Abstract: Techniques for metadata-driven dynamic content serving. Metadata content is stored as a source instance. The metadata content is utilized to provide dynamically-constructed pages. The metadata content is published to runtime pods communicatively coupled to receive the metadata content. The source instance includes a metadata definition repository and is a primary source of dynamic data for serving pages in the runtime pods. The runtime pods are groups of multiple servers that act as a single entity to dynamically generate metadata-driven content in response to requests received from client devices. A request for content is received with a selected one of the runtime pods for a specific site. The specific site is mapped to a user identified by a user identifier. The user identifier is utilized to retrieve site metadata from a site metadata server. Content is provided in response to the request with the selected runtime pod utilizing the metadata content.
Type:
Grant
Filed:
February 11, 2016
Date of Patent:
December 20, 2016
Assignee:
salesforce.com, inc.
Inventors:
Philip N. Calvin, Brian Zotter, Eric Dorgelo
Abstract: Disclosed are methods, systems, and computer program products for updating a web application displayed on a client machine. In some implementations, a server maintains a database of application identifiers identifying instances of one or more web applications. The server receives, from a first client machine, a communication identifying a first web application and a first application identifier, the instance of the first web application being associated with one or more components. The server determines that the first application identifier is not included in the database of application identifiers, and generates an updated application identifier for the instance of the first web application based on component version identifiers of the one or more components. The server stores the updated application identifier and transmits a notification to the first client machine indicating that the instance of the first web application is out-of-date.
Type:
Grant
Filed:
August 5, 2014
Date of Patent:
December 20, 2016
Assignee:
salesforce.com, inc.
Inventors:
Gordon Oliver, Freeland Knight Abbott, III
Abstract: In accordance with embodiments disclosed herein, there are provided methods, systems, and apparatuses including, for supporting transactional message handling in an on-demand service environment including, for example: enqueuing a message specifying a transaction to be processed via a host organization; inserting a row into a database of the host organization associating the message with a status of pending, wherein the row is autocommitted to the database upon insertion; updating the status for the row to ready if a commit operation for the transaction is initiated; requesting a lock on the row; and performing final processing for the transaction based on the status for the message and based further on whether the lock is obtained for the row. Final processing may include, for example, a transaction roll back, a transaction commit, a transaction requeue, a termination of transaction processing, or an orphaned transaction clean up.
Abstract: The technology disclosed relates to systems and methods for providing a CSS parser engineered for runtime usage to improve the maintainability of code that displays data to users. The technology disclosed also improves the performance and consistency of the code that delivers a user's experience.
Abstract: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing data masking via compression dictionaries including, for example, means for receiving customer data at the host organization; compressing the customer data using dictionary based compression and a compression dictionary; storing the compressed customer data in a database of the host organization; retrieving the compressed customer data from the database of the host organization; and de-compressing the compressed customer data via a masked compression dictionary, in which the masked compression dictionary de-compresses the customer data into masked customer data. Other related embodiments are disclosed.
Abstract: Some embodiments comprise integrating information from a social network into a multi-tenant database system. A plurality of information from the social network is retrieved, using a processor and a network interface of a server computer in the multi-tenant database system, wherein the plurality of information is associated with a message transmitted using the social network. Metadata related to the transmitted message is generated, using the processor. A conversation object is generated, using the processor, based on the plurality of information associated with the transmitted message and the metadata related to the transmitted message. The conversation object is then stored in an entity in the multi-tenant database system, using the processor of the server computer.
Abstract: Methods and systems are provided for regulating interaction with respect to an object in a database. One exemplary method involves creating an engagement record associated with the object in the database and in response receiving a request for a database activity with respect to the object from a user, determining whether the user is authorized to initiate the database activity with respect to the object based on a protection status indicated by the engagement record for the object. When the first user is authorized, the database is updated the database to reflect the requested database activity associated with the object and the protection status of the engagement record is updated in response to the database activity. After updating the protection status of the engagement record, subsequent database activity with respect to the object initiated by a second user is regulated based on the updated protection status.
Abstract: A system may include multiple personal data sources and a machine-implemented data extractor and correlator configured to retrieve personal data from at least one of the personal data sources. The data extractor and correlator may extract information from unstructured data within the retrieved personal data and correlate the extracted information with previously stored structured data to generate additional structured data. The system may also include a storage device configured to store the previously stored structured data and the additional structured data. A natural language query module may be configured to receive a natural language query from a user and provide a response to the natural language query based at least in part on one or both of the previously stored structured data and the additional structured data.
Type:
Application
Filed:
August 11, 2016
Publication date:
December 1, 2016
Applicant:
salesforce.com, inc.
Inventors:
Thierry DONNEAU-GOLENCER, Rajan Singh, Madhu Yarlagadda, Corey Hulen, Kenneth C. Nitz, William Scott Mark
Abstract: A novel unified neural network framework, the dynamic memory network, is disclosed. This unified framework reduces every task in natural language processing to a question answering problem over an input sequence. Inputs and questions are used to create and connect deep memory sequences. Answers are then generated based on dynamically retrieved memories.
Type:
Application
Filed:
June 1, 2016
Publication date:
December 1, 2016
Applicant:
salesforce.com, inc.
Inventors:
Richard Socher, Ankit Kumar, Ozan Irsoy, Mohit Iyyer, Caiming Xiong, Stephen Merity, Romain Paulus
Abstract: A system and method for providing features in a database system. In one embodiment, a method includes receiving, from a user, a request for a feature, where the feature is a functionality of the database system. The method further includes upgrading the database system, where the upgrading includes one or more provisioning steps that are based on the request from the user.
Abstract: A threat detection system receives links from emails opened in web browsers. The received links are compared with a whitelist of trusted links and blacklisted links associated with security threats. The threat detection system sends trusted identifiers when the received links are identified in the whitelist and sends block identifiers back to the web browsers when the received links are identified in the blacklist. The trusted identifiers cause the web browsers to display a trusted message and the block identifiers cause the web browsers to remove the received link and display a warning message. The threat detection system may receive threat reports for suspected links from employees of a same enterprise and allow an enterprise security administrator to asynchronously update the blacklists and whitelists based on the threat reports received from the enterprise users.
Abstract: A system and method for adapting a security tool for performing security analysis on a software application. In one embodiment, a method includes maintaining a registry of security tools; receiving code for a software application; and comparing component criteria for each security tool against each component of the software application, wherein the component criteria for each respective security tool indicate which components the respective security tool is designed to analyze for security vulnerabilities. The method also includes generating a tool-specific package for each component of the software application, wherein the tool-specific package comprises one or more security tools that are designed to analyze the respective component for security vulnerabilities.
Abstract: In accordance with embodiments disclosed herein, there are provided mechanisms and methods for batch processing in an on-demand service environment. For example, in one embodiment, mechanisms include receiving a processing request for a multi-tenant database, in which the processing request specifies processing logic and a processing target group within the multi-tenant database. Such an embodiment further includes dividing or chunking the processing target group into a plurality of processing target sub-groups, queuing the processing request with a batch processing queue for the multi-tenant database among a plurality of previously queued processing requests, and releasing each of the plurality of processing target sub-groups for processing in the multi-tenant database via the processing logic at one or more times specified by the batch processing queue.
Abstract: In one embodiment, a method of accessing multi-page data via a user interface can include: displaying a scrollbar on the user interface, where the scrollbar includes a page index and a scroll indicator; receiving a selection of a page of the data using the page index in the scrollbar on the user interface, where the data is arranged as a plurality of pages; indicating the selected page in the scrollbar with a predetermined indicator, such as a highlight indicator; receiving a selection of a portion of the selected page using the scroll indicator in the scrollbar on the user interface; and displaying the selected portion of the selected page in a main window on the user interface.
Abstract: Methods and systems for optimizing queries in a multi-tenant store are described. In one embodiment, such a method includes retrieving data from a multi-tenant database system having a relational data store and a non-relational data store, receiving a request specifying data to be retrieved, retrieving one or more locations of the data to be retrieved, generating a database query based on the request, in which the database query specifies a plurality of data elements to be retrieved, the plurality of data elements including one or more data elements residing within the non-relational data store and one or more other data elements residing within the relational data store, generating an optimized database query having an optimized query syntax that is distinct from a query syntax of the database query, and executing the optimized database query against the multi-tenant database system to retrieve the data.
Abstract: A system for introducing behaviorally tested live content into an electronic mail message comprising at least one dynamic live content area sent through an e-mail service provider system is disclosed. The system includes a memory including a plurality of live content comprising image data, wherein the plurality of live content is behaviorally tested for campaign effectiveness, and a click manager that receives an indication of the opening of the message by a recipient, wherein, after receiving the indication, the click manager, accesses the memory to retrieve at least one of the plurality of live content and sends the retrieved live content for rendering in the dynamic live content area of the e-mail message opened by the one of the plurality of recipients, wherein the at least one of the plurality of live content is retrieved based at least in part on the campaign effectiveness.
Abstract: The technology disclosed preserves the tenant specificity and user specificity of the tenant data by associating user IDs to complementary special IDs referred to as the integration user(s). In particular, it combines the traceability of user actions, the integration of security models and the flexibility of a service ID into one integration user(s).
Type:
Application
Filed:
August 4, 2016
Publication date:
November 24, 2016
Applicant:
salesforce.com, inc.
Inventors:
Donovan A. Schneider, Fred Im, Vijayasarathy Chakravarthy
Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for causing an entity to automatically follow other entities in an online social network. Location information of an entity can be received, and an automatic follow rule applicable to the entity can be determined. The automatic follow rule may cause the entity to follow other entities when one or more conditions including a designated spatial proximity of the entity to the other entities is satisfied. When it is determined that one or more conditions is satisfied, data associated with the entity can be updated to indicate that the first entity follows the other entities. In some implementations, when the entity is associated with a temporal follow status and a trigger event specified by the automatic follow rule is satisfied, data associated with the entity can be updated to indicate that the entity does not follow the other entities.