Abstract: Embodiments regard security descriptors for record access queries. An embodiment of a method includes: receiving a record access query, the query regarding records for a certain one or more users at a certain access level; searching one or more sharing tables of entities in a computing environment for security descriptors, each security descriptor being associated with a set of one or more users having access to one or more records of a set of records at an access level; identifying any security descriptors in the one or more sharing tables that relate to the certain one or more users with at least the certain access level; and searching the one or more records associated with each of the identified security descriptors according to the record access query.
Abstract: Methods and systems for optimizing queries in a multi-tenant store are described. In one embodiment, such a method includes retrieving data from a multi-tenant database system having a relational data store and a non-relational data store, receiving a request specifying data to be retrieved, retrieving one or more locations of the data to be retrieved, generating a database query based on the request, in which the database query specifies a plurality of data elements to be retrieved, the plurality of data elements including one or more data elements residing within the non-relational data store and one or more other data elements residing within the relational data store, generating an optimized database query having an optimized query syntax that is distinct from a query syntax of the database query, and executing the optimized database query against the multi-tenant database system to retrieve the data.
Abstract: A time series database system receives a request from a user device for first time series data within a first time range, the first time series data being a subset of second time series data within a second time range, the second time series data being stored in a persistent storage. The system determines whether all of the first time series data is stored in a memory. The system retrieves the second time series data from the persistent storage if all of the first time series data is not stored in the memory. The system stores the second time series data, excluding any part of the second time series data associated with a current time period, into the memory. The system causes the first time series data, being a subset of the second time series data retrieved from the persistent storage, to be outputted to the user device.
Type:
Grant
Filed:
May 26, 2016
Date of Patent:
May 5, 2020
Assignee:
salesforce.com, inc.
Inventors:
Dilip Devaraj, Bhinav Sura, Kirankumar Kakanuru Gowdru, Thomas Nicholas Valine, Rajavardhan Sarkapally
Abstract: System and methods are described for managing references to master data within a multi-tenant architecture associated with an entity. In one implementation, a host database system defines a class of tenants within the multi-tenant architecture. The system designates a first tenant of a plurality of tenants as a master tenant, and defines the remaining tenants of the plurality of tenants as sub-tenants. The system further modifies data objects maintained by the sub-tenants to include references to data maintained by the master tenant.
Abstract: Techniques are disclosed relating to invalidating keys in a cache. In some embodiments, a computer system may implement a cache for a data store, where the cache stores a data set and is organized such that a stored data item of the data set is specified by a corresponding key having one or more portions. The computer system may store metadata for the cache, where the metadata includes nodes organized in a hierarchy. The computer system may receive a request to invalidate one or more keys of the cache, and may invalidate a particular node within the metadata based on a key value corresponding to the request.
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for causing movement of items in a user interface of a web browser-based application. A bounding window of a web browser comprising a presentation of items can be caused to be displayed in a user interface on a display of a device. First keyboard input from a user interacting with a first item can be processed. The first item can be caused to be transformed to a moveable state. Second keyboard input from the user interacting with the first item can be processed. The first item can be caused to change locations as displayed in the user interface from the first location to a second location. The second location can be different from the first location.
Type:
Grant
Filed:
September 28, 2016
Date of Patent:
May 5, 2020
Assignee:
salesforce.com, inc.
Inventors:
Jesse Alan Hausler, Katherine Jeanne Rushton, Gregory Pinto, Michael M Pedersen, II
Abstract: An indexing scheme generates a token index associating token index values with keywords in queries and generates expression trees for the queries that use the token index values to represent the keywords. The indexing scheme generates a document index assigning document index values to uploaded documents. The indexing scheme generates a document-token index that associates the token index values with the document index values for the documents containing the keywords associated with the token index values. The indexing scheme applies the expression trees to the document-token index to quickly identify the documents satisfying the queries. For example, the indexing scheme may generate bit arrays for each of the token index values identifying the documents containing the keywords and apply logical operators from the queries to the bit arrays. The resulting data structure provides a list of documents satisfying the queries.
Abstract: In one embodiment, a stream processing system ingests data from one or more data sources and converts the data into an unbounded stream for an event stream processor. The stream processing system may include a first coordinating spout instance that is deployed at a first time, the first coordinating spout instance to instantiate one or more second spout instances and deploy said one more second spout instances at a second time that is later than the first time; the one or more second spout instances to: connect to the one or more data sources, respectively, and ingest a respective portion of the data from its respective one of the one or more data sources; and output messages based on the ingested portions of the data; wherein the unbounded stream for the event stream processor is based on the messages. Other embodiments may be disclosed and/or claimed.
Type:
Grant
Filed:
December 11, 2017
Date of Patent:
May 5, 2020
Assignee:
SALESFORCE.COM, INC
Inventors:
Stephen Powis, Stanley C. Lemon, Kevin Peek
Abstract: Systems and methods are provided for managing timelines of social network communications from social network feeds. A system accesses social network communications associated with a user of at least one social network and identifies a plurality of social network communications based on each respective communication being related to a same associated attribute. The system assigns a priority to each identified social network communication based on a corresponding number of social network references generated by social network account contacts and selects a first identified communication from a first social network based on its assigned priority and a second identified communication from a different social network based on its assigned priority.
Abstract: A computer-implemented method in a document editing module is provided. The document editing module comprises a processor configured by programming instructions encoded in non-transient computer readable media. The method comprises providing, by the processor, contents of a document to a user interface; providing via the user interface, by the processor, an object that when selected indicates a desire to lock the document from editing by another document editing module or another instance of the document editing module for a fixed time period; and modifying, by the processor, one or more attributes of the document that indicate that the document is locked for editing and a fixed length of time the document is locked for editing when the object has been selected.
Abstract: A method for automated filtering within an analytics dashboard includes integrating, by a server and within a user-interface software framework used to develop dynamic web applications, aspects of the analytics dashboard. The server sets a series of filters for a database associated with the analytics dashboard by, for each filter of the series of filters, defining how the filter operates on data within records of the database. The server detects an action through a user interface of the user-interface software framework. Responsive to detecting the action, the server sequentially applies the series of filters to the data within the records of the database according to a sequential order of the series of filters and with a pause between application of each filter. The server displays, within the analytics dashboard, each set of results sequentially in response to application of each respective filter of the series of filters.
Abstract: Systems and methods are described for registering a new column in an existing table on a distributed file system as a partition. In response to receiving a request to add a new column to a selected table, a new table may be created that includes all fields of the selected table, the new column, and a new partition, and the selected table may be renamed within the distributed file system. A view may then be created that points to data in the new table and the renamed selected table, the created view being a virtual table that receives and processes queries. All data from the renamed selected table may be transferred the new table. When the transfer is complete, the new table may be renamed to an original name of the selected table, and any data received after the renaming may be included in the renamed new table.
Abstract: In an example, a network traffic analysis system including a network based logging host may include a transport module, an event parser, and one or more consumer modules. The transport module may collect one or more messages including one or more event logs from one or more remote hosts, respectively. The event parser may generate normalized events consumable by the network logging host from the collected messages. The consumer modules may host process metadata of the event out to file for analysis. Other embodiments may be disclosed and/or claimed.