Software AG Patent applications |
Patent application number | Title | Published |
20150347091 | SYSTEM AND METHOD FOR PROVIDING USER SUPPORT IN DESIGNING GRAPH STRUCTURES - A computer system for providing user support in editing graph structures includes a memory, a display, and a processor cooperatively operable with the display and the memory. The processor, based on instructions stored in the memory, causes the display to present, on a user interface, a visualization of a graph structure that includes one or more connections and one or more objects. Each of one or more connections represents a connection of two or more objects. In response to an action by user that selects at least one of the one or more connections and one or more objects, the processor causes the display to present, on the user interface, in real time, a support that indicates an allowable modification to the graph structure based on a methodology to which the graph structure is assigned and the selection of the one or more connections and one or more objects. | 12-03-2015 |
20150286947 | GRAPH SYNTAX VALIDATION SYSTEM AND METHOD - A graph syntax validation system, method, or computer-readable medium that receives: (i) an input graph, (ii) transformation rules, and (iii) a minimal valid graph. The system/method/computer-readable medium transforms the input graph into the minimal valid graph using the transformation rules that are comprised of source patterns and target patterns. The system/method/computer-readable medium recurrently transforms the input graph until either the input graph has been reduced to the minimal valid graph indicating that the input graph uses a valid syntax, or until it is determined that one or more transformation rules do not match the input graph indicating that the input graph uses an invalid syntax. | 10-08-2015 |
20150278395 | METHOD AND SYSTEM FOR TRANSITIVE TRAVERSAL SERVICE DISCOVERY - A computer system includes a processor and an electronic storage. The processor provides a service composition tree of services which are offered, wherein the tree is hierarchical and specifies relationships of the services which are offered within the service composition tree to each other; translates service composition trees and the relationships of the services represented in the trees into a directed acyclic graph (DAG) that represents the service composition trees, the DAG being redundancy-free; and performs a transitive traversal within the DAG among the services represented in the DAG to locate information, within the DAG, regarding the services, in relation to each other. The electronic storage stores the DAG accessed by the processor. A method according to the above will perform a transitive traversal service discovery of a DAG that is redundancy-free, and optionally is minimal weighted. A non-transitory computer-readable medium can perform the method. | 10-01-2015 |
20150278356 | FREE TEXT SEARCH ENGINE SYSTEM AND METHOD - A free text search engine system, for an application, aggregates information sent to and received from a host by the emulator running the application. The information includes (i) field names and associated field contents for a display screen for the application, (ii) emulator action indicating sent or received, (iii) a screen image of the display screen used when the information was sent or received, and (iv) a hot link to reproduce the display screen. The system indexes field contents and field names in memory and searches, in response to receipt of a search query specifying a search term, the field contents and the field names in the memory that match the search term to form search results. The search results are ranked using a rank calculation based on various ranking factors. | 10-01-2015 |
20150254290 | SYSTEMS AND/OR METHODS FOR ON-DEMAND REPOSITORY BOOTSTRAPPING AT RUNTIME IN A SCALABLE, DISTRIBUTED MULTI-TENANT ENVIRONMENT - Certain example embodiments relate to techniques for dynamically bootstrapping repositories or databases for newly created tenants at runtime in scalable, distributed multi-tenant environments. Repositories are maintained for respective application-tenant combinations. If there is an existing repository for the application and tenant combination involved in an incoming request, the request is responded to using that existing repository. However, if this is not the case, a new repository is created dynamically and at runtime. Bootstrapping is triggered dynamically the first time a client application tries to access the newly created tenant at runtime. This approach advantageously is flexible when it comes to enabling tenant- and application-specific repositories with optional search index mapping (e.g., for searching and/or other purposes). | 09-10-2015 |
20150254142 | SYSTEMS AND/OR METHODS FOR DATA RECOVERY IN DISTRIBUTED, SCALABLE MULTI-TENANT ENVIRONMENTS - Certain example embodiments relate to techniques for recovering registry information and recreating the entire registry for all available tenants in a scalable, multi-tenant distributed environment, while also potentially looking into all of the running services where the most up-to-date data could exist. Dynamic real-time or substantially real-time recreation of connections between a web application and the latest instance of a tenant in such an environment (e.g., following a failure of one of the databases holding the tenant data, a corruption of the registry entry pointing to the tenant, and/or the like) is made possibly by, for instance, comparing the timestamps of the last written entities in order to examine the most current data and “re-bundle” the last master/replication instances, e.g., for restores in an environment where a rolling failover procedure is implemented. | 09-10-2015 |
20150220859 | CONTEXT SPECIFIC RESOURCE EDITORS - A computerized method implemented in at least one processor for at least one of viewing, editing, and handling Business Process Management artifacts, the method including storing in a database repository coupled to the at least one processor, a plurality of computerized editor representations, receiving, by the at least one processor, a computerized request from a client computer for a database artifact stored in the database repository, accessing, by the at least one processor, the requested database artifact within the database repository, selecting, by the at least one processor, a specific computerized editor representation from the plurality of computerized editor representations, the specific computerized editor representation corresponding to the requested database artifact, and causing, by the at least one processor, the specific computerized editor to be provided to the client computer along with the requested database artifact. | 08-06-2015 |
20150220589 | SYSTEMS AND METHODS FOR MANAGING GRAPHICAL MODEL CONSISTENCY - In certain example embodiments, a system is configured to check consistency between a first computer-represented graphical model and a second computer-represented graphical model. The system includes a data storage device and at least one processor that is incorporated into or accessible to a server. The data storage device includes or stores model correlation information, e.g., in a mapping table form. The model correlation information is configured to define at least one relationship type between the first model and the second model. The model correlation information includes a mapping of objects of the first model to objects of the second model at creation time of the model correlation information. The processor is configured to perform a model consistency check procedure that uses the model correlation information including the relationship type to ascertain an inconsistency between extant versions of the first model and the second model. | 08-06-2015 |
20150213087 | SCALING FRAMEWORK FOR QUERYING - Certain example embodiments described herein relate to techniques for scaling processing systems. For instance, in certain example embodiments, a scaling master receives a user-specified scaling and/or alerting query. The scaling and/or alerting query is transmitted to scaling agents at respective ones of the processing elements, the transmission using the connection layer. Each of the scaling agents executes the at least one scaling and/or alerting query. Each of the scaling agents reports a result of the executing to the scaling master using the connection layer. The scaling master forms a scaling decision based on the result reported by each of the scaling agents. | 07-30-2015 |
20150207851 | SYSTEMS AND/OR METHODS FOR AUTOMATICALLY TUNING A DELIVERY SYSTEM FOR TRANSMISSION OF LARGE, VOLATILE DATA - Certain example embodiments relate to the concept of controlling the flow of data by providing an intelligent flow controller/manager, and a client-side component for the selection of a communication channel from a pool, and having these components communicate to regulate data flow through gateways to a broker- and/or other-type secondary stage. Data fragmentation and reassembly can be used to increase performance, e.g., through self-regulating behaviors. Advantageously, reliability is improved by enabling in-memory data persistence, rather than resorting to potentially performance-degrading use of disk storage. The delivery mechanism may be used to deliver data to multiple consumers, providing an end-to-end sender-to-consumer solution that self-regulates to optimize the data flow while still being reliable. | 07-23-2015 |
20150205621 | APPLICATION SYSTEM INDEPENDENT DYNAMIC PROCESS ORIENTED HELP - Dynamic help is generated for a process which is defined by a process model definition stored in a repository. A help request triggers help, and identifies an application system for which help is requested. The application system is in a repository which provides an API that navigates and accesses contained objects and process model definitions in the repository. The processor determines, in response to the help request, which of configurations stored in a dynamic process help generator (DPHG) storage to use to provide help, based on the application system of the help request. The processor obtains, from that configuration, information indicating relations of the repository related to the application system, process models and objects. The processor requests, via the repository API, the process models and objects based on the information obtained from that configuration. The processor provides, as a response to the help request, the relations, process models and objects. | 07-23-2015 |
20150199346 | HIERARCHICAL DATABASE REPORT GENERATION WITH AUTOMATED QUERY GENERATION FOR PLACEHOLDERS - A computerized method, implemented in at least one processor, for automatically generating a report, the method including, receiving, by the at least one processor, a document that includes placeholders arranged in a layout, reading, by the at least one processor, the placeholders, mapping, by the at least one processor, the placeholders to respective executable queries, executing, by the at least one processor, a search of a database using the executable queries to retrieve information from the database, mapping, by the at least one processor, the information from the database to the layout, and generating an updated document that includes the information retrieved from the database arranged in a layout defined by the layout of the placeholders. | 07-16-2015 |
20150149493 | METHOD AND SYSTEM TO DETECT CHANGES TO GRAPHICAL USER INTERFACE SCREENSHOTS USED IN DOCUMENTATION - A computer system includes a processor. The processor is configured to provide a documented screenshot and a machine-executable indication of steps which generated the documented screenshot as contained in documentation. The processor also will execute the steps which generated the documented screenshot, to generate a current screenshot. The processor also will compare the documented screenshot as contained in the documentation to the current screenshot generated by executing the steps, to provide a determination whether the comparison shows differences between the documented screenshot and the current screenshot. A method according to the above will detect changes to a screenshot used in documentation. A non-transitory computer-readable medium can perform a method to detect changes to a screenshot used in documentation. | 05-28-2015 |
20150134763 | TECHNIQUES FOR CREATING AND/OR MAINTAINING SCALABLE HETEROGENEOUS READ-ONLY FEDERATIONS OF REGISTRIES - Certain example embodiments described herein relate to techniques for creating and maintaining scalable heterogeneous read-only federations of registries, e.g., for use in service-oriented architectures. Federation of heterogeneous registries can be achieved with any types of registries (e.g., UDDI, ebXML, OSGi, ESB, proprietary, etc.), while at the same time avoiding the need to have target registries implement extra protocols or layers. In certain example embodiments, gateway registries may implement translation layers appropriate for the types of registries thereunder so as to provide a scalable and flexible solution. Optionally, registries may be grouped based on type so that messages may be translated only once per group, while avoiding tight couplings with registries and the services they provide. | 05-14-2015 |
20150134750 | TECHNIQUES FOR CHANGE PROPAGATION ACROSS BROKER TERRITORIES - Certain example embodiments described herein relate to techniques for propagating changes across broker territories. Broker territories are formed from broker servers that are placed in different geographical locations. When a territory is formed, a minimum spanning tree (MST) is formed between the brokers in the territory and, as a result, every broker in the territory will know its nearest neighbors and will be able to propagate the changes to these brokers. The MST may be dynamic in certain example embodiments. Each broker may be configured to calculate the cost of the edges based on certain predefined parameters, e.g., in computing the MSTs. Parameters that may be used in determining edge weights may include, for example, response to ping, geographical distance, whether a broker is in a LAN versus in a WAN, whether brokers are embedded in a mobile device, predefined categories (e.g., based on device type, etc.), and/or the like. | 05-14-2015 |
20150128074 | SYSTEM AND METHOD FOR BROWSER SIDE COLORIZING OF ICON IMAGES - A computer system and computer-implemented method colorizes a UI component image on the browser side. A data provider in the system encodes the UI component image into a Base64 character sequence which includes a header part and an image data part; generates Base64 header parts for specified colored versions of the UI component image; and transfers the encoded UI component image and the Base64 header parts for the specified colored versions of the UI component image to a client icon composer. The header part has a fixed amount of characters and the image data part has a variable amount of characters. The client icon composer replaces the header parts of the encoded UI component image with the Base64 header parts for the specified colored versions of the UI component image; and transfers the specified colored versions of the UI component image to a web page/application. | 05-07-2015 |
20150123983 | COLORBLIND ACCESSIBILITY TEST FOR CORRESPONDING SCREEN DISPLAYS - A method and apparatus that are capable of identifying corresponding screen displays that convey color coded information and identifying whether color coded information found in corresponding screen displays is likely to be accessible or inaccessible to a colorblind individual. The method and apparatus are capable of receiving data corresponding to a plurality of screen displays including information encoded in color. The method and apparatus are capable of identifying corresponding screen displays from the plurality of screen displays. The method and apparatus are further capable of detecting text and color encoded information that are different in the first and second corresponding screen displays at first and second locations, respectively. The method and apparatus are further capable of determining a proximity of the first and the second locations when there is text that is different in the first and second corresponding screens at the first location, and generating a colorblindness accessibility indicator based on whether text that is different was detected/and or the determined proximity. | 05-07-2015 |
20150123982 | COLORBLIND ACCESSIBILITY TEST FOR A SCREEN DISPLAY - A method and apparatus for testing a screen display for colorblind accessibility identifies when an onscreen display is likely to be accessible or inaccessible to a colorblind individual. The method and apparatus can receive data corresponding to a screen display, including information encoded in color. The method and apparatus can further apply a color filter to the screen display to remove a background color generating a filtered image. The method and apparatus can further detect an object associated with the filtered image. The method and apparatus can further detect whether there is text in the filtered image and determine a proximity of the detected text to the object when text is detected and generate a colorblindness accessibility indicator based on whether text was detected and/or the determined proximity. | 05-07-2015 |
20140380267 | LIFECYCLE MANAGEMENT SYSTEM WITH CONDITIONAL APPROVALS AND CORRESPONDING METHOD - Certain example embodiments concern a lifecycle management system for at least one computing component. A lifecycle model, including lifecycle states assignable to the at least one computing component, is defined. The lifecycle states include a production state. The lifecycle management system ensures the at least one computing component can be productively used only if it is assigned the production state. A lifecycle transition request assigning a requested target lifecycle state of the lifecycle model to the at least one computing component is received. A conditional lifecycle state, different from the requested target lifecycle state, is assigned to the at least one computing component. At least one condition to be fulfilled for the at least one computing component to be assigned the requested target lifecycle state is assigned. The requested target lifecycle state is automatically assigned to the at least one computing component when the at least one condition is fulfilled. | 12-25-2014 |
20140222523 | TECHNIQUES FOR BUSINESS PROCESS DRIVEN SERVICE ORIENTED ARCHITECTURE (SOA) GOVERNANCE - Certain example embodiments tie the business process governance and Service Oriented Architecture (SOA) governance processes together through the use of Business Process Model and Notation (BPMN) and Event Driven Architecture (EDA) based messaging. That is, in certain example embodiments, a BPMN agent integrated into a SOA registry and publish/subscribe agents deployed to the SOA registry and a business process engine are used to bring the business and SOA governances together through an EDA that helps generate relevant messages from a BPMN model representing the various governance mechanisms. Advantageously, a Complex Event Processing (CEP) engine and business analytics modules may provide monitoring and feedback to both parts of the overall architecture. | 08-07-2014 |
20140181233 | SYSTEM, MESSAGING BROKER AND METHOD FOR MANAGING COMMUNICATION BETWEEN OPEN SERVICES GATEWAY INITIATIVE (OSGI) ENVIRONMENTS - Certain example embodiments relate to techniques for managing communication between a plurality of Open Services Gateway initiative (OSGi) environments. A system includes a messaging broker configured to receive a message from one of the OSGi environments, with the message including a call of a service provided by one of the other OSGi environments. The broker may be further configured to transfer the message to the other OSGi environment. The plural OSGi environments communicate only via the messaging broker. | 06-26-2014 |
20140173634 | METHOD AND INTEGRATION COMPONENT FOR INTEGRATING OSGI ENVIRONMENTS INTO A SERVICE-ORIENTED ARCHITECTURE - Certain exemplary embodiments relate to a method for integrating at least one Open Services Gateway initiative (OSGi) environment into a Service-oriented Architecture (SOA). The OSGi environment includes at least one OSGi object, and the SOA includes a SOA registry. The method includes publishing the at least one OSGi object to the SOA registry. The publishing includes creating an SOA object in the SOA registry corresponding to the at least one OSGi object. The SOA object includes information reflecting at least one relationship of the at least one OSGi object to at least one further OSGi object within the OSGi environment. | 06-19-2014 |
20140173633 | METHOD AND SYSTEM FOR PROPAGATING MODIFICATION OPERATIONS IN SERVICE-ORIENTED ARCHITECTURE - Certain example embodiments relate to techniques for propagating modification operations for Service-oriented Architecture (SOA) objects in a SOA. The SOA includes at least two SOA objects that are connected by at least one relationship that defines one SOA object as referencing SOA object and another SOA object as referenced SOA object. Steps of an appropriate may include: receiving a request for propagating a modification operation from the referencing SOA object to the referenced SOA object; evaluating at least one propagation rule to determine whether the requested modification can be performed on the referenced SOA object; and if it is determined that the requested modification cannot be performed in accordance with the at least one propagation rule, evaluating at least one approval rule to determine whether the requested modification can be performed on the referenced SOA object. | 06-19-2014 |
20140173488 | SYSTEMS AND/OR METHODS FOR PATH FINDING ON MODEL STRUCTURES - Certain example embodiments described herein relate to defining relevant data for analysis and reporting for modeled processes and process-related data. In certain example embodiments, a normal (and potentially-non-expert) user can define a model, object, or a relation as “source” and “target” of interest. The user also may be able to make a question more concrete, e.g., by specifying stopovers, a number of steps that might be between the source and the target, etc. A net of different paths from the source to the target may be retrieved as result, representing all possible relations, including those that are implicit. Such information also can be selectively excluded from the net, e.g., if the user does not want to evaluate same. However, the user can be reasonably sure that all relevant data for analysis has been returned, even though the definition was made without consulting an expert. | 06-19-2014 |
20140172500 | COMPUTER-IMPLEMENTED METHOD AND PROCESS MANAGEMENT SYSTEM FOR DYNAMICALLY ADAPTING PROCESSES - Certain example embodiments relate to a computer-implemented method for adapting at least one process defined as a base model in a process management system. In the process management system, at least one adaptation layer is defined separate, from the base model. The adaptation layer includes at least one definition of an adaptation of the base model. The at least one adaptation layer is applied on the base model in accordance with at least one aggregation rule to generate an adapted model of the at least one process. | 06-19-2014 |
20140164836 | TECHNIQUES FOR TEST AUTOMATION IN EMERGENT SYSTEMS - Certain example embodiments described herein relate to techniques for test automations in emergent systems. More particularly, certain example embodiments provide a mechanism for dynamic recognition of combinations of services/components, monitoring of their real-time usage, and automatic generation and running of tests for the combinations at appropriate times (e.g. when part of a combination is updated). The tests for individual (and, if available, combinations of) services are associated with the services using a registry. A taxonomy or ontology can be used to denote the semantics of the services, providing an array of options for assessing how and when to run tests and actions. It also is possible to detect similar combinations of services automatically. It therefore becomes possible to automate the detection and running of tests for a combination of services/components, even in emergent systems where such combinations cannot always be predicted in advance and where services/components are addable/modifiable over time. | 06-12-2014 |
20140136520 | METHOD AND SYSTEM FOR PROCESSING GRAPH QUERIES - In certain example embodiments, a graph query retrieves data items from a data source by indicating a source node, a target node, and a plurality of edges between the source and target nodes. Each edge includes one or more relation conditions. Each relation condition defines a mapping between items of one of the source item types and items of one of the target item types. The edges are selected and traversed from the source node to the target node in accordance with the relation condition(s), producing an intermediate set of result items including items of the data source that belong to the at least one target item type and fulfill the corresponding relation condition(s). Items from the intermediate set of result items that do not fulfill the corresponding relation condition(s) are deleted as further traversals are made. The intermediate set ultimately is returned as the graph query result. | 05-15-2014 |
20140129583 | SYSTEM AND METHOD FOR GRAPHICALLY CREATING QUERIES ON MODEL DATA - Certain example embodiments relate to techniques for creating queries on model data of at least one data source (DS | 05-08-2014 |
20140101640 | WHITE-BOX TESTING SYSTEMS AND/OR METHODS FOR USE IN CONNECTION WITH GRAPHICAL USER INTERFACES - Certain example embodiments relate to white-box testing techniques, e.g., for graphical user interfaces (GUIs). A test case to be run on the application includes interactions between the application and external components that were gathered as the application ran and received user input from a user until a desired test state was reached, and assertions to be made to the application once that state is reached. A test environment replaces a normal environment in which the application runs. An adapter executes interactions on the test environment's GUI dedicated thread(s). The application is fed with interactions, through the adapter, until the application reaches the desired state. Once the application reaches that state, the application is fed with assertions. Expected data associated with the assertions is compared with data actually being generated by the application. A determination is made regarding whether the test case resulted in success or failure. | 04-10-2014 |
20140078163 | SYSTEMS AND/OR METHODS FOR STATISTICAL ONLINE ANALYSIS OF LARGE AND POTENTIALLY HETEROGENEOUS DATA SETS - Certain example embodiments relate to using Complex Event Processing (CEP) techniques for statistical analysis of cache behavior and parameters, e.g., in connection with large, potentially heterogeneous data sets (e.g., “Big Data”). A dedicated stream mining operator registers a listener to a cache and receives notifications on cache operations. For selected element attributes, a first model estimates the probability density functions of the attribute values, delivering well-defined estimates of the attribute value distributions. A second model analyzes the time elements stay in the cache (“validity”). Validity is combined with the attribute value distribution. A meaningful analysis model (Cache Element Model) can be derived by combining additional summary statistics for the validity with the attribute value distribution, describing how long elements stay in the cache for attribute values of a specific region, and how the values are distributed. It may be used to inform administrative tasks such as, optimization of cache parameters. | 03-20-2014 |
20140059085 | METHOD AND SYSTEM FOR STORING TABULAR DATA IN A MEMORY-EFFICIENT MANNER - Certain example embodiments relate to a method of storing data in a tabular data structure having columns and rows in a column-oriented storage system. At least one of the columns is divided into a plurality of segments. Each segment has an associated cell size that indicates the maximum size of the data items in the respective segment. When storing a data item into one of the segments, it is determined whether the size of the data item exceeds the cell size of the segment; and if the size of the data item exceeds the cell size of the segment, the cell size of the segment is adapted to accommodate the size of the data item. The adapting of the cell size of the segment to accommodate the size of the data item is performed independent of the cell sizes of the other of the plurality of segments. | 02-27-2014 |
20140025700 | SYSTEMS AND/OR METHODS FOR INTRODUCING SEMANTIC CONCEPTS INTO COMPLEX EVENT PROCESSING ENVIRONMENTS - Certain example embodiments described herein relate to techniques for introducing semantic concepts into complex event processing (CEP) systems and/or methods. In an event processing system, for example, an event bus is configured to receive a stream of events, each having a predefined event type. An event processing agent is configured to execute predefined queries on the events, with each query conforming to a query language, and with the query language being enhanced via a semantic extension corresponding to an ontology. An ontology management component in communication with the event processing agent stores mappings (optionally specified at design time) between concepts of the query language and concepts of the ontology that enhances the query language. Processing resources of the component translate (optionally at compile time) references to ontology concepts into translated queries processable by the event processing agent in accordance with the query language, without the semantic extension enhancement. | 01-23-2014 |
20140019628 | RESOURCE ADAPTER FOR ESTABLISHING A CONNECTION BETWEEN AN EXECUTIVE INFORMATION SYSTEM AND AT LEAST ONE CLIENT - Certain example embodiments relate to a resource adapter configured to establish connections between an executive information system (EIS) and one or more clients. The resource adapter includes at least a first and a second connection pool, both maintaining a plurality of connection objects. Each connection object defines a channel of communication between the EIS and the resource adapter. A cluster coordinator is configured to assign a first connection object in a first connection pool and a second connection object in a second connection pool to the one or more clients to create at least two coexisting connections between the one or more clients and the EIS. | 01-16-2014 |
20140012882 | METHOD OF PROCESSING RELATIONAL QUERIES IN A DATABASE SYSTEM AND CORRESPONDING DATABASE SYSTEM - Certain example embodiments concern a computer-implemented method of processing a relational query in a database system. The relational query addresses a plurality of data objects linked by one or more relationships. For each data object addressed by the relational query, at least one result is computed in accordance with at least one index structure, with the index structure being stored in a storage device of the database system. The results computed are merged in accordance with at least one translation data structure to produce a final result of the relational query, with the translation data structure representing the one or more relationships between the data objects and being stored in a memory of the database system. | 01-09-2014 |
20130332508 | SYSTEMS AND/OR METHODS FOR SERVER-CONTROLLED DISPLAY OF NESTED MULTI-LEVEL CLIENT DIALOGS - Certain example embodiments described herein relate to server-controlled display techniques for nested multi-level client dialog boxes. On the client side, standard dialog elements are shown in the dialog box. Client-side events, e.g., caused by user interaction with the dialog box, are converted to parameters for a function call to the server and are processed there. The dialog box display may be updated by transferring (possibly only) dialog item changes that result from the function call back to the client. The server may process separate threads and bundle dialog and sub-dialog data in one function, and the server may split the bundled data for dialog and/or sub-dialog box rendering, as appropriate. Thus, an advantage of certain example implementations is that no dialog-specific logic (e.g., data access, dialog specific functions, etc.) needs to exist on the client side. Instead, the client side may simply render a fixed set of dialog box items. | 12-12-2013 |
20130262931 | SYSTEMS AND/OR METHODS FOR TESTING CLIENT REACTIONS TO SIMULATED DISRUPTIONS - Certain example embodiments described herein relate to approaches for testing client reactions to simulated disruptions in a real production environment that leverages the publish/subscribe messaging model (or one of its variants), optionally in connection with JMS messages and/or triggers. In certain example embodiments, a test driver reads a script that includes an instruction flow that brings down brokers in a broker cluster similar to (or in a manner as inflicted by) broker crashes (e.g., where a process or application does not have a chance to save its state or data before it is terminated), and/or broker stop/start events, e.g., to simulate the problems and determine whether the client application remains intact in the presence of errors. The simulations may leverage hardware and/or software means for intentionally causing disruptions in a live production environment. Thus, it advantageously becomes possible to test an application integration's client-side failover and/or load-balancing implementations. | 10-03-2013 |
20130254746 | SYSTEMS AND/OR METHODS FOR EXECUTING APPROPRIATE TESTS BASED ON CODE MODIFICATIONS USING LIVE, DISTRIBUTED, REAL-TIME CACHE AND FEEDBACK LOOP - Certain example embodiments relate to systems and/or methods for determining and/or executing an appropriate subset of tests in response to a code change. In certain example embodiments, hash digests or other unique values for code structures (such as, for example, classes, methods, and/or other structural elements) may be created. Tests associated those associated code structures may be identified. New hash digests or other unique values may be generated for the code structures after the source code has been modified. In response to a mismatch as between the existing and new hash digests or other unique values, a list of associated tests for possible subsequent execution may be retrieved. Certain example embodiments additionally or alternatively provide an incremental but consistent way of analyzing performance issues, e.g., in connection with a profiler. | 09-26-2013 |
20130226970 | SYSTEMS AND/OR METHODS FOR AUTOMATICALLY DERIVING WEB SERVICE PERMISSIONS BASED ON XML STRUCTURE PERMISSIONS - Certain example embodiments relate to techniques for automatically deriving web service permissions based on XML structure permissions. A call for a web service operation is received from a client at a web service runtime engine. XML data objects from a database of XML data objects located on an XML server implicated by the called web service operation are identified. The XML data objects have corresponding XML data structures. Access permissions for the user for the identified XML data objects are retrieved from the XML server, the access permissions for the web service having been generated automatically from access permissions based on the XML data structures for corresponding XML data objects. The called web service operation is either permitted or prohibited based on a determination, at the web service runtime engine and based on the retrieved access permissions. Thus, data access requests are handled in the “higher” web service layer. | 08-29-2013 |
20130219361 | SYSTEM AND METHOD FOR CONTROLLING THE DEVELOPMENT OF A SOFTWARE APPLICATION - Certain example embodiments relate to techniques for controlling the development of a software application. The system includes an event channel for receiving at least one event that indicates an action performed by one of a plurality of existing development tools used in the development of the software application, a policy-based event engine for evaluating the at least one event and for initiating at least one action of one of the plurality of existing development tools in accordance with at least one policy, and a repository, for storing at least one artifact to define an architecture of the software application. The at least one artifact corresponds to a component of the software application and/or to a dependency between a first component and a second component of the software application. | 08-22-2013 |
20130160108 | EXTENSIBLE AND/OR DISTRIBUTED AUTHORIZATION SYSTEM AND/OR METHODS OF PROVIDING THE SAME - In certain example embodiments, an extensible and/or distributed security system is provided. In certain example embodiments the security system provides authorization to a resource of a first application. In the first application, a security context is created and a client is authenticated to the first application. A request is accepted in the first application to access at least on resource. The first application communicates with an authorization application to determine authorization to the at least one resource. In the authorization application, an authorization process is executed which communicates with another application that defines a step of the authorization process for this resource. Based on that step, it is determined whether the first application allows access to the at least one resource for the client. | 06-20-2013 |
20130159347 | AUTOMATIC AND DYNAMIC DESIGN OF CACHE GROUPS - A system and method is provided for automatic and dynamic adaptation of cache groups in a database system having one or more processors. The method includes analyzing a database query and determining if a set of predicates in a predicate pattern are suitable for inclusion in one or more cache groups, with the one or more cache groups having one or more cache tables; mapping value-based predicates in the predicate pattern to a filling column in the one or more cache tables; and mapping equi-join predicates in the predicate pattern to a referential cache constraint in the one or more cache tables. New cache groups can be created for predicate patterns occurring more frequently and existing cache groups can be deleted if the frequency of the predicate pattern falls below a predetermined threshold value. | 06-20-2013 |
20130138575 | AUTOMATED IMPLEMENTATION OF BUSINESS SERVICE COMMUNICATION AND/OR LINKAGE OF EXECUTABLE PROCESSES THROUGH AUTOMATIC GENERATION AND POPULATION OF VARIABLES - Certain example embodiments described relate to the generation of variables for data flow chains that are associated with control flow models. Certain example embodiments relate to the creation of a diagram (e.g., an automation diagram) that encapsulates the flow of data in a process model (e.g., EPC). In certain example embodiments, the generation of variables provides for linking executable processes via the automation diagram so that the data flow may be integrated into the EPC model. An EPC model may be transformed into a BPMN model. Optionally, the transformations may occur in reverse so that an automation diagram is created from a modified EPC model. | 05-30-2013 |
20130110578 | SYSTEMS AND/OR METHODS FOR IDENTIFYING SERVICE CANDIDATES BASED ON SERVICE IDENTIFICATION INDICATORS AND ASSOCIATED ALGORITHMS | 05-02-2013 |
20130104099 | SELECTIVE CHANGE PROPAGATION TECHNIQUES FOR SUPPORTING PARTIAL ROUNDTRIPS IN MODEL-TO-MODEL TRANSFORMATIONS - Certain example embodiments relate to selective change propagation techniques for supporting partial roundtrips in model-to-model transformations. In certain example embodiments, enablement checking is performed to determine whether a propagation operation can be performed for an object. If the object passes enablement checking, the propagation is executed by, for example, creating the object(s) in a business-oriented (e.g., EPC) model; updating relevant internal attributes of technical (e.g., BPMN) objects that allow for the successful merge; optionally correcting user-introduced errors in the technical model; and properly connecting the pulled-up objects with their surroundings. The connecting is performed so that the objects advantageously appear as if the current business-oriented model was used for the merge. According to certain example embodiments, the connecting may be deterministic, e.g., such that the result will be the same regardless of order or sequence in which the propagations are made. | 04-25-2013 |
20130046725 | SYSTEMS AND/OR METHODS FOR FORECASTING FUTURE BEHAVIOR OF EVENT STREAMS IN COMPLEX EVENT PROCESSING (CEP) ENVIRONMENTS - Certain example embodiments described herein relate to forecasting the future behavior of event streams in Complex Event Processing (CEP) environments. For each received event in an event stream, a reference window indicative of a predefined temporal range during which the forecast is to be computed is updated so that the reference window ends with the received event, with the reference window moving with the event stream. Within this processing loop, when a forecasting update policy indicates that the forecast is to be updated based on the received event: a forecasting window indicative of a temporal range in which events are to be forecasted is updated; and while the time period of the forecasting window is not exceeded, (a) a next forecasted event is generated via at least one processor and (b) the next forecasted event is inserted into the forecast window; and the forecast window is published. | 02-21-2013 |
20130013612 | TECHNIQUES FOR COMPARING AND CLUSTERING DOCUMENTS - Certain example embodiments relate to techniques for analyzing documents. A plurality of documents/document portions are imported into a database, with at least some of the documents/document portions being structured and at least some being unstructured. The imported documents/document portions are organized into one or more collections. A selection of at least one of the one or more collections is made. An index of words and/or groups of words is built (and optionally refined in accordance with one or more predefined rules) based on each of the document or document portion in each selection. A document-word matrix is built (and optionally weighted using a semantic approach), with the matrix including a value indicative of a number of times each word and/or group of words in the index appears in each document/document portion. One or more clusters of documents are generated using the document-word matrix. | 01-10-2013 |
20120310681 | SYSTEMS AND/OR METHODS FOR IDENTIFYING SERVICE CANDIDATES BASED ON SERVICE IDENTIFICATION INDICATORS AND ASSOCIATED ALGORITHMS - Certain example embodiments relate to algorithmic and/or programmatic approaches to identifying service candidates from among business process functions. In certain example embodiments, a method of analyzing functions of a business process model for possible exposure as service capabilities in a service-oriented business process system (SO-BPS) is provided. A business process model defined by a plurality of objects is received, with each said object having metadata attributes associated therewith. Business process analysis intelligence is obtained at design time for each said object. Process performance intelligence at run time is obtained for each said object. Indicators corresponding to the design time and run time gathered intelligence are stored together with the metadata attributes for the corresponding object. Via at least one processor of the SO-BPS, an overall service candidate algorithm is applied to the stored indicators to arrive at a total service eligibility value for each process function in the model. | 12-06-2012 |
20120306898 | SYSTEMS AND/OR METHODS FOR EFFICIENT RENDERING OF BUSINESS MODEL RELATED VECTOR GRAPHICS - Certain example embodiments described herein relate to systems and/or methods for efficient rendering of vector graphics corresponding to business models generated by a business process management (BPM) package. Such graphics may be provided in an Abstract Vector Graphic (AVG) format. In certain example embodiments, graphic images are provided to an AVG generator, along with a renderer fragment file including static code that is independent from the generated graphic but dependent on the target platform. The AVG generator in certain example embodiments produces program logic that is executable on the target device to cause the display of the graphic. | 12-06-2012 |
20120210294 | SYSTEMS AND/OR METHODS FOR IDENTIFYING AND RESOLVING COMPLEX MODEL MERGE CONFLICTS BASED ON ATOMIC MERGE CONFLICTS - Certain example embodiments described herein relate to interactive model merging systems and/or methods and, more particularly, to using basic information obtained during merging to help a user resolve high-level merge conflicts. In certain example embodiments, instead of leaving it to the user to resolve the merge conflicts on the level of the atomic elements (e.g., objects and connections with a non-empty merge state), the recognition of high-level merge conflicts may help capture the semantics of the differences between the models being merged on a larger scale (e.g., covering a possibly very large number of model elements in one conflict) and/or also may generally help allow the user to resolve them easily and quickly within a reduced number of operation. The high-level merge conflicts may be resolvable at their high levels or decomposed and resolved at a lower level depending, in part, on the type of conflict involved. | 08-16-2012 |
20120185877 | SYSTEMS AND/OR METHODS FOR END-TO-END BUSINESS PROCESS MANAGEMENT, BUSINESS EVENT MANAGEMENT, AND/OR BUSINESS ACTIVITY MONITORING - The example embodiments disclosed herein relate to application integration techniques built around the publish-and-subscribe model (or one of its variants). In certain example embodiments, application integration techniques for managing and/or monitoring a business process comprising a plurality of activities, events, and/or objects located in at least one resource external to the application integration system and a process engine thereof are provided. During design time, by introspecting the business object types involved in the activities, events, and/or objects of the at least one resource, potential state changes may be identified, and an integrative linkage may be established, with the integrative linkage being managed and maintained by a process monitoring agent (PMA). During runtime, the PMA may “listen” to the business object state changes in the at least one external resource and notify the local process engine accordingly. | 07-19-2012 |
20120185829 | Method and system for debugging a job running on a legacy system - The present invention concerns a computer-implemented method for debugging a job running on a legacy system, wherein the method comprises the following steps:
| 07-19-2012 |
20120166688 | System and method for secure complex event processing in heterogeneous environments - Certain example embodiments relate to a system for secure complex event processing (CEP). The system includes an input adaptor configured to receive at least one input event from at least one external source system. The at least one input event comprises at least one event-specific disclosure permission concerning data of the input event. A CEP engine is configured to process the at least one input event and to produce at least one corresponding complex output event. A security enforcer is configured to remove data from the at least one output event that is not in accordance with the at least one event-specific disclosure permission defined in the corresponding at least one input event. An output adaptor is configured to send the at least one output event to at least one external target system. | 06-28-2012 |
20120166469 | CEP engine and method for processing CEP queries - The present invention concerns a complex event processing (CEP) engine ( | 06-28-2012 |
20120166421 | SYSTEMS AND/OR METHODS FOR USER FEEDBACK DRIVEN DYNAMIC QUERY REWRITING IN COMPLEX EVENT PROCESSING ENVIRONMENTS - Certain example embodiments described herein relate to techniques for user feedback driven dynamic query rewriting in complex event processing (CEP) environments. In certain example embodiments, the adjustment of already-initiated queries may be permitted during runtime in order to help continuously or substantially continuously meet a user's requirements. In certain example embodiments, parameters of a query may be adapted dynamically, e.g., without the need to redeploy it. Adaptable parameters in certain example embodiments may be identified and/or based on, for instance, an automatic determination from original query creation, user specifications, the way in which a user interacts with a user interface for visualizing the results of queries, etc. | 06-28-2012 |
20120166246 | SERVICE-ORIENTED PROCESS CONFIGURATION SYSTEMS AND/OR METHODS - Certain example embodiments described herein relate to techniques for matching business requirements with available services in service-oriented business process systems. An n-to-m relationship between process steps and services may be established. In certain example embodiments, both future design and dynamic runtime changes become possible by elaborating on possible resolution techniques before process execution and by identifying/resolving configurational dependencies. The addition of a service-oriented process configuration layer is made possible in certain example embodiments by enhancing the way that business processes are modeled visually or notationally, and through the implementation of a metamodel. The model linking process steps and services may be extended so as to support logical operators, rules or constraints for matching process steps and services, dependencies and relationships, etc. A meta model may be provided so as to provide support for evaluating or analyzing matches, sometimes automatically, at either or both of runtime and design time. | 06-28-2012 |
20120116782 | Security systems and/or methods for cloud computing environments - Certain example embodiments described herein relate to security systems and/or methods for cloud computing environments. More particularly, certain example embodiments described herein relate to the negotiation and subsequent use of Trading Partner Agreements (TPAs) between partners in a Virtual Organization, the TPAs enabling resources to be shared between the partners in a secure manner. In certain example embodiments, TPAs are negotiated, an algorithm is executed to determine where an executable is to be run, the resource is transferred to the location where it is to be run, and it is executed—with the TPAs collectively defining a security policy that constrains how and where it can be executed, the resources it can use, etc. The executable may be transferred to a location in a multipart (e.g., SMIME) message, along with header information and rights associated with the executable. | 05-10-2012 |
20120110599 | Systems and/or methods for appropriately handling events - Certain example embodiments described herein relate to techniques for the attachment of priorities and/or reaction time limits to various entities of a system such as, for example, events, event types, queries, etc. The system's processing may be tailored behavior to match these boundary conditions while at the same time increasing (and sometimes even maximizing) the rate of events processed. Advantageously, the system may be made to adapt its behavior to the current situation, which is changeable and may even be changing quite frequently, e.g., as in connection with a potentially rapidly changing stream. Users may in certain example embodiments specify policies to control this adaptation in certain example embodiments and, thus, in certain example instances, events (including events of special interest) may be handled appropriately, even in response to changing conditions. | 05-03-2012 |
20120102486 | DISTRIBUTED CLOUD APPLICATION DEPLOYMENT SYSTEMS AND/OR ASSOCIATED METHODS - In certain example embodiments, distributed cloud application deployment systems (DCADS), and/or associated methods are provided. A formal description of the cloud application is created. The cloud application's formal representation, with its constituent nodes and their associated properties and interfaces, etc., is exported to a machine processable form. The exported DCADS machine processable rendition and any needed implementation artifacts are retrieved by a cloud application deployer that helps facilitate the deployment of the cloud application into the distributed and heterogeneous cloud environments as prescribed in the DCADS. | 04-26-2012 |
20120047078 | System and method for ad-hoc modification of a process during runtime - The present invention concerns a system for ad-hoc modification of a process running in a workflow management system (WFMS), wherein the process is defined by a process definition, the system comprising an ad-hoc modification component ( | 02-23-2012 |
20110238935 | Systems and/or methods for distributed data archiving - Certain example embodiments of this invention relate to system and/or methods that pair a data extractor with a data accumulator, wherein these components may be located on any one or more computers in a network system. This distributed peer extract-accumulate approach is advantageous in that it reduces (and sometimes completely eliminates) the need for a “funnel” approach to data archiving, wherein all data is moved or backed up through a central computer or central computer system. In certain example embodiments, recall-accumulate, search, verify, and/or other archive-related activities may be performed in a similar peer-based and/or distributed manner. Certain example embodiments may in addition or in the alternative incorporate techniques for verifying the integrity of data in an archive system, and/or techniques for restoring/importing data from a non-consumable form. | 09-29-2011 |
20110178775 | Analysis system and method for analyzing continuous queries for data streams - The present invention concerns an analysis system ( | 07-21-2011 |
20110172986 | Mainframe data stream proxy and method for caching communication between emulators and mainframes - The present invention concerns a mainframe data stream proxy (MDSP) ( | 07-14-2011 |
20110170561 | Mainframe injection component and method for manipulating data packets communicated between emulators and mainframes - The present invention concerns a mainframe injection component (MIC) ( | 07-14-2011 |
20110153530 | Method and system for analyzing a legacy system based on trails through the legacy system - The present invention concerns a method for analyzing a legacy system ( | 06-23-2011 |
20110125762 | Method for generating processing specifications for a stream of data items - The present invention concerns a method for generating at least one processing specification ( | 05-26-2011 |
20110087633 | Primary database system, replication database system and method for replicating data of a primary database system - The present invention concerns a method for replicating one or more data items of a primary database system ( | 04-14-2011 |
20110071986 | Method for mass-deleting data records of a database system - The present invention concerns a method for mass-deleting a plurality of data records ( | 03-24-2011 |
20110066595 | Database server, replication server and method for replicating data of a database server by at least one replication server - The present invention concerns a method for replicating data of a database server ( | 03-17-2011 |
20100333111 | Systems and/or methods for policy-based JMS broker clustering - The example embodiments disclosed herein relate to application integration techniques and, more particularly, to application integration techniques built around the publish-and-subscribe model (or one of its variants). In certain example embodiments, a publishing application, and first and second broker clusters are provided. Each broker cluster comprises a plurality of brokers, and each broker is configured to relay messages from the publishing application to at least one subscribing application. A composite cluster connection is associated with the publishing application, and cluster connections are associated with the composite cluster connection. The message generated by the publishing application is sent to the broker cluster in accordance with a user-defined composite policy. The message is routed from the composite cluster connection to at least one cluster connection based on a first policy layer. The messaging is routed from the at least one cluster to at least one broker based on a second policy layer. | 12-30-2010 |
20100325252 | Broker system for a plurality of brokers, clients and servers in a heterogeneous network - The present invention concerns a broker system for a plurality of brokers ( | 12-23-2010 |
20100325165 | Consistency enforcement system for XML objects stored in an SOA-registry - The present invention concerns a consistency enforcement system ( | 12-23-2010 |
20100251264 | Systems and/or methods for end-to-end business process management, business event management, and/or business activity monitoring - The example embodiments disclosed herein relate to application integration techniques built around the publish-and-subscribe model (or one of its variants). In certain example embodiments, application integration techniques for managing and/or monitoring a business process comprising a plurality of activities, events, and/or objects located in at least one resource external to the application integration system and a process engine thereof are provided. During design time, by introspecting the business object types involved in the activities, events, and/or objects of the at least one resource, potential state changes may be identified, and an integrative linkage may be established, with the integrative linkage being managed and maintained by a process monitoring agent (PMA). During runtime, the PMA may “listen” to the business object state changes in the at least one external resource and notify the local process engine accordingly. | 09-30-2010 |
20100251262 | Systems and/or methods for standards-based messaging - The example embodiments disclosed herein relate to application integration techniques built around the publish-and-subscribe model (or one of its variants). In certain example embodiments, a first standards-based messaging protocol (e.g., the JMS messaging protocol) may be used to create a trigger so that a message envelope according to a second standards-based messaging protocol (e.g., SOAP) may be communicated over the first standards-based messaging transport layer. In other words, in certain example embodiments, a trigger according to a first protocol (e.g., JMS) may have a message according to a second protocol (e.g., SOAP) associated therewith so as to enable the message to be communicated over the first protocol's transport layer. The trigger may be configured to receive a message from a web service consumer via the JMS messaging protocol and pass it to the web service stack for dispatch to the web service provider. Similarly, for a request-reply web service exchange pattern, the trigger may be configured to send the reply message from the web service provider, as returned by the web service layer, to the web service consumer via the JMS messaging protocol. | 09-30-2010 |
20100250519 | XML database management system for an XML database comprising access protected XML data - The present invention concerns an XML data base management system (XDBMS, | 09-30-2010 |
20100223666 | Method, SOA registry and SOA repository for granting a user secure access to resources of a process - The present invention relates to a method for granting a user (U | 09-02-2010 |
20100131460 | Method, server extension and database management system for storing non XML documents in a XML database - The present invention relates to a method for storing at least one non-XML document ( | 05-27-2010 |
20100115046 | Method and server cluster for map reducing flow services and large documents - The present invention refers to a method for MapReducing the processing of an Electronic Data Interchange (EDI) document ( | 05-06-2010 |
20100094905 | Method for manipulating objects in a SOA registry - The present invention concerns a method for manipulating at least one registry object ( | 04-15-2010 |
20100088256 | Method and monitoring system for the rule-based monitoring of a service-oriented architecture - The present invention concerns a method for the rule-based monitoring of a component (C | 04-08-2010 |
20100083348 | Method and rule-repository for generating security-definitions for heterogeneous systems - The present invention concerns a method for generating one or more system-specific security-definitions ( | 04-01-2010 |
20100057691 | Method, server extensionand database management system for storing annotations of non-XML documents in an XML database - The present invention relates to a method for storing annotations of non-XML documents ( | 03-04-2010 |
20100042986 | SOA-registry, method and platform manager for automatic SOA application deployment - The invention concerns a SOA-registry ( | 02-18-2010 |
20100042679 | Method and interprocess communication driver for managing requests of a database client to a database server - The present invention concerns a method for managing the interprocess communication between at least one database client process ( | 02-18-2010 |
20100011372 | Method and system for synchronizing the execution of a critical code section - The invention concerns a method for synchronizing the execution of at least one critical code section (C | 01-14-2010 |
20100005108 | Method and system for generating indexes in an XML database management system - The invention concerns a method for generating at least one index ( | 01-07-2010 |
20090171879 | Systems and/or methods for prediction and/or root cause analysis of events based on business activity monitoring related data - In certain example embodiments of this invention, there is provided systems and/or methods for processing BAM-related data to predict when events of interest are about to happen and/or to identify the root causes of, or at least data correlated with, such events of interest. In certain example embodiments, key performance indicators (KPIs) are gathered and gardened. The gardening process may identify KPI values of interest (e.g., based on a Z-factor analysis thereof across one or more collection intervals). The gardened KPIs may be processed using a time-series transform (e.g., a Fast Fourier Transform), matched to one of a plurality of predefined waveforms, and fed into a dynamic Naïve Bayesian Network (NBN) for prediction. The gardened data also may be used to determine the relevance of the KPI for root causes of problems (e.g., based on a chi-square analysis). | 07-02-2009 |
20090171720 | Systems and/or methods for managing transformations in enterprise application integration and/or business processing management environments - In certain example embodiments of this invention, systems and/or methods for managing transformations in Enterprise Application Integration (EAI) and/or Business Process Management (BPM) Environments are provided. In certain example embodiments of this invention, when a process and/or transform is defined, design-time encoding data is extracted and stored as metadata. When the process or transform is implemented, runtime data is captured and/or managed, and also stored as metadata. When new processes and/or transforms are defined, and/or when an already-defined process and/or a transform is executed, heuristics may be applied so as to suggest one or more already-existing transformation chains for use in accomplishing at least a part of the same and/or a similar process or transform. | 07-02-2009 |
20090125488 | Geographic XML database management system - The present invention relates to an XML database management system for providing geographic information. In one embodiment, the XML database management system comprises a loader capable to convert ( | 05-14-2009 |
20090064307 | Systems and/or methods for streaming reverse HTTP gateway, and network including the same - In certain example embodiments of this invention, there is provided systems and/or methods for a streaming reverse HTTP gateway, and/or networks including the same. In such a network, a reverse HTTP gateway is located within a demilitarized zone (DMZ) disposed between public (or external) and private (or internal) networks for providing security therebetween. Requests from external clients may be streamed from the external network to the internal network over various connections and ports, including a substantially persistent reverse connection between an internal server and a reverse HTTP gateway. The reverse HTTP gateway architecture of certain example embodiments removes the need for proprietary protocols implemented between the reverse HTTP gateway located in the DMZ and the internal server located in the internal network. In certain example embodiments, the reverse HTTP gateway architecture is configured to leverage the capabilities of HTTP 1.1. | 03-05-2009 |
20090064182 | Systems and/or methods for providing feature-rich proprietary and standards-based triggers via a trigger subsystem - The example embodiments disclosed herein relate to application integration techniques and, more particularly, to application integration techniques built around the publish-and-subscribe model (or one of its variants). In certain example embodiments, triggers are provided for establishing subscriptions to publishable document types and for specifying the services that will process documents received by the subscription. A standards-based messaging protocol (e.g., JMS messaging) may be fully embedded as a peer to a proprietary messaging protocol provided to an integration server's trigger subsystem so that all or substantially all of the feature-rich capabilities available via the proprietary protocol may also become available via the standards-based messaging protocol. The triggers may be JMS triggers in certain example embodiments. | 03-05-2009 |
20090063664 | Systems and/or methods for location transparent routing and execution of processes - The example embodiments disclosed herein relate to networks and, more particularly, to systems and/or methods that enable processes to be routed and/or executed in a distributed, location transparent manner. A process engine for use across instances of a service-oriented integration server is provided to a network having a messaging layer. The process engine executes a process in accordance with a process model defined at design time. Each instance of the process engine comprises runtime artifacts such as deployable units of executable logic; a publishing service for publishing a process transition document (PTD) that includes routing data as a part of the message itself; a subscription service for subscribing to the PTDs to be routed to the corresponding instance of the process engine; and a filtering service for filtering other PTDs published to the messaging layer. The messaging layer includes a first queue to process PTDs that trigger new process instances, and a second queue to accommodate transitions between steps of the process model. After a step in the process model is executed, the publishing service publishes a new PTD to cause a next step in the process model to be executed. | 03-05-2009 |