Abstract: A system includes reception of a plurality of findings output by runtime checks executed by a plurality of computing systems, determination of whether a first one of the findings is a duplicate of an already-stored finding, storage, in a case it is determined that the first finding is not a duplicate of an already-stored finding, of the first finding in association with a finding identifier, and generation of a message including the finding identifier and information describing a problem associated with the finding.
Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
Abstract: A system, a method, and a computer program product for providing an application object framework are disclosed. In response to a request, an application object of a software application is obtained from an application object framework. The application object framework loads a metadata corresponding to the requested application object. The metadata contains at least one metadata schema definition. The application object framework generates a runtime interface for execution of the requested application object based on the loaded metadata.
Abstract: The present disclosure describes methods, systems, and computer program products for performing fuzzy substring search. One computer-implemented method includes determining, by operation of a hardware processor, one or more tokens of an input string received from a client application, identifying, from a database, a reference string based on the one or more tokens of the input string, determining a plurality of character index values of the reference string, each character index value indicating a position of a character in the reference string, determining one or more hop index values of the input string, each hop index value indicating a position of a separator in the input string, and calculating a similarity score of the reference string relative to the input string based on the plurality of character index values of the reference string and the one or more hop index values of the input string.
Abstract: The disclosure provides for a telecommunication method using a communication system, wherein the communication system comprises: a main database system; a local database system; a first network connection for exchanging data between the main database system and the local database system, wherein the main database system and the local database system are separated by a first firewall; a handheld telecommunications device with digital mobile telecommunication connection to the local database system.
Abstract: A method includes generating a request for data sets in a database via a user interface, modifying the request as a function of a number, n, of data sets visible in the user interface, sending the modified request to the database for execution, and receiving n data sets from the database responsive to the modified request to display on the user interface.
Abstract: A system and method of logless atomic data movement. An internal transaction is started within a multi-level storage architecture, the internal transaction to merge data from the first level storage structure to the second level storage structure. Committed data is read from a first level storage structure of the multi-level storage architecture as specified by the internal transaction. The committed data from the first level storage structure is inserted into a second level storage structure in a bulk insertion process, and the committed data is marked as being deleted from the first level storage. The internal transaction is then committed to the multi-level storage architecture when the committed data has been inserted into the second level storage structure.
Type:
Grant
Filed:
August 14, 2015
Date of Patent:
March 14, 2017
Assignee:
SAP SE
Inventors:
Franz Faerber, Juchang Lee, Ivan Schreter
Abstract: A system, method, and medium, the method including generating a display environment having multiple layers, each layer containing at least one user interface element associated with the layer; and generating a viewport having a port that provides a visible view onto multiple the layers of the display environment.
Abstract: Example embodiments involve a system, computer-readable storage medium storing at least one program, and computer-implemented method for graphical modeling and editing of database query statements. The method may include accessing a database query statement, and generating an abstract syntax tree (AST) representing a syntactic structure of the database query statement. The method may further include generating a graphical model of the database query statement based on the AST, and rendering the graphical model.
Abstract: An access code can be generated by a primary device and interpreted by a secondary device for the purpose of presenting, on the secondary device, additional content related to an application running on the primary device. The access code can be a two dimensional graphic or QR code that can be easily captured by a camera unit of the secondary device. Once captured, additional content related to the running application can be identified and displayed on the secondary device.
Abstract: Methods and apparatus, including computer program products, are provided for transporting processes within a distributed computing system, such as a cluster. In one aspect, the computer-implemented method may receive an event at a first node. The event may correspond to a process instance for handling the received event. The process instance may be transported from a second node to the first node. The process instance may be transported from a persistence when the process instance is inactive and, when the process instance is active, the process instance may be persisted to enable transport to the first node. Related apparatus, systems, methods, and articles are also described.
Type:
Grant
Filed:
December 12, 2008
Date of Patent:
March 7, 2017
Assignee:
SAP SE
Inventors:
Thilo-Alexander Ginkel, Matthias Miltz, Sören Balko, Boris Klinker
Abstract: Embodiments relate to enrichment of a data warehouse utilizing a business compendium. Embodiments may employ a process comprising data standardization and cleansing, de-duplication of entries, and matching and enrichment, followed by manual review of an enriched record by a user. During standardization, data may be transformed into consistent content, placing correct data elements into appropriate fields, removing invalid characters, and/or standardizing names and addresses. Duplicate records are then detected and marked. During matching and enrichment, the existence of an entity (such as a supplier), may be verified by progressive matching against the business compendium. Enrichment may provide additional information regarding the entity (e.g. related to risk, diversity, and bankruptcy). The enriched record is available for manual review, allowing the user to change duplicates, matches, and parent/child linkages.
Type:
Grant
Filed:
September 6, 2012
Date of Patent:
February 28, 2017
Assignee:
SAP SE
Inventors:
Vishal Kapadia, John Jensen, Geralyn McBride
Abstract: In response to an identification of a displayed position in a file, a shortcut to the identified position in the file may be created on a desktop environment. In response to an activation of the shortcut, the identified position in the file may be indicated. In response to the activation, the file may be opened. Identification of the position in the file may include dragging a cursor from the position in the file to a location on the desktop environment. Identification of the position in the file may include dragging a cursor from the position in the file to a toolbar and dragging the cursor from the toolbar to a location on the desktop environment.
Abstract: The systems, methods and articles described herein are directed to a cloud based server which can access and retrieve data for dynamically calculating and generating information relating to driving ranges of one or more electric vehicles. In addition, the information relating to the driving ranges can be displayed on the one or more electric vehicles for improving driving range anxiety. Related apparatus, systems, techniques and articles are also described.
Abstract: A technique is described for providing interactive features to a composite plot for visualizing a multi-variable dataset. The interactive features include the presentation of curved links and associative highlighting, both of which can assist a user in the exploration of possible relationships between different variables.
Type:
Grant
Filed:
July 25, 2013
Date of Patent:
February 28, 2017
Assignee:
SAP SE
Inventors:
Jean-Francois Im, Michael McGuffin, Rock Leung
Abstract: Systems and methods for generating previews of list data in space constrained user interfaces are disclosed. In the available display area of a particular display device or user interface, a segment of a list of items are displayed. Values in the on-screen and off-screen portions of the list are analyzed and processed to generate previews of the list. One preview includes generating a box plot of the distribution of values in the list. An adaptively sized slider can then be generated relative to the box plot to indicate which part of the distribution is displayed in the list items that fit in the available display area. Another preview includes generating a composite row in the available display area that summarizes the data in one or more of the off-screen portions of the list. Such previews can include the sum or average of the values in the off-screen list items.
Abstract: Data synchronization techniques are provided that effectively isolate data transfer over the network from actual interpretation of data. The data synchronization techniques include a protocol designed to work based on a “size” (amount) of data transferred over the network, irrespective of the content represented by the data that is transferred. The size itself may be determined, for example, by the client, backend system, an agreed-upon configuration that is maintained for a predetermined period of time, etc. In certain embodiments, a client transmits a request to the server that indicates a “requested payload size.” Using the requested payload size, the server generates a response (i.e., one or more messages) that provides the client with data, referred to herein as synchronization data, for storage at the client device.