Abstract: Some embodiments provide a non-transitory machine-readable medium that stores a program. The program receives, from a requestor, a query for data comprising a condition on a column of a table. The table includes a plurality of records divided into a plurality of zones. The program further determines a set of zones in the plurality of zones that include records that satisfy the condition based on metadata associated with each zone in the plurality of zones comprising a data interval of an expression on data values in the column of the table. The program also determines a result set of records in the table that satisfy the condition based on records in the set of zones. The program further sends the result set of records to the requestor.
Abstract: Technologies are described for facilitating the processing of requests for database operations within a database environment that includes one or more processing units and a memory. A utilization level of one or more computing resources of a database system is periodically determined. When a request for a database operation is received from a database client, it is determined, such as based on the utilization level, whether the database system has sufficient resources to process the request. If the database system does not have sufficient resources to process the request, the request is enqueued in a request queue for deferred execution. If it is later determined that the database system has sufficient resources to execute the request, the request can be dequeued, executed, and execution results returned to the database client.
Type:
Application
Filed:
June 7, 2017
Publication date:
December 13, 2018
Applicant:
SAP SE
Inventors:
Jaeyoung Choi, Chul Won Lee, Jeong Hee Won, Norman May
Abstract: Some embodiments provide a non-transitory machine-readable medium that stores a program. The program receives a set of metadata associated with a web page provided by an application. The set of metadata includes a first attribute value in a first hierarchy of attributes and a second attribute value in a second hierarchy of attributes. The method further determines a set of boost values based on the set of metadata, the first hierarchy, and the second hierarchy. The method also generates a query for documents associated with the web page based on the set of boost values. The method further executes the query in order to generate a result set of document associated with the web page.
Abstract: A dynamic data service accepts requests for database operations from a client application, where the requests can be associated with a property, including a particular data member, of a data model template. The property has at least one attribute that can be instantiated in a plurality of configuration values. The property is instantiated with the at least one attribute having a configuration value that is appropriate for fulfilling a client request, including being instantiated a plurality of times with a plurality of configuration values. The dynamic data service can send the request to a database for execution and return execution results to the client application. The dynamic data service can allow for the more flexible design of client applications, as the client applications can use different configuration values, or can use combinations of configuration values.
Abstract: In some embodiments, a logging framework reserves space in an in-memory storage for a log entry upon receiving a first function call from an application being executed. Upon receiving a second function call from the application being executed, the framework writes the log entry in the space in the in-memory storage. Upon receiving a third function call from the application being executed, the framework selects a configuration for the application and comparing an indicator that is generated based on the executing of the application to the configuration. When the indicator meets a condition of the configuration, the framework copies the log entry from the space in the in-memory storage to a persistent storage space. The log entry is deleted from the space in the in-memory storage at a time after performing the comparing.
Abstract: Various embodiments of systems and methods for generating mnemonics are described herein. In an aspect, the method includes receiving a trigger for a mnemonic. Upon receiving the trigger, a menu including options for creating the mnemonic is displayed. A selection of an option from the menu is received for creating the mnemonic. Based upon the selection of the option, one or more pop-up windows for creating the mnemonic is rendered.
Type:
Grant
Filed:
December 29, 2015
Date of Patent:
December 11, 2018
Assignee:
SAP SE
Inventors:
Florian Jann, Michael Krenkler, Emil Voutta, Annette Jann, Leif Jensen-Pistorius, Peer Hilgers, Martin Wezowski, Kathrin Fischer, Kai Richter
Abstract: According to some embodiments, a source application part may be established having a source data object with a set of source attribute identifiers and associated source attribute values. A target application part may also be established having a target data object with a set of target attribute identifiers. An object reuse platform may then receive, from a user via a graphical interface, an indication that the source data object relates to the target data object. The object reuse platform may then calculate, for each source attribute identifier, a probability that the source attribute identifier is associated with one of the target attribute identifiers.
Type:
Grant
Filed:
September 30, 2016
Date of Patent:
December 11, 2018
Assignee:
SAP SE
Inventors:
Knut Manske, Slavin Donchev, Markus Latzina
Abstract: Disclosed herein are system, method, and computer program product embodiments for of big block allocation of persistent main memory. An embodiment operates by receiving an allocation request for memory of a requested size. A free memory block, that exceeds the requested size by a remainder and is available for allocation, is determined. A size of the free memory block is updated to indicate that the size of the free memory block is equal to the remainder size. A new block of the requested size is inserted with an indication that the new block is allocated. A memory address corresponding to the new block is returned.
Abstract: A method and system including a display; a memory storing processor-executable process steps; and a processor to execute the processor-executable process steps to cause the system to: present a user interface on a display, the user interface including one or more sub-actions associated with a core action, and one or more user-entry sub-action fields associated with the one or more sub-actions; receive data in one or more of the displayed user-entry sub-action fields, wherein the received data is entered by a first user; present a sharable action indicator in response to reception of the data in the one or more displayed user-entry sub-action fields; in response to a first user selection of the sharable action indicator, display a list of one or more additional users; and in response to selection by the first user of at least one of the one or more additional users, transmit a notification to the selected one or more additional users indicating that the core action has been shared with them by the first user.
Abstract: Technologies are provided for using a multi-user execution plan cache to process database queries. A database query processor can be configured to store execution plans in a multi-user execution plan cache. The query processor can determine whether an execution plan is shareable by multiple database users. If the execution plan is shareable, it can be stored in the cache in association with a sharing user identifier. When a database query is received, the query processor can determine that the query can be performed using the cached execution plan. If the cached execution plan is shareable, the database query can determine whether the cached execution plan is valid for a database user associated with the received database query. If the cached execution plan is valid for the database user, the query processor uses the cached execution plan to perform the query for the associated database user.
Abstract: Technologies are described for facilitating the processing of requests for database operations in a distributed database environment. Criteria are defined for processing a request for a database operation according to first or second snapshot isolation protocols. A request for a database operation is received and it is determined if the snapshot isolation protocol criteria are met. If the criteria are met, the request can be processed using a local snapshot identifier value of a worker node. If the criteria are not met, the local snapshot identifier value is synchronized with another node, and the request processed using the updated snapshot identifier value.
Abstract: Technologies are described for facilitating transaction processing in a distributed database environment. A database client sends database operations to a slave node, which mediates execution of the transaction. A connection between the database client and the slave node is associated with an identifier, and the transaction has an identifier. The database client sends a commit request to a master node over a network connection between the master node and the database client. The commit request includes the transaction identifier. The commit request can also include an indication of database nodes executing operations in the transaction.
Type:
Application
Filed:
June 1, 2017
Publication date:
December 6, 2018
Applicant:
SAP SE
Inventors:
Juchang Lee, Deok Koo Kim, Chang Gyoo Park, Nosub Sung
Abstract: Some embodiments provide a non-transitory machine-readable medium that stores a program. The program reads a file representing a source image. The file specifies an interior image and a set of successive exterior images that correspond to a set of successive zoom levels. The interior image includes a plurality of pixels. Each pixel in the interior image has a particular size. Each exterior image in the set of successive exterior images includes a plurality of pixels configured to encompass the interior image. The plurality of pixels of each successive interior image have a successively larger size than the particular size. The program generates the source image based on the interior image and the set of successive exterior images. The program receives a selection of a zoom level in the set of successive zoom levels. The program generates a target image based on the selected zoom level and the source image.
Abstract: A web application security testing framework includes a HTTP browser engine replaying recorded sessions to identify candidate traces indicative of attack. A mutation engine changes values in the attack candidate traces to generate additional traces posed against a virtualized server-side platform. The virtualized server-side platform creates snapshots of application state for testing, avoiding permanent damage to application persistence. The virtualized server-side platform includes persistence monitoring sensors (e.g., at connectors to the database or file system) for detecting vulnerability classes including Cross-Site Request Forgery (CSRF) and SQL injection attacks. For remote command execution attack detection, a server-side vulnerability validation interface records strings passed to code generating application program interfaces (APIs).
Abstract: Embodiments detect cross-site request forgery (CSRF) attacks by monitoring, mutation, and analysis of suspect requests that are received by an application server. An engine observes UI interaction, HTTP traffic, and server-side changes in order to create an initial list of CSRF candidates (e.g., HTTP requests that could indicate a CSRF vulnerability). Embodiments may feature a virtualized server-side platform including sensors deployed for application persistence monitoring. Using inter-trace analysis, these CSRF candidates are de-composed into their semantic components (e.g., parameter values and classes). By performing value mutation operations on these components and repeated replay of the resulting HTTP requests, CSRF candidates are tested to see if the underlying HTTP request could be utilized in the context of a CSRF attack.
Abstract: A system includes acquisition of executable code of a database job, generation of a definition of the database job in a database repository, the definition of the database job comprising metadata specifying the executable code of the database job and a schedule for executing the executable code, association of a user with the database job, and activation of the database job.
Type:
Grant
Filed:
June 20, 2014
Date of Patent:
December 4, 2018
Assignee:
SAP SE
Inventors:
Bjoern Friedmann, Florian Foebel, Boris Gruschko, Christian Mohr, Martin Strenge, Sascha Zorn