Abstract: An alias key is generated for each person identification (ID) in a database table. The alias key us used to lookup the corresponding person ID in the database table. In addition, for each alias key, a temporary alias key is generated that is used to lookup the corresponding alias key in the database table. A plurality of queries are received from at least one remote client that each specify at least one of the temporary alias keys. Data is later transmitted to the at least one remote client that is responsive to the queries. Related apparatus, systems, techniques and articles are also described.
Abstract: Embodiments of the present disclosure pertain to extracting data from images using neural networks. In one embodiment, an image is fit to a predetermined bounding window. The image is then processed with a convolutional neural network to produce a three dimensional data cube. Slices of the cube are processed by an encoder RNN, and the results concatenated. The concatenated results are processed by an attention layer with input from a downstream decoder RNN. The attention layer output is provided to the decoder RNN to generate a probability array where values in the probability array correspond to particular characters in a character set. The maximum value is selected, and translated into an output character. In one embodiment, an amount may be extracted from an image of a receipt.
Abstract: Primary tables associated with a first user interface application are received in a migration of user interface application layer. Properties associated with the primary tables and secondary tables are determined. The primary tables and the secondary tables are converted to an entity data model file in a migration system based on the properties associated with the primary tables and the secondary tables. A service and a link to access the service are generated based on the entity data model file. UI controls corresponding to the properties determined from the service are identified in the migration system. A second user interface application with the UI controls is displayed in the enterprise application.
Type:
Grant
Filed:
December 10, 2015
Date of Patent:
May 12, 2020
Assignee:
SAP SE
Inventors:
Resmi Kollaparambil Subramanian, Rupali Ray, Aaby Sivakumar
Abstract: In virtual prototyping and assembly validation, visual images of physical components of a product are captured through a camera inbuilt in an augmented reality/virtual reality (AR/VR) wearable device, registered as 3D models in a virtual workbench. When a first voice command is received to initiate recording, continuous visual motion signals are received as trajectories corresponding to assembling a 3D model of a component. They are recorded as an installation view of the component. The 3D model of the component is dynamically validated while assembling the virtual workbench. The installation view of the component and an installation view of a next component is stored as an animation assembly file. The animation assembly file may be extracted from the AR/VR application and stored in a visual enterprise application as a visual enterprise format such as visual design stream.
Abstract: A server receives a first query to perform one or more operations on an encrypted database and intercepts the first query. A set of data referenced by the first query is determined to include data that is to be encrypted. Based on metadata, one or more data columns of the data that is to be encrypted are identified as well as an encryption scheme to be applied to each of the data columns. Each of the identified data columns is encrypted based on the identified encryption scheme to produce encrypted data. One or more of the operations of the first query is determined to be unsupported on encrypted data. The one or more operations are executed on a token vault at a tokenizer to retrieve token data referencing the encrypted data. The first query is replaced with a modified query based on the retrieved token data. The modified query is executed on the encrypted database to retrieve an encrypted query result.
Type:
Grant
Filed:
October 10, 2017
Date of Patent:
May 5, 2020
Assignee:
SAP SE
Inventors:
Ami Tabak, Roopang Chauhan, Gangadhar Mavuru, Karan Sasan
Abstract: A method and apparatus for determining relationships between objects in a meta-model semantic network is described. A contextual network graph comprising nodes and edges representing semantic objects and semantic relationships is generated from a meta-model of business objects from the meta-model semantic network. The contextual network graph is used to generate a unique identifier for each node and associated edge. The unique identifiers are used to compute information of cost and energy between the nodes. The information is stored in a meta-model semantic network database.
Type:
Grant
Filed:
March 23, 2012
Date of Patent:
May 5, 2020
Assignees:
SAP SE, intelligent views gmbh
Inventors:
Robert Heidasch, Stefan Scheidl, Michael Neumann, Matthias Kaiser, Stephan Brand, Nico Licht, Archim Heimann, Klaus Reichenberger, Steffen Moldaner
Abstract: A computer implemented method for manipulating data comprises receiving log transaction information from a primary database system at a secondary database system and parsing the log transaction information to identify data objects that have been modified on the primary database system. The secondary database system determines whether the data objects are present in main memory on the secondary database system. If the data objects are not in the main memory, they are copied from persistence data volumes to the main memory. The data objects are modified by replaying the log transactions on the data objects in the main memory. Then, the data objects in the persistence data volumes are modified. Related apparatus, systems, techniques and articles are also described.
Type:
Grant
Filed:
November 30, 2016
Date of Patent:
May 5, 2020
Assignee:
SAP SE
Inventors:
Mihnea Andrei, Rolando Blanco, Shiping Chen, Martin Heidel, Vivek Kandiyanallur, Thomas Peh, Joern Schmidt, Liang Song, Peter Steinemann
Abstract: A page is loaded into memory of an in-memory database system. Thereafter, it is determined whether to reorganized the page based on how such page is used. Based on such determination, the page is either reorganized by filling any free space gaps in memory and then, use of the reorganized page is enabled or, otherwise, use of the page is enabled without reorganization.
Abstract: A query is received by a document store from a client. The query specifies at least one database operation implicating documents within the document store. At least one of the implicated documents has partially compressed objects in which only a portion of the document is compressed. Thereafter, the documents are scanned to identify the compressed objects and to identify decompression keys. The scanned compressed objects are then decompressed using the corresponding decompression keys. Data responsive to the query can then be provided to the client. lated apparatus, systems, techniques and articles are also described.
Abstract: A development maintenance (Dev-Maintain) computing system is upgraded from a release version n to a release version n+1, where a production (Prod) computing system is on the release version n, and a development preview (Dev-Preview) computing system is on the release version n+1. Changes are transported from the Dev-Preview computing system to the Dev-Maintain computing system. Inactive changes transported from the Dev-Preview computing system into the Dev-Maintain computing system are merged to generate merged changes. The merged changes are transported to the Dev-Preview computing system. A release version upgrade is performed to the Prod computing system and to the Dev-Preview computing system. Active changes are transported from the Dev-Maintain computing system to the Prod computing system.
Abstract: Allocation of an entry in a variable size entry container is initiated in an in-memory database system. The variable size entry container includes a plurality of pages forming a chain. Thereafter, it is determined whether free space is found within the pre-existing pages. If free space is found, the entry is allocated in the free space. Otherwise, a new page is created and appended to the chain so that the entry can be allocated on such new page.
Abstract: The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented method includes creating a connection between a decision service manager and a managed system, establishing a signature of a decision service, developing, using at least one computer, the decision service based upon the established signature of the decision service, performing a deployment readiness check, transferring generated code implementing the decision service to the managed system upon a determination that the deployment readiness check was successful, inserting the generated code into the managed system, and retrieving a deployment status from the managed system.
Abstract: Technologies are described for acquiring and processing data related to a production process, including to generate a report of variances between planned values and actual values. Data can be received from a plurality of data sources, such as hardware sensors, associated with the production process. The data can be sent in real time, such as in response to a request or upon the occurrence of a particular event. The data can be received and stored in one or more database tables having a format. The format can be the same format as a format in which planning data is maintained. When maintained in a common format, comparisons of planning and actual data can be carried out faster and with less processor use. Reports can include granular data, such as variances associated with particular data sources, or groups of data sources.
Abstract: Methods, systems, and computer-readable storage media for provisioning resources for microservice-based applications hosted in cloud infrastructures, implementations including actions of receiving event data from each of a plurality of microservices hosted in a cloud infrastructure, for each microservice, determining a load metric based on a probability distribution, comparing each load metric to one or more thresholds to effect respective comparisons, and selectively initiating provisioning of one or more instances of at least one microservice based on a respective comparison.
Abstract: According to some embodiments, each of a plurality of computer systems to be monitored receives a monitoring solution agent code portion and a monitoring solution agent content portion, the monitoring solution agent code portion and monitoring solution agent content portion together forming a monitoring solution agent. The monitoring solution agent code portion and monitoring solution agent content portion may comprise a remote Monitoring Solution Agent that executes at the computer system to be monitored. According to some embodiments, monitoring solution agent content portion includes a data source layer, a data provider layer, a request layer, and a user interface layer.