Interfaces; Database Management Systems; Updating (epo) Patents (Class 707/E17.005)
-
Publication number: 20130275361Abstract: Systems, methods, and computer-readable media for associating multiple data sources into a web-accessible framework. Health data is received from multiple data sources and is used to populate a framework comprising at least one topic focused data mart. Each topic focused data mart has a common structure and is associated with a web service providing standard features supported by each topic focused data mart and custom features specific to a topic associated with each topic focused data mart. In various embodiments, demographic information is received from a clinician and is utilized to present context-specific data derived from the topic focused data mart.Type: ApplicationFiled: April 17, 2012Publication date: October 17, 2013Applicant: CERNER INNOVATION, INC.Inventors: MARK A. HOFFMAN, KEVIN M. POWER, KATHLEEN M. GORMAN, AARON BUSH, MICHELLE SIEFERT, MATTHEW F. EMONS
-
Publication number: 20130275377Abstract: Provided are a computer program product, system, and method for maintaining multiple copy versions of component values in a system. A database includes entries for components in a system, wherein there is one entry for each of a plurality of component values associated with a component, wherein each entry indicates a range of copy versions for which the component value applies. A copy operation is performed at a current time to create a current copy version. A determination is made as to whether the component values for the components at the current time have changed since a previous copy version. The previous copy version is maintained in the database and immediately precedes the current copy version. For each component value that has changed, the entry for the component having the open indicator as the end copy version is updated to indicate the previous copy version as the end copy version.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stefan Jaquet, Arvind C. Surve, Raymond M. Swank, Cindy Zhou
-
Publication number: 20130275342Abstract: Disclosed herein is a information system for nutritional substances. The information system obtains information regarding a nutritional substance from the creation of the nutritional substance, the preservation of the nutritional substance, the transformation of the nutritional substance, the conditioning of the nutritional substance, and the consumption of the nutritional substances. The information system stores and provides this information to the various constituents of the nutritional substance supply system.Type: ApplicationFiled: May 31, 2012Publication date: October 17, 2013Inventor: Eugenio Minvielle
-
Publication number: 20130275373Abstract: A method, apparatus, and computer program product are provided to facilitate seamless switching between source and target devices. Relative to the source device, a user interface state of the source device is provided to the target device and database replication is initiated in response to an indication of a switch between the source and target devices. The target device is permitted to access a database of the source device while the source database is replicated to the target device. Relative to the target device and in response to a switch from the source device to the target device, the state is received from the source device in conjunction with an initiation of database replication. The user interface is configured in accordance with the state received from the source device. The target device also directs access to a database of the source device while the source database is replicated.Type: ApplicationFiled: April 12, 2012Publication date: October 17, 2013Applicant: NOKIA CORPORATIONInventors: Juha Tapani Uola, Johan Wilhelm Wikman, Oskari Koskimies, Lauri Paimen, Pekka Reijula
-
Publication number: 20130275376Abstract: Techniques for providing on-demand validation services for wager-based virtual machines deployed in a cloud based virtual environment. In some implementations, data sources store master deployment sets containing virtual machines. The master deployment sets may be deployed to component servers to provide a gaming related software services to remote client machines. The on-demand service takes snapshots of the virtual machines in the deployment and the virtual machines in the master deployment set. The snapshots are compared to ensure that important files in the master deployment set have not been improperly modified in the deployment. In some implementations, a secure hashing algorithm creates signatures for the snapshots prior to the comparison and the signatures are compared. The validation result may be sent to a remote client that requested the validation.Type: ApplicationFiled: April 17, 2012Publication date: October 17, 2013Applicant: IGTInventors: Gandolf G. Hudlow, Eugene T. Bond, Adam J. Thompson
-
Publication number: 20130275346Abstract: A platform to facilitate transferring spectrum rights is provided that includes a database to ascertain information regarding available spectrum for use in wireless communications. A request for spectrum use from an entity needing spectrum may be matched with available spectrum. This matching comprises determining a pattern in user requests overtime to optimize spectrum allocation. The Cloud Spectrum Services (CSS) process allows entities to access spectrum they would otherwise not have; it allows the end user to complete their download during congested periods while maintaining high service quality; and it allows the holder of rental spectrum to receive compensation for an otherwise idle asset.Type: ApplicationFiled: June 26, 2012Publication date: October 17, 2013Inventors: Srikathyayani Srikanteswara, Carlos Cordeiro, Bahareh Sadeghi, Reza Arefi, Geoff O. Weaver, Takashi Shono
-
Publication number: 20130275367Abstract: Various systems, non-transitory computer readable media, and methods for reorganizing data records of a database are provided. For example, a system may use an efficiency parameter that indicates a satisfactory level of organizational efficiency of at least a portion of a database table having a group of rows stored using a plurality of data blocks. The system may determine an efficiency of the group of rows based on a number of data block changes that occur during a sequential access of the group of rows. When the determined efficiency is less than the efficiency indicated by the efficiency parameter, the server may generate a control card to reorganize the group of rows when the efficiency is not satisfactory. The control card is used by an online reorganization process that reorganizes the group of rows.Type: ApplicationFiled: April 12, 2012Publication date: October 17, 2013Inventors: Kevin P. Shuma, Joseph B. Lynn, Robert Florian
-
Publication number: 20130275362Abstract: Conversion of a snowflake-like schema to a star-like schema includes a distribution of the snowflake-like schema across several host computer systems. Each host computer system has a fragment of the snowflake-like schema, including a fragment of constituent fact tables. Dimension keys in the fact table fragments are mapped to data tables via the constituent dimension tables. Data table keys are identified and populate the fact table for the converted star-like schema, thus obviating the dimension tables in the converted star-like schema.Type: ApplicationFiled: April 17, 2012Publication date: October 17, 2013Applicant: SAP AGInventors: Klaus Nagel, Martin Richtarsky, Achim Seubert
-
Publication number: 20130275393Abstract: A computer-implemented method comprising partitioning data representing an input instance of a database including multiple tuples into multiple fragments of tuples, detecting tuples which violate a data quality specification in respective ones of the fragments, selecting a data cleaning asset on the basis of characteristics of errors in detected tuples for a fragment and based on declared asset capabilities, assigning a selected data cleaning asset to the fragment, the selected data cleaning asset to provide a set of candidate corrections for the detected tuples in the fragment, providing data representing an output instance of the database in which detected tuples are replaced with selected candidate corrections.Type: ApplicationFiled: May 10, 2012Publication date: October 17, 2013Applicant: Qatar FoundationInventors: Ihab Francis Ilyas Kaldas, George Beskales, Ahmed Elmagarmid
-
Publication number: 20130275368Abstract: Maintaining an electricity powered vehicle recharging database is described where updating is based on recharging information provided by a subscriber via a telematics unit on the electric vehicle relating to a recharge event. Maintaining the database is carried out by receiving an indication that a recharge event has occurred, receiving additional information pertaining to the recharge event, comparing the recharge event information with recharge information for a previous recharge event stored in the database. Based upon the received information and comparison to existing information stored in the database, the received, information is used to conditionally update the information maintained in the database maintained by the telematics service provider.Type: ApplicationFiled: April 13, 2012Publication date: October 17, 2013Applicant: General Motors LLCInventors: Esteban Camacho, Dexter C. Lowe, Shpetim S. Veliu
-
Publication number: 20130276089Abstract: A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database.Type: ApplicationFiled: April 12, 2012Publication date: October 17, 2013Inventors: Ariel Tseitlin, Roy Rapoport, Jason Chan
-
Publication number: 20130275383Abstract: In some implementations, a method for archiving emails includes determining an email file presented in an email application through a Graphical User Interface (GUI) has been selected in response to a user moving the email file into a virtual folder in the GUI. The email file is in a first file format native to the email application and has a first presentation format when presented in the email application. In response to moving the email file into the virtual folder, a second file in a second file format native to a second application different from the email application is automatically generated. The second file has, when presented in the second application through the GUI, a second presentation format substantially similar to the first presentation format. Data in the email file is stored in the second file.Type: ApplicationFiled: April 16, 2012Publication date: October 17, 2013Inventor: Thomas P. McLarty
-
Publication number: 20130273507Abstract: Disclosed herein is a consumer communication system for nutritional substances. The consumer information system obtains information regarding the nutritional substance being consumed by the consumer, and provides that information to the other constituents in the nutritional substance supply system.Type: ApplicationFiled: May 31, 2012Publication date: October 17, 2013Inventor: Eugenio Minvielle
-
Patent number: 8560941Abstract: A user interface may be generated from a schema and a rule template to create data usable by an application. The schema may define the broad constraints of the data acceptable to the application, and the rule template may include specialized knowledge or logic for selecting appropriate data values. An automated user interface generator may use default values or information in the rule template to generate a user interface. In one embodiment, a schema and rule template may be used to generate policies for managing computing devices in an enterprise environment. The rule template may include rules that reflect expert knowledge or recommendations for selecting settings, and may include complex rules that incorporate attributes or values from several different configurable parameters.Type: GrantFiled: April 8, 2009Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventor: Steven P. Burns
-
Publication number: 20130268503Abstract: An exemplary database management device includes a database storage memory for storing database information. A user access memory at least temporarily stores information to be included in the database. At least a portion of the user access memory is configured to operate as a database manager that allows a user to indicate an intended change to the database information. The database manager places the intended change into the user access memory and determines whether the intended change complies with a criterion responsive to the user attempting to implement the intended change. The database manager makes the intended change to the database information in the database storage memory if the intended change complies with the criterion. The database manager provides an indication that the intended change will not be made to the database and the database storage memory if the intended change does not comply with the criterion.Type: ApplicationFiled: April 6, 2012Publication date: October 10, 2013Inventors: Damodara R. Budithi, Harpreet Singh, Gopal Shankar, Lawrence Peter Casey
-
Publication number: 20130268567Abstract: A dimension table is populated with data records extracted from at least one source system with each data record being associated with identifying hash values and attribute hash values. Once the dimension table is established, a set of hash values is computed for an incoming set of data records. The incoming set of hash values may include at least one identifying hash value and at least one attribute hash value for each data record contained in the incoming set of data records. The method then searches the established dimension table for records having an identifying hash value identical with the identifying hash value of the incoming set of data records. Once a match is found, the method compares the attribute hash values of the records having the identical identifying hash values. If the attribute hash values are different, the method updates the dimension table with the incoming data record.Type: ApplicationFiled: April 5, 2012Publication date: October 10, 2013Applicant: Cover-All Technologies, Inc.Inventors: Frank Adjei-Banin, Rosa Antonini, Andrew Wilson, Philip James
-
Publication number: 20130268488Abstract: An approach for replicating data is provided. A job that modifies data objects in a first system to generate a first set of changed data objects is determined to be a candidate for a job replication. Based on the job being a candidate for job replication, attributes of the job are retrieved, the retrieved attributes are sent to a second system, and an execution of the job by the second system is initiated as part of the job replication. The execution of the job causes data objects included in the second system to be modified to generate a second set of changed data objects as a replication of the first set of changed data objects.Type: ApplicationFiled: April 10, 2012Publication date: October 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Waldemar Jackiewicz, Vito Losacco, Andrzej Nazaruk, Mahesh Viswanathan, Maciej Wielgus
-
Publication number: 20130262419Abstract: Resolving conflicting changes to structured data files. A method includes for a structured data file which has both a generic structure and dialects built on top of the generic structure, for which conflicting changes have been made, and where an original version of the structured data, a first version of the structured data and a second version of the structured data exist, determining a dialect of the structured data. The method further includes, based on the determined dialect performing at least one of merge or diff operations on the original version of the structured data, the first version of the structured data and the second version of the structured data.Type: ApplicationFiled: March 30, 2012Publication date: October 3, 2013Applicant: MICROSOFT CORPORATIONInventors: David Charles Kilian, Louisa Rose Millott, Gareth Alun Jones, Andrew Craig Bragdon, Yu Xiao, Arun Mathew Abraham, Kevin J. Blasko, Christopher Lovett, Mark Groves
-
Publication number: 20130262528Abstract: Systems and methods for managing sales and marketing information. A mobile device is configured to display a screen that includes a plurality of icons. In response to activating the icons, the mobile device retrieves and transmits data associated with sales and marketing data obtained by canvassing a neighborhood and displays this data to the mobile device user. The data is maintained in system database so that all system users have access to updated data on sales associate availability for appointments, job status, and sales leads obtained from canvassing. The mobile device is further configured to display a map with symbols that indicate the location of addresses associated with sales and marketing data in the database. The mobile device user may retrieve data associated with an address by selecting one of the symbols. The symbols displayed are adjusted based on the map scale and mobile device location.Type: ApplicationFiled: November 14, 2012Publication date: October 3, 2013Applicant: TOUCHSTONE MEDIA GROUP, LLCInventor: Michael Foit
-
Publication number: 20130262418Abstract: The relative importance of a file is determined based on an importance parameter and an information management policy is caused to be applied to the file based on the determined relative importance of the file. The importance parameter may be the author of the file, the number of users with whom the file is shared, the relationship between the users with whom a file is shared, the uniqueness of the file, or the presence of particular keywords in the file.Type: ApplicationFiled: July 19, 2012Publication date: October 3, 2013Inventors: Gautam Bhasin, Kalambur Subramanian, Albrecht Schroth
-
Publication number: 20130262595Abstract: Methods and systems for providing related conversations in a social network system are disclosed. One method includes identifying a plurality of conversations within the social network system, wherein the plurality of conversations each have a relationship with the first file, wherein the social network system provides a platform for storing and sharing conversation, and each conversation includes a conversation and associated information. The method further includes generating, by a system server, a list of inquiries based on the plurality of conversations, providing, by the system server, the list of inquiries to at least one sender of the first file, receiving from the at least one sender at least one response to the list of inquiries, selecting a subset of the plurality of conversations based on the at least one response, and storing information related to the selected subset of the plurality of conversations.Type: ApplicationFiled: April 3, 2012Publication date: October 3, 2013Applicant: Python4FunInventors: Devabhaktuni Srikrishna, Marc A. Coram, Christopher Hogan
-
Publication number: 20130262388Abstract: Database backup performance may be improved by copying only used portions of a database file. When the database file includes allocated but un-used pages, the unused pages are not replicated during a database backup. By replicating only the allocated and used pages in the database, the backup time may be decreased and the amount of storage required in the second file may be decreased.Type: ApplicationFiled: March 30, 2012Publication date: October 3, 2013Inventors: Ellen L. Sorenson, Roger V. Ritchie
-
Publication number: 20130262374Abstract: A data management system that is enabled such that the user can select a data source node, a repository and a data path, choose policies for each and distribute the policies to be managed by the management system.Type: ApplicationFiled: March 28, 2012Publication date: October 3, 2013Inventors: Fabrice Helliker, Simon Chappell
-
Publication number: 20130262438Abstract: A conversation server system having one or more processors and memory stores a plurality of index components in an index, a respective index entry corresponding to a respective term and having a plurality of index components, a respective index component of the respective index entry identifying a message that is associated with the respective term. The server receives a first message, associates the first message with a conversation having at least one other message and stores, in the index, a plurality of first-message index components that each include an identifier of the first message. The first-message index components include one or more index components indicative of a plurality of message terms in the first message and one or more index components indicative of one or more conversation terms in the conversation, the one or more conversation terms comprising one or more terms that are not in the first message.Type: ApplicationFiled: August 29, 2011Publication date: October 3, 2013Inventor: Andrew J. Palay
-
Publication number: 20130262461Abstract: In one embodiment, a method for facilitating centralized issue tracking. The method includes receiving information on a case from an issue tracking system (case information). The method facilitates executing a tagging method stored in a memory device that reads the case information, determines whether a part of the case information is desired information, and then tags the desired information. Finally, the method facilitates communicating the tagged information to a centralized database, where the centralized database stores the tagged information, and where the tagged information is accessible to the issue tracking system and at least one other issue tracking system.Type: ApplicationFiled: March 29, 2012Publication date: October 3, 2013Applicant: Cisco Technology, Inc.Inventors: Carlos M. Pignataro, Gonzalo A. Salgueiro, Joseph Michael Clarke, Rodney Dunn
-
Publication number: 20130262519Abstract: An approach is provided in which a processor receives a scan request to scan data included in a data table. The processor selects a column in the data table corresponding to the scan request and retrieves column data entries from the selected column. In addition, the processor identifies the width of the selected column and selects a scan algorithm based upon the identified column width. In turn, the processor loads the column data entries into column data vectors and computes scan results from the column data vectors using the selected scan algorithm.Type: ApplicationFiled: March 29, 2012Publication date: October 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Eduard Diner, Jens Leenstra, Vijayshankar Raman, Adam J. Storm
-
Publication number: 20130262537Abstract: Methods and systems for providing related files in a collaborative file storage system are disclosed. One method includes identifying a plurality of files within the collaborative file storage system, wherein the plurality of files each have a relationship with the first file, and wherein the collaborative file storage system allows sharing of the plurality of files between multiple users through a network. The method further includes generating, by a system server, a list of inquiries based on the plurality of files, providing, by the system server, the list of inquiries to at least one collaborator of the first file, receiving from the at least one collaborator at least one response to the list of inquiries, selecting a subset of the plurality of files based on the at least one response, and storing information related to the selected subset of the plurality of files.Type: ApplicationFiled: April 3, 2012Publication date: October 3, 2013Applicant: PYTHON4FUNInventors: Devabhaktuni Srikrishna, Marc A. Coram, Christopher Hogan
-
Publication number: 20130262662Abstract: Methods and systems are provided for retrieving social media content metrics from a plurality of websites using a single multi-site adapter. The method includes constructing a respective plug-in for each website; constructing a database of M plug-ins corresponding to M websites, respectively; selecting a plug-in from the database; feeding the selected plug-in into the multi-site adapter; and applying the adapter to a particular website corresponding to the plug-ins to thereby retrieve the analytics (metrics) for pages on a website.Type: ApplicationFiled: August 24, 2012Publication date: October 3, 2013Applicant: salesforce.com,inc.Inventors: Kathi Loretto McCarthy, Mark Magennis
-
Publication number: 20130262399Abstract: A method of processing a database can include comparing, using a processor, a delta file with a risk assessment criterion, wherein the delta file is generated from a first schema and a second and different schema, assigning a risk level to a change specified within the delta file according to the comparing, and applying the change of the delta file to a test database conforming to the first schema according to the assigned risk level.Type: ApplicationFiled: July 19, 2012Publication date: October 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: MARGARET A. EKER, NNAEMEKA I. EMEJULU, KARTHIKEYAN RAMAMOORTHY
-
Publication number: 20130262378Abstract: Example apparatus and methods concern integrating external items (e.g., data, services) and an enterprise business application (EBA). Example apparatus and methods facilitate having an EBA describe an item for which external data or services are sought and then exposing the description. Example apparatus and methods also facilitate having a provider of external items register external items so that they can be discovered, evaluated, and bound to the EBA. Once an external item has been bound to an EBA item, then data may be automatically exchanged between the external item and the EBA under the control of a synchronization and transformation agent. Metadata-based descriptions of data items in two separate data models are collected in an aggregation point to break direct coupling of the two separate data models while facilitating flexible, extensible, re-definable indirect coupling through the aggregation point.Type: ApplicationFiled: April 2, 2012Publication date: October 3, 2013Applicant: Microsoft CorporationInventors: Adam D. WILSON, Dipanjan GHOSH
-
Publication number: 20130262424Abstract: Systems, methods, and products for database system transaction management are provided herein. One aspect provides for annotating via a computing device at least one data object residing on the computing device utilizing at least one transaction tag, the at least one transaction tag being configured to indicate a status of an associated data object; processing at least one database transaction utilizing a transactional memory process, wherein access to the at least one data object is determined based on the status of the at least one data object; and updating the status of the at least one data object responsive to an attempted access of the at least one data object by the at least one database transaction. Other embodiments and aspects are also described herein.Type: ApplicationFiled: March 30, 2012Publication date: October 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Harold Wade Cain, III, Donna N. Dillenberger, Michel H.T. Hack, Hong Min, Gong Su, James Zu-Chia Teng
-
Publication number: 20130262381Abstract: A proxy-based, non-linear editing system is provided having simplified source file ingestion. The system includes a source file repository that stores media source files copied from a plurality of memory cards from video cameras; a proxy file generator that generates and stores a compressed low-resolution proxy of media source files copied into the source file repository; both an editing station and an ingestion station including a web browser having a display screen, and at least one interactive digital processor that coordinates the interaction between the source file repository, proxy file generator, and editing and ingestion stations. In operation, the digital processor automatically generates a proxy file and a thumbnail of each media source file copied into one of the card folders, and makes the proxy file and thumbnail immediately ready for editing on the web browser of the editing station.Type: ApplicationFiled: March 31, 2012Publication date: October 3, 2013Applicant: BITCENTRAL INC.Inventors: Fredric J. Fourcher, Daniel O. Pugh, Kyle R. Miller
-
Publication number: 20130262425Abstract: Techniques to perform in-database computational programming. In one embodiment, for example, an apparatus may comprise a processor circuit and a client application operative on the processor circuit to generate a general request to perform an analytical calculation on data stored in a distributed database system based on a compute model, where the client application uses a threaded kernel service layer. The apparatus may also comprise a compute request component operative on the processor circuit to convert the general request to a compute request having a request format used by the distributed database system, and send the compute request to a node of the distributed database system having an analytic container. Other embodiments are described and claimed.Type: ApplicationFiled: April 3, 2012Publication date: October 3, 2013Applicant: SAS INSTITUTE INC.Inventors: David B. Shamlin, Michael S. Whitcher
-
Publication number: 20130262596Abstract: Methods and systems for providing related audio files in an audio file storage system are disclosed. One method includes identifying a plurality of audio files within the audio file storage system, wherein the plurality of audio files each have a relationship with the first file, and wherein each audio file includes an audio and associated information. The method further includes generating, by a system server, a list of inquiries based on the plurality of audio files, providing, by the system server, the list of inquiries to at least one creator of the first file, receiving from the at least one creator at least one response to the list of inquiries, selecting a subset of the plurality of audio files based on the at least one response, and storing information related to the selected subset of the plurality of audio files.Type: ApplicationFiled: April 3, 2012Publication date: October 3, 2013Applicant: Python4FunInventors: Devabhaktuni Srikrishna, Marc A. Coram, Christopher Hogan
-
Publication number: 20130254200Abstract: In an embodiment, a method is provided for collecting configuration data. In this example, configuration data associated with an application is searched. Additionally, metadata associated with the configuration data is searched. Changes made to the configuration data are detected, and the changes and associated metadata are stored in a storage device. The changes are then categorized based on the metadata.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Applicant: SAP AGInventor: Marco Sachs
-
Publication number: 20130254224Abstract: A system and method provide for an application for matching metadata from a transaction in an online transaction processing subsystem of an enterprise system to query metadata in an online analytical processing subsystem. A business object type is identified from a transaction in the online transaction subsystem using an object repository key and a corresponding data object attribute is determined from a mapping table. A new query of metadata from the online analytical processing subsystem is run, using the value of the data object attribute as a filter. This may allow for the generation of dynamic related report results for the transaction.Type: ApplicationFiled: March 26, 2012Publication date: September 26, 2013Applicant: SAP AGInventors: Sumanth HEGDE, Santosh V, Tarun Shetty
-
Publication number: 20130254246Abstract: Systems and methods of data processing performance enhancement are disclosed. One embodiment includes, invoking operating system calls to optimize cache management by an I/O component; wherein, the operating system calls are invoked to perform one or more of proactive triggering of readaheads for sequential read requests of a disk; purging data out of buffer cache after writing to the disk or performing sequential reads from the desk; and/or eliminating a delay between when a write is performed and when written data from the write is flushed to the disk from the buffer cache.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Inventor: Todd Lipcon
-
Publication number: 20130254155Abstract: Embodiments relate to systems and methods employing personalized query expansion to suggest measures and dimensions allowing iterative building of consistent queries over a data warehouse. Embodiments may leverage one or more of: semantics defined in multi-dimensional domain models, user profiles defining preferences, and collaborative usage statistics derived from existing repositories of Business Intelligence (BI) documents (e.g. dashboards, reports). Embodiments may utilize a collaborative co-occurrence value derived from profiles of users or social network information of a user.Type: ApplicationFiled: March 23, 2012Publication date: September 26, 2013Applicant: SAP AGInventors: Raphael Thollot, Nicolas Kuchmann-Beauger, Corentin FollenFant
-
Patent number: 8543605Abstract: Rights clearances management for assets, such as media assets. A rights brokerage service enables potential licensees to clears rights to use assets within designated projects, such as advertising campaign projects. The potential licensee uses an interface to select or identify an asset without necessarily accessing the asset itself. The rights holders and the rights held by each rights holder are identified based on the asset identity. A request is automatically issued to the rights holders to approve use of the asset for the project. The potential licensee may use an interface to track progress of approvals from the rights holders. Unenforceable rights are detected and approval is automatically obtained. If all enforceable rights are cleared, the asset may be committed for approval by a project manager or other authority. When approved, a license to use the asset is automatically created between the potential licensee and each of the rights holders.Type: GrantFiled: October 31, 2011Date of Patent: September 24, 2013Assignee: Corbis CorporationInventors: Curtis W. M. Bowden, David M. Crandall, David Edward Reeder, Jonathan Frederick Schupp, Sung H. Shin
-
Publication number: 20130246335Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing an inventory of objects in a data storage location of a network environment and presenting an inventory view of the objects to a user. The inventory view includes a first summary of the inventory objects. The method further includes receiving a request from the user to manipulate the inventory view based on a first selected dimension group and presenting to the user a manipulated inventory view that includes a second summary of a first subset of the inventory objects. In more specific embodiments, the method includes receiving a request from the user to perform a protection task on objects of the first subset and initiating the protection task. The protection task includes one of applying a remediation policy to the objects of the first subset and registering the objects of the first subset.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20130246344Abstract: Provided are a computer program product, system, and method for providing access to documents of friends in an online document sharing community based on whether the friends' documents are public or private. A request is received from a requesting participant computer for a page. A determination is made, from participant information for the requesting participant, friends of the requesting participant and participant information in the database for the determined friends. A further determination is made of documents owned by the friends. A further determination is made as to whether document information for the determined documents owned by the friends indicates the documents as public or private. The page includes information on the friends and access elements to provide access to the content of the determined documents of the friends that are indicated as public.Type: ApplicationFiled: March 19, 2012Publication date: September 19, 2013Inventor: David W. Victor
-
Publication number: 20130246353Abstract: Aspects of the subject matter described herein relate to synchronizing data. In aspects, properties are synchronized from an organization property store to a cloud property store and/or vice versa. The list of properties to synchronize may change based on the cloud services to which the organization subscribes, changes to the cloud services, or for other reasons. Furthermore, the list of properties to synchronize may be limited to certain objects of the organization which may also change over time.Type: ApplicationFiled: March 13, 2012Publication date: September 19, 2013Applicant: MICROSOFT CORPORATIONInventors: Clifford Neil Didcock, Jonathan M. Luk
-
Publication number: 20130246465Abstract: A system, method, and computer program product are provided for conditionally allowing access to data on a device based on a location of the device. In use, a location of a device storing data is identified. Furthermore, access to the data is conditionally allowed, based on the location.Type: ApplicationFiled: March 31, 2009Publication date: September 19, 2013Inventors: Rodney Derrick Cambridge, Jonathan Dyton
-
Publication number: 20130246334Abstract: A method is provided in one example and includes receiving first sets of metadata elements representing objects of an inventory and generating a first summary of a first subset of the objects. The method further includes receiving second sets of metadata elements and corresponding category information representing objects of the first subset that are classified based on a first category and generating a second summary of a second subset of the classified objects. In yet further embodiments, the method includes initiating a protection task for objects of the second subset of the classified objects. In more specific embodiments, the protection task includes applying a remediation policy to the objects of the second subset or registering the objects of the second subset. In yet other embodiments, the second summary includes at least one of a total count and a total size of the objects in the second subset.Type: ApplicationFiled: December 27, 2011Publication date: September 19, 2013Inventors: Ratinder Paul Singh Ahuja, Bimalesh Jha, Nitin Maini, Sujata Patel, Ankit R. Jain, Damodar K. Hegde, Rajaram V. Nanganure, Avinash Vishnu Pawar
-
Publication number: 20130246377Abstract: A method, apparatus, and system is described for distributing a rule to a distributed capture system and storing the rule in a global configuration database, wherein the rule defines an action for the distributed capture system to perform regarding packets intercepted by the distributed capture system.Type: ApplicationFiled: August 12, 2008Publication date: September 19, 2013Inventor: Jitendra B. Gaitonde
-
Publication number: 20130246367Abstract: A method for managing storage functions in a data replication environment is disclosed. In one embodiment, such a method includes continually monitoring for changes to a storage configuration at a secondary site. Upon detecting changes to the storage configuration at the secondary site, the method transmits remote metadata describing the changes to the primary site and stores the remote metadata at the primary site. The method then initiates a storage management function at the primary site which is mirrored to the secondary site. In order to perform the storage management function, the method reads the remote metadata at the primary site to determine the storage configuration at the secondary site. The method then performs the storage management function at the primary site in a way that takes into account the storage configuration at the secondary site. A corresponding apparatus, system, and computer-readable medium are also disclosed and claimed herein.Type: ApplicationFiled: March 15, 2012Publication date: September 19, 2013Applicant: International Business Machines CorporationInventors: Nicolas M. Clayton, Lisa J. Gundy, John R. Paveza, Beth A. Peterson, Alfred E. Sanchez, David M. Shackelford, Warren K. Stanley, John G. Thompson
-
Publication number: 20130246474Abstract: Provided are a computer program product, system, and method for providing different access to documents in an online document sharing community depending on whether the document is public or private. A request is received for a page and a determination is made of a document to include in the page and whether document information for the determined document indicates the document as public or private. An access element is included in the page to provide access to the content of the determined document in response to determining that the determined document is public. Access to a public description of the document not including all the content of the document is included in the page in response to determining that the determined document is private and that the requesting participant is not a member of the group of participants allowed to access the document.Type: ApplicationFiled: March 19, 2012Publication date: September 19, 2013Inventor: David W. VICTOR
-
Publication number: 20130246352Abstract: A system, method, and computer program product are provided for generating a file signature using file characteristics. In use, a plurality of characteristics of a file is identified. Furthermore, a signature for the file is generated based on a combination of the characteristics.Type: ApplicationFiled: June 17, 2009Publication date: September 19, 2013Inventors: Joel R. Spurlock, Anthony V. Bartram
-
Publication number: 20130246343Abstract: Provided are a computer program product, system, and method for inviting participants in an online document sharing community to accept terms of a non-disclosure agreement (NDA) to access a document. Group information for a group created by an owner of a document indicates at least one document associated with the owner and at least one invitee. A join message is sent to the at least one invitee participant computer. The join message includes a description of the document that does not include all the content of the document and a non-disclosure agreement (NDA) requesting the invitee to accept terms of the NDA in order to access all of the content of the document. The content of the document is only provided to the invitee participant computer of the at least one invitee that has accepted the NDA.Type: ApplicationFiled: March 19, 2012Publication date: September 19, 2013Inventor: David W. Victor
-
Publication number: 20130246347Abstract: Files may be assigned to groups for processing in an efficient manner. For example, a group may include a list of file names for processing together. The file names are assigned to the group by a user. When a command is executed on the system for modifying a file, the group name is provided along with the command rather than the file name or list of individual file names. The command automatically executes repeatedly for each file name associated with the group name.Type: ApplicationFiled: March 15, 2012Publication date: September 19, 2013Inventors: Ellen L. Sorenson, Roger V. Ritchie