Patents Assigned to Sap AG
-
Publication number: 20120167013Abstract: Disclosed are methods, systems and products, including a method that includes receiving, by at least one processor-based device, data relating to features of a computing system, generating, by the at least one processor-based device, a diagram including graphical data representative of, at least partly, the features of the computing system, including an order of release of at least some subsystems of the computing system and layered relationship information, and providing the generated diagram to a user interface for presentation.Type: ApplicationFiled: December 28, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Martin Kaiser, Andreas Meier
-
Publication number: 20120166928Abstract: A program and corresponding method allow for the enablement of customizable extension fields into a form template, independent of the field type of the extension field. New extension fields corresponding to section headers of the form template can be created and added to a user interface. A new extension field can drive the form template and be added to all applicable section headers in the form template from the user interface.Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Andre Stern, Saikrishna Gollapudi, Frank Erle, Uwe Schlarb, Visvapriya Sathiyam, Vinit Kumar, Ritesh Kumar Dokania, Christoph Birkenhauer, Stefan Baeuerle, Bernhard Thimmel, Matthias Lehr, Sathish Babu Krishna Vihar, Karsten Fanghänel
-
Publication number: 20120167225Abstract: Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password.Type: ApplicationFiled: December 28, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Laurent Gomez, Slim Trabelsi, Aymen Mouelhi
-
Publication number: 20120166475Abstract: A request for at least a portion of a business object is received by a database from a client in a first half of a roundtrip between the client and the database. Each of the tables includes a primary key column and a plurality of records. The primary key column provides, for each record in the table, a primary key for one of a plurality of business objects. Thereafter, the database identifies records within a set of tables among a larger number of tables in the database by matching a primary key associated with the business object with the primary key in the primary key column. Once this identification has been made, the database obtains all values responsive to the request from the identified record and transmits, in a second half of the roundtrip between the client and the database, the obtained values for the business object to the client.Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Tobias Zahn, Holger Schwedes, Martin Heidel
-
Publication number: 20120167206Abstract: A system and method for securely displaying to a user images retrieved from an external image source. Upon the request for a product catalog by the user via a user interface a backend retrieves images for the product catalog from external image sources and converts the retrieved images to render inoperable potentially malicious code embedded in the images. The converted images may then be used in the product catalog displayed to the user via the user interface. In an embodiment, the frontend compiles the product catalog and requests images from the backend. Product catalog information may be stored in a database implemented at the backend.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Markus REETZ-LAMOUR, Rainer BAUREIS, Philipp STEVES
-
Publication number: 20120166984Abstract: The present disclosure involves systems, products, and methods for modifying elements within a user interface (UI). One method includes operations for identifying an instance of a UI text element for modification within a UI associated with a software application, wherein the UI is displayed to at least one user; retrieving a set of metadata associated with the identified instance of the UI text element, where each instance of the UI text element is associated with the retrieved set of metadata; receiving at least one modification to the retrieved set of metadata associated with the identified instance of the UI text element; and persisting the modified set of metadata associated with the UI text element.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Frank Brunswig, Frank Jentsch, Bare Said
-
Publication number: 20120166493Abstract: In one general aspect, a computer system can include instructions stored on a non-transitory computer-readable storage medium. The computer system can include a program database module configured to define, at a shadow system, a shadow program database including data and a structure collectively defining an upgrade to an original program database on an original system. The computer system can include a basis module configured to define at the shadow system a shadow basis database related to start functionality of the shadow system. The computer system can also include a downtime execution module configured to trigger the shadow system to change from a downstate to an upstate based on a combination of data included in the shadow basis database and the data of the shadow program database.Type: ApplicationFiled: December 27, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Levke Bentzien, Wieland Hoprich
-
Publication number: 20120166486Abstract: The system, method and machine-readable medium that provides an efficient presentation of a hierarchical table by providing an accurate summation of table line values when the table is expanded and collapsed.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventor: Pepijn Visser
-
Publication number: 20120167034Abstract: A more tailored and flexible update schedule is provided for large enterprise software development and delivery through mini-releases. Instead of delivering update packages after a development and delivery period, e.g., 18 months, where the update packages include an update release for the entire software package, the software package may be broken down into component parts. Mini-releases may then be issued several times during the same delivery period (e.g., 18 months). Each mini-release may include a small subset of the component parts to be focused on, allowing greater flexibility, without greatly increasing code release efforts (e.g., as required by releasing the whole software suite in an update).Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Andreas KEMMLER, Torsten KAMENZ
-
Publication number: 20120167012Abstract: In an object development environment, source objects in a structured hierarchy are mapped to one or more target objects, also in a structured hierarchy. Dual view user interfaces with connection mapping tools may be provided to facilitate creation, deletion and maintenance of these mappings. The invention includes an improvement by providing a context menu as a fly-out menu from a particular object. The context menu may include global functions and a list of connected objects, each with supplemental object-specific functions.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Joachim Sander, Tina Rauschenbach
-
Publication number: 20120167200Abstract: Embodiments of the present invention may provide a system and method for business data provisioning for a pre-emptive security audit. In one aspect, a method embodiment may comprise the steps of identifying the business resources as expressed in business terms, ensuring that applications dealing with (parts of) the business resources are aware of the link to the resource, transmitting the information about the used business resources throughout the call stack up to the UI, making use of the highest access enforcement point possible where it can be ensured that access to the protected resource is only done through either authorized users or trusted code, and having this access enforcement point taken over by a framework to ensure adequate protection even in extensibility scenarios.Type: ApplicationFiled: December 27, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Cristina Buchholz, Bare Said
-
Publication number: 20120166459Abstract: The present disclosure is directed to executing transformation rules. In some implementations, a method includes receiving a request to apply a predefined transformation rule to a portion of a service. In response to at least the request, the predefined transformation rule is identified from a plurality of predefined transformation rules included in a business model. Each of the plurality of predefined transformation rules are configured to update at least one service independent of generating code in a service layer. The predefined transformation rule is assigned to the portion of the service.Type: ApplicationFiled: December 28, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Gerd M. Ritter, Frank Brunswig
-
Publication number: 20120166620Abstract: Embodiments of the present invention may provide a system and method for providing real time analytics and reporting across networked applications. The real time analytics and reporting across networked applications may be provided by extending the reporting metadata and the corresponding design- and runtime-tools. Based on a cross NWAs MDAV-Definition, the corresponding metadata (subview and subquery definitions) may be generated and assigned to the corresponding NWA-Layer (NWA software component). At deployment and configuration time, the relevant views may be activated depending availability of underlying data. At runtime, an MDAV executer (e.g., a MDAV runtime engine) may run a distributed and optimized provisioning of reporting and analytics data. The data provisioning scheme may depend on selection parameters, filters, join conditions between parts in different NWAs, analytical functions defined in the report, and the locality of the data (local or remote).Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Bare Said, Jan Teichmann
-
Publication number: 20120166525Abstract: A computer-implemented method for providing a stateful computer application to a multitude of users. The method may comprise generating a session identification (e.g., a primary key) for a user session for one user and retrieving a state representation using the session identification. The state of the stateful computer application may be described by a set of user-specific session variables that may be reconstructed from information contained in the state representation. The method may further comprise restoring the set of user-specific session variables using the retrieved state representation and calling functional computing logic based thereon. The functional computing logic may comprise the code of the stateful computer application and the call may provide an updated set of user-specific session variables. Upon completion of functions performed by the called functional computing logic, an updated state representation may be assembled from the updated set of user-specific session variables and stored.Type: ApplicationFiled: December 22, 2011Publication date: June 28, 2012Applicant: SAP AGInventor: Wolfgang Dittrich
-
Publication number: 20120166489Abstract: A computer-implemented method for presenting a multidimensional decision table includes: receiving a decision table that defines columns as respective dimensions, each row having a value in only one of the columns, the decision table specifying results for respective value combinations in the dimensions; identifying each value in an innermost dimension of the decision table; and generating a table representation for the decision table that has a corresponding column for each of the dimensions except the innermost dimension, and a separate column for each of the identified values, wherein the separate columns include corresponding ones of the results.Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventor: Long Fung Cheng
-
Publication number: 20120166550Abstract: Disclosed is a method of business-to-business messaging by receiving a human-cognizable business-to-business message; parsing the human-cognizable business-to-business message; validating the human-cognizable business-to-business message using a message protocol ontology; and selecting and executing a service call corresponding to the particular human-cognizable business-to-business message based upon a message-to-service ontology.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Theo Dirk Meijler, Frank Nietzold
-
Publication number: 20120167015Abstract: One or more processors may provide visual representations of a system landscape. A first visual representation of the system may be displayed, the first visual representation providing a first level of detail of at least one first system component. An indication from a user to display a second visual representation of the system may be received, and the processor may determine a second level of detail of the system based on the received indication. Data associated with the second level of detail of the system may be identified, and the second visual representation of the system may be displayed, the second visual representation of the system including the data associated with the second level of detail of the system.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: SAP AGInventor: Christian Martick
-
Publication number: 20120166164Abstract: Baseline data may be generated, including copying selected data from a planning database. Modifying requests associated with changes to a derived simulation may be received, and affected entries within the baseline data that are affected by the modifying requests may be determined. Simulation entries may be stored within a derived simulation dataset, the simulation entries corresponding to the affected entries within the baseline data. A mapping may be provided between the simulation entries within the derived simulation dataset and the affected entries within the baseline data. The derived simulation may be provided in response to the modifying requests and based on the mapping.Type: ApplicationFiled: December 28, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Hans-Georg Reusch, Volkmar Soehner, Andreas Wiethoff
-
Publication number: 20120167056Abstract: A computer system includes a metadata repository that is arranged and configured to store multiple meta-objects, at least one execution engine that is operably coupled to the metadata repository and that is arranged and configured to process one or more of the meta-objects during a runtime process and a debug manager that is operably coupled to the metadata repository and to the at least one execution engine and that is arranged and configured to provide an interface to the at least one execution engine and to manage one or more debug processes at a metadata level.Type: ApplicationFiled: December 23, 2010Publication date: June 28, 2012Applicant: SAP AGInventors: Frank Brunswig, Frank Jentsch, Baré Said
-
Publication number: 20120166476Abstract: A system and method for real-time comparison of data objects stored in a repository. A comparison of a plurality of selected objects may be implemented. A metadata comparison summary may be displayed to the user. The comparison summary may identity the most viewed, most liked, most disliked, or also viewed objects. The metadata comparison may be displayed on a user interface via the addition of an identification icon, by color highlighting a list of objects in the repository, by displaying a comparison summary in an information panel, or by other methods of object identification. In an embodiment, the user may control the type of information displayed in the comparison summary.Type: ApplicationFiled: December 27, 2010Publication date: June 28, 2012Applicant: SAP AGInventor: Huma Zaidi