Patent application number | Description | Published |
20130024612 | STORING ROW-MAJOR DATA WITH AN AFFINITY FOR COLUMNS - A method, device, and computer readable medium for striping rows of data across logical units of storage with an affinity for columns is provided. Alternately, a method, device, and computer readable medium for striping columns of data across logical units of storage with an affinity for rows is provided. When data of a logical slice is requested, a mapping may provide information for determining which logical unit is likely to store the logical slice. In one embodiment, data is retrieved from logical units that are predicted to store the logical slice. In another embodiment, data is retrieved from several logical units, and the data not mapped to the logical unit is removed from the retrieved data. | 01-24-2013 |
20130031056 | METHODS AND SYSTEMS FOR FILE REPLICATION UTILIZING DIFFERENCES BETWEEN VERSIONS OF FILES - Methods and systems for efficient file replication are provided. In some embodiments, one or more coarse signatures for blocks in a base file are compared with those coarse signatures for blocks of a revised file, until a match is found. A fine signature is then generated for the matching block of the revised file and compared to a fine signature of the base file. Thus, fine signatures are not computed unless a coarse signature match has been found, thereby minimizing unneeded time-consuming fine signature calculations. Methods are also provided for determining whether to initiate a delta file generation algorithm, or whether to utilize a more efficient replication method, based upon system and/or file parameters. In accordance with additional embodiments, the lengths of valid data on physical blocks are obtained from physical block mappings for the files, and these lengths and mappings are utilized for delta file generation, to minimize unnecessary signature computations. | 01-31-2013 |
20130036101 | Compression Analyzer - Techniques are described herein for automatically selecting the compression techniques to be used on tabular data. A compression analyzer gives users high-level control over the selection process without requiring the user to know details about the specific compression techniques that are available to the compression analyzer. Users are able to specify, for a given set of data, a “balance point” along the spectrum between “maximum performance” and “maximum compression”. The point thus selected is used by the compression analyzer in a variety of ways. For example, in one embodiment, the compression analyzer uses the user-specified balance point to determine which of the available compression techniques qualify as “candidate techniques” for the given set of data. The compression analyzer selects the compression technique to use on a set of data by actually testing the candidate compression techniques against samples from the set of data. After testing the candidate compression techniques against the samples, the resulting compression ratios are compared. The compression technique to use on the set of data is then selected based, in part, on the compression ratios achieved during the compression tests performed on the sample data. | 02-07-2013 |
20130046731 | AUTOMATED INTEGRATED HIGH AVAILABILITY OF THE IN-MEMORY DATABASE CACHE AND THE BACKEND ENTERPRISE DATABASE - A cluster manager manages copies of a mid-tier database as a mid-tier database cluster. The cluster manager may concurrently manage a backend database system. The cluster manager is configured to monitor for and react to failures of mid-tier database nodes. The cluster manager may react to a mid-tier database failure by, for example, assigning a new active node, creating a new standby node, creating new copies of the mid-tier databases, implementing new replication or backup schemes, reassigning the node's virtual address to another node, or relocating applications that were directly linked to the mid-tier database to another host. Each node or an associated agent may configure the cluster manager during initialization, based on common cluster configuration information. Each copy of the mid-tier database may be, for example, a memory resident database. Thus, a node must reload the entire database into memory to recover a copy of the database. | 02-21-2013 |
20130066929 | VERSIONING IN INTERNET FILE SYSTEM - Techniques are provided for managing versions of files in a file system. According to one technique, new versions of directories are created in response to creation of new versions of files that descend from the directories, where the different versions of a versioned directory are associated with different points in time. Links are maintained between the files in the file system such that the versions of the files that descend from a particular version of a versioned directory reflect the point in time associated with the versioned directory. | 03-14-2013 |
20130073566 | CONTEXTUAL SEARCH OF A COLLABORATIVE ENVIRONMENT - Techniques are provided for using bonds, which reflect relationships between items, to facilitate searches against the items. The degree of separation between any two given searchable items is based on the minimum number of bonds that have to be traversed to arrive at one of the two searchable items when starting at the other of the two searchable items. The bonds are used to respond to a search request, performing a search relative to a particular searchable item. For example, the search may involve only those searchable items that are within a particular degree of separation of the particular searchable item. As another example, the search may involve determining the order in which searchable items are compared against search criteria of the search request based on the degree of separation of the searchable items from the particular searchable item. | 03-21-2013 |
20130080514 | SYSTEM AND METHOD FOR AUTO-TAB COMPLETION OF CONTEXT SENSITIVE REMOTE MANAGED OBJECTS IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server environment. In accordance with an embodiment, the system comprises a command-line interface and/or command-line shell which provides an autocompletion feature for remote objects including wherein, in response to an instruction from an administrator to invoke the feature, the system determines configurable remote back-end objects based on the context of the command-line at the time of invocation, and uses the information to one of autocomplete the command-line input or provide a list of remote back-end objects. | 03-28-2013 |
20130080566 | SYSTEM AND METHOD FOR DYNAMIC CACHE DATA DECOMPRESSION IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof, wherein the traffic director is provided as a software-based load balancer that can be used to deliver a fast, reliable, scalable, and secure platform for load-balancing Internet and other traffic to back-end origin servers, such as web servers, application servers, or other resource servers. In accordance with an embodiment, the traffic director can be configured to compress data stored in its cache, and to respond to requests from clients by serving content from origin servers either as compressed data, or by dynamically decompressing the data before serving it, should a particular client prefer to receive a non-compressed variant of the data. In accordance with an embodiment, the traffic director can be configured to make use of hardware-assisted compression primitives, to further improve the performance of its data compression and decompression. | 03-28-2013 |
20130081024 | COMPOSITE TASK FRAMEWORK - A primary task manager, which is a local task manager, can perform a distributed task on a local server. If the performing of the task with the local task manager succeeds, the distributed task can then be propagated to at least one secondary task manager, which is a remote task manager. The remote task manager is capable of performing the distributed task. If the performing of the task with the local task manager fails, an undo task that is associated with the distributed task can be performed. | 03-28-2013 |
20130081128 | SYSTEM AND METHOD FOR PROVIDING A REST-BASED MANAGEMENT SERVICE IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for providing software administration tools, for use in administering server configurations, such as in a traffic director or other type of server environment. In accordance with an embodiment, the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. An administration server can be used to manage the traffic director, including a REpresentational State Transfer (REST) infrastructure and management service which maps REST calls to mbeans or other management components registered on the administration server, for use in managing the traffic director. | 03-28-2013 |
20130085794 | SCREENING ELECTRONIC SERVICE REQUESTS - A facility for screening service requests for requesting assistance is described. The facility receives from a user a service request that requests assistance with solving a problem associated with a system accessible to the user and includes information related to the system. The facility searches a collection of system status information for at least one entry that corresponds with the received information related to the system. Where a corresponding entry is found, the facility provides to the user an indication of the correspondence and an opportunity to cancel the service request. | 04-04-2013 |
20130085895 | HIGH THROUGHPUT GLOBAL ORDER PROMISING SYSTEM - Techniques are disclosed for high-throughput order promising using multiple servers. Methods and apparatus provide item availability information by receiving an inquiry requesting availability status of a specified item, retrieving summary data associated with the item from a summary data structure stored in a memory of the computer system, determining availability data for the specified item based upon the summary data, and sending an inquiry response indicating the availability of the item based upon the determined availability data. Methods and apparatus provide order scheduling by receiving a scheduling request that identifies an item to be scheduled, determining a schedule for the item, storing availability information for the item based upon the schedule in an in-memory database, and sending a scheduling response based upon the schedule. Storing the availability information may cause the in-memory database to generate a notification that results in an update of the summary data structure. | 04-04-2013 |
20130085996 | SYSTEM AND METHOD FOR DATABASE PERSISTENCE OF TRANSACTION LOGS - A system and method for database persistence of transaction logs (TLOGs). Embodiments of the invention allow an administrator to configure their system to associate one or more Java Database Connectivity (JDBC) TLOG stores with a data source or database instead of a file system, for use in storing the primary TLOG. This provides an opportunity to exploit the high availability features of a database system; improve handling of disaster recovery scenarios, such as cross-site recovery using database replication; and alleviate the need for third-party distributed file system components, together with their cost and complexity. | 04-04-2013 |
20130086060 | PRIVILEGED ACCOUNT MANAGER, MANAGED ACCOUNT PERSPECTIVES - Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and/or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed. | 04-04-2013 |
20130086065 | PRIVILEGED ACCOUNT MANAGER, DYNAMIC POLICY ENGINE - Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and/or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed. | 04-04-2013 |
20130086095 | MAKING AND USING ABSTRACT XML REPRESENTATIONS OF DATA DICTIONARY METADATA - An XML representation of the metadata for objects in a database system. The XML representation is called SXML. The SXML representations of two objects that belong to the same class of objects may be compared to produce a difference representation that shows the differences between the objects. Database commands that will create or alter objects may be produced from the difference representation, as well as an XML representation of the database commands. In addition to being comparable, SXML representations have the characteristics that a given property of the metadata is expressed in only one way in the representation, that SXML does not describe properties that belong only to particular instances of the object described by the metadata, that SXML describes only properties that the user can specify when creating an object, and that SXML is easy for humans to read, understand, and write. | 04-04-2013 |
20130086154 | SYSTEM AND METHOD FOR PROVIDING ASYNCHRONY IN WEB SERVICES - A system and method for providing asynchrony in web services, such as Java-based web services, including in some instances use of a distributed in-memory data grid. Embodiments of the system allow a client application or client to make requests upon a server application or service. A queuing feature, such as one or more Java Message Service (JMS) queues, can be used to store incoming requests at the server side, to support asynchronous behavior. In accordance with an embodiment, instead of or in addition to JMS, the system can use a distributed in-memory data grid, such as Oracle Coherence, to provide queuing functionality. | 04-04-2013 |
20130086326 | SYSTEM AND METHOD FOR SUPPORTING A TIERED CACHE - A computer-implemented method and system can support a tiered cache, which includes a first cache and a second cache. The first cache operates to receive a request to at least one of update and query the tiered cache; and the second cache operates to perform at least one of an updating operation and a querying operation with respect to the request via at least one of a forward strategy and a listening scheme. | 04-04-2013 |
20130086628 | PRIVILEGED ACCOUNT MANAGER, APPLICATION ACCOUNT MANAGEMENT - Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and/or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed. | 04-04-2013 |
20130086645 | OAUTH FRAMEWORK - A framework, which conforms to the OAuth standard, involves a generic OAuth authorization server that can be used by multiple resource servers in order to ensure that access to resources stored on those resource servers is limited to access to which the resource owner consents. Each resource server registers, with the OAuth authorization server, metadata for that resource server, indicating scopes that are recognized by the resource server. The OAuth authorization server refers to this metadata when requesting consent from a resource owner on behalf of a client application, so that the consent will be of an appropriate scope. The OAuth authorization server refers to this metadata when constructing an access token to provide to the client application for use in accessing the resources on the resource server. The OAuth authorization server uses this metadata to map issued access tokens to the scopes to which those access tokens grant access. | 04-04-2013 |
20130086658 | PRIVILEGED ACCOUNT MANAGER, ACCESS MANAGEMENT - Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and/or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed. | 04-04-2013 |
20130097175 | Efficient File Access In A Large Repository Using A Two-Level Cache - A two-level cache to facilitate resolving resource path expressions for a hierarchy of resources is described, which includes a system-wide shared cache and a session-level cache. The shared cache is organized as a hierarchy of hash tables that mirrors the structure of a repository hierarchy. A particular hash table in a shared cache includes information for the child resources of a particular resource. A database management system that manages a shared cache may control the amount of memory used by the cache by implementing a replacement policy for the cache based on one or more characteristics of the resources in the repository. The session-level cache is a single level cache in which information for target resources of resolved path expressions may be tracked. In the session-level cache, the resource information is associated with the entire path expression of the associated resource. | 04-18-2013 |
20130097374 | EFFICIENT VOLUME MANAGER HOT SWAPPING - A method of updating an extent map is described. The method includes providing in a memory an instance of a first version of the extent map, wherein the instance is referenced by an application. The extent map include entries. The method further includes storing, at each extent map entry, an offset from the beginning of a physical drive which is identified within said each extent map entry, providing a second version of the extent map, comparing the first version of the extent map with the second version of the extent map, in response to the comparing, determining that is at least on segment in the second version of the extent map that is different from a corresponding at least one segment in the first version of the extent map. | 04-18-2013 |
20130097487 | SINGLE VIEW REPRESENTATION OF AN XLS TRANSFORMATION - In various embodiments, arrangements for presenting an XSLT mapping tool is presented. A computer system may receive XML source code that includes a plurality of source nodes. The computer system may also receive XSLT code configured to transform the XML source code into XML target code. The XSLT code may include multiple templates. The computer system may use the multiple templates of the XSLT code and the XML source code to create XML target code. The XML target code may include a plurality of target nodes. An interface of the XSLT mapping tool that displays mappings between the plurality of source nodes of the XML source code and the plurality of target nodes of the XML target code resulting from the multiple XSLT templates may be presented. | 04-18-2013 |
20130097615 | SYSTEM AND METHOD FOR PROVIDING A MESSAGING APPLICATION PROGRAM INTERFACE - A system and method for providing a message bus component or version thereof (referred to herein as an implementation), and a messaging application program interface, for use in an enterprise data center, middleware machine system, or similar environment that includes a plurality of processor nodes together with a high-performance communication fabric (or communication mechanism) such as InfiniBand. In accordance with an embodiment, the messaging application program interface enables features such as asynchronous messaging, low latency, and high data throughput, and supports the use of in-memory data grid, application server, and other middleware components. | 04-18-2013 |
20130103391 | NATURAL LANGUAGE PROCESSING FOR SOFTWARE COMMANDS - A system and method for facilitating user access to software functionality. An example method includes receiving natural language input; determining an identify of a user providing the input; employing the identity to facilitate selecting a software command to associate with the received natural language input; and employing software to act on the command. In a more specific embodiment, the method further includes determining an initial set of available software commands, and narrowing the initial set of available software commands based on the identity of a user and enterprise data associated with the identity of the user, resulting in a narrowed set of software commands in response thereto. Example enterprise data includes enterprise organizational chart information (e.g., corporate hierarchy information) and user access privilege information maintained by an ERP system. | 04-25-2013 |
20130113820 | GALAXY VIEWS FOR VISUALIZING LARGE NUMBERS OF NODES - A system and method for illustrating data. An example method includes organizing the data into objects; assigning a transparency value to each object; and graphically depicting the data by distributing nodes representing the objects in a region of a visualization in accordance with a distribution method or function. Each node is displayed as partially transparent in accordance with the transparency value. In a more specific embodiment, the visualization includes a galaxy visualization with nodes that are randomly or pseudo randomly distributed about a center point or region of the visualization. | 05-09-2013 |
20130114620 | SYSTEM AND METHOD FOR PROVIDING DEADLOCK FREE ROUTING BETWEEN SWITCHES IN A FAT-TREE TOPOLOGY - A system and method can support routing packets between a plurality of switches in a middleware machine environment, thereby supporting Internet Protocol (IP) based management traffic via enabling IP over Infiniband (IPoIB) communication in the middleware machine environment. The plurality of switches can perform routing for inter-switch traffic in the middleware machine environment using a first routing algorithm. Then, a switch in the middleware machine environment can be selected as a hub switch for inter-switch traffic that can not reach destination using the first routing algorithm. Furthermore, a routing table associated with the hub switch can be updated when a path exists between a source switch and a destination switch via the hub switch. | 05-09-2013 |
20130117441 | UPGRADING ENTERPRISE MANAGERS - Techniques are described for upgrading systems that include a first set of agents for collecting target data from a plurality of targets and sending the target data to a first management server. In an embodiment, a second set of agents is pre-deployed. Each pre-deployed agent is configured to, upon activation, collect target data from a respective target of the plurality of targets and send the target data to a second management server. While the pre-deployed agent remains inactive, an agent from the first set of agents collects and sends the target data to the first management server. When a first batch of one or more pre-deployed agents is activated, each activated agent begins collecting target data and sending the target data to the second management server. For agents not in the first batch, the first set of agents continues to collect and send the target data. | 05-09-2013 |
20130120054 | DIE POWER STRUCTURE - A die including a first set of power tiles arranged in a first array and having a first voltage; a second set of power tiles arranged in a second array offset from the first array and having a second voltage; a set of power mesh segments enclosed by the second set of power tiles and having the first voltage; a first power rail passing underneath the set of power mesh segments and the first set of power tiles; and a set of vias operatively connecting the power rail with the set of power mesh segments and the first plurality of power tiles. | 05-16-2013 |
20130121149 | SYSTEM AND METHOD FOR USING VIRTUAL LANES TO ALLEVIATE CONGESTION IN A FAT-TREE TOPOLOGY - A system and method can alleviate congestion in a middleware machine environment with a plurality of switches in a fat-tree topology. The middleware machine environment can support a plurality of end nodes and allows for generating a virtual lane assignment for every pair of source end node and destination end node. Then, the packet flows from a source end node to different destination end nodes sharing a physical link can be distributed across different virtual lanes in order to avoid the head-of-line (HOL) blocking. | 05-16-2013 |
20130121154 | SYSTEM AND METHOD FOR USING DYNAMIC ALLOCATION OF VIRTUAL LANES TO ALLEVIATE CONGESTION IN A FAT-TREE TOPOLOGY - A system and method can prevent traffic congestion in a middleware machine environment with a plurality of switches in a fat-tree topology. A subnet manager can sweep a subnet in the middleware machine environment to discover changes and maintain the subnet fully connected. A performance manager can retrieve performance and error-related information from one or more performance management agents that are associated with one or more components in the subnet. Then, a host can dynamically reconfigure one or more virtual lanes in order to improve network performances. | 05-16-2013 |
20130124472 | METHODS AND SYSTEMS FOR FILE REPLICATION UTILIZING DIFFERENCES BETWEEN VERSIONS OF FILES - Methods and systems for efficient file replication are provided. In some embodiments, one or more coarse signatures for blocks in a base file are compared with those coarse signatures for blocks of a revised file, until a match is found. A fine signature is then generated for the matching block, of the revised file and compared to a fine signature of the base file. Thus, fine signatures are not computed unless a coarse signature match has been found, thereby minimizing unneeded time-consuming fine signature calculations. Methods are also provided for determining whether to initiate a delta file generation algorithm, or whether to utilize a more efficient replication method, based upon system and/or file parameters. In accordance with additional embodiments, the lengths of valid data on physical blocks are obtained from physical block mappings for the files, and these lengths and mappings are utilized for delta file generation, to minimize unnecessary signature computations. | 05-16-2013 |
20130124910 | SYSTEM AND METHOD FOR SIGNALING DYNAMIC RECONFIGURATION EVENTS IN A MIDDLEWARE MACHINE ENVIRONMENT - A system and method can provide fault tolerance in a middleware machine environment. A subnet manager can determine whether there is a path record change when a fault occurs in the middleware machine environment. Furthermore, the subnet manager can signal a dynamic reconfiguration event to at least one host in the middleware machine environment. The at least one host can send a message to the subnet manager to query for a latest path record. Then, the subnet manager can provide a latest path record to the at least one host. | 05-16-2013 |
20130132550 | SERVICE CONFIGURATION ASSURANCE - Systems, methods, and other embodiments associated with service configuration assurance are described. One example method includes comparing an expected device configuration model with an actual device configuration model for the network device and communicating service identifiers in the expected device configuration for which there is no corresponding service configuration item in the actual device configuration model to a user. The example method may also include generating a service-impact event notification when a likely service-impacting configuration change is detected. | 05-23-2013 |
20130132864 | SOCIAL KUDOS - A system and method for facilitating rating enterprise personnel or otherwise issuing and tracking indications of approval, e.g., kudos. An example method includes providing a first set of user interface controls adapted to enable plural enterprise personnel to participate in a discussion via electronic communications; providing a first user option for a first participant of the discussion to associate an indication of approval with input provided by a participant of the discussion; providing a second user option to associate a note with the indication of approval; and associating the discussion and the indication of approval with a business object. A social network may provide the first set of user interface controls. The electronic communications include messages exchanged over a social network used to conduct the discussion. The input may include, for example, text and/or a document submitted to participants of the discussion, such as a presentation document. | 05-23-2013 |
20130141224 | EPC PROVISIONING SYSTEM - An EPC provisioning system comprising an EPC server can dynamically provide EPC code blocks for one product to multiple client sites. The EPC server can use business rules to determine the EPC codes for the multiple client sites. | 06-06-2013 |
20130145245 | METHODS AND SYSTEMS FOR IMPLEMENTING A DYNAMIC HIERARCHICAL DATA VIEWER - Methods, systems, and machine-readable mediums are disclosed for viewing multiply-dimensioned data. In one embodiment, a method is disclosed which comprises displaying multiply-dimensioned data in a table format, the table format having a plurality of rows, a plurality of columns, and a plurality of cells displaying data, a first column of the plurality of columns including data having at least two hierarchical levels. Data for at least a first set of the plurality of cells is displayed in a graphical format, the first set including cells in the first column, the graphical format of the cells in the first set in the first column indicating a hierarchical level associated with the cell data and a mechanism is displayed for a first one of the rows to display at least one additional row having data in the first column associated with a lower hierarchical level of the first row data. | 06-06-2013 |
20130151567 | TECHNIQUES FOR MORE EFFICIENT USAGE OF MEMORY-TO-CPU BANDWIDTH - Techniques are provided for more efficiently using the bandwidth of the I/O path between a CPU and volatile memory during the performance of database operation. Relational data from a relational table is stored in volatile memory as column vectors, where each column vector contains values for a particular column of the table. A binary-comparable format may be used to represent each value within a column vector, regardless of the data type associated with the column. The column vectors may be compressed and/or encoded while in volatile memory, and decompressed/decoded on-the-fly within the CPU. Alternatively, the CPU may be designed to perform operations directly on the compressed and/or encoded column vector data. In addition, techniques are described that enable the CPU to perform vector processing operations on the column vector values. | 06-13-2013 |
20130151568 | TECHNIQUES FOR MAINTAINING COLUMN VECTORS OF RELATIONAL DATA WITHIN VOLATILE MEMORY - Techniques are provided for more efficiently using the bandwidth of the I/O path between a CPU and volatile memory during the performance of database operation. Relational data from a relational table is stored in volatile memory as column vectors, where each column vector contains values for a particular column of the table. A binary-comparable format may be used to represent each value within a column vector, regardless of the data type associated with the column. The column vectors may be compressed and/or encoded while in volatile memory, and decompressed/decoded on-the-fly within the CPU. Alternatively, the CPU may be designed to perform operations directly on the compressed and/or encoded column vector data. In addition, techniques are described that enable the CPU to perform vector processing operations on the column vector values. | 06-13-2013 |
20130152063 | SYSTEM AND METHOD FOR EARLY PLATFORM DEPENDENCY PREPARATION OF INTERMEDIATE CODE REPRESENTATION DURING BYTECODE COMPILATION - A system and method for early platform dependency preparation of intermediate code representation during bytecode compilation in a virtual machine (VM), or other runtime environment, and particularly for use in a system that includes a Java Virtual Machine (JVM). Current techniques for separating the platform dependent intermediate representation from the platform independent intermediate representation using a watertight abstraction layer gives non-optimal side effects (such as compiler source code duplication or inefficiency in the generated code). Embodiments of the present invention enable the compiler to construct platform dependent idioms using medium level intermediate code, and maintain the platform dependent construct all the way to the final native code. | 06-13-2013 |
20130156197 | SECURE BROADCASTING AND MULTICASTING - Techniques are presented for secure broadcasting and multicasting. Communications for multicasting and broadcasting are encrypted and decrypted using a secure communication key. The secure communication key is represented in a broadcast value that is sent to selected parties. The broadcast value represents the product of unique prime numbers and an additional number plus the secure communication key. Each party is represented by one of the unique prime numbers. Each party can acquire the secure communication key by dividing the broadcast value by its particular prime number to obtain a remainder, which is the secure communication key. | 06-20-2013 |
20130166512 | METHODS AND SYSTEMS FOR IMPLEMENTING A SELF DEFENDING/REPAIRING DATABASE - This disclosure describes, generally, methods and systems for self defending and repairing a database. The method includes monitoring, at a database server, code modifications to a database management application. The database management application is configured to maintain the database. The method further includes determining that a code modification has occurred to the database management application. The method further includes checking the code modification for the presence of an authorization key, and in response to an invalid or non-existent authorization key, determining that the code modification is unauthorized. Further, the method includes quarantining the modified code in a secure storage location, and automatically accessing original code of the database management application and replacing the modified code with code from the original code of the database management application. | 06-27-2013 |
20130173774 | METHOD AND SYSTEM FOR CONTINUOUS APPLICATION STATE - Disclosed are methods and apparatuses to share application state across devices. This approach allows the user to switch devices and have the application on the new device share the same state as the previous device. In addition, this approach allows the user to shut down a device at a first point in time, and later be presented with the same state for the application at a second point in time on the same device when it is turned back on. | 07-04-2013 |
20130174154 | Java Virtual Machine Embedded in a Native Mobile Application - A native application built for a mobile device can embed non-native JAVA code that may be executed by a JAVA virtual machine also embedded as a library within the native application. Enterprise applications may be extended for use by mobile devices. Business logic for an application may be constructed just once and then used in both enterprise applications and mobile device applications. | 07-04-2013 |
20130179876 | SYSTEM AND METHOD FOR PROVIDING AN ENTERPRISE DEPLOYMENT TOPOLOGY - In accordance with an embodiment, one or more enterprise software application products, such as Fusion Applications, can be installed and/or configured according to an integration and deployment design/blueprint that is built or optimized for use within a multi-tiered enterprise deployment topology at an organization/customer's data center. Based on the organization/customer's site topology and needs/requirements, provisioning of the software applications can be optimized, and application life cycle operations performed. This enables each product component to be aware of the topology, which in turn provides customers with an “out-of-the-box” solution. The deployment topology can also be optimized for security, performance and simplicity. | 07-11-2013 |
20130185242 | DATA SOURCE FOR PARALLEL INFERENCE - Systems, methods, and other embodiments associated with data sources adapted for parallel inference on triples associated with a semantic model are described. One example method includes creating a source table that is partitioned on triple predicate and stores triples for entailment. The source table may store compact triple identifiers that have been mapped to triple identifiers from the semantic model. | 07-18-2013 |
20130185332 | SECURE SEARCH PERFORMANCE IMPROVEMENT - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety or of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 07-18-2013 |
20130197953 | METHOD AND SYSTEM FOR IMPLEMENTING USER REPORTING - Disclosed are methods and apparatuses that efficiently provides for end user reporting from interactive applications. One embodiment provides an approach for implementing dynamic field selection for a user to select report parameters for an end user report using the user interface of an ERP application. User inputs are used to automatically generate queries to form a report data model usable by a reporting tool. | 08-01-2013 |
20130198249 | DISTRIBUTED CONSISTENT GRID OF IN-MEMORY DATABASE CACHES - A plurality of mid-tier databases form a single, consistent cache grid for data in one or more backend data sources, such as a database system. The mid-tier databases may be standard relational databases. Cache agents at each mid-tier database swap in data from the backend database as needed. Ownership locks maintain consistency in the cache grid. Cache agents prevent database operations that will modify cached data in a mid-tier database unless and until ownership of the cached data can be acquired for the mid-tier database. Cache groups define what backend data may be cached, as well as a general structure in which the backend data is to be cached. Metadata for cache groups is shared to ensure that data is cached in the same form throughout the entire grid. Ownership of cached data can then be tracked through a mapping of cached instances of data to particular mid-tier databases. | 08-01-2013 |
20130198611 | METHOD AND SYSTEM FOR IMPLEMENTING A COMMON DATA INTERFACE TO WEB SERVICES - Disclosed are methods and systems for developing web services for a plurality of platforms utilizing a plurality of web service specification languages. A common data layer is used to map classes of different web service specification languages to a common class hierarchy. This allows for the creation of data layers independent of each individual web service specification language, reducing the requirement to implement duplicate data controls for each web service specification language. | 08-01-2013 |
20130198814 | METHOD AND SYSTEM FOR IMPLEMENTING AN ADVANCED MOBILE AUTHENTICATION SOLUTION - Disclosed is an improved method, system, and program product to implement a login interface that collects additional information (in addition to the username and password) to be used in the login process. The additional information may include role and environment information specifying the privileges or resources in an application that the user may access. | 08-01-2013 |