Patent application number | Description | Published |
20080276225 | Testing Executable Logic - A computer-implemented method for performing testing on executable logic includes providing, in a test framework, an instance of at least one object that is associated with an object-processing framework. The test framework has at least one interface that is common with the object-processing framework. The method includes calling a logic portion that is to be tested, the logic portion being called with at least one test parameter received from a user. The method includes recording a result of an operation that is performed as the logic portion causes the at least one object in the test framework to be accessed using the at least one interface. Also a related computer program product and graphical user interface. | 11-06-2008 |
20080278198 | Buffer for Object Information - A buffer that is state-aware and/or node-oriented. In a state-aware buffer, one or more operations relating to a state can be performed. In a node-oriented buffer, instances of a node can be accessed without regard to an object structure in which the instance is included. | 11-13-2008 |
20080307395 | Providing Registration of a Communication - A computer-implemented method for providing registration of a communication includes locating a reference in metadata for an object-processing framework. The reference identifies a portion of logic that performs a specific service. The method includes storing at least part of the located reference in a trace object. The method includes replacing the located reference in the metadata with a reference to the trace object. | 12-11-2008 |
20080307433 | Locking or Loading an Object Node - A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a lock group such that nodes of the lock group are locked together. Identification of a first group of the nodes to form the lock group is received. The method includes storing the object with the first group of the nodes forming the lock group. A method includes receiving identification of an object that includes a plurality of nodes. The object is modeled to provide for association of any of the plurality of nodes into a load group such that nodes of the load group are loaded together. Identification of a first group of the nodes to form the load group is received. The method includes storing the object with the first group of the nodes forming the load group. | 12-11-2008 |
20100057504 | FUNCTIONAL EXTENSIONS FOR BUSINESS OBJECTS - A system may include generation of extension metadata defining a functional extension associated with a business object, and generation of a runtime metadata buffer comprising enhanced metadata, the enhanced metadata based on core metadata of the business object and the extension metadata. In some aspects, a service request associated with the business object is received, it is determined whether the service request is associated with the functional extension, an extension service associated with the functional extension is provided if it is determined that the service request is associated with the functional extension, and a core service associated with core data of the business object is provided if it is determined that the service request is not associated with the functional extension. | 03-04-2010 |
20100179946 | SYSTEM AND METHOD FOR HANDLING PARALLEL UPDATES OF OBJECTS REQUIRING TIME SENSITIVE ACKNOWLEDGEMENT - A system and method of updating persistent objects in a persistent store. In response to receipt of a confirmation of task competition, an attempt is made to acquire a lock for corresponding item data in the persistent store. Regardless of whether the lock is acquired, a successful update of the persistent store is acknowledged to the sender of the confirmation within a defined time period. | 07-15-2010 |
20120005645 | METAOBJECT ENHANCEMENT OBJECTS - A system may include acquisition of metadata defining a first object model, the first object model comprising an instance of a metaobject, acquisition of enhancement object metadata defining one or more enhancements to the first object model and associating each of the one or more enhancements with one of one or more stable anchors of the first object model, and creation, based on the metadata defining the object model and the metadata defining the one or more enhancements, of metadata defining an extended object model, the extended object model comprising an instance of the metaobject. | 01-05-2012 |
20120137267 | Business Object Service Simulation - Systems, methods, computer program products, and the like for performing business object service simulation are disclosed. A runtime model of a business object can be generated. The runtime model can include a plurality of structural and functional entities. A simulation runtime model of the business object can be instantiated. The simulation runtime model can include a plurality of pseudo-structural and pseudo-functional entities. During the simulation runtime model, a predetermined business object service of the business object can be selected and at least one parameter of the predetermined business object service can be determined. Functional entities of the runtime model can be replaced with pseudo-functional entities of the simulation runtime model. The simulation runtime model can be executed using pseudo-functional entities. | 05-31-2012 |
20120174081 | PROVIDING CODE LIST EXTENSIBILITY - A computer implemented method for providing code list extensibility includes providing a first code data type representation. The first code data type representation corresponding to a first code data type and having a first code value representation for at least one code value. The at least one code value associated with a corresponding code value issuing entity. The method may also include providing a second code data type representation. The second code data type representation corresponding to the first code data type and having a second code value representation for the at least one code value. The second code value representation including a unique identifier associated with the code value issuing entity. The method also may include mapping the first code data type representation and the second code data type representation based at least in part on the unique identifier associated with the code value issuing entity. | 07-05-2012 |
20140157154 | MANAGING BUSINESS OBJECTS - In accordance with aspects of the disclosure, a system and methods are provided for managing business objects in memory. The system and methods may be provided for defining a context of one or more input parameters of data used to determine one or more properties of one or more business objects, defining one or more rules associated with the one or more properties of each business object, and generating a metadata model for each business object based on the context of the one or more input parameters of each business object and the one or more rules associated with the one or more properties of each business object. | 06-05-2014 |
20140172895 | Modeled Associations for Business Object Data Structures - A service request to execute an operation on a business object is received. Thereafter, a metadata repository is polled to obtain a modeled association corresponding to the service request. The modeled association involves at least one node of the business object. The at least one node of the business object is then called using the modeled association to respond to the service request. Related apparatus, systems, techniques and articles are also described. | 06-19-2014 |
20140172918 | Role Based Access Management for Business Object Data Structures - A service request from a user is received to execute an operation on an instance of a business object. Thereafter, an access control check is performed to confirm whether the user is allowed to execute the requested operation on a type of business object corresponding to the business object specified and based on an access group associated with the user. Subsequently, the user is either provided with access to the instance of the business object to execute the operation if the access control check confirms that the user is allowed to execute the operation on the instance of the business object, or prevented from accessing the instance of the business object to execute the operation on the instance of the business object. Related apparatus, systems, techniques and articles are also described. Related apparatus, systems, techniques and articles are also described. | 06-19-2014 |
20150074069 | ADVANCED DATA MODELS CONTAINING DECLARATIVE AND PROGRAMMATIC CONSTRAINTS - A database language is extended to define constraints on a data model (e.g., entity-relationship model) rather than the concrete database. The constraints can be declarative (e.g., constraints that are defined using expressions of the database language) or programmatic (e.g., constraints that are defined as a stored procedure implemented in a domain specific language). By storing the constraints at a higher level than the database level, the constraints can be performed without changing the persistency of the database. Also disclosed are techniques for handling of constraints on partially loaded entities. | 03-12-2015 |