Abstract: Techniques for selecting an anomaly based on a context are disclosed. A set of metrics corresponding to communications with nodes of a computer system are identified. A set of insights are generated based on the set of metrics. A context for determining a primary anomaly is determined. A subset of metrics associated with the context are identified. A subset of insights that are generated based on the subset of metrics are identified. An insight is selected from the subset of insights as the primary anomaly. A visualization associated with the primary anomaly is presented at a user interface. One or more secondary anomalies may be concurrently presented with the visualization. Additionally, the primary anomaly, the selected visualization, and/or the secondary anomaly is used to determine a new context for selecting another primary anomaly. Hence, a series of primary anomalies may be selected, each primary anomaly being related to each other.
Abstract: Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system. The cloud computer system may determine security authentication of a user for the requested service. A security protocol may be determined for a requested enterprise computer system and a security token may be generated for the request according to the determined security protocol. The request may be sent to the requested enterprise computer system. In some embodiments, security authentication for a request to an enterprise computer system may be determined based on previous authentication. The cloud computer system may be configured to communicate with several different enterprise computer systems according to their supported protocols (e.g.
Abstract: Processing a database statement received from a database client, which requests information about the timing of a last committed change to a row in a database table, comprises retrieving a logical time value that represents a commit time associated with the row and providing the value to the client. In one embodiment, providing the logical time value to the client is enabled by database infrastructure in which a virtual column is used to temporarily “store” the value so that the value can be manipulated as if the value resided in a column of the row. Performance of operations that involve the virtual column are processed similar to real columns, as if data was actually logically stored in the virtual column. For example, the virtual column can be used in condition clauses of database statements for concurrency control.
Abstract: A method and system of reclaiming storage space in data storage systems is disclosed. In one embodiment, a high water mark of a data container is adjusted after data in the data container is compacted. As a result, unused space in the data container can be reclaimed.
Type:
Grant
Filed:
June 24, 2004
Date of Patent:
September 8, 2009
Assignee:
Oracel International Corporation
Inventors:
Sujatha Muthulingam, Alex Tsukerman, Vishwanath Karra, Nicholas Whyte