Patents Assigned to SAP
-
Patent number: 8924565Abstract: Transporting of flexibility changes of customer content between tenants in a multi-tenant computing system can be performed by exporting customer content from a first tenant of the multi-tenant computing system, transporting the customer content exported from the first tenant to a second tenant of the multi-tenant computing system, importing the customer content into a staging area in the second tenant to enable a user associated with second tenant to access the customer content via the staging area based on a content extraction trigger, and activating selected customer content from the staging area in a productive component of the second tenant. The content extraction trigger can characterize an extraction of at least some of the customer content from the staging area. Related methods, systems, and articles of manufacture are also disclosed.Type: GrantFiled: March 5, 2013Date of Patent: December 30, 2014Assignee: SAP SEInventors: Matthias Lehr, Stefan Baeuerle, Karsten Fanghaenel, Bernhard Thimmel, Uwe Schlarb, Olaf Meincke, Volker Driesen, Juergen Specht
-
Publication number: 20140379636Abstract: Copying data in a table from a source database to a target database is performed by copying the table into a conflicts schema. A first INSERT/SELECT statement is executed to copy data from the table. Then, in response to a determination that the table definition for the table in a source database dictionary is not compatible with a table definition for the table in a target database dictionary, the INSERT/SELECT statement execution is rolled back in response to a determination that the data from the first INSERT/SELECT statement did not fit in a table in the target schema of the target database. A second INSERT/SELECT statement is executed including a WHERE clause to copy data from the table to the target schema of the target database. In response to a determination that the second INSERT/SELECT statement did not copy data from the table to the target schema of the target database, a third INSERT/SELECT statement is executed forcing the data to fit.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Andreas Lober, Markus Schierle
-
Publication number: 20140380182Abstract: A method for providing multi-touch, multi-user interactive control system using mobile devices. The method includes establishing socket connections with the mobile devices and receiving messages representing multi-touch user actions from the mobile devices through the socket connections. The messages are translated into predetermined parameters, and transmitted to an application for performing actions corresponding to the multi-touch user actions. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Hai Yun Lu, Kar Leong Tew
-
Publication number: 20140379638Abstract: A request handler may receive transaction requests for transactions to be executed using data of a database, and may classify a first transaction request of the transaction requests as a simple transaction request, and a second transaction request of the transaction requests as a complex transaction request. A key-value store engine may execute a first transaction satisfying the first transaction request, using a key-value store of pre-calculated results determined prior to receipt of the first transaction request, and based on the data, and may update a key-value delta reflecting a change, if any, of the key-value store caused by the first transaction. A relational store engine may cause the at least one processor to execute a second transaction satisfying the second transaction request, using a relational store including a subset of the data, and may update a relational delta reflecting a change, if any, of the relational store caused by the second transaction.Type: ApplicationFiled: June 27, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Wen-Syan Li, Bin Dong, Zheng Long Wei, Yongyuan Shen
-
Publication number: 20140380486Abstract: Methods, systems, and computer-readable storage media for analyzing security of dataflows in programs. In some implementations, actions include processing source code using static analysis to: identify one or more dataflows and one or more candidate sanitizers, each candidate sanitizer being associated with a respective dataflow, and provide an executable sub-program for each candidate sanitizer to provide one or more executable sub-programs, processing the one or more executable sub-programs using dynamic analysis to: execute the one or more executable sub-programs, and provide dynamic analysis results, providing combined results based on the static analysis and the dynamic analysis, the combined results including the dynamic analysis results, and assigning a priority to each result in the combined results.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Achim D. Brucker, Tim Herres
-
Publication number: 20140379754Abstract: In one embodiment, a method receives a query for analyzing data in a database. The method then determines a constant in the query and determines an operator applied to the constant in the query. The operator explicitly controls a behavior of the constant. The constant is represented as a scalar representation in the query instead of as a vectorial representation where the constant would have been used as the vectorial representation without the use of the operator due to a rule governing use of constants. Then, the method performs a calculation for the query to determine a query result using the constant as the scalar representation.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Stefan Dipper, Sebastian Schroetel, Michael Wilking, Christof Mueller, Tim Kaiser
-
Publication number: 20140379656Abstract: Methods and systems are directed to a maintenance procedure in a production environment comprising a primary database and a secondary database. Production data may be stored in the primary database and failover data may be stored in the secondary database. Data from the primary database may be replicated to the secondary database. The maintenance procedure may provide for modification of the primary database and the secondary database to conform to one or more modified requirements of a modified version of the application. During the maintenance procedure, data in the databases may be duplicated, data structures may be modified, and modification of certain data elements may be prohibited.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Volker Driesen
-
Publication number: 20140379650Abstract: Techniques for managing a file-based versioning of data objects include receiving, from a back-end computing system, a transport request that includes an updated transport object, the updated transport object including serialized database content of a data object; converting the serialized database content of the updated transport object to file-based content; storing the file-based content of the updated transport object in a repository over a previously-stored version of the transport object; and updating a database that includes a change history of the data object based on the storage of the file-based content in the repository.Type: ApplicationFiled: June 21, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Ralf-Juergen Hauck
-
Publication number: 20140380181Abstract: Techniques for presenting information on a mobile communication device to an employee of an organization include receiving an indication to present information associated with an organization to an employee of the organization; in response to receiving the indication, determining a current geographic location of the employee; identifying a facility of a plurality of facilities associated with the organization based on the determined current geographic location of the employee; retrieving information associated with the identified facility from a local memory of the mobile communication device; and presenting the retrieved information to the employee.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Stephan Lange, Manuela Janicki, Torsten Wichmann
-
Publication number: 20140379780Abstract: Techniques for obtaining a support package status associated with a software component executing on a computing system include receiving a transport request that comprises metadata associated with a software component, and a support package start point that defines an updated support package status of the software component for receiving an updated support package for the software component; in response to receiving the transport request, creating a correction transport that comprises the support package start point and metadata associated with the updated support package; distributing the correction transport to a computing system; in response to distributing the correction transport, identifying a current support package status of the software component; comparing the current support package status of the software component with the updated support package status of the support package start point; and based on the comparison, updating the support package status of the software component.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Thorsten Scheyter, Dirk Rosenkranz, Sylvia Groth, Stephan Heidel, Premchand Nutakki, Kai Schneider
-
Publication number: 20140379413Abstract: Techniques for managing business process functionality by grouping process structures in a solution manager unified directory (SMUD) include defining a group for a SMUD, the defined group including a group identification (ID) and a plurality of members of the group, each member including a business process structure; defining a plurality of generic functions of the group; receive a request for an adjustment to the plurality of generic functions of a particular member of the plurality of members of the group; and based on the received request, adjusting the plurality of generic functions of members of the group other than the particular member.Type: ApplicationFiled: June 20, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Michael Volkmer, Martin Naumann
-
Publication number: 20140380322Abstract: Systems and method for a task scheduler with dynamic adjustment of concurrency levels and task granularity are disclosed for improved execution of highly concurrent analytical and transactional systems. The task scheduler can avoid both over commitment and underutilization of computing resources by monitoring and controlling the number of active worker threads. The number of active worker threads can be adapted to avoid underutilization of computing resources by giving the OS control of additional worker threads processing blocked application tasks. The task scheduler can dynamically determine a number of parallel operations for a particular task based on the number of available threads. The number of available worker threads can be determined based on the average availability of worker threads in the recent history of the application. Based on the number of available worker threads, the partitionable operation can be partitioned into a number of sub operations and executed in parallel.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Anastasia Ailamaki, Tobias Scheuer, Iraklis Psaroudakis, Norman May
-
Publication number: 20140379669Abstract: Example systems and methods of database migration optimized by feedback are presented. In one example, a migration of database data from a first to a second database by multiple concurrent processes may be initiated on a computing system. Processing time of at least some of the processes may be monitored during the migration. Based on this monitoring, at least one portion of the database data being migrated by one of the concurrent processes may be segmented into multiple segments, wherein each of the multiple segments may be migrated by a separate one of the concurrent processes. Also, a load on the computing system may be monitored during the migration. Based on this monitoring, a number of the concurrent processes may be adjusted. In other examples, consistency checking for subsequent database migrations may be based on consistency checking results for the current migration.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Volker Driesen, Christoph Luettge, Andreas Jahr
-
Publication number: 20140379914Abstract: Methods and systems of enabling service consumption based on gamification level classification are described. A request to use a first service of a service provider may be received from a user. A usage measure for the user and a first usage measure requirement for the first service of the service provider may be determined. The usage measure may be a measure of how much the user has used services of the service provider. It may be determined if the usage measure satisfies the first usage measure requirement. The user may be enabled to use the first service of the service provider in response to a determination that the usage measure satisfies the first usage measure requirement. The stored usage measure may be increased by a first amount in response to the user using the first service. The usage measure may be a level classification or a number of points.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Jens Odenheimer
-
Publication number: 20140380265Abstract: Systems and methods to manage software change process orchestration are provided. In example embodiments, an indication to initiate a software change process is received. A process required to be performed for the software change process is identified in response to receiving the indication. Using a uniform software logistic protocol capable of accessing tools across different platforms and environments, a tool mapped to the process required to be performed for the software change process is triggered to be executed.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Volker Driesen, Andreas Jahr
-
Publication number: 20140380272Abstract: An inspection and modification window can be displayed within a user interface of a business application being executed in a business application inspection and modification environment. Application code relating to a current navigation point within the business application can be listed within the inspection and modification window. Modifications to the application code can be received via one or more user inputs, and the business application can be executed from the current navigation point to test how the received modifications to the application code affect operation of the business application.Type: ApplicationFiled: June 21, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Jens Hertweck
-
Publication number: 20140379706Abstract: Data is received by a content management system that identifies a first document managed by the content management system. Thereafter, the first document is associated with a first user that authored or edited the first document. Subsequently, the first user is associated with at least one chained document different from the first document that has at least one pre-defined attribute associated with the first user. Data can then be provided that characterizes the at least one chained document. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Geoffrey Neil Peters
-
Publication number: 20140379396Abstract: Systems and method for deploying CO2 emission and financial cost optimized secured algorithms to cloud computing environments are disclosed. Algorithms are converted into a single state assignment representation that includes a combination of statements that represent sub operations of the algorithm. Runtime and power consumption cost values associated with executing the statements in the cloud are calibrated by executing the statements in a particular configuration of a cloud some number of time with multiple security protocols and then analyzing the results. CO2 emission and financial cost values are mapped to the calibrated runtime and power consumption cost values. The mapped CO2 emission and financial cost values and the calibrated runtime and power consumption cost values are used by a linear program to optimize a partitioning vector of indicators that define which security protocol will be used to execute each statement in the cloud when the algorithm is deployed.Type: ApplicationFiled: June 25, 2013Publication date: December 25, 2014Applicant: SAP AGInventor: Axel Schroepfer
-
Publication number: 20140379677Abstract: Methods and systems are directed to controlling access to data in a production environment. Production data may be stored in a production database and test data may be stored in a test database. A production application may have access only to the data in the production database while a test application may have access to both the production database and the test database. The test application may have read-only access to the production database and read-write access to the test database. Data in the test database may be handled differently than data in the production database. A type of data may be associated with a range of valid values. The values assigned to the elements may differ depending on whether the elements are stored in the production database or the test database.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Volker Driesen, Peter Eberlein
-
Publication number: 20140380266Abstract: An execution framework allows developers to write sequential computational logic, constrained for the runtime system to efficiently parallelize execution of custom business logic. The framework can be leveraged to overcome limitations in executing low level procedural code, by empowering the system runtime environment to parallelize this code. Embodiments employ algorithmic skeletons in the realm of optimizing/executing data flow graphs of database management systems. By providing an extensible set of algorithmic skeletons the developer of custom logic can select the skeleton appropriate for new custom logic, and then fill in the corresponding computation logic according to the structural template of the skeleton.Type: ApplicationFiled: June 21, 2013Publication date: December 25, 2014Applicant: SAP AGInventors: Christof Bornhoevd, Wolfgang Lehner