received by a security mechanism in the data processing system that is external of the database. The query is converted to a modified query according to a security policy. The modified query is sent to the database, and a response to the modified query is returned. | 12-22-2011 |
20120011105 | CONTENT MONITORING AND COMPLIANCE ENFORCEMENT - Responding to a use of controlled content is disclosed. Responding includes receiving an indication of the use of the controlled content including a context of the use of the controlled content, automatically determining using the context an engagement action for responding to the use, and automatically initiating the engagement action. | 01-12-2012 |
20120016848 | ESTABLISHING PARSE SCOPE - Example apparatus, methods, and computers control establishing a shared parse scope between two computers that intend to be involved in a shared de-duplication action. One example method includes, upon determining that a first de-duplication logic and a second de-duplication logic are to participate in a shared de-duplication action for an object, controlling the first de-duplication logic to establish a shared parse scope with the second de-duplication logic. Establishing the shared parse scope may include negotiations between the computers, where the negotiations transfer dialect information. The dialect information may take the form of rules. The method may also include persisting the shared parse scope. | 01-19-2012 |
20120023074 | SCALABLE RULE-BASED DATA SYNCHRONIZATION SYSTEMS AND METHODS - Exemplary scalable, rule-based data synchronization systems and methods are disclosed. An exemplary method includes at least one computing device executing a database trigger process in response to a database trigger event, the database trigger process including writing a general data message to a general message repository. The method further includes the at least one computing device executing an independent process including monitoring the general message repository, detecting the general data message in the general message repository, and processing, in response to the detecting of the general data message in the general message repository, the general data message in accordance with a predefined set of rules. Corresponding systems and methods are also disclosed. | 01-26-2012 |
20120023075 | DOCUMENT CLASSIFICATION TOOLBAR IN A DOCUMENT CREATIONAPPLICATION - A toolbar in a document creation application provides the ability to classify documents based on specific properties such as security classification. The toolbar through dropdown selections allows users to select the appropriate classification and properties based upon the content of the document and have appropriate classifiers added to the document. Document classification properties are generated that are associated with the document in the document properties and by inserting visual markings that allow users to quickly identify the security, sensitivity, intended distribution or retention. By utilizing the classification toolbar a user can classify an document by one or more classification levels and be ensured that the classification will be visible to any person viewing the document. | 01-26-2012 |
20120036113 | PERFORMING DEDUPLICATION OF INPUT DATA AT PLURAL LEVELS - Deduplication of input data is performed at a first level, where the deduplication at the first level avoids storing an additional copy of at least one of the chunks in a data store. Additional deduplication of the deduplicated input data is performed, wherein the additional deduplication further reduces duplication. | 02-09-2012 |
20120041932 | METHOD FOR VALIDATING EQUIVALENT DATA STRUCTURES - Embodiments of the invention relate to a method, system, and computer program product for validating a data structure, comprising: responsive to identifying a data structure in a first programming language, identifying an equivalent data structure in a second programming language; comparing a data definition of the data structure with a data definition of the equivalent data structure; determining an incompatibility between a compared data definition of the data structure and a compared data definition of the equivalent data structure; and responsive to determining an incompatibility, identifying a rule defining an action to be taken in order to correct the incompatibility. | 02-16-2012 |
20120047114 | ENFORCING QUERY POLICIES OVER RESOURCE DESCRIPTION FRAMEWORK DATA - A method of performing a graph query issued by a user is provided. The method includes performing on a processor, receiving a user graph query; rewriting the user graph query as a new query based on a query policy expressed in a graph query language; and performing the new query on graph data to obtain a result. | 02-23-2012 |
20120059805 | Inter-Organizational and Intra-Organizational Repository for Operating System Images - Mechanisms are provided for collaborating between two or more operating system image repository systems. A first operating system image (OSI) repository system is associated with a second OSI repository system. Each of the first and second OSI repository systems store one or more OSIs for use either natively or virtually by client computing devices. One or more collaboration rules are defined that define a manner by which OSI information in the first OSI repository system is shared with the second OSI repository system. A collaborative operation is performed between the first OSI repository system and the second OSI repository system. An extent of the collaborative operation is circumscribed by application of the one or more collaboration rules. | 03-08-2012 |
20120078862 | HYBRID OFF-PEAK AND JUST-IN-TIME INTEGRATION - The invention is directed to off-peak and just-in-time (JIT) retrieval of directory information to reduce network traffic and load on directory servers and/or data sources by requesting only the information that is currently needed from the directory server, while subsequently updating the directory information during an off-peak period in the case that the directory information retrieved in a JIT manner is outdated. In these embodiments, a hybrid integrator operable with an integration directory capable of retrieving directory information in a JIT manner provides this functionality. Specifically, the hybrid integrator and the integration directory are configured to receive a request for directory information at the hybrid integrator, and record the request. The integration directory retrieves a set of current attribute values in a JIT manner from at least one of the following: the directory server, and an external source. During an off-peak period, it is determined whether each of the set of current attribute values corresponding to the request is current. Based on whether each of the set of current attribute values corresponding to the request is current, a set of updated current attributes is retrieved from at least one of the following: a directory server, and an external source. | 03-29-2012 |
20120095972 | System and Method for Configuring Business Entity Search Logic - A system for generating a business name normalization configuration used by a secretary of state office to process a business name search is disclosed. The system includes a user interface that enables a user to create or edit the business name normalization configuration by displaying a plurality of business name normalization characteristics and receiving a plurality of selections corresponding to the characteristics. The system stores the business name normalization characteristics and selections so as to define the business name normalization configuration, wherein the business name normalization configuration provides a set of rules for normalizing each of a plurality of business names. The business name normalization configuration is then used to normalize registered names and a query name. The normalized registered names and normalized query name are compared, and the registered names corresponding to the normalized registered names that are identical to the normalized query name are displayed as search results. | 04-19-2012 |
20120095973 | METHOD AND SYSTEM FOR DEVELOPING DATA INTEGRATION APPLICATIONS WITH REUSABLE SEMANTIC TYPES TO REPRESENT AND PROCESS APPLICATION DATA - A method and system for developing data integration applications with reusable semantic types to represent and process application data. Methods include creating schemas to describe external data, creating semantic types to describe internal data, mapping schemas to semantic types, developing dataflows that configure input and output operations using schemas, mappings, and semantic types and all other transformation operations and functions based solely on semantic types, and executing dataflows defined in this manner. | 04-19-2012 |
20120109912 | METHODS AND SYSTEMS TO MAINTAIN DATA COHERENCY - In one embodiment, a data coherency system access an age criterion associated with a data set and determines a previous refresh time associated with the data set. The data coherency defines a next refresh time that satisfies the age criterion relative to the previous refresh time and schedules a request for the data set at the next refresh time. | 05-03-2012 |
20120109913 | METHOD AND SYSTEM FOR CACHING REGULAR EXPRESSION RESULTS - A method and system for efficiently processing regular expressions associated with new BGP packets uses the caches results of prior processing of regular expressions associated with a prior matching BGP packet within the same epoch. | 05-03-2012 |
20120117039 | Automatic Reconciliation Of Discrepancies In Asset Attribute Values - Discrepancies in two sets of asset data for an organization are identified and automatically reconciled. One set of asset data may be compiled using automatic physical discovery software while the other set is from a financial system of the organization. Automatic reconciliation is performed according to user-configurable rules and corresponding user-configurable actions. | 05-10-2012 |
20120136843 | METHOD AND APPARATUS FOR MANAGING FILE SYSTEMS AND FILE-BASED DATA STORAGE - Embodiments of the present invention can comprise systems and methods for managing filesystems and can provide a programmable filesystem with active rules and policies, an n-tier network filesystem, stack mounting, a union filesystem with write-through semantics, a filesystem middleware with selective delegation, a filesystem with a statistical warehouse and/or other management functionality. | 05-31-2012 |
20120158678 | PROCESS AND METHOD FOR DATA ASSURANCE MANAGEMENT BY APPLYING DATA ASSURANCE METRICS - The present invention relates generally to methods, software and systems for measuring and valuing the quality of information and data, where such measurements and values are made and processed by implementing objectively defined, measurable, comparable and repeatable dimensions using software and complex computers. The embodiments include processes, systems and method for identifying optimal scores of the data dimension. The invention further includes processes, systems and method for data filtering to improve the overall data quality of a data source. Finally, the invention further includes processes, systems and method for data quality assurance of groups of rows of a database. | 06-21-2012 |
20120166405 | Changeability And Transport Release Check Framework - Disclosed are methods, systems and products, including a method that includes receiving an object including an identifier to determine whether the object is subject to at least one of a change during a transaction and a transport from a first system to a second system; determining attributes for the received object; determining a rule based on at least the identifier and the determined attributes; and allowing an action comprising at least one of the change to the object and the transport of the object based on a result of a rule check performed using the determined rule. Related systems, methods, and articles of manufacture are also disclosed. | 06-28-2012 |
20120166406 | Information Integrity Rules Framework - An information integrity rules framework manages rules across heterogeneous enforcement systems by managing canonical rules that are mapped to native rules and enforcement system-specific rules. The information integrity rules framework discovers an existing native rule utilized by an enforcement system, which is written in an enforcement system-specific format. Next, the information integrity rules framework creates a mapping entry and maps the native rule to a canonical rule, which is independent from the enforcement system. When the information integrity rules framework detects a change to one of the rules managed by the framework, the information integrity rules framework propagates the change to other corresponding rules across enforcement systems managed by the framework. | 06-28-2012 |
20120191676 | SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES - A system and method for updating, monitoring, and controlling applications on a workstation. The workstation includes a workstation management module configured to detect the launch or request to access a network by an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more policies or categories to associate with the application by referencing an application inventory database. Once the application server module has the category or policy, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the application to control network access by the application. | 07-26-2012 |
20120191677 | Policy Performance in an Information Management System - In an information management system, policies are optimized before they are associated to a device in order to increase evaluation speed or reduce space requirements, or both. Optimization techniques may include common subexpression elimination, constant folding, constant propagation, comparison optimization, dead code or subexpression removal, map or lookup table generation, policy rewriting, redundant policy elimination, heuristic-based policy ordering, or policy-format transformation, and combinations of these. | 07-26-2012 |
20120215749 | System And Method For Managing Records Using Information Governance Policies - An invention for creating and managing, within an Information Governance framework, a Master Classification of Record Classes (MC-RC) and associated file plans within an entity and across jurisdictions where its sub-entities operate. The file plans are used to organize the records of the entity and apply governance rules to them, for example, retention and disposition. The invention may use two integrated modules. | 08-23-2012 |
20120221535 | Auditing Database Access In A Distributed Medical Computing Environment - Methods, systems, and computer program products are provided for auditing database access in a distributed medical computing environment including receiving from a user a query of one or more databases within the distributed medical administration computing environment; determining by an audit manager in dependence upon audit policies for the medical computing environment whether any of the results of the query require auditing access; and if any of the results of the query require auditing access, creating an audit record and storing the audit record in an audit database. | 08-30-2012 |
20120246130 | Enforcing Legal Holds of Heterogeneous Objects for Litigation - Software for managing legal holds on objects identifies a target object to associate with a particular legal hold. The example software is further operable to automatically communicate with a lookup table to verify a hold record associated with the target object. In another example, the software for managing legal holds on objects can receive a legal hold status request for a target object associated with a business application. The software can automatically communicate with a lookup table to determine a hold record identifying a legal hold associated with the target object. The software is further operable to respond to the legal hold status request with a legal hold status based on the lookup table communication. | 09-27-2012 |
20120265741 | REPLICA BASED LOAD BALANCING IN MULTITENANT DATABASES - Systems and methods are disclosed for a swap-based multitenant database load balancing (SWAT) by finding an optimal swap set that eliminates hotspots, and finding a sequencing and parallelization of swap executions for the multi-tenant database. | 10-18-2012 |
20120265742 | EVENTUALLY CONSISTENT STORAGE AND TRANSACTIONS - An “Eventually Consistent Sharing Model” provides various techniques for using “revision diagrams” to determine both arbitration and visibility of changes or updates to shared data (e.g., data, databases, lists, etc.) without requiring a causally consistent partial order for visibility, and without requiring change or update timestamps for arbitration. In particular, the Eventually Consistent Sharing Model provides fork-join automata based on revision diagrams to track the forking and joining of data versions, thereby tracking updates made to replicas of that data by one or more sources. “Cloud types” are used to define a structure of the shared data that enables fully automatic conflict resolution when updating the shared data. These concepts enable mobile devices (or other computing devices that may periodically go “offline”) to share structured data in cloud-based environments in a manner that provides local data replicas for offline operation while guaranteeing eventually consistent convergence of the data replicas. | 10-18-2012 |
20120278292 | METHOD AND APPARATUS FOR MANAGING AND ARCHIVING PERFORMANCE INFORMATION RELATING TO STORAGE SYSTEM - A data management and archive method and apparatus, for implementation in an automated system to monitor and manage status, performance and configuration data for networked storage components. Analysis and cross-correlation of data related to the storage components can be done individually, collectively and/or comparatively. A collection manager component of a workload analyzer is implemented to start and stop data collection. The collection manager includes a command and control module that coordinates requests of data from at least one collection agent configured on at least one host connected to the storage component(s). The collection manager manages collection of data and effects file transfer of collected data according to a user specified policy, and maintains status of the data collected. The user specified policy allows the user to specify data collection “shifts” (i.e. periodicity). | 11-01-2012 |
20120284243 | METHOD TO AUTOMATICALLY MAP BUSINESS FUNCTION LEVEL POLICIES TO IT MANAGEMENT POLICIES - A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed. | 11-08-2012 |
20120290544 | DATA COMPLIANCE MANAGEMENT - A solution for managing data compliance for a set of data repositories in an automated/semi-automated manner is provided. A data repository profile for each data repository can be used to identify a scanning component corresponding to the data repository, which can be launched to identify any suspect data items stored in the data repository. Subsequently, an identified suspect data item can be evaluated for compliance with one or more compliance policies of the corresponding data repository, which also can be stored in the repository profile. When the suspect data item is evaluated as being in violation of one or more compliance policies, a set of corrective actions stored in the repository profile can be identified and initiated to address the violation. | 11-15-2012 |
20120290545 | COLLECTION OF INTRANET ACTIVITY DATA - Systems, methods and computer program products for facilitating the collection of data within a computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' rules addressing intranet users' privacy are disclosed. Such systems, methods and computer program products allow for the collecting of activity information related to computer-based activities performed by users while logged into an organization's intranet. Such activity includes navigating to URLs, opening and editing documents, writing, opening and reading email and instant messages, and the like. The collecting, consolidating, storing and exposing of such activity information—while ensuring privacy requirements—serves as a basis for high-value services (e.g., augmenting documents with extra information, improving search results, automatic news feeds, social networking announcements, etc.) to be offered and provisioned to such users. | 11-15-2012 |
20120310904 | DATA VALIDATION AND SERVICE - A data validation service includes providing a user interface to a subscriber of the service via a computer device of the subscriber, receiving a data validation rule specified by the subscriber and an address of a database subject to the data validation, and generating a configuration file that includes the address of the database. The service also includes transmitting the configuration file and a thin client application to the computer device over a network, the thin client application configured to read the configuration file and pull data from the database. The service further includes receiving the data from the computer device via the network, performing the data validation by executing the data validation rule with respect to the data, and compiling results of the data validation and providing the results to the computer device. | 12-06-2012 |
20120310905 | DATA VALIDATION AND SERVICE - A data validation service includes providing a user interface to a subscriber of the service via a computer device of the subscriber, receiving, via the user interface, a data validation rule specified by the subscriber and an address of a database subject to the data validation, and generating a configuration file that includes the address of the database and an address of a location of executable code corresponding to the data validation rule. The data validation service also includes transmitting the configuration file and remote methods to the computer device over the network. The remote methods are configured to execute the data validation rule with respect to the data and compile results of the execution. | 12-06-2012 |
20120330911 | AUTOMATIC GENERATION OF INSTANTIATION RULES TO DETERMINE QUALITY OF DATA MIGRATION - During migration of data from at least one data source to a target system, data quality is determined by obtaining metadata associated with the target system, automatically generating instantiated rules for assessing a quality of data to be loaded from the at least one data source into the target system, where the instantiated rules are dependent upon the obtained metadata associated with the target system, and applying a quality analysis based upon the instantiated rules to the data to be loaded into the target system. The quality analysis provides an indication of a level of compliance of the data with requirements of the target system. | 12-27-2012 |
20130018858 | USE AND ENFORCEMENT OF PROVENANCE AND LINEAGE CONSTRAINTSAANM Velasco; Marc B.AACI OrangeAAST CAAACO USAAGP Velasco; Marc B. Orange CA US - Provided are techniques for managing constraints. Content data and content metadata that is associated with the content data is stored. In response to receiving a change to one of the content data and the content metadata, a provenance value is calculated based on the change, wherein the provenance value represents a change in content between the changed content data or the content metadata and an original version of the content data or the content metadata, and a lineage value is calculated based on the change, wherein the lineage value represents a change in authorship between the changed content data or the content metadata and the original version of the content data or the content metadata. It is determined whether the calculated provenance value violates at least one constraint. It is determined whether the calculated lineage value violates at least one constraint. In response to determining that the calculated provenance value or the calculated lineage value violates at least one constraint, one or more actions associated with the violated constraint are performed, wherein the one or more actions include allowing the change and preventing the change. | 01-17-2013 |
20130031066 | System and Method for Reviewing Role Definitions - A system for reviewing the ownership of data resources includes a database that stores a plurality of data resource identifiers. Each of the plurality of data resource identifiers has an associated owner field. The system also includes a second database that stores data resource review definitions. The review definitions define a review processes for the plurality of data resources. The system further includes a processor that is in communication with the data resource database and the review definition database. The processor executes the data resource ownership review processes defined by the review definitions at the appropriate times. | 01-31-2013 |
20130036102 | INCREMENTAL UPDATE - A system, apparatus, and method are provided for adding, deleting, and modifying rules in one update from the perspective of an active search process for packet classification. While a search processor searches for one or more rules that match keys generated from received packets, there is a need to add, delete, or modify rules. By adding, deleting, and modifying rules in one update from the perspective of an active search process for packet classification, performance and functionality of the active search process may be maintained, thereby preventing packet loss and preserving throughput. | 02-07-2013 |
20130054548 | MASS INGESTION OF CONTENT RELATED METADATA TO AN ONLINE CONTENT PORTAL - The present technology supports mass ingestion of metadata related to consumables related to online server supported applications. The online server publishes a specification defining metadata fields, allowed format values, and other parameters to facilitate the mass submission of metadata related to consumables. Metadata arranged according to the specification can be fed to the online server via a data stream or through submission of a document including metadata defining a plurality of consumables. The specification has been intelligently designed to account for the many different uses of consumables in applications supported by the server. As will be further described herein, the specification accounts for unique events pertaining to subscription content, in-application purchases, game performance and game award consumables, among others. Every type of consumable being submittable in the same document. | 02-28-2013 |
20130066843 | INFORMATION CLASSIFICATION - Providing information classification in a computer system for use in an information management system. Information management provides services such as data protection, backup, retention, compliance, etc., by classifying the objects and/or environment of an entity according to its value to the entity. Initially a series of rules are identified relating to information management services. Using these rules, information is classified into categories by using a series of plugins that relate to specific characteristics of information within data. Often, classification includes the collection and/or generation of metadata. After the data is classified, service level objectives can be identified and mapped to service levels. After service levels are selected, the corresponding actions can be orchestrated such that the objects of the entity received the selected services in the service level. | 03-14-2013 |
20130073531 | INTEGRATING CUSTOM POLICY RULES WITH POLICY VALIDATION PROCESS - A system is provided for integrating custom policy rules with a policy validation process for validating forms within an organization. The system may enable the organization to create new policy rules and to customize existing policy rules for forms according to various specifications. The custom policy rules may be stored in policy database and the policy validation process may be applied to validate submitted forms against the custom policy rules for identifying policy rule violations. The system may automatically apply the policy validation process upon the submission of a form to the organization for identifying violations before posting the form to the organization's system. The system may generate a policy violation results list, and may provide a display message for indicating when policy violations have been identified in the submitted form, and may also present options to the user for addressing the policy violation and approving the form. | 03-21-2013 |
20130080411 | SYSTEM AND METHOD FOR A SERIALIZED DATA SERVICE - The present disclosure includes a system and method for a serialized data service. A method for a serialized data service [ | 03-28-2013 |
20130091106 | AUDITING DATABASE ACCESS IN A DISTRIBUTED MEDICAL COMPUTING ENVIRONMENT - Methods, systems, and computer program products are provided for auditing database access in a distributed medical computing environment including receiving from a user a query of one or more databases within the distributed medical administration computing environment; determining by an audit manager in dependence upon audit policies for the medical computing environment whether any of the results of the query require auditing access; and if any of the results of the query require auditing access, creating an audit record and storing the audit record in an audit database. | 04-11-2013 |
20130097130 | METHOD AND SYSTEM FOR RESOLVING DATA INCONSISTENCY - Method, system, and programs for resolving data inconsistency in a distributed system having a plurality of replica instances. In response to a read request of at least one data element, a key-specific probability value for the at least one data element of the read request is retrieved. Based on the retrieved key-specific probability value and a system load of the distributed system, a self-healing probability of the at least one data element of the read request is computed. A self-healing transaction that includes the at least one data element of the read request is then generated based on the self-healing probability of the at least one data element. The generated self-healing transaction is further applied to at least some of the plurality of replica instances in the distributed system to resolve data inconsistency. | 04-18-2013 |
20130097131 | Establishing Parse Scope - Example apparatus, methods, and computers control establishing a shared parse scope between two computers that intend to be involved in a shared de-duplication action. One example method includes, upon determining that a first de-duplication logic and a second de-duplication logic are to participate in a shared de-duplication action for an object, controlling the first de-duplication logic to establish a shared parse scope with the second de-duplication logic. Establishing the shared parse scope may include negotiations between the computers, where the negotiations transfer dialect information. The dialect information may take the form of rules. The method may also include persisting the shared parse scope. | 04-18-2013 |
20130097132 | STORAGE SUBSYSTEM DATA DUPLICATION POLICY - A type of a storage subsystem that has been connected to a computing device is detected as one of a number of types including a first type and a second type ( | 04-18-2013 |
20130110795 | INHERITANCE OF RULES ACROSS HIERARCHICAL LEVELS | 05-02-2013 |
20130117244 | DATA SECURITY METHOD USING DATABASE ENGINE - Disclosed is a data security method in a database engine. A data security engine unit is provided in the database engine so that the data security engine unit performs a data security function while automatically converting queries, which were stored in data storage engine unit without having been encoded and which were used to perform input or inquiry on the source data, to queries to be used to perform input or inquiry on encoded data. A data management engine unit performs operations associated with the input or inquiry with respect to the source data. A data storage engine unit stores encoded data which is encoded from the source data by the data security engine unit. | 05-09-2013 |
20130132354 | MULTIPLE SOURCE DATA MANAGEMENT USING A CONFLICT RULE - A solution for managing data received from multiple sources is provided. In particular, when conflicting data values are received from multiple sources for a data element, a conflict rule is used to determine the main data value for the data element, which is subsequently stored for use. The conflict rule can define any automatic, semi-automatic, or manual procedure for resolving the conflict. The conflict rule, or an identifier thereof, can be stored with each data value and the main data value for the data element. | 05-23-2013 |
20130138618 | POLICY-BASED FILE MANAGEMENT FOR A STORAGE DELIVERY NETWORK - A method for managing storage and access to data files stored in a storage delivery network comprising a plurality of geographically distributed storage nodes, the method including: receiving a file request from a user, wherein the user is associated with a service level agreement (SLA) containing one or more policies governing handling of file requests from the user; determining if the SLA dictates redirecting the file request to a predetermined storage node; if the SLA dictates redirecting the file request to a predetermined storage node, redirecting the file request to the predetermined storage node; otherwise, identifying all storage nodes from the plurality of geographically distributed storage nodes that are not too busy by determining whether a number of current access requests being served by each storage node exceeds a predetermined threshold value; identifying a nearest storage node from among the not too busy storage nodes; and redirecting the user request to the nearest storage node. | 05-30-2013 |
20130144851 | EFFICIENT DATA EXTRACTION BY A REMOTE APPLICATION - A query controller accesses a cache comprising information related to data that is newly added to a database, responsive to detecting a data extraction application is ready to query the database for at least one data extraction rule. The information is added to the cache for each new data event received by a data processing application, prior to the data processing application adding the data parsed from each new data event to the database. The query controller evaluates each data extraction rule against the information in the cache to determine whether the information is relevant to at least one data extraction rule. The query controller sends a separate query by the data extraction application to the database only for any particular data extraction rules to which the information is relevant, such that the query controller reduces the number of queries sent for each query period to only queries based on data extraction rules that need to be reevaluated based on the information updated about data that is newly added to the database. | 06-06-2013 |
20130151486 | METHOD AND APPARATUS THAT COLLECT AND UPLOADS IMPLICIT ANALYTIC DATA | 06-13-2013 |
20130166520 | MONITORING BEHAVIOR WITH RESPECT TO A SOFTWARE PROGRAM - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, used to monitor behavior with respect to a software program. In one aspect, a method includes playing media content using a first program that is limited to a first security context corresponding to a first domain of the first program, the first program having an object in the first security context corresponding to the media content; receiving an event including information indicating a monitoring program; instantiating the monitoring program in a second security context that is applicable to multiple domains, including the first domain, the instantiated monitoring program having access from the second security context to the object of the first program in the first security context; and receiving from the monitoring program information regarding playing of the media content. | 06-27-2013 |
20130173565 | FINDING SUSPICIOUS ASSOCIATION RULES IN DATA RECORDS - Suspicious activity may be found by automated methods and systems that analyze data records to find association rules correlating values in the fields of the records and then analyzing the association rules, as the association rules themselves can be indicative of improprieties. Thus, minimal human intervention is used to find improprieties in even very large datasets. If the data records are records of sales transactions, the finding and the analyzing of association rules as disclosed can flag suspicious-appearing transactions that may have resulted from improprieties, such as human mistakes or intentional frauds. Instructions for performing the disclosed analyses may be stored on non-transitory storage media for access by systems to execute the automated methods. | 07-04-2013 |
20130173566 | STRUCTURED TEST ADHERENCE MANAGEMENT FOR MANUAL DATA ENTRY SYSTEMS - A computer-implemented method is provided for managing manual entries of blood glucose measures for a patient in relation to a structured collection procedure managed by a portable computing device. The method includes: managing a structured collection procedure for a user of the computing device, where the structured collection procedure specifies one or more collection events for obtaining blood glucose measures for a patient; receiving a data entry for a blood glucose measure from the user of the computing device; evaluating the data entry in relation to the structured collection procedure using a membership rule set, where the membership rule set defines rules for associating data entries with structured collection procedures; and inputting the data entry into a logbook residing in a data store on the computing device. Depending upon the evaluation, the data entry may be input with or without an association to the structured collection procedure. | 07-04-2013 |
20130179414 | MECHANISMS FOR CONNECTING FILES BETWEEN APPLICATIONS - The claimed subject matter provides for systems and/or methods for accessing and/or updating files by a first application in which the first application does not have direct accessibility to said file. In some embodiments, file host applications that are not directly accessible to said first application may be connected to through a file picker extensibility point that enable the first application to acquire files through an operating system user experience. In these various embodiments, the system may provide for one or more of the following functionalities: (1) refreshing content that is controlled by a file host application; (2) updating content that is controlled by a file host application; (3) exporting files from an application to a file host application; (4) a user interface for export operations and file host application intervention and (5) a file host extensibility point provided by the operating system. | 07-11-2013 |
20130191354 | System and Method for Information Lifecycle Management of Investigation Cases - Various agencies, such as law enforcement and intelligence agencies, deploy monitoring centers that monitor communication networks and analyze the monitored communication. One possible way to reduce storage cost is to apply Information Lifecycle Management (ILM) techniques, which store the content to multiple storage tiers having different performance levels. The monitoring center processes the various items of content in the context of investigation cases. given investigation case may be assigned a certain status, e.g., active or closed. The monitoring center comprises an ILM server that assigns content items to storage tiers based on the investigation cases with which the content items are associated. The ILM server may analyze the state of a given investigation case, and selects an ILM policy based on the state of the case. The ILM policy specifies the storage tier (or tiers) to be used for storing items of data associated with the case. | 07-25-2013 |
20130191355 | System, Method and Apparatus for Enterprise Policy Management - Disclosed are systems, methods and apparatuses for managing objects (files and directories) in network file systems according to policies. Each policy may have one or more rules, each of which ties a condition to an action. Each condition can be expressed in terms of metadata harvested across file systems and stored in a metadata repository. The actions are user-programmable. Users can apply and/or enforce a policy by manipulating the metadata stored in the metadata repository. For example, suppose a policy prohibits storing MP3 files in corporate storage, a user can specify a rule that ties the condition “no MP3 files in volumes A-Z” to an action “delete MP3 files from volumes A-Z.” A file management application may apply a filter to the metadata repository to produce metadata records having values that meet the specified condition and take the corresponding action on managed objects associated with those metadata records. | 07-25-2013 |
20130191356 | AUTONOMIC GENERATION OF DOCUMENT STRUCTURE IN A CONTENT MANAGEMENT SYSTEM - A content management system (CMS) autonomically generates structure for a document when a synchronization rule references structure that does not exist in the document. A dynamic structure policy specifies at least one criterion that determines if and how the structure is autonomically generated. By autonomically generating structure in a document, a CMS administrator or CMS user (such as the author) is relieved of the manual task of generating the structure before the synchronization rule can be successfully processed. Once dynamically generated, the added structure may be auto-populated with dummy data or with default data specified in the autonomic structure policy. | 07-25-2013 |
20130198153 | AUTOMATED CORRUPTION ANALYSIS OF SERVICE DESIGNS - Methods and arrangements for conducting corruption analysis of service designs. A service design is accepted. Corrupting factors within the service design are assessed, and a corruption susceptibility score is generated. An alternative service design is generated responsive to a corruption susceptibility score fulfilling predetermined criteria. | 08-01-2013 |
20130218852 | PRE-AUDIT SYSTEM, APPARATUS, AND METHOD - A pre-audit system, apparatus, and method is provided to perform a pre-audit of form data. Form data is received from a supplier prior to the form data being delivered to one or more purchasers. The form data is compared with rules or conditions set by the one or more purchasers. A response message is transmitted to the supplier, where the response message includes one or more results and one or more descriptions related to the one or more results. | 08-22-2013 |
20130218853 | Rule Modification in Decision Trees - A system, apparatus, and method are provided for modifying rules in-place atomically from the perspective of an active search process using the rules for packet classification. A rule may be modified in-place by updating a rule's definition to be an intersection of an original and new definition. The rule's definition may be further updated to the rule's new definition and a decision tree may used updated based on the rule's new definition. While a search processor searches for one or more rules that match keys generated from received packets the in-place rule modification prevents periods of incorrect rule matching of the keys thereby preventing packet loss and preserving throughput. | 08-22-2013 |
20130232127 | META-DIRECTORY CONTROL AND EVALUATION OF EVENTS - Techniques for meta-directory control and evaluation of events are provided. Disparate events from heterogeneous processing environments are collected as the events are produced by resources within the processing environments. The events are filtered and organized into taxonomies. Next the filtered and organized events are assigned to nodes of a Meta directory, each node defining a relationship between two or more of the resources and policy is applied. Finally, additional policy is evaluated in view of the events and their node assignments with other events, and one or more automated actions are then taken. | 09-05-2013 |
20130238575 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 09-12-2013 |
20130246376 | METHODS FOR MANAGING DATA INTAKE AND DEVICES THEREOF - This technology defines one or more of initial validation rules, one or more source to target mapping instructions, one or more data filtering rules, one or more data validation rules, one or more data transformation rules, and one or more file definition rules. The initial validations are performed on one or more source files based on the initial validation rules. The initially validated source files are mapped into a staging database based on the source to target mapping instructions. The data filtering rules are applied to the mapped source files in the staging database. Validation and transformation are performed on each of the successfully filtered source files based on the data validation rules and the data transformation rules. The validated and transformed source files are loaded into a core database. One or more load ready files are generated from the loaded source files based on the target file generation filtering rules. | 09-19-2013 |
20130254172 | INFORMATION PROVISION SERVER, INFORMATION PROVISION SYSTEM, INFORMATION PROVISION METHOD AND PROGRAM - The present invention provides an information provision server comprising: a history information storage which stores, as history information, a user identifier and history element information received from a user terminal; a rule storage which stores a rule that authorizes the stored user history information to be output to a service server that provides a service to the terminal; a rule assessment unit which receives the user identifier and assessment element information from the terminal, assesses the assessment element information on the basis of the rule, and, if the assessment element information conforms to the rule, enters the user identifier corresponding to the assessment element information into an output authorization list; and a filtering unit which extracts from the history information storage, the history information corresponding to the user identifier entered into the output authorization list, and outputs the extracted history information to the service server. | 09-26-2013 |
20130262416 | Methods for Discovering Sensitive Information on Computer Networks - One embodiment of a method of the present invention for discovering sensitive information on computer network provides for discovering databases on a computer network, defining a pattern for a data discovery, discovering qualifying records by matching the pattern with field names and/or record values in the databases, sending electronic notification to a database administrator managing the qualifying database, receiving a selection choice from the database administrator managing the qualifying database identifying the status for the qualifying records. | 10-03-2013 |
20130262417 | Graphical Representation and Automatic Generation of Iteration Rule - Embodiments relate to graphical representation and/or automatic generation of an iteration rule in mapping design that is to integrate or transform one or more input data sets into another target data set. The input and output data set can be of flat or hierarchical in nature. In an embodiment, a graphical interface allows users to specify an iteration rule (e.g. JOIN operation in a relational database) in a tree-like structure (e.g. a JOIN tree). The interface allows users to visualize and implement complicated and powerful combinations of multiple data sets, including data sets exhibiting hierarchical structure. Drag-and-drop techniques may be employed to reduce the need for manual typing. Also disclosed are procedures automatically generating an iteration rule based on the data mapping information, thereby reducing a need for manual mapping. | 10-03-2013 |
20130262418 | INFORMATION MANAGEMENT POLICY BASED ON RELATIVE IMPORTANCE OF A FILE - The relative importance of a file is determined based on an importance parameter and an information management policy is caused to be applied to the file based on the determined relative importance of the file. The importance parameter may be the author of the file, the number of users with whom the file is shared, the relationship between the users with whom a file is shared, the uniqueness of the file, or the presence of particular keywords in the file. | 10-03-2013 |
20130282678 | VERIFYING AGE AND INTEGRITY OF WEBSITE PAGES - Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection. | 10-24-2013 |
20130304712 | SYSTEM AND METHOD FOR VALIDATION - Systems and methods for validation are disclosed. In an aspect, a method can comprise receiving a selection of a validation rule, the validation rule including a validation element, receiving a selection of a triggering event associated with the validation rule, and validating data using the validation rule and in response to the triggering event. | 11-14-2013 |
20130325822 | CONTENT MANAGEMENT SYSTEM AND METHOD OF MANAGING RETENTION AND DISPOSITION OF CONTENT ITEMS - In specific embodiments, a content management system operable on one or more microprocessors comprises a content repository storing a plurality of content items and a content usage analyzer. The computer is usable to perform one or more operations on one or more contents items stored in the content repository, and when an operation is performed on a content item, audit data is captured related to the operation. The content usage analyzer is configured to identify an idle content item within the content repository based on the captured audit data. | 12-05-2013 |
20130332429 | MODEL FOR GENERATING CUSTOM FILE PLANS TOWARDS MANAGEMENT OF CONTENT AS RECORDS - Convenient approach for managing records with respect to entities based on file plans. In an embodiment, historical data representing policies previously selected is maintained. The historical data is then used to generate custom file plans containing policies most likely to be used by a corresponding user. A list in such custom file plan may have more relevant policies prioritized higher. A user may thus conveniently select a desired policy, and associate the selected policy with a set of entities to cause the selected policies to be applied against management of the set of entities. | 12-12-2013 |
20140012825 | DISPERSED STORAGE NETWORK FOR MANAGING DATA DELETION - A dispersed storage device manages deletion of data objects stored within a dispersed storage network by receiving a data delete request to delete a data object stored throughout a set of dispersed storage units within a dispersed network memory of the dispersed storage network, determining a deletion policy for the data object and selectively generating and transmitting, based on the deletion policy, a delete command to the set of dispersed storage units. | 01-09-2014 |
20140019426 | SYSTEMS AND METHODS FOR IN-PLACE RECORDS MANAGEMENT AND CONTENT LIFECYCLE MANAGEMENT - An in-place information management system having a management application built on a common data model and configured for asynchronous query-based application of policies on content stored in the disparate data storage systems through a query interface which may be part of a set of integration services. The common data model may be configured based on common architectures of the disparate data storage systems. The query interface may be configured for running a query on a data storage system in response to a search request received by the management application from a records manager and for mapping semantically equalivant keys from disparate data storage systems to a key in the common data model. The query may define a set of records to be treated similarly according to corporate policy on content lifecycle and records compliance. | 01-16-2014 |
20140019427 | FRAMEWORK FOR CONTEXT-AWARE SYSTEMS AND METHODS - The present document describes a context aware system (CAS) for automatically controlling a plurality of actuators based on fact information received from a plurality of detectors, wherein the actuators and detectors may be added and removed in a plug and play manner. The CAS comprises a sensor mechanism for sensing parameter of an environment and outputting fact information relating to the parameters. A context mechanism extracts context from the fact information and generates situations using a set of situation definitions and context definitions. The context mechanism may include one or more reasoners that work independently in a separation of concern manner to output situations pertaining to different domains. The situations are sent to an adaptation mechanism for determining one or more actions for each situation. Each action is sent to an actuator for execution. | 01-16-2014 |
20140025649 | Generic Lifecycle Management of Entity in Hierarchy According to Status - Lifecycle of an entity residing within a hierarchy, may be managed according to corresponding status identifiers of a ruleset referenced by an engine. At design time, particular embodiments determine a finite set of fundamental statuses common to the entities, and covering the full lifecycle of each entity. A ruleset is created comprising rules accounting for each change in the status of the entity over its lifetime within the hierarchy. The status may be indicated by status identifiers, that in some embodiments are stored within a database. During runtime, an engine receives information from the entity. The engine references the ruleset including the status identifier information, and then propagates the status change of the entity to other entities in the same or different hierarchy levels based upon the ruleset. In this manner, the lifecycle of an entity within a hierarchy can be managed according to its status. | 01-23-2014 |
20140025650 | ABSTRACT RELATIONAL MODEL FOR TRANSFORMING DATA INTO CONSUMABLE CONTENT - Concepts and technologies are described herein for an abstract relational model for transforming data into consumable content. In accordance with the concepts and technologies disclosed herein, a computing device can execute a transformation engine for transforming data into the consumable content. The computing device can be configured to generate an abstract relational model from data to analyze the data and to identify relationships within data elements or other portions of the data. The computing device also can determine a visualization model to apply to the data and to choose a world based upon the determined visualization model. The computing device can obtain rules associated with the selected or chosen world, and can apply the rules to the data to generate the output. In some embodiments, the computing device can be configured to obtain and apply feedback to the output. | 01-23-2014 |
20140040216 | Managing Media Files Using Metadata Injection - Apparatus and methods to manage media files using metadata injection provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed. | 02-06-2014 |
20140046914 | METHOD FOR EVENT-BASED SEMANTIC CLASSIFICATION - A method of automatically classifying images in a consumer digital image collection, includes generating an event representation of the image collection; computing global time-based features for each event within the hierarchical event representation; computing content-based features for each image in an event within the hierarchical event representation; combining content-based features for each image in an event to generate event-level content-based features; and using time-based features and content-based features for each event to classify an event into one of a pre-determined set of semantic categories. | 02-13-2014 |
20140046915 | METHODS AND SYSTEMS FOR BULK ROW SAVE LOGIC IN AN OBJECT RELATIONAL MAPPING LAYER AND APPLICATION FRAMEWORK - In accordance with embodiments, there are provided mechanisms and methods for saving multiple rows together through an object relational mapping layer to a database. These mechanisms and methods for saving multiple rows together can enable embodiments to detect faults in the save operation(s) and recover. The ability of embodiments to detect faults in the save operation(s) and recover can enable embodiments to provide a robust forgiving published API that saves a set of rows together whenever possible. | 02-13-2014 |
20140059023 | DATA RETENTION MANAGEMENT - Systems, methods, and computer program products manage retention of data associated with a business record are described herein. In one embodiment, a computer-based system to manage retention of data associated with a business record comprises at least one processor and logic instructions stored in a tangible computer readable medium which, when executed by the at least one processor, configure the at least one processor to determine whether the business record has reached a record retention threshold, and in response to a determination that a business record has reached the record retention threshold to separate a business record into a plurality of data elements, wherein the data elements have at least one defined retention policy associated therewith, determine a selected storage location for each of the plurality of data elements based on the at least one defined retention policy and store each of the plurality of data elements in the selected storage location. | 02-27-2014 |
20140059024 | SYSTEM AND METHOD OF STORAGE, RECOVERY, AND MANAGEMENT OF DATA INTERCEPTED ON A COMMUNICATION NETWORK - A system, method, and apparatus for storing, retrieving, and managing data streams, such as data packets, on a network are disclosed. In one embodiment, a network monitoring system (NMS) includes an access device for retrieving data from a network, and a circular storage device coupled to the access device. The circular storage device is operative to retrieve a portion of a data stored in the circular storage device based on a query. The portion of the data retrieved is a broader subset of results of the query. A remote data processing device refines the portion of the data retrieved from the circular storage device based on the query. The circular storage device coupled to the access device may be further operative to overwrite the at least a portion of the data stream based on a set of criteria. | 02-27-2014 |
20140067778 | SELECTIVE OFFLINING STORAGE MEDIA FILESYSTEM - A method of operation of a storage control system includes: configuring a state change policy on a data server, the state change policy including an online duration for a storage device; activating the storage device based on the state change policy; mounting the storage device based on the state change policy; and scheduling a filesystem maintenance task to be performed on the storage device based on the state change policy. | 03-06-2014 |
20140067779 | PREDICTIVE INFORMATION TOPOLOGY MODELING AND VISUALIZATION - A system and method of ensuring usage-based compliance based on a predicted model topology are disclosed. The system includes an information topology that extracts information from at least one information object, a daemon that operates to monitor interactions with at least one information object, an analyzer that performs a statistical-based pattern analysis using the monitored interactions, and a compliance policy that receives input from the information topology. The compliance policy is adjusted based on the analyzer and any new rules, and compares the actual state to the desired state. The method includes monitoring a file system to capture user interaction with the file system, performing statistical-based pattern analysis on the captured interactions, adjusting a compliance policy based on the statistical analysis and any new rules, inputting an information topology into the compliance policy, and comparing the actual state to a desired state that is based on the adjusted compliance policy. | 03-06-2014 |
20140074806 | VALIDATING DOCUMENTS USING RULES SETS - The disclosure generally describes computer-implemented methods, software, and systems for detecting and correcting errors in documents. A computer-implemented method includes: (i) identifying a string policy enforcement rules set associated with at least one set of documents, each rule in the rules set including one or more specific rule strings and instructions relating to string-based policies; (ii) identifying at least one document containing at least one string, the at least one identified document associated with at least one rule included in the identified string policy enforcement rules set; and (iii) validating the at least one identified document, wherein validating the at least one identified document includes validating the at least one string in the at least one identified document using the at least one rule from the string policy enforcement rules set associated with the at least one identified document. | 03-13-2014 |
20140081931 | Automatic Rule Generation - In an example embodiment, a method of automatically generating data validation rules from data stored in a column of a table is provided. Outliers for the data are determined by analyzing a profiling statistic for the data, the profiling statistic having a type. Then it is determined if a predefined limit is exceeded, based on a quantity of the outliers determined for the data through the analysis of the profiling statistic. A data validation rule is then automatically generated based on non-outliers detected in the data through the analysis of the profiling statistic, the generated data validation rule also being based on the type of the profiling statistic. The data validation rule can then be applied to data subsequently entered for the column, causing at least a portion of the data subsequently entered for the column to be rejected. | 03-20-2014 |
20140081932 | METHOD AND SYSTEM FOR SECURE AUTOMATED DOCUMENT REGISTRATION FROM SOCIAL MEDIA NETWORKS - A method and system for secure automated document registration with social media. A secure cloud transformed electronic document is created on an application on a target network device from an original electronic document. The original electronic document is electronic text, audio, video or pictures from a social media network or from a telecommunications network. The secure cloud transformed electronic document is made viewable via the target network device and other target devices from anywhere on a cloud communications network or on a social media network without the ability to tamper with the information within the secure cloud transformed electronic document. This provides an automatic secure electronic document registration system on the cloud communications network and the social media network. | 03-20-2014 |
20140089278 | Integrated Data Retention Policy for Solid State & Asymmetric Access - Embodiments of the present disclosure provide for a method and system for storing content based on one or more attributes associated with the content. Specifically, the present disclosure provides for determining storage capabilities of one or more storage devices associated with a computing device and also determining a retention policy associated with the content. In certain embodiments, the retention policy is identified by the one or more attributes. When the retention policy and the capabilities of the one or more storage devices have been determined, the content is written to the one or more storage devices based on the retention policy. | 03-27-2014 |
20140089279 | AUTOMATED SEPARATION OF CORPORATE AND PRIVATE DATA FOR BACKUP AND ARCHIVING - A computing device categorizes data items as a corporate data items when a first criterion is satisfied and as personal data items when a second criterion is satisfied. The computing device provides identified corporate data items to a first backup system that stores the corporate data items to a corporate data store. The computing device further provides identified personal data items to a second backup system that stores the personal data items to a personal data store. | 03-27-2014 |
20140101117 | METHODS AND SYSTEMS FOR MANAGING RECORDS IN AN ON-DEMAND SYSTEM - Methods and systems are provided for managing records in a database. An exemplary method involves a server coupled to the database determining a value indicative of a relative uniqueness of an input record based on a subset of a plurality of fields of the input record and storing the input record in the database when that value is unique among one or more values for one or more existing records in the database. Each value of the one or more values for the existing records is also based on the subset of the plurality of fields of a respective existing record and is indicative of the relative uniqueness of that respective existing record. | 04-10-2014 |
20140114939 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DETERMINING ISSUES BETWEEN RULES - In accordance with embodiments, there are provided mechanisms and methods for determining issues between rules. These mechanisms and methods for determining issues between rules can enable improved system performance, increased system efficiency, enhanced user feedback, etc. | 04-24-2014 |
20140136494 | SYSTEM AND METHOD FOR AUTOMATIC WRAPPER INDUCTION BY APPLYING FILTERS - Information from a plurality of domains is automatically extracted according to an iterative application of rules. A first rule is generated based on a target string. The first rule comprises at least one filter. A domain of interest is identified and a training set is generated using the target string and at least one document in the domain of interest. The first rule is applied to each document in the training set to obtain a first of target results. The first set of target results are compared to desired set of target results. Based on the comparison, a second rule may is created and applied to the training set to yield an improved second set of target results. | 05-15-2014 |
20140143214 | MAINTAINING ACCESS CONTROL LISTS IN NON-IDENTITY-PRESERVING REPLICATED DATA REPOSITORIES - Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space. | 05-22-2014 |
20140143215 | ASSURED FEDERATED RECORDS MANAGEMENT - A record is managed by obtaining from an external system on which a stored object comprising the record is stored a property of the stored object as stored on the external system. A stored property associated with the record is compared with the obtained property of the stored object. In the event the comparison does not match, responsive action is taken. | 05-22-2014 |
20140143216 | SYSTEMS AND METHODS FOR MATCHING, SELECTING, NARROWCASTING, AND/OR CLASSIFYING BASED ON RIGHTS MANAGEMENT AND/OR OTHER INFORMATION - Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class. | 05-22-2014 |
20140143217 | SYSTEM AND METHOD FOR MANAGING DATA POLICIES ON APPLICATION OBJECTS - Described herein are systems and methods for providing data policy management over application objects in a storage system environment. An application object may comprise non-virtual or virtual objects (e.g., non-virtual-based applications, virtual-based applications, or virtual storage components). An application object manager may represent application objects by producing mapping graphs and/or application object data that represent application objects in a standardized manner. A mapping graph for an application object may describe a mapping between the application object and its underlying storage objects on a storage system. Application object data may describe a mapping graph in a standardized format. Application object data representing application objects may be received by an application policy manager that manages data policies on the application objects (including virtual applications and virtual storage components) based on the received application object data. Data policies may include policies for backup, service level objectives, recovery, monitoring and/or reporting. | 05-22-2014 |
20140156614 | MANAGING STRUCTURED DATA FIELDS WITHIN A SOCIAL MEDIA CHANNEL - Managing structured data fields within a social media channel. Modifications are detected to a structured data field inside the social media channel from content passed from a document creation application that runs on a platform of a structured database management system and is supported by a business management application which supports rules for the content. The structured data field is modified by a user. The modifications are shared to the structured data field with collaboration group within the social media channel integrated within the document creation application, the modifications to the structured data field represented as structured data. Further, the collaboration group is enabled to modify the structured data. The structured data field is then updated with the structured data that is modified by the collaboration group The document creation application is further controlled if the structured data field that is updated violates a rule in the business management application. | 06-05-2014 |
20140156615 | METHOD AND APPARATUS FOR GENERATING A DATA REPOSITORY - A computer system for generating a data repository comprising engineering, service, and lifecycle rules related to domain specific objects used by engineering, service and lifecycle software tools, may include for each engineering, service, and lifecycle software tool a software plugin adapted to generate rules arising while interacting with the respective engineering, service, and lifecycle tool, and to store the generated rules in said data repository of said computer system. | 06-05-2014 |
20140156616 | METHOD AND SYSTEM OF STORING DATA FILES - A method and system for storing data files are provided. The method includes receiving a first data file and a first data file virtualization policy; associating the first data file with the first data file virtualization policy; and storing the first data file and the first data file virtualization policy on a storage device in communication with the computer system. | 06-05-2014 |
20140172807 | POLICY-BASED FILE MANAGEMENT FOR A STORAGE DELIVERY NETWORK - A method for managing storage and access to data files stored in a storage delivery network comprising a plurality of geographically distributed storage nodes, the method including: receiving a file request from a user, wherein the user is associated with a service level agreement (SLA) containing one or more policies governing handling of file requests from the user; determining if the SLA dictates redirecting the file request to a predetermined storage node; if the SLA dictates redirecting the file request to a predetermined storage node, redirecting the file request to the predetermined storage node; otherwise, identifying all storage nodes from the plurality of geographically distributed storage nodes that are not too busy by determining whether a number of current access requests being served by each storage node exceeds a predetermined threshold value; identifying a nearest storage node from among the not too busy storage nodes; and redirecting the user request to the nearest storage node. | 06-19-2014 |
20140172808 | Multi-Layered Metadata Management System - A metadata layer management system is presented. Layers of metadata objects can be constructed where each metadata layer object comprises a rights policy. As entities interaction with the metadata layer objects, possibly by navigating links among the objects, each entity's access rights to the objects are governed by the rights policy. Further, the disclosed techniques provide for resolving rights conflicts among the rights policies of the metadata layer objects. | 06-19-2014 |
20140181055 | Policy-based management of a redundant array of independent nodes - An archive cluster application runs across a redundant array of independent nodes. Each node runs an archive cluster application instance comprising a set of software processes: a request manager, a storage manager, a metadata manager, and a policy manager. The request manager manages requests for data, the storage manager manages data read/write functions, and the metadata manager facilitates metadata transactions and recovery. The policy manager implements policies, which are operations that determine the behavior of an “archive object” within the cluster. The archive cluster application provides object-based storage. It associates metadata and policies with the raw archived data, which together comprise an archive object. Object policies govern the object's behavior in the archive. The archive manages itself independently of client applications, acting automatically to ensure that object policies are valid. | 06-26-2014 |
20140188825 | PLACEMENT POLICY - A region-based placement policy that can be used to achieve a better distribution of data in a clustered storage system is disclosed herein. The clustered storage system includes a master module to implement the region-based placement policy for storing one or more copies of a received data across many data nodes of the clustered storage system. When implementing the region-based placement policy, the master module splits the received data into one or more regions, where each region includes a contiguous portion of the received data. Further, for each of the plurality of regions, the master module stores complete copies of the region in a subset of the data nodes. | 07-03-2014 |
20140195503 | METHOD AND SYSTEM FOR MANAGING CACHE FILES - A method and a system for managing cache files, adapted for a local end apparatus to manage files cached from a service end apparatus, are provided. In the method, a file is divided into a plurality of segments, and a part of the segments are downloaded from the service end apparatus and stored in the local end apparatus. Then, the segments of the file to be downloaded are increased or decreased according to a utility rate of the file. | 07-10-2014 |
20140195504 | STATISTICAL IDENTIFICATION OF INSTANCES DURING RECONCILIATION PROCESS - A system for reconciling object for a configuration management databases employs statistical rules to reduce the amount of manual identification required by conventional reconciliation techniques. As users manually identify matches between source and target datasets, statistical rules are developed based on the criteria used for matching. Those statistical rules are then used for future matching. A threshold value is adjusted as the statistical rules are used, incrementing the threshold value when the rule successfully matches source and target objects. If the threshold value exceeds a predetermined acceptance value, the system may automatically accept a match made by a statistical rule. Otherwise, suggestions of possibly applicable rules may be presented to a user, who may use the suggested rules to match objects, causing adjustment of the threshold value associated with the suggested rules used. | 07-10-2014 |
20140201176 | FILE SYSTEM WITH PER-FILE SELECTABLE INTEGRITY - A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. Such a setting for a file system object can be changed to and from having integrity on. Given a file system object with an attribute, the file system provides file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute. | 07-17-2014 |
20140222771 | MANAGEMENT DEVICE AND MANAGEMENT METHOD - A management device includes a memory and a processor coupled to the memory. The processor executes a process including: acquiring, from a plurality of devices, group information indicating a management group used to manage the devices and setting information indicating a setting item and setting content that are set in each of the devices; extracting a setting item corresponding to setting content that is common to devices included in a same management group indicated by the acquired group information; and creating, for the extracted setting item, a rule indicating that a common setting content is set to the devices included in the same management group. | 08-07-2014 |
20140236909 | System and Method for Governing Data Entry Into a Network Data Base by Multiple Entities Having Varying Data Requirements - A system for governing entry of data into a database commonly accessible by a plurality of entities, each of which has requirements for its data that differ from the requirements of other entities, comprised one or more rules base servers for storing a rules base data structure. The data structure is a collection of documents which are either a rule applicable to an entity or a rules interface which provides a navigation route to an applicable rule. The system includes a rules engine which executes an algorithm that recursively searches the documents in the rules base, evaluating each document until a rule is found, executing the rule, and storing the result returned by the executed rule, until all applicable rules for the entity submitting the set of data are executed. | 08-21-2014 |
20140236910 | APPLICATION OF RETENTION RULES TO RECORDS - A system for automatically applying retention categories and retention rules to records. The system defines a plurality of retention categories. Each retention category of the plurality of retention categories comprises a criteria for membership in the retention category and at least one retention rule for the retention category. The system receives at least one record. The system automatically associates a retention category of the plurality of retention categories with the at least one record. The at least one record meets the criteria for membership in the associated retention category. The system automatically applies the retention rule of the associated retention category to the at least one record. | 08-21-2014 |
20140244605 | CONTENT VALIDATION FOR DOCUMENTATION TOPICS USING PROVIDER INFORMATION - At least one processor may determine one or more issues in one or more of a plurality of documentation topics that document at least one software functionality based at least upon applying one or more business rules to the one or more of the plurality of documentation topics. Responsive to determining the one or more issues, one or more entries may be inserted into an issues report, wherein the one or more entries include information regarding the one or more issues. | 08-28-2014 |
20140250091 | Systems and Methods for Managing Media Files - Various embodiments are disclosed for facilitating media management. A method for managing digital content comprises obtaining a media file and generating a primary identifier unique to the media file and obtaining at least one storage destination for the media file, wherein the at least one storage destination comprises one of: at least one user-specified storage destination and at least one storage destination automatically determined by an analyzing component. Based on the at least one storage destination, a secondary identifier unique to the at least one storage destination is generated. The method further comprises generating a media identifier based on primary identifier and the secondary identifier, storing the media identifier, and performing batch processing of media files based on corresponding media identifiers. | 09-04-2014 |
20140250092 | RULE DISCOVERY SYSTEM, METHOD, APPARATUS AND PROGRAM - A system, an apparatus, a method and a program are provided which render it possible to obtain with high efficiency a set of rules useful in grasping or correcting contents of a database. The system includes a free itemset generation unit ( | 09-04-2014 |
20140258250 | Flexible Control Framework Featuring Standalone Rule Engine - A database system features a standalone rule-based engine that is decoupled from internal controls implemented by a separate existing control engine. The standalone rule engine is configured to execute business rules during runtime, in order to produce outcomes relevant to stored database information. The standalone rule engine offers enhanced flexibility, allowing its reuse by outside entities. For example, certain embodiments allow the outcomes of the standalone rule engine to be consumed by third parties, including but not limited to: Key Risk Indication (KRI), Audit Management, Analytics tools, and 3rd party compliance management tools. | 09-11-2014 |
20140279972 | CLEANSING AND STANDARDIZING DATA - Data cleansing and standardization techniques are provided. A user interactively defines rules for cleansing and standardizing data of a source dataset. The rules are applied to the data and varying degrees of results and metrics associated with applying the rules are presented to the user for inspection and analysis. | 09-18-2014 |
20140304243 | METHOD AND SYSTEM FOR MANAGING AND SECURING SUBSETS OF DATA IN A LARGE DISTRIBUTED DATA STORE - A system groups multiple entities in a large distributed data store (DDS), such as directories and files, into a subset called a domain. The domain is treated as a unit for defining policies to detect and treat sensitive data. Sensitive data can be defined by enterprise or industry. Treatment of sensitive data may include quarantining, masking, and encrypting, of the data or the entity containing the data. Data in a domain can be copied as a unit, with or without the same structure, and with transformations such as masking or encryption, into parts of the same DDS or to a different DDS. Domains can be the unit of access control for organizations, and assigned tags useful for identifying their purpose, ownership, location, or other characteristics. Policies and operations, assigned at the domain level, may vary from domain to domain, but within a domain are uniform, except for specific exclusions. | 10-09-2014 |
20140324800 | Management Method And System Implementation, Execution, Data Collection, And Data Analysis Of A Structured Collection Procedure Which Runs On A Collection Device - Embodiments related to a system and method managing the implementation, execution, data collection, and data analysis of a structured collection procedure running on a portable, hand-held collection device are disclosed. The collection device performing the structured collection procedure has program instructions that when executed by a processor causes the processor to initiate automatically a schedule of events of the structured collection procedure upon one or more entry criterions being met at some unknown time, store in memory patient data collected in accordance to the schedule of events, end automatically the structured collection procedure upon one or more exit criterions being met at some unknown time, and mark/indicate the structured collection procedure as completed if no exception occurred during performance of an event in the schedule of events. | 10-30-2014 |
20140324801 | PROCESS AND METHOD FOR DATA ASSURANCE MANAGEMENT BY APPLYING DATA ASSURANCE METRICS - The present invention relates generally to methods, software and systems for measuring and valuing the quality of information and data, where such measurements and values are made and processed by implementing objectively defined, measurable, comparable and repeatable dimensions using software and complex computers. The embodiments include processes, systems and method for identifying optimal scores of the data dimension. The invention further includes processes, systems and method for data filtering to improve the overall data quality of a data source. Finally, the invention further includes processes, systems and method for data quality assurance of groups of rows of a database. | 10-30-2014 |
20140324802 | DISTRIBUTED SCALABLE POLICY BASED CONTENT MANAGEMENT - A method for defining and constraining the behavior of a shared, mobile content management system is disclosed. The method includes providing an admin console for defining, modifying, and managing declarative policies. Declarative policies are defined based on an XML policy model. The XML policy model dictates the policies that can be expressed by the admin console. The defined declarative policies are enacted without requiring the content management system to be restarted, reconfigured, or re-implemented. An XML-based policy wizard definition language is provided to define policy wizards in the admin console that guide an administrator through the steps of creating and editing the policies. Additionally, at least one policy repository based on LDAP is provided. The at least one policy repository has an interface and is adapted to store a plurality of declarative policies. The policy repository has scalable and distributed capabilities. | 10-30-2014 |
20140330799 | AUTOMATING GENERATION OF MESSAGES IN ACCORDANCE WITH A STANDARD - Arrangements described herein relate to automating generation of maps containing message formats and semantic validation rules. First unstructured data defining message formats for messages that conform to a particular standard and second unstructured data defining semantic validation rules to be applied to validate the messages can be scanned. First structured data corresponding to the first unstructured data defining the message formats and second structured data corresponding to the second unstructured data defining the semantic validation rules can be stored into a database. The first structured data and second structured data are configured to be processed to automatically generate a map comprising message formats and sematic validation rules for use in generating messages that conform to the particular standard and validating the messages. | 11-06-2014 |
20140330800 | METHOD AND SYSTEM FOR ELECTRONIC FILE LIFECYCLE MANAGEMENT - A method and system for managing a file lifecycle is disclosed. The method incorporates a virtual file cabinet having virtual drawers. Files are moved from drawer to drawer throughout their lifecycle in accordance with policies associated with each drawer. The files are moved automatically and as such, a file's lifecycle is managed from file creation to file deletion in an automated fashion. By using an archiving device such as magneto optical storage media, the files are automatically moved to their final archived location in an archiving drawer once certain policies of their present drawer are met. The system is an electronic system employing the inventive method. | 11-06-2014 |
20140337300 | Method and System for Organizing and Storing Manufacturing Process Information - A method and system for capturing, organizing, storing, and analyzing manufacturing process information, with storage and performance characteristics suitable for use in resource-constrained embedded devices. Process information is organized into extensible Channels, each of which captures information stored as extensible Events, each of which may include Metric, Category Value, Annotation, and System Fields. Shared Boundaries between Channels make it easier to organize, store, interrelate, analyze, and explore information. Channel Boundary Relationships (e.g., Coupling, Fragmenting, Projecting, and Aggregating) create shared Boundaries; and can create, or be combined to create, sets of Channels that share Boundaries (referred to as a Slice Set). Shared Boundaries and Channel Boundary Relationships facilitate rule-based traversal of Exploration Hierarchies constructed from Channels, Categories, and Metrics, which enable users to view, analyze, interpret, understand, and otherwise benefit from Metrics and other information while traversing groups of Categories. | 11-13-2014 |
20140344232 | METHODS AND SYSTEMS FOR VALIDATING MULTIPLE METHODS OF INPUT USING A UNIFIED RULE SET - A system and methods for validating input data acquired through an interactive or non-interactive source. The system includes a common definition of input validation rules, and the capability of validating input without committing the input to the system. | 11-20-2014 |
20140344233 | SERVER APPARATUS, AND DATA EXTRACTION METHOD - A server apparatus performs first data extraction by first rule and second data extraction by a plurality of second rules, the plurality of second rules being generated from the first rule, and notifies an existence of notifying rule, when the plurality of second rules include a notifying rule that matches a specific condition. | 11-20-2014 |
20140344234 | AUTOMATED, TIERED DATA RETENTION - The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period. | 11-20-2014 |
20140351230 | METHOD AND APPARATUS FOR AGGREGATING AND TRANSLATING REAL-TIME USER INFORMATION TO UPDATE SOCIAL NETWORK PROFILES - A method, computer readable medium and apparatus for automatically updating social network profiles are disclosed. For example, the method receives one or more inputs from a subscriber, processes the one or more inputs in accordance with a policy defined by the subscriber to produce an update about the subscriber and publishes the update about the subscriber on one or more social network profiles associated with the subscriber. | 11-27-2014 |
20140372391 | CONTENT VALIDATION FOR DOCUMENTATION TOPICS USING PROVIDER INFORMATION - At least one processor may determine one or more issues in one or more of a plurality of documentation topics that document at least one software functionality based at least upon applying one or more business rules to the one or more of the plurality of documentation topics. Responsive to determining the one or more issues, one or more entries may be inserted into an issues report, wherein the one or more entries include information regarding the one or more issues. | 12-18-2014 |
20140379673 | Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies - An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others. | 12-25-2014 |
20150012508 | COMPOSITE MEDIUM MANAGEMENT SYSTEM, INFORMATION MANAGEMENT SERVER APPARATUS, COMPOSITE ACCESS CONTROL CREATION APPARATUS, AND PROGRAM - Upon receiving a medium storage request from a client apparatus, an information management server apparatus according to an embodiment evaluates, based on at least one policy file read out based on at least one parent management ID in the medium storage request and user information in the medium storage request, whether medium storage responding to the medium storage request is possible. Upon evaluating that the medium storage is possible, the information management server apparatus creates composite access control which do not violate any management rules included in the at least one policy file. | 01-08-2015 |
20150032707 | SYSTEMS AND METHODS FOR PRUNING DATA BY SAMPLING - Techniques provided herein allow for management of data. In various embodiments, systems and methods prune and retain data being managed by a data management system, where the managed data can include log data aggregated from one or more servers for analysis purposes. According to some embodiments, pruning can be triggered according to one or more constraints, such as the age of managed data (e.g., retain only 30 days of managed data) or the memory space required to store the managed data (e.g., retain only 100 GB worth of managed data). The constraints that trigger data pruning can be based on a data retention policy. When triggered, pruning can be performed on a fraction of the managed data stored based on the data retention policy (e.g., 3 days of full managed data, 27 days of pruned managed data). The pruning may be performed by sampling, at a desired rate, the managed data. | 01-29-2015 |
20150032708 | DATABASE ANALYSIS APPARATUS AND METHOD - A database analysis apparatus pays its attention to table columns more than two constituting a table among plural tables that a database holds, and analyzes automatically a dependence and a limitation condition that exist between the table columns from a tendency of appearance at the same time of data which each table column maintains, which comprises a data category calculation means to calculate a method of categorizing a data group from association rules generated from the data group of two or more table columns and an association rules reconstruction means to generate association rules of the best granularity by reconstructing the association rules based on the result of the above categorizing. | 01-29-2015 |
20150046412 | HANDLING OF ERRORS IN DATA TRANSFERRED FROM A SOURCE APPLICATION TO A TARGET APPLICATION OF AN ENTERPRISE RESOURCE PLANNING (ERP) SYSTEM - An aspect of the present disclosure provides for handling of errors in data transferred from a source system to a target system. In an embodiment, the data is first transferred (from a source system) to a staging table as staging data. A user is enabled to configure rules to identify a respective portion of interest in the staging data, an error condition to be checked in the respective portion, and an action to be performed upon detection of the error in the respective portion. Accordingly, the staging data stored in the staging table is examined according to the rules to identify a first error associated with a first portion of the staging data, and an action associated with the combination of first portion and the first error is performed, as specified in the rules. | 02-12-2015 |
20150066882 | POLICY DRIVEN AUTO-TRANSITIONING FRAMEWORK FOR GOVERNED OBJECTS IN SERVICE REGISTRIES - A method for automated policy-driven transitioning of governed objects in a service registry is provided. The method includes receiving a request in a service registry executing in memory of a host server computing system to persist a governed object of a service registry. The method also includes identifying a policy to be applied to the governed object in response to the receipt of the request. The method yet further includes applying the policy to the governed object and determining whether or not the application of the policy has been successful. Finally, the method includes triggering a transition of the governed object from a contemporaneous state to a new state in the service registry if the application of the policy has been successful. In this way, governed objects of the service registry can be transitioned from one state to the other driven by policies in an automated way. | 03-05-2015 |
20150095296 | METHOD AND APPARATUS FOR A DATA CONFIDENCE INDEX - Techniques for providing a data confidence index are presented herein. In one embodiment, a method includes setting a default confidence index for a remote computing device, the confidence index indicating trustworthiness of data provided by the remote computing device, the remote computing device operating as part of a network of cooperating devices; applying a plurality of ordered rules for the remote computing device, respective rules comprising a rule pre-condition and a confidence index adjustment, respective rules considering one of a behavior of the remote computing device and a property of the remote computing device; and adjusting the confidence index for the remote computing device responsive to results of applying the plurality of ordered rules. A system and apparatus substantially perform steps of the disclosed method. | 04-02-2015 |
20150112951 | DATA MANAGEMENT IN DISTRIBUTED FILE SYSTEMS - Technology is disclosed for managing data in a distributed processing system (“the technology”). In various embodiments, the technology pushes “cold” data from a primary storage of the distributed processing system to a backup storage thereby maximizing the usage of the space on the primary storage to store “hot” data on which most data processing activities are performed in the distributed processing system. The cold data is retrieved from the backup storage into the primary storage on demand, for example, upon receiving an access request from a client. While the primary storage stores the data in a format specific to the distributed processing system, the backup storage stores the data in a different format, for example, format corresponding to the type of backup storage. | 04-23-2015 |
20150112952 | METHOD OF DATA SORTING - A method of data sorting is provided. The method at least comprises setting a classification rule in a table of t_file for a database of a computer-readable storage medium, wherein the computer-readable storage medium at least comprises a receiving unit, a processing unit and a storage unit. The receiving unit receives a plurality of files having file names. The processing unit processes the file names according to the classification rule to generate a plurality of conversion codes corresponding to the file names. The storage unit stores the conversion codes in the table of t_file for corresponding to the file names. The storage unit orderly stores the conversion codes according to a predetermined order of the classification rule. | 04-23-2015 |
20150112953 | EXPANDABLE METHOD AND SYSTEM FOR STORING AND USING FACT DATA STRUCTURE FOR USE WITH DIMENSIONAL DATA STRUCTURE - The ability to store fact data and related dimensions is improved by having a single fact data structure connected to a plurality of dimensional structures via a bridge structure, which take the position of the data structure. | 04-23-2015 |
20150134627 | END OF RETENTION PROCESSING USING A DATABASE MANAGER SCHEDULER - End of retention processing is provided. Included is: creating, using a content manager (CM), an end of retention policy for a content in a database management system (DBMS; and creating, based on the end of retention policy, a stored procedure in the DBMS for managing the end of retention policy. | 05-14-2015 |
20150134628 | END OF RETENTION PROCESSING USING A DATABASE MANAGER SCHEDULER - End of retention processing is provided. Included is: creating, using a content manager (CM), an end of retention policy for a content in a database management system (DBMS; and creating, based on the end of retention policy, a stored procedure in the DBMS for managing the end of retention policy. | 05-14-2015 |
20150142764 | LANGUAGE TAG MANAGEMENT ON INTERNATIONAL DATA STORAGE - According to one aspect of the present disclosure, a system and technique for language tag management includes a data source categorized using language tags and logic executable by a processor unit to: access a standardized language tag repository to identify changes in repository language tags; search records of the data source to identify language tags present in records of the data source; determine whether the language tags present in the records of the data source are inconsistent with the repository language tags; responsive to determining that the language tags present in the records of the data source are inconsistent with the repository language tags, determine a language tag update policy for the data source; and perform a language tag update process for the records according to the language tag update policy to re-categorize the records based on the repository language tags. | 05-21-2015 |
20150149422 | DATA PROCESSOR AND A DATA PROCESSING METHOD - A data processor and a data processing method are provided. The data processor is arranged between a client and a database system to determine in advance whether a user instruction sent from the client updates data of the database system. When the data processor determines that the user instruction does not update data of the database system, the data processor sends the predefined data to the client and restrains the user instruction to the database system. Accordingly, the data processor can assist the database system to process the user instruction, so as to reduce in advance the enormous volume of data processing that the database system is requested upon. | 05-28-2015 |
20150149423 | DATA REDUNDANCY IN A CLUSTER SYSTEM - A cluster system includes a plurality of computing nodes connected to a network, each node including one or more storage devices. The cluster system stores data and at least one of data replicas or erasure-coded segments across the plurality of nodes based on a redundancy policy. Further, configuration information, which may be indicative of a data placement of the data and the data replicas or erasure-coded segments on the plurality of nodes, is provided to each of the plurality of nodes. Additionally, each of the nodes may act as a first node which is configured to determine, upon a change of the redundancy policy, updated configuration information based on the change of the redundancy policy and to send a message including information indicating the change of the redundancy policy to the other nodes of the plurality of nodes. | 05-28-2015 |
20150302040 | ENABLING TESTING OF PRODUCTION SYSTEMS WITHOUT AFFECTING CUSTOMER DATA SETS SYSTEM AND METHOD - A method, computer program product, and computer system for matching, at a computing device, one or more parameters of test data to one or more rules. A location of a data store is selected to store results of the test data, wherein the location is selected based upon, at least in part, the one or more rules matched to the one or more parameters of the test data. The results of the test data is separated from results of production data by storing the results of the test data at the location of the data store selected based upon, at least in part, the one or more rules matched to the one or more parameters of the test data. | 10-22-2015 |
20150302043 | DEVICE AND METHOD FOR MANAGING LIFESPAN OF CONTENT, AND SYSTEM USING THE SAME - A content lifespan management device assigns a life to a first content based on a user preference for the first content. The content lifespan management device extends or shortens a lifespan of the first content based on the user preference of the first content that is calculated after the life is assigned to the first content. | 10-22-2015 |
20150302044 | ENABLING TESTING OF PRODUCTION SYSTEMS WITHOUT AFFECTING CUSTOMER DATA SETS SYSTEM AND METHOD - A method, computer program product, and computer system for matching, at a computing device, one or more parameters of test data to one or more rules. A location of a data store is selected to store results of the test data, wherein the location is selected based upon, at least in part, the one or more rules matched to the one or more parameters of the test data. The results of the test data is separated from results of production data by storing the results of the test data at the location of the data store selected based upon, at least in part, the one or more rules matched to the one or more parameters of the test data. | 10-22-2015 |
20150310001 | PROCESSES TO BETTER SUPPORT DEFENSIBLE DISPOSAL IN RECORDS MANAGEMENT - Embodiments presented herein provide techniques for enforcing a document retention policy that uses defensible disposal processes. According to one embodiment, a records management system identifies a set of records in a container that is scheduled for deletion on a specified date according to a retention policy. The records management system generates one or more reports listing the records and information associated with the records. The records management system performs a deletion workflow to remove the records listed in the report. | 10-29-2015 |
20150310068 | Reinforcement Learning Based Document Coding - Systems and methods for enhanced document analysis and identification through a reinforcement learning framework are provided. A system may employ computer based reinforcement learning to interact with large populations of documents to help users achieve a goal. To accomplish this goal, rewards, value functions, states, policies, and actions may be modeled and various tools within the system can be used to achieve the user's goal. As actions are performed, the results of these actions may be used to update state, assess rewards, and update value functions and policy functions. If the goal is not achieved, the system may make adjustments by adjusting policies, pushing the user closer to their goal by methods of reinforcement learning. Once the goal is achieved, such as a confidence that at least a certain percentage of relevant documents have been identified, relevant documents may be provided to a party desiring the documents. | 10-29-2015 |
20150324416 | MANAGEMENT APPARATUS AND MANAGEMENT SYSTEM - a management apparatus is capable of more precisely distributing the load in redundant system reconstruction. The management apparatus is configured to detect a data migration instruction to migrate data of any one of plurality of data processing units; identify a plurality of groups that a plurality of operational data clusters stored by the any one of the plurality of data processing units belong to; identify a plurality of data processing units corresponding to each group; and change a redundant data cluster of the same group as an operational data cluster stored by the any one of the plurality of data processing units to an operational data cluster. | 11-12-2015 |
20150324417 | RULES BASED DATA PROCESSING SYSTEM AND METHOD - Systems, methods and mediums are described for processing rules and associated bags of facts generated by an application in communication with a processing engine, database and rule engine that process the bags of facts in view of the rules and generate one or more rule-dependent responses to the application which performs one or more work flows based on the responses. The rule engine may apply forward-chaining, backward-chaining or a combination of forward-chaining and backward-chaining to process the rules and facts. Numerous novel applications that work in conjunction with the processing engine, database and rule engine are also described. | 11-12-2015 |
20150324440 | Identifying Query Intent - Technologies are described herein for identifying query intent from a raw query. A method for identifying intent may include repeatedly separating and merging terms of a natural language expression based on a set of rule-based transpositions of natural language terms into one or more defined terms based on predetermined naming conventions for at least one software function. Thereafter, a cluster of previous search terms related to the defined terms may be identified, and the natural language expression may be associated with the identified cluster to create intent-based cluster information. | 11-12-2015 |
20150331777 | SYSTEM AND METHOD OF GENERATING DATA CENTER ALARMS FOR MISSING EVENTS - Systems, methods, architectures, mechanisms and/or apparatus to manage alarm generation associated with the failure of an expected event or action to occur. | 11-19-2015 |
20150331875 | SYSTEM AND METHOD FOR VALIDATING INTEGRATED DATA RECASTING OBJECTS - A system for validating integrated data recasting objects includes a data storage having a rules library containing a plurality of object rules and one or more repositories each containing integrated data and one or more recasting objects, each of the one or more recasting objects containing a plurality of objects, an integrated data validation module on one or more computers to conduct a validity test of at least one of the plurality of objects of a selected one of the one or more recasting objects of a selected one of the one or more repositories for compliance with one or more of the plurality of object rules, and a report module on one or more computers to produce a graphical representation of at least one result of the validity test. | 11-19-2015 |
20150339306 | REVISING POLICY STATEMENTS USING HYPERLINKS - A method, system, and/or computer program product revises a policy that provides rules on how to alter statements to access or manipulate data in a database. A user interface (UI) has a field containing a sample database query statement. The sample database query statement is parsed into clauses, where each clause depicts a specific type of grammatical structure. A different hyperlink is associated with each of the clauses. In response to receiving a signal activating a particular hyperlink for a particular clause, change options, for the particular clause, are presented from a resource that presents change options for the specific type of grammatical structure. User-selected changes to the particular clause are incorporated into a new rule, which causes a clause of the particular type of grammatical structure in any database query statement to be changed. Each change becomes a new rule in a revised policy. | 11-26-2015 |
20150347474 | Venue Data Validation - Techniques for validating venue data are described. The venue data can include records describing physical features of a venue and records describing conceptual features of the venue. A validation engine can detect conflicts between records in the venue data or conflicts between records in the venue data and external data. The conflict can include a physical conflict between two physical features, e.g., when a floor of a building is larger than a footprint of the building, a conceptual conflict between two occupants of a venue, e.g., when an airport baggage claim area is located next to a high school, or a relationship conflict between an occupant and a venue in which the occupant is allegedly located, e.g., ski resort located in an office building. The conflict can be defined in conflict rules. The validation engine can learn the conflict rules from historical venue data and truth references. | 12-03-2015 |
20150356095 | ASSESSING DATA GOVERNANCE BASED ON LEVELS OF ABSTRACTION - A computer receives a request for customization of a first data domain, of an organization, to be analyzed. The computer receives selection of the first data domain and a second data domain of the organization, a first data fulfillment element, and a linkage between the first data fulfillment element and one or both of the first data domain and the second data domain. The computer generates an improved data governance policy based, at least in part, on the first data domain, the second data domain, the first data fulfillment element, the linkage, and a characteristic of the organization. The computer identifies one or more differences between a current data governance policy associated with one or both of the first data domain and the second data domain and an improved data governance policy that is associated with one or both of the first data domain and the second data domain. | 12-10-2015 |
20150363454 | Method and Apparatuses for Handling Concurrent Accesses to Data in a Directory - The present specification faces the issue of detecting collisions caused by concurrent processes which operate on shared data, without compromising bandwidth and system performance. The present specification provides for: a user data repository that, for one or more requests to read data from different application front-ends, provides the data along with a current version value assigned to the data; a first application front-end that, upon determining a data modification, submits a modification request to the user data repository including a first replace indication with the data to be modified, a delete indication with the current version value received, and a second replace indication with a new version data to assign for the data to be modified; and wherein the user data repository accepts the modification if the current version value received from the application front-end matches the current version value at the user data repository, or rejects it, otherwise. | 12-17-2015 |
20150363485 | LEARNING AND USING CONTEXTUAL CONTENT RETRIEVAL RULES FOR QUERY DISAMBIGUATION - Various technologies related to generating and applying content retrieval rules are described herein. A content retrieval rule maps a combination of a query and a context to one of a query reformulation or content. The content retrieval rule is learned from search logs of a search engine, and is applied when the query having the context is received at the search engine. | 12-17-2015 |
20150370809 | SUPERSEDING OBJECTS IN A RETENTION SYSTEM - Superseding a prior version of a document, to which prior version a retention policy or other requirement has been applied, is disclosed. In some embodiments, an attribute of a retention policy indicates whether a document to which the retention policy has been applied is to be superseded by a subsequently created and/or saved version of the document. In some embodiments, the attribute is set by a logic or process configured to apply the retention policy to the document. If the retention policy indicates that supersede is enabled, in various embodiments when a subsequent version is created and/or saved, the prior version is promoted to the final phase of the retention policy that has been applied to it and automatically “qualified” for disposition as indicated in the final phase of the retention policy, without regard to intervening requirements, processes, phases, approvals, retention, waiting, or other periods, etc. | 12-24-2015 |
20150370848 | SYSTEM AND METHOD FOR MANAGING DATA INTEGRITY IN ELECTRONIC DATA STORAGE - A method for managing data integrity including: receiving a plurality of constraints related to a data structure stored in a data storage component; analyzing each of the plurality of constraints to determine a plurality of conditions based on the plurality of constraints; determining, a plurality of operations based on each of the plurality of conditions, wherein each operation provides for changes in data; and generating code based on the at least one constraint, the conditions and the operations. A system for managing data integrity including: a transmitter module configured to receive a plurality of constraints; a constraint translator module configured to analyze each of the plurality of constraints to determine a plurality of conditions based on the plurality of constraints; an analysis component configured to determine a plurality of operations based on each of the plurality of conditions, wherein each operation provides for changes in data; and wherein the constraint translator module is further configured to generate code. | 12-24-2015 |
20150370855 | Framework for Re-Writing Database Queries - Embodiments relate to re-writing database query plans, and visualizing such re-written query plans. A query re-write framework includes a query normalization engine in communication with a rule catalog comprising query re-write rules in the form of rule classes. The framework receives as input, a query plan graph to be re-written. Based upon the engine's application of re-write rules from the catalog, the framework produces a re-written query plan graph as output. An interface component of the framework may provide a visualization of the re-written query plan graph as part of a dashboard. A user may access the framework to enable/disable existing rules in the catalog, add new rules to the catalog, and/or control a sequence and a precedence in which rules are applied to re-write the query plan. A user may interact with the visualization of the re-written query plan for purposes of de-bugging, re-write optimization, and/or query development. | 12-24-2015 |
20150370865 | Framework for Visualizing Re-Written Queries to Database - Embodiments relate to re-writing database query plans, and visualizing such re-written query plans. A query re-write framework includes a query normalization engine in communication with a rule catalog comprising query re-write rules in the form of rule classes. The framework receives as input, a query plan graph to be re-written. Based upon the engine's application of re-write rules from the catalog, the framework produces a re-written query plan graph as output. An interface component of the framework may provide a visualization of the re-written query plan graph as part of a dashboard. A user may access the framework to enable/disable existing rules in the catalog, add new rules to the catalog, and/or control a sequence and a precedence in which rules are applied to re-write the query plan. A user may interact with the visualization of the re-written query plan for purposes of de-bugging, re-write optimization, and/or query development. | 12-24-2015 |
20150379025 | DYNAMIC ASSET ASSEMBLY USING A RULE BASED METHODOLOGY - In an approach for creating an asset, a computer receives a selection of at least one asset element and determines whether one or more asset elements are associated with the selected asset element. In response to determining one or more asset elements are associated with the selected asset element, the computer determines, based, at least in part, on one or more linkage rules, whether one or more of the associated asset elements are in the asset. Furthermore, in response to determining that at least one of the associated asset elements is in the asset, the computer generates an asset map. The asset map, generated by the computer for the asset, depicts the linkage rules, the selected asset elements, and the associated asset elements in the asset. | 12-31-2015 |
20150379026 | CONTENT FABRIC FOR A DISTRIBUTED FILE SYSTEM - A method, article of manufacture, and apparatus for providing content services on a distributed file system is discussed. These services may be applied to files, data blocks, and/or metadata. A content fabric that resides within or sits along side the distributed file system may apply the services. | 12-31-2015 |
20160004710 | WORK LOG EDITING METHOD AND INFORMATION PROCESSING APPARATUS - A memory unit of an information processing apparatus acquires at least one operation log in work performed on a management target device and difference information indicating a difference between a file before edit and the file after edit that is edited using an editing software. A computing unit extracts a first log indicating an activation operation of the editing software used in editing the file, from the log. Then, the computing unit replaces the first log with a second log indicating an operation for reflecting in the file the difference indicated in the difference information. | 01-07-2016 |
20160004742 | METHODS AND APPARATUS FOR HARMONIZATION OF DATA STORED IN MULTIPLE DATABASES USING CONCEPT-BASED ANALYSIS - In some embodiments, a data harmonization system can organize, classify, analyze and thus relate previously unrelated data stored in multiple databases and/or associated with different organizations. In such embodiments, the data harmonization system can relate such previously unrelated data sets to, for example, track trends, exceptions, inconsistencies, location, etc. such that determinations can be made based on such different and/or previously unrelated data sets. In such embodiments, the data harmonization system can be used to harmonize both structured data and/or unstructured data based on concept-based analysis. | 01-07-2016 |
20160026631 | NETWORK CONTROL AND MANAGEMENT USING SEMANTIC REASONERS IN A NETWORK ENVIRONMENT - An example method for facilitating network control and management using semantic reasoners in a network environment is provided and includes generating a fully populated semantics model of the network from network data according to a base network ontology of the network, mapping the fully populated semantics model to a network knowledge base, feeding contents of the network knowledge base to a semantic reasoner, and controlling and managing the network using the semantic reasoner. In specific embodiments, generating the model includes receiving the network data from the network, parsing the network data, loading the parsed network data into in-memory data structures, accessing a manifest specifying binding between a network data definition format and ontology components of the base network ontology, identifying ontology components associated with the network data based on the manifest, and populating the identified ontology components with individuals and properties from the corresponding data structures. | 01-28-2016 |
20160026676 | METHOD FOR APPLICATION MANAGEMENT, AS WELL AS SERVER AND TERMINAL DEVICE THEREOF - The present disclosure relates to methods for application program management as well as servers and terminal devices implementing the same. The method may include obtaining an application-file association list and managing applications installed therein according to the application-file association list. The application and file association list is obtained through statistics analysis of a server according to application program information of an application reported by the terminal device and file operation behaviors that the applications invoke a system read and write interface. | 01-28-2016 |
20160026687 | SOCIAL CAPTURE RULES - The collection of social data from social networking services for moderation purposes is improved by analyzing social mentions captured using an initial set of capture rules. The text and/or metadata of social mentions previously captured using an initial rule set of capture rules may be analyzed to identify common text and/or common metadata amongst those social mentions. A new rule set may be generated with capture rules having criteria selected based on the identified common text and/or common metadata. The new rule set may then be applied to capture new social data. | 01-28-2016 |
20160026731 | MANAGING COMPOUND XML DOCUMENTS IN A REPOSITORY - A declarative mechanism is used to manage large documents within a repository. The large documents are sectioned into subdocuments that are linked together by a parent document. The combination of the parent document and subdocument is referred to as a compound document. There are multiple options for configuring rules to break up a source document into a compound document and naming the subdocuments. The compound documents may be queried using statements that treat the compound document as a single XML document, or the parent document of a subdocument may be queried and treated independently. Access control and versioning can be applied at the finer granularity of the subdocument. | 01-28-2016 |
20160026736 | METHOD AND APPARATUS FOR IDENTIFYING AND RECOMMENDING EXCHANGING OF DIGITAL ASSETS - An approach for implementing an asset exchange platform for identifying assets associated with a user and providing recommendations to exchange the assets. The approach includes identifying one or more digital assets associated with a user. The approach also includes processing metadata associated with the one or more digital assets using an exchange rule to determine one or more other digital assets, a parameter for initiating an exchange of the one or more digital assets for the one or more other digital assets, or a combination thereof. Further, the approach includes presenting the one or more other digital assets, the parameter, or a combination thereof to the user as an exchange recommendation. | 01-28-2016 |
20160034476 | FILE MANAGEMENT METHOD - A file management method according to the present invention is based upon a file management method of making a file from a client to a storage device redundant by a certain redundant number and storing the file in the storage device, and the file management method according to the present invention includes a first step of accepting an additional file from the client to the storage device, a second step of comparing capacity of the additional file and unused physical capacity of the storage device and a third step of changing the redundant number of the already stored file, increasing the unused physical capacity and storing the additional file in the storage device when the capacity of the additional file is larger than the unused physical capacity. | 02-04-2016 |
20160041972 | SYSTEM AND METHOD FOR DYNAMIC DOCUMENT RETENTION - A system for dynamic document retention, in a multi-owner environment that includes a document management system, registers, in a retention service, plural different document owners for a same document. The system receives a different owner-defined document retention policy for the document from each of the document owners, and registers, in a plug-in registry, the policies. In response to a scheduler or a document owner, the system triggers an update of a document retention policy, adds/deletes a document owner from the document, and/or deletes the document when there are no remaining document owners. The document management system includes a retention service that tracks the owners of the same document(s), the plug-in registry that tracks the different document retention policies of the different document owners, and an optional scheduler. The event-based retention policies can be responsive to events occurring internal to or external to the document management system. | 02-11-2016 |
20160041995 | SYSTEM AND METHOD FOR PLANNING AND CONFIGURING A FILE SYSTEM MIGRATION - A migration plan is created that is based at least in part on an operator input. The resources of a destination file system are provisioned based on the migration plan. One or more processes to migrate the source file system for the provisioned resources of the destination file system are then configured based on the migration plan. | 02-11-2016 |
20160041997 | DATA STORAGE SYSTEM FOR ANALYSIS OF DATA ACROSS HETEROGENEOUS INFORMATION MANAGEMENT SYSTEMS - Systems and methods for generating customized reports from data storage databases and other information management system databases. The methods include normalizing queried information from different types of information management system databases to enable system-wide report generation. Other implementations are disclosed. | 02-11-2016 |
20160042024 | CONTINUOUS DATA HEALTH CHECK - A method of verifying data integrity comprising, storing data in a data storage system, scheduling an integrity check of at least a portion the data, wherein, scheduling the integrity check comprises determining when to perform the integrity check by accounting for a load on the storage system and taking into account any previous integrity checks of the at least a portion of the data. The method further comprises one of creating and updating an integrity status of the at least a portion of the data, with the integrity status comprising a reference to when the any previous integrity checks were performed on the at least a portion of the data and the integrity check was performed on the at least a portion of the data. The method further comprises providing the integrity status to a storage system user. | 02-11-2016 |
20160042027 | SYSTEM AND METHOD OF ROLLING UPGRADES OF DATA TRAITS - A method, article of manufacture, and apparatus for managing a computing environment, such as a cloud data repository. In some embodiments, this includes modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, the component of an object modified may include traits. In some embodiments, objects or traits may have more than one version. | 02-11-2016 |
20160055230 | METHOD FOR AVOIDING CONFLICTS IN DATABASE CLUSTER - A method for avoiding conflicts in a multi-master database cluster is provided. A set of hot spots is identified in the database cluster. When a given node receives a given transaction, the given node selects one or more hot-spot servicing nodes for one or more hot-spot sub-transactions, namely one or more sub-transactions of the given transaction that correspond to one or more hot spots of the set of hot spots. Subsequently, the given node redirects the hot-spot sub-transactions to their respective hot-spot servicing nodes. The hot-spot sub-transactions are then executed at their respective hot-spot servicing nodes. | 02-25-2016 |
20160063008 | FILE SYSTEM FOR EFFICIENT OBJECT FRAGMENT ACCESS - Technology is disclosed for accessing data fragments of data objects. The method receives a request for storing a data fragment of a data object in the storage server. The request includes an object identifier of the data object. The method further extracts a first string from the object identifier. The method then determines whether there is an existing file system object having a file system name that matches the first string. If there is no file system object that has a file system name that matches the first string, the method stores the data fragment as a fragment file with a file system name matching the first string. | 03-03-2016 |
20160063019 | SCRIPT CONVERTER - According to an embodiment, an apparatus including a memory and a processor is provided. The memory may store a plurality of conversion rules. The processor may receive a first script and determine a first type associated with the first script, a plurality of variables included in the first script, and a first layout associated with the first script. The processor may determine that at least one conversion rule of the plurality of conversion rules should be applied. The processor may determine a second type, a second variable, and a second layout. The processor may generate a second script associated with the second type and the second layout, the second script comprising the second variable, the second script executable against a database comprising a plurality of database processors. | 03-03-2016 |
20160063049 | COMPLIANCE VERIFICATION SYSTEM - In one embodiment, a system including a memory and processor is provided. The memory stores a plurality of quality rules and control rules. The processor receives a request comprising a plurality of parameters and data elements. The processor determines that the request is missing a first data element and that a second data element of the plurality of data elements is corrupt. The processor determines that a first number of data elements should have been communicated and a third number of data elements should have been processed. The processor determines that a second number of data elements were communicated and a fourth number of data elements were processed. The processor generates a report indicating that: the plurality of parameters is missing the first data element, the second data element is corrupt, the first number is less than the second number, and the fourth number is less than the third number. | 03-03-2016 |
20160063064 | RECORDING REASONS FOR METADATA CHANGES - Provided are techniques for recording reasons for metadata changes. In response to receiving a change to a metadata of a document, a reason for the change is requested. In response to receiving the reason, the reason is saved as additional metadata for the document. A reason indicator is associated with the metadata. | 03-03-2016 |
20160070698 | Database Management System Tools for An Automated Work to Stage Process - A computer compares an old database source file and new database source file to identify one or more changes between the old and the new database source files. Then, the computer generates one or more keys for each identified change. The keys are sorted into files that are then used to build a first dataset that includes at least one or more execution members. The execution members are initially grouped into one or more groups based on an order of execution of jobs associated with the one or more execution members. Then, within each group, the computer separates execution members that executable in parallel. Further, the computer builds a second dataset that includes at least a submit member for each group of execution members that executable in parallel. The submit member comprises a set of instructions to submit, for execution, all execution members of a group in parallel. | 03-10-2016 |
20160070819 | INTEGRATION DATABASE FRAMEWORK - A database system comprising a first database including a database manager and a schema with set of rules enabling the database manager to store and access data items in the first database, and a second database storing a plurality of data items. The schema further including rules to enable the database manager to access at least a subset of the data items in the second database. The first database further includes a first link pointing from the primary item to a replica of the secondary item stored in the first database, and a second link pointing from the replica to the secondary item in the second database. | 03-10-2016 |
20160078042 | EMBEDDING DATABASE PROCEDURES IN DATA-DRIVEN APPLICATIONS - Disclosed herein are systems and methods for embedding database procedures in data-driven software applications written in a language different from the database-procedure language. For example, in some embodiments, the hosting application may be written in ABAP whereas the database procedure may be written in SQLScript. In various embodiments, the database procedures are encapsulated in specially marked methods of the host application, which, when called at runtime, cause the database procedures to be created in a database catalog and executed on a database server. | 03-17-2016 |
20160078065 | Policy-based Storage Structure Distribution - Policy-based storage and retrieval combined with a distribution algorithm results in automatic and even distribution of policy-based storage structures across a set of nodes and dynamic, automated homing or ownership of policy-based storage structures. Large numbers of policy-based storage structures may be distributed without manual administration, allowing for rapid creation and destruction of storage structures. The overall load may be distributed and balanced across the server pool. Multiple entries having the same key value in a database- or table-like structure allow for distribution of policy-based storage and retrieval by key value and for queue semantics to be utilized for microqueues in the large database- or table-like structure. | 03-17-2016 |
20160085987 | PRIVACY PRESERVING DATA QUERYING - A method, system, and computer-readable memory containing instructions include employing a tokenizing authority to obtain a tokenized query term that represents a query term, using the tokenized query term to perform a lookup against a tokenized term database, determining whether the tokenized query term exists in the database. The method, system, and computer-readable memory may further include returning an encryption or decryption key corresponding to an encrypted record of information associated with the query term and corresponding to the tokenized query term. | 03-24-2016 |
20160092487 | CONCURRENT MULTIPLE HIERARCHICAL DATA STRUCTURES WITH CONSISTENT DATA - A method may include maintaining first data structure with records organized in a first hierarchy, and maintaining a second data structure with records organized in a second hierarchy. The method may also include receiving a first change request for a value stored in a first record. The first change request may be received from a parent in the first data structure of the first record. The method may additionally include changing the first value according to the first change request, and receiving a second change request for the value stored in the first record. The second change request may be received from a parent in the second data structure of the first record. The method may further include sending a notification to the parent in the first data structure that the parent in the second data structure is attempting to change the first record. | 03-31-2016 |
20160103846 | METHOD AND SYSTEM FOR APPLYING DATA RETENTION POLICIES IN A COMPUTING PLATFORM - Systems and methods for a multitenant computing platform. Original data is generated through operation of a computing platform system on behalf of an account of the computing platform system, and the original data is moderated according to a data retention policy set for the account. The moderated data is stored at the computing platform system. The computing platform system moderates the generated data by securing sensitive information of the generated data from access by the computing platform system, and providing operational information from the generated data. The operational information is accessible by the computing platform system during performance of system operations. | 04-14-2016 |
20160110407 | SPECIFYING AND APPLYING RULES TO DATA - A computing system processes data units using one of at least two different modes of applying a rule. In a first mode, data units are received in a particular order and are processed including writing an updated value to at least one state variable based on a result of applying the rule to the data unit. In a second mode, a selection of particular data units is processed including determining a first set of data units including an ordered subset of data units that occur before the particular data unit from the number of data units, prior to applying the rule to the particular data unit, updating at least one state variable to a state that would result from processing the first set of data units in the first mode, and applying the rule to the particular data unit including reading the updated value of the state variable. | 04-21-2016 |
20160117342 | File Monitoring - Various methods and systems for monitoring files in a computer system are provided. In this regard, aspects of the invention facilitate file monitoring without file handle use, as it pertains to file monitoring and tailing, thereby mitigating file handle locking conflicts. In various implementations, information for the monitored files is obtained from the kernel using a filter driver in the I/O path. When the filter driver detects write operations being performed on monitored files, file-write data is copied and placed in a kernel buffer, where it can be pulled by a user mode monitoring process and fed to a monitoring application. As such, there is no need for coordination between the monitoring process and the user mode processes of other third-party applications writing data to monitored files. | 04-28-2016 |
20160132512 | HIERARCHICAL MULTI-TENANCY MANAGEMENT OF SYSTEM RESOURCES IN RESOURCE GROUPS - Establishing hierarchical user management authority for storage resources organized into resource groups in a computing storage environment are provided. Each storage resource is associated with a resource group and storage resource object having a resource group attribute associating the storage resource object with one of the resource groups. The resource group label attribute is assigned to the resource group object. An additional attribute of the resource group object, that specifies management policies for the resource group object and the storage resources associated with the resource group object, is defined. One of the available users of the storage resources is associated with a user resource scope attribute. A schema is defined for comparing of values of the user resource scope attribute with the resource group label attribute. | 05-12-2016 |
20160140161 | FILE SYSTEM WITH PER-FILE SELECTABLE INTEGRITY - A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. Such a setting for a file system object can be changed to and from having integrity on. Given a file system object with an attribute, the file system provides file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute. | 05-19-2016 |
20160147776 | ALTERING DATA TYPE OF A COLUMN IN A DATABASE - Disclosed herein are system, method, and computer program product embodiments for altering the data type of a column in a database. An embodiment operates by converting an original dictionary associated with a column into a new dictionary. The new dictionary stores the values of the original dictionary using a different data type. An index vector containing the keys of the original dictionary is then updated to contain the associated keys of the new dictionary. Because the size of the original dictionary is often substantially smaller than the number of rows in the associated column, this dictionary conversion decreases the computation cost to the database system of altering the data type of the column and reduces or even minimizes database downtime for users. | 05-26-2016 |
20160147779 | Systems and Methods for Providing Distributed Tree Traversal Using Hardware-Based Processing - A database management system (DBMS) run a host CPU and a hardware coprocessor accelerate traversal of a tree-type data structure by allocating reusable memory in cache to store portions of the tree-type data structure as the tree-type data structure is being requested by the host CPU. The hardware coprocessor manages the cached tree-type data structure in a manner that is transparent to the host CPU. A driver located at the host CPU or at a separate computing device can provide an interface between the host CPU and the hardware coprocessor, thus reducing communications between the host CPU and the hardware coprocessor. | 05-26-2016 |
20160147787 | SYNCHRONIZATION OF COLLABORATIVE DOCUMENTS WITH AN ONLINE DOCUMENT MANAGEMENT SYSTEM - Embodiments describe document synchronization between a client and an online document management system. In one embodiment, a computing device identifies a mapping between a local folder and a remote folder, identifies a local file in the local folder, and determines if a remote copy of the local file exists in the remote folder. When the remote copy does not exist, the computing device either uploads the local file to the remote folder or moves the local file to an archive folder on the computing depending on whether the local file was modified after a previous synchronization. When the remote copy does exist, the computing device either uploads the local file to the remote folder or skips the upload depending on whether the remote copy was modified after a previous synchronization, the local file was modified after the remote copy, and the local file and the remote copy have different file sizes. | 05-26-2016 |
20160147811 | Database Lockless Index for Accessing Multi-Version Concurrency Control Data - An operation on a row of a table of a database is initiated. Thereafter, a multi-version concurrency control (MVCC) object is accessed to identify blocks associated with the row position of the row using bitwise operations. Subsequently, a row state block computed based on the row position of the row is accessed to determine a row state for the row. At least one other block is accessed, based in part on the row state, to obtain at least one timestamp from the computed offset based on the row. Next, the at least one timestamp is stored or retrieved. Related apparatus, systems, techniques and articles are also described. | 05-26-2016 |
20160147823 | PATTERN-BASED PROBLEM DETERMINATION GUIDANCE - Embodiments in accordance with the present invention disclose a method and system for pattern-based problem determination guidance. The method involves receiving data with respect to a computer system and determining a pattern index based on the data, searching a database to find a matching pattern index, creating problem determination guidance based on the matching pattern index and an associated PCI triplet, sending the guidance to the computer system and receiving feedback from the computer system indicating the corrective action that was implemented, along with a response of the computer system, and storing in the database, data indicating the corrective action, and the response of the computer system to the corrective action. | 05-26-2016 |
20160154828 | BUSINESS RULES MANAGER | 06-02-2016 |
20160179576 | QUOTA BASED RESOURCE MANAGEMENT | 06-23-2016 |
20160188640 | Adapting Data Quality Rules Based Upon User Application Requirements - During application of data quality rules to a data set obtained from a data source, data is retrieved from the data source along with a common set of rules configured to format the retrieved data in a manner in accordance with one or more predefined data quality rules of the common set of rules. At least one predefined data quality rule is adjusted utilizing at least one editable widget to form a modified set of data quality rules adapted for use with a specified application. The modified set of data quality rules is applied to the retrieved data. | 06-30-2016 |
20160196298 | Apply Corrections to an Ingested Corpus | 07-07-2016 |
20160196307 | STATISTICAL IDENTIFICATION OF INSTANCES DURING RECONCILIATION PROCESS | 07-07-2016 |
20160203145 | SERVICE ORIENTED DATA MANAGEMENT AND ARCHITECTURE | 07-14-2016 |
20160253350 | PROACTIVE DUPLICATE IDENTIFICATION | 09-01-2016 |
20160253374 | DATA FILE WRITING METHOD AND SYSTEM, AND DATA FILE READING METHOD AND SYSTEM | 09-01-2016 |
20170235840 | ROW-BASED DATA FILTERING AT A DATABASE LEVEL | 08-17-2017 |
20180024901 | AUTOMATIC ENTITY CONTROL IN A MACHINE DATA DRIVEN SERVICE MONITORING SYSTEM | 01-25-2018 |
20180025027 | SYSTEMS AND METHODS FOR IN-PLACE RECORDS MANAGEMENT AND CONTENT LIFECYCLE MANAGEMENT | 01-25-2018 |
20190146972 | TABLE PLACEMENT IN DISTRIBUTED DATABASES | 05-16-2019 |
20220138204 | ACCELERATING CONSTRAINED, FLEXIBLE, AND OPTIMIZABLE RULE LOOK-UPS IN HARDWARE - Encoding of domain logic rules in an analog content addressable memory (aCAM) is disclosed. By encoding domain logic in an aCAM, rapid and flexible search capabilities are enabled, including the capability to search ranges of analog values, fuzzy match capabilities, and optimized parameter search capabilities. This is achieved with low latency by using only a small number of clock cycles at low power. A domain logic ruleset may be represented using various data structures such as decision trees, directed graphs, or the like. These representations can be converted to a table of values, where each table column can be directly mapped to a corresponding row of the aCAM. | 05-05-2022 |