Abstract: In accordance with embodiments, there are provided mechanisms and methods for providing in-line scheduling in an on-demand service in a database system. These mechanisms and methods for providing in-line scheduling can enable embodiments to provide a multi-tenant database that stores client scheduling information, client customer contact information, and enables drag and drop event scheduling. In a multi-tenant database, a system for managing client customer contact information and event scheduling is established, which may be useful for a tenant that is a salesperson or that employs salespersons. The multi-tenant database may include a combined view application that provides for the simultaneous display of a calendar view and list view of contact information. The multi-tenant database may further include drag and drop functionality, allowing list view information to be dragged and dropped onto the calendar view for event scheduling.
Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for providing a reference to a content object in a user interface using an on-demand database service. A computing device can receive data regarding identification of a content object, where the content object is stored in a data repository external to the on-demand database service. The data regarding the content object can be stored in a persistent object in a database of the on-demand database service. A reference can be provided representing the persistent object to a display device operable to display the reference in a user interface when the display device accesses the on-demand database service. One or more graphical representations can be exposed regarding the content object for display in the user interface by the display device, where the exposed graphical representations depend at least in part on the data repository.
Type:
Grant
Filed:
November 18, 2013
Date of Patent:
July 11, 2017
Assignee:
salesforce.com, inc.
Inventors:
David Goldbrenner, Robert J. Snell, James Johnson
Abstract: A method and system are provided that may centralize the management of applications that access the data of social networks via API calls. A central service may generate tokens at a generation rate that permit an application to access an API. The tokens may be distributed to queues associated with certain content types. The relative distribution of tokens to each queue may be determined by rules. A queue may release tokens to applications that function to access the content type associated with the queue. The token generation rate and rules may be selected to prevent violation of the rate limits for the API.
Type:
Grant
Filed:
July 15, 2016
Date of Patent:
July 11, 2017
Assignee:
SALESFORCE.COM, INC.
Inventors:
Michael Gordon Luff, Kang Li, Stuart Douglas McClune
Abstract: In a method, system, and computer-readable medium having instructions for sharing information between tenants of a multi-tenant database, information is received on a connection between a first tenant of a multi-tenant database and a second tenant and the connection has information on a scope of data from the first tenant shared with the second tenant, data is allowed for a record of the first tenant to be accessible to the second tenant in accordance with the connection, information is received on a file related to the record of the first tenant, and data is allowed from the file to be accessible to the second tenant in accordance with the connection.
Type:
Grant
Filed:
March 21, 2016
Date of Patent:
July 11, 2017
Assignee:
salesforce.com, inc.
Inventors:
Aditya S. Kuruganti, Simon Z. Fell, Jayaprakash Pasala, Samatha Sanikommu, Kedar Doshi, Sanjaya Lai
Abstract: A messaging system implements messaging among application servers and databases, utilizing other servers that implement messaging brokers. A large flood of incoming messages can bring down messaging brokers by overflowing the message queues, negatively impacting performance of the overall system. This disclosure in some embodiments detects and identifies “flooders” in a timely manner and isolates their message traffic to dedicated queues to avoid impacting other system users. Subsequently, a preferred system de-allocates the queues and returns the messaging system to normal operation when flooding conditions subside, and “sweeps” up any remaining orphan messages.
Type:
Application
Filed:
March 22, 2017
Publication date:
July 6, 2017
Applicant:
salesforce.com, inc.
Inventors:
Hui Lam KWONG, Xiaodan WANG, Vipul MODANI, John B. BUISSON
Abstract: In accordance with embodiments, there are provided mechanisms and methods for conditionally allowing an application of an entity access to data of another entity in an on-demand database service. These mechanisms and methods for conditionally allowing an application of an entity access to data of another entity in an on-demand database service can enable embodiments to limit such access to the data, as desired. Furthermore, embodiments of such mechanisms and methods may provide additional security when sharing data among different subscribers to an on-demand database service.
Type:
Grant
Filed:
February 18, 2016
Date of Patent:
July 4, 2017
Assignee:
salesforce.com, inc.
Inventors:
Alexis Viripaeff, Vinod Mehra, Alex Warshavsky, Nate Horne, Peter J. Dapkus
Abstract: A computer-implemented method is presented herein. The method obtains a first content item from an online source, and then generates a characterizing signature of the first content item. The method continues by finding a previously-saved instance of the characterizing signature and retrieving data associated with a second content item (the second content item is characterized by the characterizing signature). The method continues by analyzing the data associated with the second content item, corresponding data associated with the first content item, and decision criteria. Thereafter, either the first content item or the second content item is identified as an original content item, based on the analyzing. The other content item can be flagged as an aggregated content item.
Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for maintaining anonymity in an online social network. In some implementations, a user can be designated a ghost user with respect to an entity in the online social network. One or more invisibility levels can be determined for the ghost user. Data indicating content to display in accordance with one or more invisibility levels can be generated and provided to a display device configured to display a presentation of the social network feed associated with the entity in a user interface associated with a second user. Also disclosed are methods, apparatus, systems, and computer readable storage media for designating a proxy in an online social network. In some implementations, a first user can be designated as a proxy user of a second user in an online social network with respect to one or more entities within the online social network.
Abstract: In one embodiment, a computer-implemented method executable by a server system to validate metadata of an application is provided. The method includes: receiving a custom metametadata object having a definition that specifies a format of metadata of an object, and having validation rules that specify a use of the custom metametadata object; generating a metadata record using the custom metametadata object; building an application using the metadata record; and validating the metadata record based on the validation rules of the metametadata object.
Abstract: Disclosed are systems, apparatus, and methods for integrating an information feed. In various implementations, an identity of a user may be determined based on authentication information, where the authentication information identifies a user profile. In some implementations, profile information is identified based on the determined identity, where the profile information identifies one or more entities tracked using one or more information feeds associated with the user profile, and where the one or more information feeds comprises one or more feed items stored in a database system. In various implementations, the identified profile information is associated with a user account provided by a network communications application.
Type:
Grant
Filed:
May 1, 2015
Date of Patent:
June 27, 2017
Assignee:
salesforce.com, inc.
Inventors:
Anant Kumar Verma, Michael Brendan Tierney, Krzysztof Sebastian Oblucki, Blake Whitlow Markham
Abstract: Disclosed herein are systems and methods for implementing data upload, processing, and predictive query API exposure including means for receiving a dataset in a tabular form, the dataset having a plurality of rows and a plurality of columns; processing the dataset to generate indices representing probabilistic relationships between the rows and the columns of the dataset; storing the indices in a database; exposing an Application Programming Interface (API) to query the indices in the database; receiving a request for a predictive query or a latent structure query against the indices in the database; querying the database for a prediction based on the request via the API; and returning the prediction responsive to the request. Other related embodiments are further disclosed.
Type:
Grant
Filed:
June 13, 2016
Date of Patent:
June 27, 2017
Assignee:
salesforce.com, inc.
Inventors:
Beau David Cronin, Cap Christian Petschulat, Eric Michael Jonas
Abstract: A database program includes loose triggers that are not coupled to specific entities at the time the database program is compiled. The database program provides a user interface that allows a user to couple selected entities to the loose triggers or decouple selected entities from loose triggers. The database program validates the entities that are selected by the user for coupling or decoupling and stores the coupled entities as part of the loose trigger definitions in a loose trigger metadata database.
Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for providing access to a private resource in an enterprise social networking system. One or more servers may receive a request for access to a private resource to be granted to a user from a publisher. The publisher may be configured to publish a message as a feed item to one or more feeds, where the message includes a user identification identifying the user. The user does not have access to the private resource. The feed item may be provided to display in the one or more feeds. Access may be granted to the user via the one or more feeds. In some implementations, access may be granted in response to a user input from the feed item associated with a moderator or owner, the moderator or owner having a privilege to control user access to the private resource.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for receiving a command to define at least one mobilized object that implements a view for at least one mobile device of data retrieved from an on-demand service. These mechanisms and methods further include generating the mobilized object including the at least one instruction for defining the view for the at least one mobile device, and pushing the mobilized object to the at least one mobile device.
Type:
Application
Filed:
January 26, 2017
Publication date:
June 22, 2017
Applicant:
salesforce.com, inc.
Inventors:
Erik FORSBERG, Bagrat MAZYAN, Jason SCHROEDER, Deepak KOTHULE
Abstract: In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.
Type:
Application
Filed:
March 8, 2017
Publication date:
June 22, 2017
Applicant:
salesforce.com, inc.
Inventors:
David Brooks, Lewis Wiley Tucker, Benji Jasik, Timothy Mason, Eric David Bezar, Simon Wong, Douglas Chasman, Tien Tzuo, Scott Hansma, Adam Gross, Steven Tamm
Abstract: Methods and systems are provided for synchronizing and sharing data objects. The method includes configuring a set of permissions, within a collaboration site, to define a sharing configuration to allow sharing of a set of data objects between a group of computing devices comprising a first computing device and second computing devices; updating a data object at the first computing device; receiving an updated data object at the collaboration site from a sync client of the first computing device in response to saving the updated data object; automatically synchronizing the updated data object at the collaboration site; and automatically pushing the updated data object from the collaboration site to the second computing devices to share the updated data object in accordance with the sharing configuration.
Abstract: An automated software vulnerability scanning and notification system and method provide an automated detection and notification regarding a software vulnerability. The operation of the system and the method includes obtaining software vulnerability information, periodically scanning a web application and a corresponding web server associated with an operator, and evaluating the periodic scans relative to the software vulnerability information to detect software vulnerabilities. Upon detection of a software vulnerability, a notification message is provided automatically to the operator regarding the software vulnerability.
Abstract: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for fixing logical or physical corruption in databases using immutable LSM trees including, for example, means for storing records in a LSM database at the host organization; processing transactions to the LSM database by writing the transactions into immutable extents for subsequent merge into the LSM database; recording a history of the transactions in a log; identifying corruption in at least one of the records of the LSM database represented within the immutable extents prior to merge of the immutable extents to the LSM database; and correcting the identified corruption to the at least one of the records of the LSM database based at least in part on the recorded history of the transactions in the log during live operation of the LSM database. Other related embodiments are disclosed.