Abstract: Systems and methods are provided for managing timelines of social network communications from social network feeds. A system accesses social network communications associated with a user of at least one social network and identifies a plurality of social network communications based on each respective communication being related to a same associated attribute. The system assigns a priority to each identified social network communication based on a corresponding number of social network references generated by social network account contacts and selects a first identified communication from a first social network based on its assigned priority and a second identified communication from a different social network based on its assigned priority.
Abstract: Systems and methods are described for registering a new column in an existing table on a distributed file system as a partition. In response to receiving a request to add a new column to a selected table, a new table may be created that includes all fields of the selected table, the new column, and a new partition, and the selected table may be renamed within the distributed file system. A view may then be created that points to data in the new table and the renamed selected table, the created view being a virtual table that receives and processes queries. All data from the renamed selected table may be transferred the new table. When the transfer is complete, the new table may be renamed to an original name of the selected table, and any data received after the renaming may be included in the renamed new table.
Abstract: An indexing scheme generates a token index associating token index values with keywords in queries and generates expression trees for the queries that use the token index values to represent the keywords. The indexing scheme generates a document index assigning document index values to uploaded documents. The indexing scheme generates a document-token index that associates the token index values with the document index values for the documents containing the keywords associated with the token index values. The indexing scheme applies the expression trees to the document-token index to quickly identify the documents satisfying the queries. For example, the indexing scheme may generate bit arrays for each of the token index values identifying the documents containing the keywords and apply logical operators from the queries to the bit arrays. The resulting data structure provides a list of documents satisfying the queries.
Abstract: A method for automated filtering within an analytics dashboard includes integrating, by a server and within a user-interface software framework used to develop dynamic web applications, aspects of the analytics dashboard. The server sets a series of filters for a database associated with the analytics dashboard by, for each filter of the series of filters, defining how the filter operates on data within records of the database. The server detects an action through a user interface of the user-interface software framework. Responsive to detecting the action, the server sequentially applies the series of filters to the data within the records of the database according to a sequential order of the series of filters and with a pause between application of each filter. The server displays, within the analytics dashboard, each set of results sequentially in response to application of each respective filter of the series of filters.
Abstract: System and methods are described for managing references to master data within a multi-tenant architecture associated with an entity. In one implementation, a host database system defines a class of tenants within the multi-tenant architecture. The system designates a first tenant of a plurality of tenants as a master tenant, and defines the remaining tenants of the plurality of tenants as sub-tenants. The system further modifies data objects maintained by the sub-tenants to include references to data maintained by the master tenant.
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for causing movement of items in a user interface of a web browser-based application. A bounding window of a web browser comprising a presentation of items can be caused to be displayed in a user interface on a display of a device. First keyboard input from a user interacting with a first item can be processed. The first item can be caused to be transformed to a moveable state. Second keyboard input from the user interacting with the first item can be processed. The first item can be caused to change locations as displayed in the user interface from the first location to a second location. The second location can be different from the first location.
Type:
Grant
Filed:
September 28, 2016
Date of Patent:
May 5, 2020
Assignee:
salesforce.com, inc.
Inventors:
Jesse Alan Hausler, Katherine Jeanne Rushton, Gregory Pinto, Michael M Pedersen, II
Abstract: In an example, a network traffic analysis system including a network based logging host may include a transport module, an event parser, and one or more consumer modules. The transport module may collect one or more messages including one or more event logs from one or more remote hosts, respectively. The event parser may generate normalized events consumable by the network logging host from the collected messages. The consumer modules may host process metadata of the event out to file for analysis. Other embodiments may be disclosed and/or claimed.
Abstract: Computing systems, database systems, and related methods are provided for guiding a user defining a quote for a product. One method involves a server obtaining one or more values for one or more attributes of a quote from a client device coupled to the server over a network, obtaining an expected pricing model for the quote from a database, determining expected pricing information for the quote based on the one or more values for the one or more attributes using the model, and providing a graphical indication of the expected pricing information on the client device. The expected pricing model is determined based on historical relationships between quote attributes and price for previously-closed quotes.
Type:
Application
Filed:
October 31, 2018
Publication date:
April 30, 2020
Applicant:
salesforce.com, inc.
Inventors:
Daniel Boren, Shrestha Basu Mallick, Glenn Dearing, Robert DeSisto, Arun Kumar Jagota
Abstract: Among other things, embodiments of the present disclosure relate to detecting performance degradation in database systems. Other embodiments may be described and/or claimed.
Abstract: Systems, methods, and apparatuses for implementing consumer data validation, matching, and merging across tenants with optional verification prompts utilizing blockchain technologies in conjunction with a cloud based computing environment are described herein.
Abstract: Among other things, embodiments of the present disclosure help identify anomalous web browser session behavior. Other embodiments may be described and/or claimed.
Abstract: Customization objects stored in a mobile database may be used to customize webpages and applications rendered in, or executed by a mobile application implemented by a mobile device. Upon authenticating the mobile application, a service provider may determine whether any customization objects have been updated since a previous authentication of the mobile application, and may update the mobile database with the updated customization objects. This way, the mobile device does not have to obtain customization objects from remote storage of the service provider each time a webpage is requested thereby reducing signaling overhead and decreasing webpage rendering time.
Abstract: A method by a computing device to allocate computing resources for processing items in a queue using a list of computing resource allocation steps. The method includes determining a total amount of computing resources that are to be allocated for processing items in the queue based on a current number of items in the queue and the list of computing resource allocation steps, where the list of computing resource allocation steps specifies a plurality of ordered steps. Each step in the plurality of ordered steps defines a rate at which additional computing resources are allocated for processing items in the queue when the number of items in the queue is within a particular range. The method further includes adjusting an amount of computing resources allocated for processing items in the queue to match the determined total amount.
Abstract: Some embodiments of the present invention include a system and method for validating state change requests and include generating one or more permission tokens based on a user's session identification (ID), each of the permission tokens associated with a record ID of a record, the one or more permission tokens and corresponding associated record IDs communicated to an application associated with the user. The system receives a state change request from the application, the state change request includes a first permission token from the one or more permission tokens and a record ID associated with the first permission token. In response to receiving the state change request, the system generates a second permission token based on the session ID and the record ID included in the state change request. The system then validates the state change request based on the first permission token matching the second permission token.
Abstract: Embodiments regard transparent sharding of traffic across messaging brokers. An embodiment of a method of sharding message traffic across messaging brokers includes providing a message sharding service for message sharding among a plurality of registered message brokers, wherein providing the message sharding service includes applying a current message sharding strategy; and sharding messages among the registered message brokers according to the current message sharding strategy, including registering the message brokers and assigning message queues to registered message brokers according to the current message sharding strategy; wherein the current message sharding strategy is one of a plurality of message sharding strategies.
Abstract: In a computing environment having multiple application servers each having at least one connection agent and at least one pause agent and a database node, detecting an error condition between a first application server from the multiple application servers and the database node. Indicating that the database node is unavailable to stop attempts to access the database node by a first application server. The attempts to access the database node are paused without an indication of the database node being unavailable to a source of the attempt to access the database node. Checking periodically, with the first application server, availability of the database node. Indicating that the database node is available in response to a pre-selected number of successful attempts to contact the database node with the first application server.
Abstract: In a computing system, methods for secure OS level login authentication for internal users to access servers. Some or all servers in a group each utilize a local ID Service for generating and validating a challenge responsive to an OS login request. The challenge is processed in a centralized secure server HSM. Rather than copying individual user public keys to each host in the data center, we need only copy the public key of the HSM to each host in the group. When a user attempts OS level login to a host, it encrypts the challenge using the public key of the HSM and forwards the request for processing in the HSM. There, it decrypts the challenge using the private key in the HSM and re-encrypts the challenge with the public key of the individual user. The user's mobile device, previously registered, is required to complete the authentication process.
Abstract: A method for browser-based chat messaging is provided. The method presents browser-based presentation interfaces, including a master and at least one slave, and including a chat messaging interface for the master; establishes a single communication session with a server system, by the master; receives chat data, by the chat messaging interface of the master via the single communication session, including rich content comprising graphical elements, enhanced formatting, and interactive functionality; stores the chat data including the rich content in session storage for the master; renders the chat data including the rich content, by the chat messaging interface of the master; provides updated chat data including the rich content to the slaves, by the master via a broadcast pipeline for the browser application; and presents the updated chat data by re-rendering the chat data including the rich content, via secondary chat messaging interfaces corresponding to the slaves.
Abstract: Application security assessment is described. A system identifies a first security configuration and a second security configuration associated with an application. The system calculates a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting. The system generates a security report associated with the application that includes the security score and outputs the security report.