Patents Assigned to SAP
-
Publication number: 20150003334Abstract: A mobile communication device can receive an inbound message, which can optionally be a voice call. Based on receipt or lack or receipt of an identifier data packet via a different communication layer than the inbound message or based on content of such an identifier data packet received in this manner, a level of prioritization can be recognized for the inbound message. A notification of the message can be provided based on the recognized level of prioritization. Methods, systems, articles of manufacture, and the like are described.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Martin Moser
-
Publication number: 20150006476Abstract: Techniques for upgrading and migrating software systems include configuring a target database on a computing appliance that is communicably coupled with a distributed computing environment that includes a source database, the source database including a plurality of productive database tables and a plurality of non-productive database tables; determining a distribution of database tables to migrate to the target database, the distribution including at least a portion of the plurality of productive and non-productive database tables from the source database and at least one new database table of a database upgrade; migrating the distribution of database tables to the target database; and pointing a productive system of the distributed computing environment to the target database.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Andrey Engelko, Christian Fiderer
-
Publication number: 20150006524Abstract: Systems and methods for providing an auto-search text box in a content submission system are provided. In example embodiments, a message interface that is used to submit content to a content submission system is provided. The message interface includes a short text field that receives at least one keyword that summarizes the content to be submitted. In response to completion of entry of the at least one keyword in the short text field, a search of a content database for previously submitted content that matches the at least one keyword is automatically performed. Based on the search, a results list is displayed in proximity to the short text field on the message interface. The results list comprises a title and a link for each result in the results lists.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Aby Jose, Vikas Gupta
-
Publication number: 20150006711Abstract: Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for predicting resource consumption in cloud infrastructures. Implementations include actions of receiving event data from one or more enterprise data sources, determining that an event associated with the event data is a known event, retrieving resource consumption information associated with the event, and providing a resource consumption schedule to a cloud infrastructure, the resource consumption schedule indicating resources expected to be consumed during execution of the event.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Andreas Schaad
-
Publication number: 20150006239Abstract: Embodiments of the present invention may provide a fraud detection system which may be used by fraud investigators to prove/disprove fraud. The system may scan business documents and generate a list of alerts associated with suspicious documents based on detection strategy business objects. The system may include a graphical user interface which may enable fraud investigators to analyze the alerts and determine whether suspicious business documents are related to fraudulent activity. The graphical user interface may display fraud pattern and investigation recipe business objects to enable fraud investigators to efficiently and accurately investigate potentially fraudulent activity.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Florian Hoffman
-
Publication number: 20150006730Abstract: Methods and systems for generating and executing a database process are described. One example method includes receiving a request at the virtual server according to the infrastructure protocol, the infrastructure protocol configured to perform actions on virtual server resources; determining an application associated with the request; and performing one or more actions associated with the request using a set of application resources associated with the application.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Nadav Binyamin Helfman, Chaim Bendelac, Stefan Baeuerle, Eran Ben Dror
-
Publication number: 20150007138Abstract: The method includes capturing an execution scenario associated with a real-time execution of an application, determining at least one scenario variable based on the execution scenario, generating a test case based on a code template, the execution scenario and the at least one scenario variable, and updating a test suite using the test case, the test suite configured to define a quality test of the application.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Antonino Sabetta
-
Publication number: 20150006553Abstract: In accordance with aspects of the disclosure, systems and methods are provided for managing context aware recommendations by providing recommendations to a user in response to a query related to the user by integrating contextual information of a context related to the user in a recommendation model while considering a granular structure of the context and the contextual information thereof.Type: ApplicationFiled: July 3, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Wen-Syan Li, Xingtian Shi
-
Publication number: 20150007172Abstract: A checkpoint trigger initiating a synchronization of a first virtual machine with a second virtual machine may be received, the first virtual machine being executed with at least a first virtual processor and a second virtual processor. The first virtual processor may be paused, while the first virtual machine is allowed to continue executing, using the second virtual processor. The synchronization may be executed, including transferring memory pages of the first virtual machine for storage by the second virtual machine, and the first virtual processor may be released and execution of the first virtual machine may be resumed, using the first virtual processor and the second virtual processor.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Benoit Hudzia, Steve Walsh, Roei Tell, Aidan Shribman, Peter Izsak
-
Publication number: 20150006071Abstract: A method for providing trip planning and route update is provided. The method includes receiving traffic demand data including a plurality of planned trips, each including an origin location, a destination location, a planned route, a planned departure time, and an end time. The method further includes building a traffic prediction model by aggregating the traffic demand data, and generating a traffic prediction for a specified trip. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Danqing Cai
-
Publication number: 20150006217Abstract: Techniques of organizing meetings are disclosed. Time boundary information and a plurality of participant parameters for a meeting may be received. A priority indication for each participant parameter may also be received. The priority indication may indicate a level of priority of the corresponding participant parameter for the meeting. Different priority indications may indicate different levels of priority. For each participant parameter, at least one potential participant for the meeting may be identified based on the corresponding participant parameter. The priority indication for each participant parameter may be associated with the at least one potential participant corresponding to that participant parameter. For each potential participant, a measure of availability may be determined based on the time boundary information of the meeting. At least one proposed meeting time for the meeting may be determined based on the priority indications and the measures of availability of the potential participants.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Matthias Buehl, Sylvia Beate Scheu
-
Publication number: 20150006222Abstract: One or more portions of a phone conversation may be captured. Text results of the one or more portions of the phone conversation may be received. The text results may be obtained from conversion of the one or more portions of the phone conversation to text. Key phrases and respective task attributes mapped to the key phrases may be retrieved from a database. One or more key phrases from the key phrases may be identified in the text results. Text following the one or more key phrases in the text results may be assigned as one or more task attribute values of one or more task attributes mapped to the one or more key phrases. A task corresponding to the one or more task attribute values may be scheduled in a calendar.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Donovan Anthony Isherwood, Jhani Adre Coetzee, Charl van der Westhuizen, Hubert Hesse, Marek Piotr Zielinski, Jan Harm Petrus Eloff, Ernest Ketcha Ngassam
-
Publication number: 20150007251Abstract: Methods, systems, and computer-readable storage media for inhibiting cross-site scripting (XSS) attacks, where actions include receiving a computer-readable document that provides a content security policy (CSP) for a website and an extension to the CSP, the CSP specifying allowed script checksums, each allowed script checksum being associated with a script that is allowed to be executed, the extension requiring comparison of script checksums before respective scripts can be executed, receiving script templates and a value list, calculating an expected script checksum for each script template to provide respective expected script checksums, comparing the expected script checksums to the allowed script checksums, and determining that at least one expected script checksum matches an allowed script checksum, and in response, executing a respective script that corresponds to the at least one expected script checksum.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Applicant: SAP AGInventor: Martin Johns
-
Publication number: 20150007078Abstract: A computing device may present a display of tiles to present therein data feeds, analytics, news items and so on. A user may expand a tile to show more additional details of data in a tile. The additional data details in the expanded tile may comprise different detailed data than the data in the original tile.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Xiaojun Feng, Yang-cheng Fan, Harish Tyagi
-
Publication number: 20150006608Abstract: Methods, systems, and computer program products for transferring business objects and business object data are described. A business object from a first networked service may be obtained. The business object may be stored in a cloud business object broker and may be transferred to a second networked service. The business object may be deleted from the cloud business object broker after a transferal from the cloud business object broker to the second networked service.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Peter Eberlein, Bare Said
-
Publication number: 20150002304Abstract: The embodiments provide a system for maximizing information gain for messages. The system may include an information processing unit configured to receive a plurality of messages having a plurality of attributes, and an integrated optimizer configured to receive an information gain model representing information gain of the plurality of messages and output a message schedule for displaying at least a subset of the plurality of messages on a display terminal including calculating a significance and display time for each of the plurality of messages using the information gain model and the plurality of attributes such that the information gain is substantially maximized. The calculated significance may determine which of the plurality of messages are included in the message schedule and the display time may provide a time period for which each message of the subset is displayed.Type: ApplicationFiled: July 12, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Gufei Sun, Heng Wang, Wen-Syan Li
-
Publication number: 20150006710Abstract: Prioritization criteria can be applied to assign a priority ranking to server processes executed by a backend server, and a utilization of the backend server by server demands can be quantified. Upon determining that the quantified utilization of the backend server has reached or exceeded one or more determined limits on backend utilization, at least a lowest priority server process can be throttled based on one or more throttling parameters.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Nikolai Sauerwald, David Freidlin, Andre Fischer
-
Publication number: 20150007249Abstract: The method includes determining, using an in-memory database, a privacy risk associated with a resultant dataset of a query, returning, by the in-memory database, an anonymized dataset if the privacy risk is above a threshold value, the anonymized dataset being based on an anonymization, by the in-memory database, of the resultant dataset, and returning, by the in-memory database, the resultant dataset if the privacy risk is below a threshold value.Type: ApplicationFiled: June 26, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Michele Bezzi, Antonino Sabetta
-
Publication number: 20150007125Abstract: The present disclosure involves systems, software, and computer implemented methods for operating on type instances. One example method includes identifying a reference to a type instance during execution of a child control flow. The child control flow is associated with one or more ancestor control flows. One or more stack frames associated with the ancestor control flows are searched for a prior instantiation of the type instance. Access to the prior instantiation of the type instance in an identified stack frame associated with an identified ancestor control flow is provided in response to determining that the prior instantiation of the type instance exists in the identified stack frame. A new instance of the type instance is instantiated in a stack frame associated with the child control flow in response to determining that the prior instantiation of the type instance does not exist in the one or more stack frames.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Jonathan Heller, Lior Schejter, Inbal Zilberman Kubovsky
-
Publication number: 20150007126Abstract: Disclosed herein are system, method, and computer program product embodiments for generating an optimal development infrastructure. An embodiment operates by decomposing a development process into one or more functional requirements, mapping each functional requirement of the decomposed development process to the one or more corresponding functional capabilities, and selecting one or more services operable to implement each mapped functional capability, wherein each service comprises one or more functional capabilities.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Applicant: SAP AGInventors: Oleg KOUTYRINE, Klaus KOPECZ