Class / Patent application number | Description | Number of patent applications / Date published |
707702000 | Triggers, stored procedures, user defined function (UDF) | 43 |
20100070479 | Proactive Information Monitoring Systems and Methods - Systems and methods for proactive information monitoring are presented. A user can define alert criteria for generating an alert through a centralized alerting service where the alert criteria relate to the status of records in a data set. The records of the data can be distributed across multiple remote or unaffiliated databases to which the user lacks access. The service can disaggregate the criteria into individual criterion targeting specific records stored in the databases. The criterions are provided to agents that monitor the records. When the records satisfy the criterion, the agents send notifications back to the service. Once the service receives sufficient notifications to indicate the alert criteria are satisfied, the service sends an alert to designated recipients. The systems and methods are able provide alert information without compromising the confidentially or security of the remote databases. | 03-18-2010 |
20100100534 | Ticker uploader for eBay.RTM. - A method for automatically uploading information to an eBay® server includes the steps of: (a) receiving in a parsing server a formatted electronic file containing information about at least one of product information including event ticket information and other product information, and service information; (b) translating the formatted electronic file within the parsing server into a format that is compatible with eBay® API to provide a compatible parsed data file using a dynamic programming language; and (c) automatically uploading the compatible parsed data file to an eBay® server. The method also updates any existing event tickets or products or services that have been uploaded to eBay® previously using this method. | 04-22-2010 |
20100145920 | Digital Media Retrieval and Display - Retrieval and display of digital media items is described. For example, the digital media items may be photographs, videos, audio files, emails, text documents or parts of these. In an embodiment a dedicated apparatus having a touch display screen is provided in a form designed to look like a domestic fish tank. In an embodiment graphical animated agents are depicted on the display as fish whose motion varies according to at least one behavior parameter which is pseudo random. In embodiments, the agents have associated search criteria and when a user selects one or more agents the associated search criteria are used in a retrieval operation to retrieve digital media items from a store. In some embodiments media items are communicated between the apparatus and a portable communications device using a communications link established by tapping the portable device against the media retrieval and display apparatus. | 06-10-2010 |
20100198799 | Method and Apparatus for Software Simulation - A software simulation method and program storage device for software defect detection and obtaining insight into software code is disclosed, where simulation consists of executing target software program code for multiple input values and multiple code paths at the same time, thus achieving 100% coverage over inputs and paths without actually running the target software. This allows simulation to detect many defects that are missed by traditional testing tools. The simulation method runs a plurality of algorithms where a plurality of custom defined and pre-defined rules are verified in target software to find defects and obtain properties of the software code. | 08-05-2010 |
20100228707 | System for rating a service - A system for rating a service comprises a database and a charging engine. A first set of balance information is read from the database. The charging engine is for determining an update to the database based at least in part on the first set of balance information, and conditionally submitting the update to the database based at least in part on a condition that includes limits on changes to the first set of balance information that occurred after the reading of the first set of balance information. | 09-09-2010 |
20100325097 | Non-Invasive Usage Tracking, Access Control, Policy Enforcement, Audit Logging, and User Action Automation On Software Applications - The present system, software, and methods relate to computer system security, particularly to tracking and controlling electronic access to legacy applications and data records without modifying the legacy applications or records. The present system, software, and methods allow for implementation of complex access audit and control rules even when the continued use of legacy application and data are required. | 12-23-2010 |
20110022575 | System and method of conclusively verifying the correctness of an information system without needing to test every combination of behaviour at run-time - An architecture for the initial development and later adaptation of information systems comprising a database, one or more clients and any number of supporting libraries whose system data, application data and rule data are stored in the database alongside the content data so that the correctness of the system can be conclusively verified without having to test every combination of behaviour at run-time. | 01-27-2011 |
20110047134 | METHOD AND SYSTEM FOR CONTROLLING MEDIA PLAYING AND METADATA EXECUTION UNIT - A method and a system for controlling media playing and a metadata execution unit are provided. The metadata execution unit obtains metadata provided by a metadata providing unit, and executes corresponding metadata according to trigger information for executing metadata. The metadata execution unit generates media content control indication information according to an execution result, and sends the media content control indication information. A media content control unit then controls media content playing correspondingly according to the media content control indication information. By using the method and apparatus, metadata is distributed to a suitable network entity to be executed for controlling media playing. In this way, decentralized execution of a policy is achieved. Therefore, processing efficiency is improved. | 02-24-2011 |
20110055180 | UPDATE-TRIGGERED DOCUMENT-DEFINED WORKFLOW - A computer-implemented update-triggered document-defined workflow method provides for triggering an update to an original source document to yield an updated document. In response, a document handler executes the document-defined workflow method so as to create, delete, or modify a target document or so as to create a workflow description calling for creating, deleting, or modifying a target document. | 03-03-2011 |
20110082845 | DYNAMIC RULE CREATION AND CACHING - A condensed version of a plurality of rules for one or more forms being used by a user is loaded from a database. The condensed version of the plurality of rules is stored in cache memory of a computing device. When an event occurs, a rules engine determines if a condensed version of the rule is stored in cache memory. If a rule is not applicable, the rules engine does not query the database. If a rule is applicable, the rules engine determines if an action should be taken for the event. If no action is to be taken, the database is not queried for the rule. If an action is to be taken, the database may be queried for information for the rule to allow performing of the action or if the action is included in the condensed version, the action is performed without querying the database. | 04-07-2011 |
20110082846 | SELECTIVE PROCESSING OF LOCATION-SENSITIVE DATA STREAMS - A method for processing a first data stream specifying locations of a user at different times and a second data stream specifying values of a monitored attribute at a location of interest at different times includes: receiving a location-centric trigger specifying at least one spatial predicate condition relative to the location of interest and at least one non-spatial predicate condition relevant to the location of interest, calculating a safe region that includes locations whose probability of satisfying the spatial predicate condition falls below a first threshold, calculating a safe value container that includes values whose probability of satisfying the non-spatial predicate condition falls below a second threshold, and processing the first data stream and the second data stream against the location-centric trigger, by considering only those locations that are not contained within the safe region and only those values that are not contained within the safe value container. | 04-07-2011 |
20110131190 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A GENERIC DATABASE SECURITY APPLICATION USING VIRTUAL PRIVATE DATABASE FUNCTIONALITY WITH A COMMON SECURITY POLICY FUNCTION - Methods for providing a generic database security application using virtual private database (VPD) functionality are provided. The methods may include inserting rows into a user security table in a database providing VPD functionality, each row comprising a user ID for which database access is to be controlled, the name of a database object to be secured, and a predicate; and defining a security policy function common to all secured database objects, said security policy function generating a second predicate to be appended by the database's VPD functionality to queries made on a queried secured database object by a querying user, said second predicate based on at least one predicate in at least one row in the user security table, the at least one row referencing the name of the queried secured database object and the user ID of the querying user. Related systems and computer program products are also provided. | 06-02-2011 |
20110131191 | OBSERVING AND REPORTING CHANGES IN COMPLEX SOFTWARE DEPENDENCIES - An observation system includes mechanisms for efficiently tracking the state of source components, which include functions, arguments, or values, etc. In one implementation, an observing component requests that a source component processes a request. The observation system then identifies all possible components in a dependency chain for the request, and all such components that are configured for change notifications. A dependency registry stores a representation of each identified component that is configured for change notifications. Any time any component configured for change notifications changes, including indirectly related components, the observing component can be immediately notified of the change, without having to reprocess the entire set of component dependencies. | 06-02-2011 |
20110313982 | FILE MAPPING AND CONVERTING FOR DYNAMIC DISK PERSONALIZATION FOR MULTIPLE PLATFORMS - File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform. | 12-22-2011 |
20120023077 | SYSTEMS AND METHODS FOR DATABASE NOTIFICATION INTERFACE TO EFFICIENTLY IDENTIFY EVENTS AND CHANGED DATA - Systems and methods for providing notifications of changes made in a database table to a remote application is presented. The system and methods manage change notification of a table in a database by notifying an application registered to receive notifications of changes made to a database table. A database manager executing on a device may receive a request to register an application to be notified when a first table of a plurality of tables in a database is changed. The database manager may establish a notification table comprising fields of the first table and one or more additional fields for managing notification. The database manager may establish a trigger on the first table to invoke a trigger procedure to copy a changed row of the first table to the notification table. The database manager may create a rule for the notification table to notify registered applications when a new row is inserted into the notification table | 01-26-2012 |
20120041933 | ONLINE DATA MIGRATION - Data is recursively migrated during uptime from a first table to a second table in a first schema in a database while taking into account changes to the first table in a change table. The database has first and second application servers respectively connecting to the database using first and second schemas and running first and second versions of a software program. Downtime can be initiated to migrate the remaining entries in the change table to the second table, delete the first table, and rename the second table to have a same name as the first table prior to deletion so that during uptime the second application server connects to the second table and runs the second version of the software program. Related apparatus, systems, techniques and articles are also described. | 02-16-2012 |
20120041934 | SUPPORT FOR USER DEFINED FUNCTIONS IN A DATA STREAM MANAGEMENT SYSTEM - A data stream management system (DSMS) is designed to support a new user-defined function, by creating and using at least two structures as follows. A first structure (“metadata entry”) is created in response to a command for creation of the new function, and maps a single instance of a class to the function's name. A second structure is created with creation of an operator on receipt of each new continuous query that uses the new function. The second structure (“operator specific data structure”) contains a path to the newly-created instance, which path is obtained by looking up the first structure. Additional second structures are created on receipt of additional continuous queries which use the new function, but all second structures contain the same path. All continuous queries use the same instance. Repeated use of a single instance to compile and execute multiple queries eliminates repeated instantiation of the same function. | 02-16-2012 |
20120047117 | Incremental Maintenance of Immediate Materialized Views with Outerjoins - Methods and systems for using algorithms in relational database management systems (RDBMSs) for incremental maintenance of materialized views with outerjoins are disclosed. The algorithms achieve the following goals with respect to a class of materialized outerjoin views and the performance of update operations: relax the requirement for the existence of the primary key attributes in a select list of the view to only some of the relations (i.e., the relations referenced as a preserved side in an outerjoin); relax null-intolerant property requirements for some predicates used in the view definition (i.e., predicates referencing relations which can be null-supplied by more than one outerjoin); and implement maintenance of outerjoin views by using one update statement (e.g., MERGE, UPDATE, INSERT, or DELETE) per view for each relation referenced in the view. The algorithms allow design and implementation of the incremental maintenance of materialized views with outerjoins to be integrated into an RDBMS. | 02-23-2012 |
20120078864 | ELECTRONIC DATA INTEGRITY PROTECTION DEVICE AND METHOD AND DATA MONITORING SYSTEM - The present invention discloses an electronic data integrity protection device and method and a data monitoring system, wherein the device includes: a data reception unit configured to receive electronic data; a signal reception unit configured to receive an external signal; a signal processing unit configured to process the external signal in accordance with a predetermined integrity protection strategy, to output a corresponding instruction, wherein the integrity protection strategy specifies at least an integrity protection mode associated with the external signal; and an integrity protection operation unit configured to perform, in response to the instruction, integrity protection operation on the electronic data so as to generate integrity protection information. According to the technical solution of the invention, it is possible to provide appropriate integrity protection for data when an external signal occurs, realize event-driven integrity and achieve a good balance among security, resource consumption and efficiency. | 03-29-2012 |
20120109916 | MANAGING SNAPSHOT STORAGE POOLS - Various embodiments of the invention relate to an apparatus and a method of managing a snapshot storage pool (SSP) associated with a storage unit of a distributed data storage system. According to some embodiments of the invention, the apparatus may include a logic module and a processor. The logic module may be adapted to provide a threshold corresponding to a ratio between a current amount of storage resources used for storing snapshots in the SSP and a total storage capacity defined for the SSP. The processor may be adapted to trigger an action that may be effective for managing the SSP in response to the amount of storage resources used for storing snapshots in the SSP crossing the threshold. | 05-03-2012 |
20120117041 | DEBUGGING A STORED PROCEDURE IN A DATABASE - This invention provides tools and methods for debugging a stored procedure in a database. The methods allow for debugging of the stored procedure even when it is invoked over a normal connection to a database management system, for example using ODBC. The developer can debug the stored procedure using an integrated development environment, including viewing the values of variables and the position of the execution pointer as the stored procedure executes. The invention also provides methods for allowing the developer for changing the source code of the stored procedure during debugging. | 05-10-2012 |
20120143837 | METHODS AND SYSTEMS FOR LOOSE COUPLING BETWEEN TRIGGERS AND ENTITIES - A database program includes loose triggers that are not coupled to specific entities at the time the database program is compiled. The database program provides a user interface that allows a user to couple selected entities to the loose triggers or decouple selected entities from loose triggers. The database program validates the entities that are selected by the user for coupling or decoupling and stores the coupled entities as part of the loose trigger definitions in a loose trigger metadata database. | 06-07-2012 |
20120158679 | Controlling Database Trigger Execution with Trigger Return Data - A database trigger generates a return code having the effect of inhibiting further executions of the trigger within a pre-defined scope of execution. Preferably, the pre-defined scope is a task or process executing on behalf of a particular user. Upon first encountering the applicable trigger condition, the corresponding trigger is fired normally. Internal logic within the trigger determines whether it is necessary to call the same trigger again within the same scope, and if not, generates corresponding return data. A database management system which manages the trigger and causes it to automatically fire intercepts the return data and disables further firing of the trigger for the pre-defined scope. | 06-21-2012 |
20120221536 | SYSTEM AND METHOD FOR DATA TRANSFER - a data transfer system and method are provided in the present invention. Wherein, the data transfer system and method comprises a source data obtaining service module and a target table updating service module, both of which are divided into a main part and an affiliated part, and wherein the affiliated part is a dynamic function library, which can package sub-processings such as source data obtaining, data transformation and data inserting/updating. Meanwhile, the data transfer system and method can support quasi real-time data transfer tasks and real-time data transfer tasks at the same time. The data transfer system and method support multi-computer disaster tolerance and extension, and the customization of the dynamic function library can facilitate the change in the requirements of data transfer. | 08-30-2012 |
20120265743 | PERSISTING OF A LOW LATENCY IN-MEMORY DATABASE - Processing is provided for operating an in-memory database, wherein transaction data is stored by a persistence buffer in an FIFO queue, and update processor subsequently: waits for a trigger; extracts the last transactional data associated with a single transaction of the in-memory database from the FIFO memory queue; determines if the transaction data includes updates to data fields in the in-memory database which were already processed; and if not, then stores the extracted transaction data to a store queue, remembering the fields updated in the in-memory database, or otherwise updates the store queue with the extracted transaction data. The process continues until the extracting is complete, and the content of the store queue is periodically written into a persistent storage device. | 10-18-2012 |
20130091112 | MANAGING A TEMPORAL KEY PROPERTY IN A DATABASE MANAGEMENT SYSTEM - Embodiments provide an approach for efficiently searching a temporal key index as well as enforcing key distinctiveness property in a database table corresponding to the index. For example, by addressing time range overlaps in an index having a sort order for temporal keys, a database management tool of a server system may efficiently process client requests while enforcing a temporal key property in the database table. | 04-11-2013 |
20130144852 | DISTRIBUTED EVENT SYSTEM FOR RELATIONAL MODELS - A distributed event system for a relational database is disclosed. An event data model operatively describes a target database. For a subject entity in the target database, the event data model declares and defines triggering events and respective corresponding operations. An event engine monitors database queries and events involving the subject entity and determines from the event data model corresponding operations. Execution of the determined corresponding operations is distributed to network-based agents. Agents may be filtered based on skills and/or credentials injected at runtime. Code binaries of the operations are downloaded to the agents for execution. | 06-06-2013 |
20130226889 | DATABASE QUERY USING A USER-DEFINED FUNCTION - A database query by using a user-defined function (UDF) is provided. A computer-implemented method for performing the database query by using the UDF includes detecting whether a command for invoking the UDF to transmit a parameter value has been received. Based on detecting that the command for invoking the UDF to transmit the parameter value has been received: a first interface of the UDF is started; the parameter value is received through the first interface; and the received parameter value is transmitted to an external data source. The method further includes returning to detecting whether the command for invoking the UDF to transmit the parameter value has been received. | 08-29-2013 |
20130304713 | SYSTEM AND METHOD FOR METADATA LEVEL VALIDATION OF CUSTOM SETUP OBJECTS - In one embodiment, a computer-implemented method executable by a server system to validate metadata of an application is provided. The method includes: receiving a custom metametadata object having a definition that specifies a format of metadata of an object, and having validation rules that specify a use of the custom metametadata object; generating a metadata record using the custom metametadata object; building an application using the metadata record; and validating the metadata record based on the validation rules of the metametadata object. | 11-14-2013 |
20130318057 | TECHNIQUES FOR IMPLEMENTING BATCH PROCESSING IN A MULTI-TENANT ON-DEMAND DATABASE SYSTEM - In accordance with embodiments, there are provided techniques for implementing batch processing in a multi-tenant database system. These techniques for implementing batch processing in a multi-tenant database system may enable embodiments to provide great flexibility to a tenant of the architecture to perform desired functions on content of the database while allowing the owner of the architecture schedule the processing of the functions on the content. | 11-28-2013 |
20140006367 | AUTOMATED REPORT OF BROKEN RELATIONSHIPS BETWEEN TABLES | 01-02-2014 |
20140156617 | SYSTEM AND METHOD OF CONCLUSIVELY VERIFYING THE CORRECTNESS OF AN INFORMATION SYSTEM WITHOUT NEEDING TO TEST EVERY COMBINATION OF BEHAVIOR AT RUN-TIME - An architecture for the initial development and later adaptation of systems comprising a database, one or more client or user-interface programs whose system data, application data and rule data are stored in the database alongside the content. A framework in the database stores system, application and rule data and frameworks in the user-interface and client programs load the system, application and rule data to generate objects and, in doing so, define an application-specific system. Data integrity checks of the system data, application data and rule data using triggers and/or stored procedures ensure the correctness of the system without having to test every combination of behavior at run-time. | 06-05-2014 |
20150012510 | POINT OF INTEREST DATABASE MAINTENANCE SYSTEM - A method of processing data at a server ( | 01-08-2015 |
20150046417 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - Disclosed is an information processing apparatus including a metadata expansion unit. The metadata expansion unit is configured to expand metadata of a target item using metadata of other items to which a responder has shown a response, the responder being a user having shown a response to the target item of which the metadata is to be expanded. | 02-12-2015 |
20150074069 | ADVANCED DATA MODELS CONTAINING DECLARATIVE AND PROGRAMMATIC CONSTRAINTS - A database language is extended to define constraints on a data model (e.g., entity-relationship model) rather than the concrete database. The constraints can be declarative (e.g., constraints that are defined using expressions of the database language) or programmatic (e.g., constraints that are defined as a stored procedure implemented in a domain specific language). By storing the constraints at a higher level than the database level, the constraints can be performed without changing the persistency of the database. Also disclosed are techniques for handling of constraints on partially loaded entities. | 03-12-2015 |
20150112954 | SYSTEM AND METHOD FOR ESTIMATING DELIVERY EVENTS - A computer-implemented method for processing loading operation data to estimate one or more delivery events is described. The loading operation data comprises payload records, each representing a delivery event. The method comprises, for a selected payload record, operating a processing unit to determine whether a delivery weight in respect of the selected payload record is likely to reflect a single delivery event. If the delivery weight is unlikely to reflect a single delivery event the method further comprises generating a synthetic payload record representing an estimated delivery event and comprising synthetic weight and timing values. | 04-23-2015 |
20150149425 | DATABASE JOB DESCRIPTION AND SCHEDULING - A system includes acquisition of executable code of a database job, generation of a definition of the database job in a database repository, the definition of the database job comprising metadata specifying the executable code of the database job and a schedule for executing the executable code, association of a user with the database job, and activation of the database job. | 05-28-2015 |
20150293952 | METHOD FOR TRACKING DIFFERENCES BETWEEN PRODUCTION AND DEVELOPMENT DATABASES TO PERFORM AN AUTOMATIC SYNCHRONIZATION - Embodiments disclosed herein relate to systems, methods, and computer program products for updating a development database. In some embodiments, the system and method compare a development database and an associated production database to determine a drift score. The development database is then updated when the drift score exceeds a predetermined threshold. In some situations, the system extracts a schema from the development database and the associated production database in order to identify differences between the two databases. The system then calculates a drift score based on the differences and compares the drift score to a predetermined threshold value. If the drift score exceeds the threshold value, the system alerts the user to update the development database or automatically updates the development database. | 10-15-2015 |
20150317350 | CUSTOM METADATA IN LOOSELY COUPLED TRIGGERS - A database system that supports associating a custom metadata type with loosely coupled triggers may be implemented to include instructions to receive a definition of a custom metadata type, the definition comprising at least one relationship field associated with a triggerable database object. The database system may also include instructions to associate the definition of the custom metadata type with a loosely-coupled trigger, and to cause the loosely-coupled trigger to execute based on generating a custom metadata record of the custom metadata type. The custom metadata record including a triggerable database object value for the relationship field. | 11-05-2015 |
20150347494 | DATA UNIQUENESS CONTROL AND INFORMATION STORAGE - Techniques for flexibly controlling data uniqueness which are applicable to different types of data that require different data uniqueness control. Control information mapped by a data storage space of a database is determined. The control information and data to be written into the data storage space is combined to obtain a combination result. The techniques of the present disclosure determine whether there is another combination result that is the same as the combination result. The techniques of the present disclosure, in response to determining that there is another combination result that is the same as the combination result, reject to write into the data storage space the data to be written into the data storage space of the database; or modify the another data in the database. | 12-03-2015 |
20160034576 | Context-Aware Landing Page - Techniques are described for creating a context-aware landing page. A context-aware landing page is capable of dynamically updating its tiles to include content tiles which are related to a received triggering event. The triggering event can be received from a business context source. When the triggering event is received, a weighting table that contains a plurality of content tiles can be retrieved. The method can then select one or more content tiles to include in the context-aware landing page. The selection of the one or more content tiles can depend on the triggering event. | 02-04-2016 |
20160154893 | DETERMINATION DEVICE, DETERMINATION METHOD, AND PROGRAM | 06-02-2016 |
20160378637 | MULTI-TENANT AWARE DEBUGGING METHODS AND SYSTEMS - Methods and systems are provided for debugging application code in an on-demand multi-tenant database system. One exemplary method involves an application server receiving a request associated with application code in a database from a client device via a network, verifying that debugging associated with the request does not violate a debugging utilization criterion, and after verifying that debugging associated with the request does not violate the debugging utilization criterion, accessing the application code in the database in conjunction with the request. | 12-29-2016 |