Abstract: Methods and systems include embodiments that recursively save parent, grandparent, and other records in a database that depend from a record. User-provided code within a save event or trigger can thus call further save methods without corrupting the database. Junction objects, objects that reflect records with two or more parents, can also be recursively saved.
Type:
Application
Filed:
September 25, 2013
Publication date:
January 23, 2014
Applicant:
salesforce.com, Inc.
Inventors:
Simon Y. Wong, Walter Macklem, Lars Hofhansl, Varadarajan Rajaram, Eric Bezar
Abstract: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a slipstream bandwidth management algorithm including, for example, means for executing an application a computing device, in which the application is to communicate with a remote computing device over a public Internet; means for approximating outgoing bandwidth for communications from the computing device to the remote computing device; means for approximating incoming bandwidth for communications received at the computing device from the remote computing device; means for allocating multiple simultaneous Transmission Control Protocol (TCP) connections in support of the application based at least in part on the approximated outgoing bandwidth and based further on the approximated incoming bandwidth; and means for iteratively adjusting bandwidth communicated for the application between the computing device and the remote computing device based at least in part on latency between the computing devic
Abstract: A method for sharing an email in an on-demand database system is provided. The method receives, at one or more computer systems associated with the on-demand database system, the email from a first user; determines, at the one or more computer systems, a database record associated with the email; logs, at the one or more computer systems, the email with the associated database record; and provides access to the email to one or more second users with access rights to the database record.
Abstract: The present invention discusses a dashboard application that compiles values across a set of records, each of the records having fields which include data pertaining to user-defined criteria. The user enters a query into the system and the set of records is returns and analyzed according the criteria. The results are numerical and are displayed in components of the dashboard. The component is a graph, bar graph, pie chart, etc. that appears in a user interface of the dashboard. A user can customize the application and define its component. Multiple users can view and subscribe to the dashboard and can select specific components to follow. Some components can have user-defined threshold values and can provide graphics displaying breakpoints of those values. When the system refreshes, or the user manually refreshes the dashboard, an alert is generated if the threshold value is traversed. The alert, including the component graphic, is posted in the subscriber's feed and a feed of the dashboard.
Abstract: A system and method for determining organizational hierarchy from contact data. A phrase having multiple terms representing a job title is received and converted to lower case, then concatenated with a symbol to separate the terms. The phrase is compared to a training set of predefined normalized phrases representing known job titles. If a match is found, a data record is created or updated with organizational hierarchy information associated with the matched phrase in the training set. If a match is not found, a term is removed from the phrase and the comparison repeated.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multi-tenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.
Type:
Grant
Filed:
April 18, 2011
Date of Patent:
January 21, 2014
Assignee:
salesforce.com, inc.
Inventors:
David Brooks, Lewis Wiley Tucker, Benji Jasik, Timothy Mason, Eric David Bezar, Simon Wong, Douglas Chasman, Tien Tzuo, Scott Hansma, Adam Gross, Steven Tamm
Abstract: Systems and methods are provided for controlling access to data of heterogeneous origin. A system creates combined access rights from access rights and other access rights for combined data that includes data and other data. The system receives a request to access data that is part of the combined data. The system determines whether to provide access to at least part of the data based on access rights that are part of the combined access rights. The system provides access to at least part of the data in response to a determination to provide access to at least part of the data based on the access rights that are part of the combined access rights.
Abstract: Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server provides a human verification test to the source and thereafter initiates the activity with respect to the database in response to receiving a satisfactory human verification response to the human verification test from the source.
Abstract: Disclosed are systems, apparatus, methods, and computer readable media for selecting updates to associated records to publish on an information feed in an on-demand database service environment. In one embodiment, one or more updates associated with a data record are stored in a database. One or more criteria are applied to the one or more updates to generate a score associated with each update. The score is compared with a designated threshold. When the score is identified as meeting or exceeding the designated threshold, the one or more updates are provided as one or more candidates for publication on an information feed associated with the data record, where the information feed is capable of being displayed on a display device.
Type:
Application
Filed:
September 10, 2013
Publication date:
January 16, 2014
Applicant:
salesforce.com inc.
Inventors:
William Gradin, Margaret Law, Matthew Davidchuk, Qiu Ma, Leonid Zemskov, Amy Palke, Rasmus Mencke, Peter Lee
Abstract: Disclosed are methods, apparatus, systems, and computer-readable storage media for maintaining communities and providing access to communities of users in an online social network. In some implementations, an internal user of an organization is provided access to a community switcher user interface component in a user interface for switching between an external community and an internal community established at a domain associated with an organization. The external community is established at an external community root domain. A community switcher user interface component can be requested and displayed at a computing device. The community switcher user interface component includes a link to the internal community and a link to the external community.
Type:
Application
Filed:
March 14, 2013
Publication date:
January 16, 2014
Applicant:
salesforce.com, inc.
Inventors:
John Kucera, Aditya Kuruganti, William Charles Mortimore, JR.
Abstract: A system and method for performing security assessments in an online services system. In one embodiment, the method includes receiving a list of target data for a report; and generating fields in the report. The method also includes populating the fields with composite information; receiving a command to execute the report; fetching the target data using the composite information; and populating the report with the target data.
Abstract: Various techniques and procedures related to user authentication, identity providers, and single sign-on (SSO) are presented here. One approach creates an SSO link between two organizations in a streamlined manner using an internal cross-user systemwide digital certificate, and without processing any user-created, user-uploaded, or user-assigned digital certificates. Another approach presented here configures an identity provider service for an entity or organization by processing a single user command. The identity provider service is automatically configured in the background without processing any additional user commands, user instructions, or user-entered data.
Abstract: Systems, methods, and apparatus for preventing misuse of searches of a database system are provided. This prevention of misuse of database searches can enable reliable operation of the database system, as an improper query using a regular expression will not shut down or severely affect an application process that provides access to the database system. A thread of the application process determines whether an input character characters string matches the regular expression. To prevent misuse, a computational effort of the search is tracked, and compared to a threshold value. When the threshold is exceeded, an operation of the thread is exited or stopped.
Abstract: A system and method of identifying fraudulent data in a contact database is disclosed herein. In some embodiments, a set of contact records is received where each of the contact records includes a set of contact field values corresponding to a set of contact fields. Some embodiments determine whether a similar content pattern exists in the contact records using at least one of the set of contact field values. In some embodiments, a determination is made as to whether an unusual content pattern exists in the contact records using at least one of the set of contact field values. The set of contact records is flagged when at least one of the similar content pattern or the unusual content pattern is determined to exist in the contact records.
Abstract: Some embodiments comprise integrating information from a social network into a multi-tenant database system. A plurality of information from the social network is retrieved, using a processor and a network interface of a server computer in the multi-tenant database system, wherein the plurality of information is associated with a message transmitted using the social network. Metadata related to the transmitted message is generated, using the processor. A conversation object is generated, using the processor, based on the plurality of information associated with the transmitted message and the metadata related to the transmitted message. The conversation object is then stored in an entity in the multi-tenant database system, using the processor of the server computer.
Abstract: The present invention provides techniques for managing process space on a multi-tenant database system that features a method that provides to multiple users of two or more organizations, over a network, access to information stored in a database repository shared by the two or more organizations. The database repository implements security protocols to restrict a set of first users to a first sub-portion of the information. The set of first users belongs to one of the two or more organizations. The first sub-portion of the information is different from a second sub-portion accessible by users from another organization. Access of the information by the multiple users is monitored. A first processing space for the set of first users is generated in response to the access of the database repository. The first processing space is distinct from a second processing space for the users from the other organization.
Type:
Grant
Filed:
April 16, 2010
Date of Patent:
December 31, 2013
Assignee:
salesforce.com, inc.
Inventors:
Craig Weissman, Dave Moellenhoff, Simon Wong, Paul Nakada
Abstract: A mobile device test framework is used in combination with client controllers and device controllers so that a single mobile device API test can be used with mobile devices having different operating system platforms. The client controllers can provide information specific to the client and the device controllers can provide information needed to apply the test to each of the mobile device platforms. The test framework can navigate through the controls of the mobile device GUIs and input information. The test framework can then check that the text and images displayed by the mobile devices match the expected information.
Abstract: Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response.
Type:
Grant
Filed:
November 1, 2011
Date of Patent:
December 31, 2013
Assignee:
salesforce.com, inc.
Inventors:
Eric Chan, Craig Weissman, Paul Nakada, Dave Moellenhoff, Todd McKinnon
Abstract: Systems and methods for operating a database using distributed memory and set operations, and for evaluating graphs stored in the database. Any system may be represented as a graph structure having nodes and edges. The graph structure is stored in a distributed memory system using a key/value schema wherein each node is stored as a key and a set of neighbor nodes is stored as the corresponding value. A short path from one node to another may be determined by traversing the graph in stages, moving outward from each node in stages until common midpoint nodes are found indicating connections between the nodes.
Abstract: Disclosed are methods, apparatus, systems, and computer-readable storage media for representing a portion of a user interface of a web browser as a web address. In some implementations, a computing device receives a request to encode as a web address a portion of a user interface provided in a web browser at the computing device. The computing device then generates a web address to identify content of the portion of the user interface. The portion of the user interface represented by the web address includes a primary user interface component and one or more secondary user interface components associated with the primary user interface component.