Interfaces; Database Management Systems; Updating (epo) Patents (Class 707/E17.005)
  • Publication number: 20140046918
    Abstract: An embodiment of the invention provides a method for recording, managing and tracking changes to objects in a computer system. A master record is created for the computer system; and, a transactional record is created for an object in the computer system. The master record includes the current status of the object and the current status for all objects associated to the object. The transactional record is updated in the electronic database; and, the master record is updated when the transactional record is updated. The master record is linked to all of the transactional records of the objects associated to the object with the processor. The master record is updated with the processor when a transactional record of the objects associated to the object is updated or added.
    Type: Application
    Filed: October 12, 2012
    Publication date: February 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Edward Cordell, Mark W. Honeck, Joachim Lohmiller, Susan L. Merkle, Jan Nielsen, Paul Noga, William J. Reilly, John J. Roberts, Siegfried F. Sanders, Thomas Schaefnner, Debra Jean Waite, Dirdre Ann Wessel, Dan Wingard
  • Publication number: 20140043646
    Abstract: A method and system for notifying a user are provided. The user prints a document at a printer and registers to have the electronic version of the printed document tracked for changes. The electronic version of the printed document is monitored for changes and in case of an alteration, a notification is sent to the user on the basis of his/her preferences.
    Type: Application
    Filed: August 13, 2012
    Publication date: February 13, 2014
    Applicant: XEROX CORPORATION
    Inventors: Jonathan D. Levine, Neelima Gokhale, Stanton G. Pecor
  • Publication number: 20140046920
    Abstract: A system and method is provided for determining an available space in one or more data blocks. A physical data storage area associated with one or more portions of a database may be determined. An available space in each data block of one or more data blocks in the physical data storage area may be determined. A number of new data rows that can be added to each data block may also be determined.
    Type: Application
    Filed: August 10, 2012
    Publication date: February 13, 2014
    Inventor: Kevin P. Shuma
  • Publication number: 20140046940
    Abstract: A portable medical treatment device is designed to be placed on or near a patient when the patient is moved. The device communicates with a database that stores patient profiles and/or treatment protocols. Based on input patient information, the device communicates with the database and loads a patient profile and/or treatment protocol. The device evaluates data entered by a user according the patient profile and/or treatment protocol to determine metrics, and the determined metrics are compared with parameters to determine whether the entered data is within acceptable limits. The device tags and displays the entered data in a manner that reflects whether it was within the acceptable limits.
    Type: Application
    Filed: August 13, 2012
    Publication date: February 13, 2014
    Applicant: ART OF HEALTHCARE, LLC
    Inventors: Chris M. THOMSON, Chad HOYT
  • Patent number: 8650396
    Abstract: A server includes a central processing unit and electronic memory communicatively coupled to the central processing unit. The memory stores a dynamically tunable operating system kernel that includes at least one tunable implemented as a plurality of states. Each application managed by the operating system is assigned to one of these states according to a permission level association with the application. Each state defines a range of automated tuning of the tunable that is authorized to applications assigned to the state.
    Type: Grant
    Filed: December 1, 2009
    Date of Patent: February 11, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Santosh Kumar Gangaraj Manoharan, Aravind Nanjundaswamy, Sunil Agrawal
  • Publication number: 20140040314
    Abstract: An approach for providing data access via a common access manager configured to support security for multiple database management system types is described. A request specifying access for a user to a feature associated with one of a plurality of database management system types is determined by a common access manager configured to support the database management system types. A first-level approval of the access request by a first-level approver is determined. The access request is forwarded to a second-level approver based on the first-level approval. A provisioning of the access to the feature for the user is initiated based on a second-level approval by the second-level approver.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: Verizon Patent and Licensing Inc.
    Inventors: Fariborz Ebrahimi, Walid Hassan, Sumit Singh, Swamynathan Kuppuswamy, Mirdul Jain, Varun K. Maduri
  • Publication number: 20140040217
    Abstract: Methods, systems, and computer-readable storage media for evaluating a validity of an extended status and action management (SAM) schema. In some implementations, actions include receiving the extended SAM schema, the extended SAM schema being stored as a computer-readable document in memory and being an extension of a core SAM schema, providing one or more goals, each goal representing an intention of the core SAM schema, the one or more goals being provided in a computer-readable document stored in memory and comprising one or more primary goals that each express an intention of a process underlying the core SAM schema, and processing the one or more goals using a computer-executable model checking tool for evaluating the validity of the extended SAM schema.
    Type: Application
    Filed: August 6, 2012
    Publication date: February 6, 2014
    Applicant: SAP AG
    Inventors: Jens Lemcke, Andreas Friesen, Bernhard Thimmel, Piergiorgio Bertoli, Marco Pistore, Otfried von Geisau
  • Publication number: 20140040199
    Abstract: A method for managing data using writeable snapshots in a multi-versioned, distributed B-tree comprising nodes distributed over a plurality of servers, includes receiving a transaction request specifying a transaction type, the transaction having a transaction snapshot id, and determining the transaction type. If the transaction type is an update transaction, the method includes determining a node to update, which is defined by a node snapshot id, and if the transaction snapshot id is greater that the node snapshot id, the method copies the node and updates the copy to create a writeable snapshot, assigns the transaction snapshot id as a node snapshot id of the copy, and places a pointer from the node to the copy.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Inventors: Wojclech Golab, Mahul A. Shah, Benjamin Albert Sowell
  • Publication number: 20140040326
    Abstract: One or more embodiments are directed to creating a structure comprising a weak reference to an object, a strong reference to the object, a count of remote references to the object, and an identifier for the object, incrementing the count when a remote reference is created to the object and decrementing the count when a remote reference is removed, setting the strong reference in response to the count being greater than a first threshold in order to avoid a garbage collection of the object, clearing the strong reference in response to the count being less than a second threshold to enable a garbage collection of the object, and removing the structure and related resources based on a recognition of the object's collection through the weak reference.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tamiya Onodera, Kiyokuni Kawachiya
  • Publication number: 20140040048
    Abstract: Systems and methods related to an individualized menu system for use by customers in a retail environment. Multiple mobile computing devices are in communication with a database server from which the mobile computing devices retrieve menu related data items. The menu related data items are then used to present a menu to the customer by way of the mobile computing devices. The mobile computing devices are authenticated by the database server and communicate with the database server using a secure communications protocol. Each menu related data item in the database server is individually editable by an administrative user and edits are not propagated to the mobile computing devices until they are committed as such by the administrative user.
    Type: Application
    Filed: November 26, 2010
    Publication date: February 6, 2014
    Applicant: BINNJ, INC.
    Inventor: Robert Clay Hutcherson
  • Publication number: 20140040327
    Abstract: One or more embodiments are directed to creating a structure comprising a weak reference to an object, a strong reference to the object, a count of remote references to the object, and an identifier for the object, incrementing the count when a remote reference is created to the object and decrementing the count when a remote reference is removed, setting the strong reference in response to the count being greater than a first threshold in order to avoid a garbage collection of the object, clearing the strong reference in response to the count being less than a second threshold to enable a garbage collection of the object, and removing the structure and related resources based on a recognition of the object's collection through the weak reference.
    Type: Application
    Filed: August 7, 2012
    Publication date: February 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Tamiya Onodera, Kiyokuni Kawachiya
  • Publication number: 20140040626
    Abstract: A method for managing information may include associating at least one offline device with personal information identifying a user. An identifier paired with the at least one offline device may be mapped to the personal information to create an identity-to-device association record. At least a portion of the identity-to-device association record may be edited by the user. The at least a portion of the identity-to-device association record may include activity information associated with the identifier paired with the at least one offline device. The personal information may be owned by the user. The activity information may include information (e.g., biometric data and/or location data) about activity of the user while using the offline device. The editing may include deleting the activity information associated with the identifier paired with the at least one offline device.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 6, 2014
    Inventors: Dan Fredinburg, Alex Brett Abelin
  • Publication number: 20140040315
    Abstract: A method, computer program product, and computer system for receiving, at a second computer device, data content sent from a first computer device. The data content includes a first set of user metadata and permission metadata. A second set of user metadata and permission metadata is created. Both the first set and the second set of user metadata and permission metadata are maintained with the data content. The second set of user metadata and permission metadata is used in place of the first set of user metadata and permission metadata. The first set of user metadata and permission metadata is restored prior to transmitting the data content. The data content is transmitted at least with the first set of user metadata and permission metadata.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 6, 2014
    Applicant: International Business Machines Corporation
    Inventors: Mark C. Hampton, Stefan A. Hepper, Eric Martinez de Morentin
  • Publication number: 20140040183
    Abstract: Provided are a method, computer program product, and system for processing a data management request. User intent that defines properties of target data is determined. Policies and constraints for the data management request are determined. An abstract data management request that identifies source data, the target data, and the polices and constraints is created. A technology to use to process the data management request based on the user intent, policies, and constraints is determined.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Holger Kache, Jacques J. Labrie, Veera Maddipati, Paulo R.R. Pereira, Alan P. Plante, Charles D. Wolfson
  • Publication number: 20140040210
    Abstract: Method, system, and computer program product to archive data objects, by providing an object store and a shadow object store each configured to store one or more data objects, the object store and the shadow object store residing in different storage devices, creating a first object stored in the object store, the first object having at least one attribute, and responsive to receiving a request to archive the first object, transferring the first object to the shadow object store, and creating, in the object store, a reference to a location of the first object in the shadow object store, the first object remaining accessible through the object store and the shadow object store following the transfer.
    Type: Application
    Filed: August 3, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kenytt Avery, Edward Bader, Kevin Trinh
  • Publication number: 20140040184
    Abstract: A computerized system provides automatic generation and sending of advice to a first predetermined individual to help that person's relationship with a second predetermined individual. The advice content is composed and tailored from pre-written text based on the answers to survey questions from those individuals. Also, a gift suggestion system provides gift recommendations to the first predetermined individual to give to the second predetermined individual. One or more distinct invited groups of friends, relatives, provide the recommendations.
    Type: Application
    Filed: August 1, 2012
    Publication date: February 6, 2014
    Inventor: Anne Benissan
  • Publication number: 20140040206
    Abstract: Pipelined data replication for disaster recovery is disclosed. An example pipelined data replication method for disaster recovery disclosed herein comprises sending replicated first data from a primary processing environment to a secondary processing environment for backup by the secondary processing environment, the replicated first data being a replica of first data in the primary processing environment, processing the first data in the primary processing environment prior to the backup of the replicated first data by the secondary processing environment being confirmed, and preventing a result of the processing of the first data from being released by the primary processing environment until the backup of the replicated first data by the secondary processing environment is confirmed.
    Type: Application
    Filed: August 2, 2012
    Publication date: February 6, 2014
    Inventors: Kadangode K. Ramakrishnan, Horacio Andres Lagar-Cavilla, Prashant Shenoy, Jacobus Van der Merwe, Timothy Wood
  • Publication number: 20140040257
    Abstract: Various embodiments illustrated and described herein provide include at least one of systems, methods, and software providing dashboard views of task activity data. Some embodiments include servicing dashboard view requests by retrieving a dashboard configuration that identifies at least one chart template of a chart to be included in the dashboard view and identifying user and activity data to populate respective charts generated based on the respective at least one chart templates. Such embodiments further include retrieving each of the at least one chart template and the respective user and user activity data to populate respective at least one chart. The retrieved chart templates are then processed to incorporate the respective user and user activity data into a respective chart rendering generated based thereon, and each chart rendering is added to a dashboard view data structure which may then be transmitted to a requestor for viewing.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: CA, Inc.
    Inventor: Rajesh Chandrasekaran
  • Publication number: 20140040200
    Abstract: A method includes receiving, at a mediation object in a target system, one or more replication requests from a source system, where the replication requests include requests to replicate data on the target system from one or more source objects located at the source system. The mediation object collects and stores data from the source objects of the source system as part of the replication requests. The mediation object determines when data from the source objects of the source system are complete and processes completed data from the source objects of the source system by distributing the data to one or more target objects in the target system.
    Type: Application
    Filed: August 3, 2012
    Publication date: February 6, 2014
    Applicant: SAP AG
    Inventors: Matthias Richter, Thomas Moser, Fabian Guenther
  • Publication number: 20140040189
    Abstract: Systems and methods are disclosed herein to a computer-implemented method for providing assistive technology, the method comprising receiving, by a computing device, a media file comprising an assistive media component configured to assist a user with viewing or hearing a particular content file being screened at a venue; receiving, by a computing device, an audio portion of the content file using an audio receiving device; determining, by a computing device, a time signature of the audio portion of the content file by performing sound processing on the received audio portion of the content file; synchronizing, by a computing device, the media file with the content file by matching a time synchrony track of the media file with the determined time signature of the content file; and outputting, by a computing device, the assistive media component included in the media file in synchronization with the content file.
    Type: Application
    Filed: August 3, 2012
    Publication date: February 6, 2014
    Inventor: Craig David CUTTNER
  • Publication number: 20140032606
    Abstract: Various embodiments include at least one of systems, methods, software, and data structures for creating, modifying, and presenting collapsible groups in graphical workflow models in workflow process applications. Some embodiments include providing a presentable workflow modeling user interface including a graphical model of a modeled workflow process including multiple elements and receiving data indicative of first input selecting at least two elements to be grouped. Such an embodiment may further include building a data structure representative of the at least two elements to be grouped, storing the data structure, and modifying the graphical model by replacing the at least two elements to be grouped with a single element representative of the grouping.
    Type: Application
    Filed: August 20, 2009
    Publication date: January 30, 2014
    Applicant: Adobe Systems Incorporated
    Inventors: Elham Chandler, Jingqi Xian
  • Publication number: 20140032481
    Abstract: Apparatus, systems, and methods may operate to add opaque state information to a data file that includes dynamic content and is organized according to a page descriptive format. The opaque state information can be referenced to a comment and a comment state selected from a plurality of states associated with the dynamic content. In some embodiments, the apparatus, systems, and methods may operate to access the data file and the opaque state information to recreate the comment state associated with the dynamic content. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: September 27, 2007
    Publication date: January 30, 2014
    Inventor: Grayson Squier Lang
  • Publication number: 20140032504
    Abstract: Based on events corresponding to operations performed with respect to a data store, a measure is computed that represents an instantaneous consistency level, at a point in time, of data that is subject to the operations.
    Type: Application
    Filed: July 30, 2012
    Publication date: January 30, 2014
    Inventors: Wojciech Golab, John Johnson Wylie
  • Publication number: 20140032600
    Abstract: A system and method for managing application(s)' access to personal data of an enterprise business partner is presented. The method includes selecting business partners having personal data records stored in a database connected to an enterprise computing system, for each particular business partner identifying each application that accesses the business partner's personal data records, inquiring from each identified application if it has reached an end-of-purpose period for the personal data records. If an end-of-purpose period has been reached receiving a start-of-retention-time from the application, storing the start-of-retention-time indication in a data record associated with the particular business partner, and blocking access by the particular application to the personal data records of the particular business partner.
    Type: Application
    Filed: July 26, 2012
    Publication date: January 30, 2014
    Inventors: Siar Sarferaz, Joerg Wiederspohn
  • Publication number: 20140032423
    Abstract: In one embodiment, a system and method is illustrated and includes receiving auditing data relating to a piece of digital content, associating the auditing data with the piece of digital content to create audited digital content, receiving a content request pertaining to the audited digital content from a requester, checking a permission associated with the audited digital content, the permission to determine an exchange basis upon which the audited digital content is provided to the requester, and where the exchange basis defines the condition upon which the audited digital content may be accessed, and providing the audited digital content to the requester according to the exchange basis.
    Type: Application
    Filed: September 3, 2010
    Publication date: January 30, 2014
    Applicant: Adobe Systems Incorporated
    Inventors: Michael Hopwood, Peter F. Ullmann
  • Publication number: 20140032491
    Abstract: Techniques for recovering from session failures between clients and database servers are described herein. A session may be established between a client and a first database server, and a transaction may be opened to process a plurality of database commands. One or more commands associated with the transaction may be received from the client at the database server. Each received command has an associated command identifier. A transaction log stores the command identifier associated with each received command and indicates whether each received command has been successfully executed at the database server. After a session failure, the session is reestablished, and a command identifier for a further command is received from the client. If the command identifier associated with the further command is determined to have been stored in the transaction log, the command does not need to be executed, and the transaction may continue.
    Type: Application
    Filed: July 27, 2012
    Publication date: January 30, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthew Alban Neerincx, Luiz Fernando Federico Dos Santos, Oleg Ignat, David Bruce Lomet, Quetzalcoatl Bradley, Raghu Ram, Chadwin James Mumford, Peter Gvozdjak, Balendran Mugundan
  • Publication number: 20140032503
    Abstract: A plurality of users may interact with a content distribution system in order to share digital media content. The system may receive, store, and/or publish a delivery specification that includes requirements relating to digital content that a first user wishes to receive. The delivery specification for the digital content may include one or more requirements of the digital content to be received. A second user who wishes to provide the digital content may access the delivery specification. The system provides for flexible validation of the media content from the second user. For example, validation may occur at device of the first user, at a device of the second user, and/or at a device of the content distribution system. Upon validation of the media content from the second user, the system may facilitate transfer of the media content from the second user to the first user.
    Type: Application
    Filed: July 30, 2012
    Publication date: January 30, 2014
    Applicant: Signiant Inc.
    Inventors: Michael Gregory Nash, Tony Vasile, Ian Kennedy Hamilton
  • Publication number: 20140032501
    Abstract: Apparatus, systems, and methods may operate to detect a plurality of changes to one of a database format and database content between a first version of a database and a second version of the database, and to transmit change information to a receiving entity, enabling display of the plurality of changes in at least one of a row-wise collective format, a column-wise collective format, a field-wise collective format, or a record-wise collective format. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: September 29, 2008
    Publication date: January 30, 2014
    Inventors: Marissa Dulaney, Robert Shaver
  • Publication number: 20140032578
    Abstract: A dynamic integration framework allows property data to be dynamically influenced by external data sources. In one example, a client services component receives, from a client application, a request to create or edit an object. The client services component retrieves, from a content repository, an initial property set applicable to the object. An external data service specifies an initial property modification set based on property dependencies between controlling property values and dependent properties. The external data service provides the property modifications to the client services component with an initial data identifier that indicates a state of the property modifications. The client services component merges the initial property modifications and the initial data identifier with the initial property set.
    Type: Application
    Filed: July 27, 2012
    Publication date: January 30, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David A. Hanson, Xin P. Lang, Wayne A. Malkin, Lauren A. Mayes, Evgeny Rozhdestvensky
  • Publication number: 20140032608
    Abstract: A system includes a database adapter. The database adapter is to interface an application to a database that the application is not configured to access. The database lacks support for database global temporary tables. The database adapter is to instantiate, in the database, a database session temporary table based on a call, received by the database adapter, to the database by the application to access a database global temporary table.
    Type: Application
    Filed: July 30, 2012
    Publication date: January 30, 2014
    Inventor: Gregory P. COMEAU
  • Publication number: 20140032513
    Abstract: In some example, a computerized method includes receiving a first electronic document and a second electronic document. The method also includes determining a difference between the first electronic document and the second electronic document based on matching of a component of the first electronic document to a component of the second electronic document in a hierarchical order. The method includes storing the difference in a machine-readable medium.
    Type: Application
    Filed: February 19, 2008
    Publication date: January 30, 2014
    Applicant: Adobe Systems Incorporated
    Inventor: Shawn A. Gaither
  • Publication number: 20140032570
    Abstract: Techniques for discriminative learning via hierarchical transformations. A method includes obtaining a model of a first set of data, two or more data transformations, and a second set of data, evaluating the two or more data transformations to determine which data transformation will most effectively modify the second set of data to match the model, and selecting the data transformation that will most effectively modify the second set of data to match the model based on the evaluation.
    Type: Application
    Filed: July 30, 2012
    Publication date: January 30, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasha P. Caskey, Dimitri Kanevsky, Brian Kingsbury, Tara N. Sainath, George Saon
  • Publication number: 20140032981
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for using an intermediate database management layer to manage communications between an application layer and a database layer. The database management layer can receive an initial communication from the application layer and transmit a subsequent communication to a particular database based upon a rule. The rules can specify the particular database based upon the initial communication and an availability status of the database. The rules specify criteria by which the initial communication is identified and logic specifying the particular database to receive the subsequent communication based upon the identification of the initial communication.
    Type: Application
    Filed: July 26, 2012
    Publication date: January 30, 2014
    Applicant: Apple Inc.
    Inventors: Shahid Ahmed, Blake R. Bauman, Hengki Suwandi, Mohit Gupta
  • Publication number: 20140032964
    Abstract: Techniques for recovering from session failures between clients and database servers are described herein. A session may be established between a client and a first database server to handle a database query for the client. A command of the session may be received by the first database server from the client. Data requested by the command may be retrieved. Prior to responding to the command, the data is spooled to a session state stored in a repository of the first database server, and the session state is replicated to one or more additional database servers. The session state stored in the repository of the first database server enables the first database server and client to recover from a failure of the session. The replicated session state enables the additional database server(s) to reestablish the session and respond to the command, instead of the first database server, if the session fails.
    Type: Application
    Filed: July 26, 2012
    Publication date: January 30, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthew Alban Neerincx, Luiz Fernando Federico Dos Santos, Oleg Ignat, David Bruce Lomet, Quetzalcoatl Bradley, Raghu Ram, Chadwin James Mumford, Peter Gvozdjak
  • Publication number: 20140032590
    Abstract: Technologies are described herein for implementing a windowed mid-tier data cache. A request is received for a data page comprising a set of data rows from a result set of a query in a database management system (“DBMS”). A determination is made whether the requested data rows exist in the mid-tier cache. If the requested rows exist in the cache, then the set of data rows is retrieved from the cache and the requested data page is returned. If the requested rows do not exist in the cache, a data chunk comprising a number of data rows from the result set larger than and encompassing the requested rows is requested from the DBMS. Upon receiving the data chunk, the data chunk is stored in the mid-tier cache, and the set of data rows are retrieved from the cache and the requested data page is returned.
    Type: Application
    Filed: July 27, 2012
    Publication date: January 30, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Russell Mark Sinclair, Saurin Bipin Shah, Nishant Kumar, Alexander Alexandrovich Spiridonov
  • Publication number: 20140032602
    Abstract: A system, method, and a computer program product for checking in-memory authorization profiles are disclosed. An authorization profile of a user in an enterprise resource planning system can be determined. An access to an in-memory database system can be requested based on the determined authorization profile. Based on the access request, an authorization check of the determined authorization profile of the user can be performed to determine whether the user can access the in-memory database system using the determined authorization profile. An access to the in-memory database system to the user can be granted based on the performed authorization check.
    Type: Application
    Filed: July 26, 2012
    Publication date: January 30, 2014
    Applicant: SAP AG
    Inventor: Hans-Christian Humprecht
  • Publication number: 20140025627
    Abstract: Techniques, an apparatus and an article of manufacture for targeted maintenance of computing devices in a system. A method includes assessing a maintenance request to determine a class of computing devices to which the request applies, selecting a propagation mechanism applicable to the class of computing devices, generating an agent based on the propagation mechanism to carry out the maintenance request on the class of computing devices, deploying the agent on at least one computing device in the class of computing devices, and propagating the agent to additional devices in the class of computing devices.
    Type: Application
    Filed: July 17, 2012
    Publication date: January 23, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kamal Bhattacharya, Anshu N. Jain, Suman K. Pathapati, Nidhi Rajshree
  • Publication number: 20140025643
    Abstract: A database management data processing system has been provided. The system can include a host computing system that includes at least one server with memory and at least one processor. The system further includes a database coupled to the host computing system and a database management system (DBMS) executing in the host computing system and managing access to the database through a statement table implemented as a triplestore. Finally, the system includes a triplestore management module coupled to the DBMS. The module includes program code enabled to retrieve from the triplestore a record for a number of rows provided for a common subject in order to validate consistency of data read from the statement table for the particular subject.
    Type: Application
    Filed: July 17, 2012
    Publication date: January 23, 2014
    Applicant: International Business Machines Corporation
    Inventors: Tim J. Baldwin, Amardeep Bhattal, Bernard Kufluk
  • Publication number: 20140025644
    Abstract: Mechanisms are provided for improving the efficiency of garbage collection in a deduplication system by intelligently managing storage of deduplication segments. When a duplicate segment is identified, a reference count for an already maintained segment is incremented only if the already maintained segment has the same lifecycle as the identified duplicate segment. In some instances, an already maintained segment is assumed to have the same lifecycle if it is not stale or the age is not significantly different from the age of the newly identified duplicate. If the already maintained segment is has a different lifecycle, the new segment is stored again even though duplicates are already maintained.
    Type: Application
    Filed: July 23, 2012
    Publication date: January 23, 2014
    Applicant: DELL Products L.P.
    Inventors: Mark Taylor, Goutham Rao, Vinod Jayaraman
  • Publication number: 20140025645
    Abstract: A method, a system and a computer program product for resolving conflicts between data for database integration. Data is integrated from first and second data sources to produce integrated data, and the presence of a conflict is determined between data from the first data source and data from the second data source, where one or more sets of prioritized policies for resolving conflicts is associated with data of the first and second data sources. A policy is selected from the set of prioritized policies associated with the conflicted data, where the selected policy is appropriate to resolve the conflict and includes the greatest priority. The selected policy is applied to resolve the conflict and to produce a resulting data value for the integrated data.
    Type: Application
    Filed: July 23, 2012
    Publication date: January 23, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kyle G. Brown, Rada Chirkova, Ioannis Viniotis
  • Publication number: 20140019490
    Abstract: Examples of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for event processing for graph-structured data can include storing graph structured data. The graph structured data includes a plurality of vertex, edge, and/or property graph elements. The example method further includes defining a first graph view of a characteristic of vertex, edge, and/or property graph elements. A subgraph is determined as a subset of the plurality of vertex, edge, and/or property graph elements that have the characteristic of vertex, edge, and/or property graph elements defined by the first graph view. The vertex, edge, and/or property graph elements of the subgraph are processed responsive to a predefined event that occurs on at least one of the vertex, edge, and/or property graph elements of the subgraph.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Inventors: Indrajit Roy, Alvin Au Young, Vanish Talwar, Michael Mihn-Jong Lee
  • Publication number: 20140019429
    Abstract: Extensions to an application programming framework, such as for example a database system, can allow individual parts of an application to be set to “read-only” during a lifecycle management event affecting the application programming framework. The application data for a newly deployed software version can thereby be adjusted without risk of inconsistencies due to parallel use by end-users. However, end-users can continue to work with the remaining application programming framework and even use certain parts of the application programming framework and underlying data in a “read-only” while these parts are currently under reconstruction as part of the lifecycle management event.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 16, 2014
    Inventors: Volker Driesen, Thomas Vogt, Martin Mayer, Andrey Engelko
  • Publication number: 20140019422
    Abstract: Techniques are provided for encoded data processing which allows for continuous data processing as encoded data changes. Data is decomposed into one or more blocks with each block containing at least one data record. At least one data record within a given block is encoded with a first encoding process selected from one or more encoding processes. The first encoding process is associated with the given data block. Techniques evaluate whether or not to implement an encoding change for a given block when updating a given data record in the given block. Responsive to the evaluation, the given block is re-encoded with a second encoding process. Responsive to the re-encoding, the association of the given block is updated. A map is formed to convert the given data record encoded with the first encoding process to the second encoding process so as to preserve comparative relationships of the given data record.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 16, 2014
    Applicant: International Business Machines Corporation
    Inventors: Hubertus Franke, Balakrishna R. Iyer, Hong Min, Terence P. Purcell, Guogen Zhang
  • Publication number: 20140019424
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium, and including a method are provided where the method includes receiving information from a web publisher related to a presentation of a web property responsive to a user request, the information including an identifier associated with the content presented and an identifier associated with the user that viewed the web property; validating the information, including comparing the information to a separate information source that is provided by the web publisher including determining when the information is properly encoded and/or formatted; and when the information is unable to be validated, storing a record indicative of any invalid information.
    Type: Application
    Filed: July 11, 2012
    Publication date: January 16, 2014
    Applicant: GOOGLE INC.
    Inventors: Eu-Jin Goh, Anusha Sriraman
  • Publication number: 20140019421
    Abstract: Systems, methods and computer-readable mediums are disclosed for a shared hardware and architecture for database systems. In some implementations, one or more source databases in a data warehouse can be backed up to one or more backup databases on network storage. During normal operating conditions, the backup databases are continuously updated with changes made to their corresponding source databases and metadata information for the database backup copies and database backup information are stored in a centralized repository of the system. When a source database fails (failover), the source database is replaced by its corresponding backup database on the network storage and the source database node (e.g., a server computer) is replaced by a standby node coupled to the network storage.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: APPLE INC.
    Inventor: Chandrasekaran Jagadeesan
  • Publication number: 20140019423
    Abstract: Tracking lineage of data. A method may be practiced in a network computing environment including a plurality of interconnected systems where data is shared between the systems. A method includes accessing a dataset. The dataset is associated with lineage metadata. The lineage metadata includes data indicating the original source of the data, one or more intermediary entities that have performed operations on the dataset, and the nature of operations performed on the dataset. A first entity performs an operation on the dataset. As a result of performing a first operation on the dataset, the method includes updating the lineage metadata to indicate that the first entity performed the operation on the dataset. The method further includes providing functionality for determining if the lineage metadata has been compromised in that the lineage metadata has been at least one of removed from association with the dataset, is corrupted, or is incomplete.
    Type: Application
    Filed: July 10, 2012
    Publication date: January 16, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Christian Liensberger, Rene J. Bouw, Ori Kashi
  • Publication number: 20140019492
    Abstract: Methods and apparatus for presenting a visualization of content and analytics data for content accessed from one or more devices, where the visualization includes a display of the content as it would appear on a given device. In some cases, an analytics visualization tool displays the content overlaid with analytics data specific to a device and to the content. Additionally, the analytics visualization tool may request a content page from a content server, where the request includes an indication of being a particular device, and in response, a content page is received formatted according to the particular device. The analytics visualization tool may then display the received content page along with analytics data that has been segmented according to the device and according to the content page.
    Type: Application
    Filed: December 22, 2011
    Publication date: January 16, 2014
    Inventors: Roger J. Woods, Matthew L. Freestone, Edward L. Hewett, Guillaume L. Escarguel
  • Publication number: 20140019418
    Abstract: A mobile communication device includes a temperature sensor configured to sense a temperature and a control unit configured to determine whether a change in the sensed temperature relative to a previously-sensed temperature corresponds to a critical time range. The control unit is also configured to store data in a data storage unit when it is determined that the change in the sensed temperature corresponds to the critical time range.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jean Chu, Susan L. Diamond, Peter B. Hom, Raghunandan Hulgundi, Jenny S. Li, Jing-Na Yuan
  • Publication number: 20140019405
    Abstract: Switching an active metadata node is disclosed. An indication that a standby metadata node of a distributed file system should replace an active metadata node of the distributed file system as a new active metadata node of the distributed file system is received. The standby metadata node is included in a server. A request that indicates that the standby metadata node would like to become an exclusive metadata node writer of a transaction log is sent. A confirmation that the standby metadata node is the exclusive metadata node writer of the transaction log is received. Based at least in part on the confirmation, an update that the standby metadata node has become the new active metadata node of the distributed file system is provided.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Inventors: Dhrubajyoti Borthakur, Dmytro Molkov, Hairong Kuang
  • Publication number: 20140012822
    Abstract: Sub-block partitioning for hash-based deduplication is performed by defining a minimal size and maximum size of the sub-block. For each boundary start position of the sub-block, starting a search, after the minimal size of the sub-block, for a boundary position of a subsequent sub-block by using multiple search criteria to test hash values that are calculated during the search. If one of the multiple search criteria is satisfied by one of the hash values, declaring the position of the hash value as a boundary end position of the sub-block. If the maximum size of the sub-block is reached prior to satisfying one of the multiple search criteria, declaring a position of an alternative one of the hash values that is selected based upon another one of the multiple search criteria as the boundary end position of the sub-block.
    Type: Application
    Filed: July 3, 2012
    Publication date: January 9, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lior ARONOVICH, Michael HIRSCH