Patent application number | Description | Published |
20100250623 | GENERIC EDITOR FOR DATABASES - Facilitating generic database editing to allow for data to be received from a user for entry into a database without requiring the data to conform to schema constraints for the database. A method includes examining a first schema for a first database. The first schema including a first set of constraints specified in the first schema on data to be entered into the first database. The method further includes, based on the examination, constructing a second database corresponding to the first database. The second database is associated with a second schema with a second set of constraints. The second set of constraints is a relaxed version of the first set of constraints specified in the first schema. | 09-30-2010 |
20120151395 | CONFIGURATION OF CUSTOM CONTROLS IN DATA-DRIVEN ENVIRONMENTS - The subject disclosure relates to systems and methods for providing custom controls configuration. In one embodiment, a system comprises a custom controls component configured to receive view information associated with a default view of controls, and receive customized configuration information indicative of a customization of at least one aspect of the controls. The default view of controls is based on data and default configuration information, and the data and the default configuration information are represented via a data-driven programming language. The custom control component is also configured to generate a customized view of the controls based, at least, on the default view of the controls and the customized configuration information. The configuration information comprises metadata, and the customized view of the controls includes a modified view, help text, or a description of a field associated with the controls. | 06-14-2012 |
20130173672 | GENERIC EDITOR FOR DATABASES - Facilitating generic database editing to allow for data to be received from a user for entry into a database without requiring the data to conform to schema constraints for the database. A method includes examining a first schema for a first database. The first schema including a first set of constraints specified in the first schema on data to be entered into the first database. The method further includes, based on the examination, constructing a second database corresponding to the first database. The second database is associated with a second schema with a second set of constraints. The second set of constraints is a relaxed version of the first set of constraints specified in the first schema. | 07-04-2013 |
20140146171 | Surveillance and Security Communications Platform - A surveillance and security communications platform for detecting and responding to potential emergencies is provided. The platform may be utilized to automatically open communications channels via multiple media streams based on predefined settings for detecting a potential emergency situation. The platform may further be utilized to automatically send video and audio streams to an emergency responder upon detecting the potential emergency situation. The platform may further be utilized to detect the potential emergency situation while it is occurring and automatically initiate escalated emergency notifications to multiple parties. The platform may further be utilized to receive computing device sensor data for detecting the potential emergency for a potential victim in a business or home setting and immediately send an emergency notification, which may include a predefined text-to-speech announcement, to emergency responders in order to mitigate the potential emergency. | 05-29-2014 |
20140149572 | MONITORING AND DIAGNOSTICS IN COMPUTER NETWORKS - Various techniques of network monitoring and diagnostics in computer networks are disclosed herein. In one embodiment, a method includes configuring a network session between a first client device and a second client device interconnected to each other by the computer network. The configured network session having one or more encrypted attributes. The method also includes transmitting one or more of the encrypted attributes of the configured network session to a network management system for collecting information from one or more network elements connecting the first client device to the second client device during the network session. | 05-29-2014 |
20150304165 | Session-based Device Configuration - Techniques for session-based device configuration are described. According to one or more implementations, various settings of a wireless device are configured to optimize device performance while participating in a communication session via a wireless network. The settings, for instance, are configured dynamically and on a per-session basis. | 10-22-2015 |