Systems and methods include creation of a first instance of a tenant object in a database instance, association of the first instance of the tenant object with a first plurality of database artifacts including first data associated with the first instance of the tenant object, creation of a second instance of the tenant object in the database instance, association of the second instance of the tenant object with a second plurality of database artifacts including second data associated with the second instance of the tenant object, and reception and response to queries on the first data associated with the first instance of the tenant object and to queries on the second data associated with the second instance of the tenant object.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 16/10 - Systèmes de fichiers; Serveurs de fichiers
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
Systems and methods include monitoring of one or more software applications to determine a value of a first metric associated with instances of a first process, the first process including steps executed by the one or more software applications, determination that the value of the first metric has exceeded a threshold associated with the first process in a first number of ongoing instances of the first process, determination that the first number is greater than a first count limit associated with the first process, and, in response to the determination that the first number is greater than the first count limit, sending of an error message to a user associated with each of the ongoing instances of the first process.
Technologies are described for routing structured query language (SQL) statements to elastic compute nodes (ECNs) using workload classes within a distributed database environment. The elastic compute nodes do not store persistent database tables. For example, a SQL statement can be received for execution within the distributed database environment. A workload class can be identified that matches properties of the SQL statement. Based on the workload class, a routing location hint can be obtained that identifies a set of elastic compute nodes. The SQL statement can then be routed to one of the identified elastic compute nodes for execution. Execution of the SQL statement at the elastic compute node can involve retrieving database data from other nodes which store persistent database tables.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
4.
QUERYING SEMANTIC DATA FROM UNSTRUCTURED DOCUMENTS
Disclosed herein are system, method, and computer program product embodiments for querying document terms and identifying target data from documents. In an embodiment, a document processing system may receive a document and a query string. The document processing system may perform optical character recognition to obtain character information and positioning information for the characters of the document. The document processing system may generate a two-dimensional character grid for the document. The document processing system may apply a convolutional neural network to the character grid and the query string to identify target data from the document corresponding to the query string. The convolutional neural network may then produce a segmentation mask and/or bounding boxes to identify the targeted data.
A method, a system, and a computer program product for decompressing data. One or more compressed blocks in a set of stored compressed blocks responsive to a request to access data in the set of stored compressed blocks are identified. String prefixes inside the identified compressed blocks are decompressed using front coding. String suffixes inside the identified compressed blocks are decompressed using a re-pair decompression. Uncompressed data is generated.
A computer implemented system and method of memory management for an in-memory database. The system implements a paged data vector using non- uniform compression of its chunks. In this manner, the system achieves greater compression than systems that use uniform compression.
G06F 16/20 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet de données structurées, p.ex. de données relationnelles
G06F 5/00 - Procédés ou dispositions pour la conversion de données, sans modification de l'ordre ou du contenu des données maniées
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
Disclosed herein are system, method, and computer program product embodiments for mitigating offline decryption attacks of ciphertext. An embodiment operates by inputting plaintext into an encryptor, writing ciphertext output from the encryptor into memory, inputting the ciphertext from memory into a noise generator, outputting ciphertext from memory to an output device in response to receiving a first timing signal from a timer, and outputting noise data generated by the noise generator to the output device in response to receiving a second timing signal from the timer. The output device may be a node in a distributed ledger, in some embodiments. The distributed ledger may include a blockchain, for example. Using techniques disclosed herein, encryption may be strengthened to thwart attempts by untrusted third-party attackers to crack encryption, e.g., of information that is sensitive and/or confidential, even when they use significant computational resources separate from host computers of legitimate parties.
Disclosed herein are embodiments for performing multi-version concurrency control (MVCC) in non-volatile memory. An embodiment operates by determining that an event occurred, wherein one or more write transactions to one or more records of a multi-version database that were pending prior to the event did not commit. The one or more write transactions are identified based on a commit value that was stored in the non- volatile memory prior to the event. A particular one of the identified uncommitted write transactions is selected. From the multi-version database, a first version of a record corresponding to the selected uncommitted write transaction that was not committed, and an earlier version of the record that was committed prior to the event are identified. A visibility of the record is set to indicate that the earlier version of the record is visible and the first version of the record is not visible.
The present disclosure involves systems, software, and computer implemented methods for data separation and write redirection in multi-tenancy database systems. One example method includes providing access to at least one application to a database system. A query is received from an application. A determination is made that the query is associated with a union view that provides unified access to a first read- only table in a shared database container and a first writable table in a tenant database container. A determination is made as to whether the query is a read query or a write query. In response to determining that the query is a read query, the query is processed using the union view. In response to determining that the query is a write query, the query is modified to use the first writable table and the query is processed using the writable table.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
A computer system is configured to provide a database system. The computer system comprises one or more processors, a primary database system implemented by the one or more processors, and a secondary database system implemented by the one or more processors. The secondary database system is configured as a hot-standby system for the primary database system. The secondary database system is capable of providing at least a minimum amount of essential functionality of the primary database system during a disruption to the primary database system. The primary database system is configured by programming instructions, executable on the computer system, to cause the one or more processors to determine from a query request from a client application directed to the primary database system that workload from a query may be shifted to the secondary database system and instruct the client application to direct the secondary database system to execute the query. Related apparatus, systems, techniques and articles are also described.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
Technologies are described for facilitating transaction processing within a database environment having first, second, and third database system nodes. In the database system, the first database system node receives from the second database system node a request to precommit a first database transaction. The first database system node stores information for the first database transaction that includes an indication that the second database system node coordinates the committing of the first database transaction. The first database system node receives from the third database system node a request to precommit a second database transaction. The first database system node stores information for the second database transaction that includes an indication that the third database system node coordinates the committing of the second database transaction.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
12.
SERVICES AND MANAGEMENT LAYER FOR DIVERSE DATA CONNECTIONS
A method relates to quality of services and management of diverse data connections to and from an application launched on a computing platform. The diverse types of data connections to and from the application may include, for example, one or more of HTTP, Web Services, OData/REST, OData/HTTP, SAP RFC, and SAP ALE types of data connections. The method includes providing a layer, in the computing platform, for quality of services and management of diverse types of data connections to and from the application and providing a common entry point to receive data destined for external receivers over the diverse types of data connections to and from the application.
H04L 69/14 - Protocoles multicanaux ou multi-liaisons
H04L 61/4535 - Répertoires de réseau; Correspondance nom-adresse en utilisant une plate-forme d'échange d'adresses qui établit une session entre deux nœuds, p.ex. des serveurs de rendez-vous, des gardes-barrières de protocoles d'initiation de session [SIP] ou contrôleurs d’accès H.323
13.
SYSTEMS AND METHODS FOR IN-MEMORY DATABASE PROCESSING
A system, a method, and a computer program product for in-memory database processing are provided. A business object is generated in a first system. The generated business object is replicated from the first system to a second system. A high performance application implementing the replicated business object is executed based on at least one system specific view.
Embodiments of the present disclosure may provide a system and method for processing an online transactional processing (OLTP) transaction on a column- based storage of a database. The method may include receiving a request of the OLTP transaction to access data on the column-based storage. A determination may be made whether a cache associated with the database includes column information for the OLTP transaction. If the cache includes the column information for the OLTP transaction, the method may include processing the OLTP transaction with the column information in the cache. If the cache does not include the column information for the OLTP transaction, the method may include selecting columns from the column-based storage of the database.
A method for managing personal data access in a multi-system landscape includes receiving at a first system in the multi-system landscape an end-of-purpose check result for a personal data record associated with a particular business partner, identifying other systems of the multi-system landscape that perform operations for the particular business partner if the end-of-purpose check result indicates a start-of- retention-time, transmitting requests to each of the identified systems to synchronously perform an end-of-purpose check of local personal data records associated with the particular business partner, and receiving end-of-purpose check results from each of the identified systems. The method further can include initiating a global blocking process for the particular business partner. A system for implementing the method and a non-transitory computer readable medium are also disclosed.
Systems and methods for retrieving, analyzing, and displaying summary analytics within a structured user interface framework are disclosed. The structured user interface can include an analysis digests section that includes and organizes individual discrete summary analytics in the form of analysis digests. Each analysis digests includes graphical and or alphanumeric visual representations of discrete analysis results according to analysis digest specifications associated with a particular user. An analysis digest section can include analysis digests selected by and/or associated with a particular user and/or analysis digests associated with a user associated with the particular user. Thus, through social networks, users may create and share analysis digests from within the structured user interface framework.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06Q 10/063 - Recherche, analyse ou gestion opérationnelles
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
17.
SYSTEM AND METHOD FOR PREDICTIVE NETWORK CONGESTION CONTROL
A method for predictive network congestion control may include receiving network traffic data of a network. The network traffic data may be indicative of a current level of use of the network. A predicted future level of use at the location of the network may be identified based on the received network traffic data and based on past network traffic data for the location of the network. A recommendation to alter the future level of use for the location may be generated. The recommendation may include a type of alert to transmit to devices of users in the location of the network. The recommendation may be transmitted to a network policy management server of the network
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p.ex. en réponse aux événements dans le réseau
H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources
H04L 47/762 - Contrôle d'admission; Allocation des ressources en utilisant l'allocation dynamique des ressources, p.ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par le réseau
A system and method of query processing in a multi-level storage system having a unified table architecture. A query is received by a common query execution engine connected with the unified table architecture, the query specifying a data record. The common query execution engine performs a look-up for the data record based on the query at the first level storage structure. If the data record is not present at the first level storage structure, the common query execution engine performs separate look-ups in each of the second level storage structure and the main store.
Method and system for removing sparse data in a response to a query to a multidimensional database by establishing a cross-tab with sparse data. After selecting a member in an axis of the cross-tab for sparsity removal, a first set expression on the orthogonal axis is selected in the context of the member. The context of the orthogonal axis is collected for generating a filter set expression with a data removal criteria, based on the collected context; and the query is submitted to the database with the filter set expression.
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/28 - Bases de données caractérisées par leurs modèles, p.ex. des modèles relationnels ou objet
20.
METHOD AND SYSTEM FOR SECURE PASSWORD/PIN INPUT VIA MOUSE SCROLL WHEEL
A method and system for inputting a character string using a handheld input device, such as a mouse wheel or touchpad. Signals are grouped depending on a change in direction, depressing the mouse button as an interrupt, holding a mouse button down, etc., and the groupings are translated into symbols. Translation can be pre-determined or from a mapping file. Symbols can be appended into a character string and provided as a password, PIN, credit card, account number, or as other sensitive data.
G06F 3/0354 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection des mouvements relatifs en deux dimensions [2D] entre le dispositif de pointage ou une partie agissante dudit dispositif, et un plan ou une surface, p.ex. souris 2D, boules traçantes, crayons ou palets
G06F 3/0362 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection des translations ou des rotations unidimensionnelles [1D] d’une partie agissante du dispositif de pointage, p.ex. molettes de défilement, curseurs, boutons, rouleaux ou bandes
G06F 21/83 - Protection des dispositifs de saisie, d’affichage de données ou d’interconnexion dispositifs de saisie de données, p.ex. claviers, souris ou commandes desdits claviers ou souris
21.
COMPUTER SYSTEMS AND METHODS FOR PROVIDING FAILURE PROTECTION
The present invention relates to a data processing system, such as a client- server system, that uses one or more Web services as potential replacements if the server computer and / or a component that is used by the server computer for providing a particular data processing service becomes unavailable.
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
H04L 67/02 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP]
H04L 69/329 - Protocoles de communication intra-couche entre entités paires ou définitions d'unité de données de protocole [PDU] dans la couche application [couche OSI 7]
H04L 69/40 - Dispositions, protocoles ou services de réseau indépendants de la charge utile de l'application et non couverts dans un des autres groupes de la présente sous-classe pour se remettre d'une défaillance d'une instance de protocole ou d'une entité, p.ex. protocoles de redondance de service, état de redondance de protocole ou redirection de service de protocole
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
22.
A DATA PROCESSING METHOD, SYSTEM AND COMPUTER PROGRAM
A data processing system, method and computer readable medium is disclosed. The data processing system, method and computer readable medium provide a first computer for entering data values into data entry fields of an electronic data entry form and for entering an identifier of web service. The first computer includes means for initiating data processing to be performed on the basis of entered data values. A second computer performs the data processing and sends the result of the data processing to a third computer. The web service is coupled to the third computer and receives signaling data that signals the scheduling, initiation and/or completion of the data processing step.
The Invention relates to a method for locking data objects in a computer system, the method comprising a first processing module requesting a lock service module to lock one or more (n) data objects for access for further data processing modules by creating one or more lock objects for the one or more data objects, said method further comprising: - the lock service receiving names of one or more (m) key fields of the one or more data objects to be locked; - the lock service receiving n values for each of the m key fields of n data objects to locked; - the lock service receiving a maximum number (k) of locks to lock the n data objects; - the lock service checking whether n < =k and in case yes, creating one or more lock objects comprising the m names and n values for the m key fields in case no, querying the n values of the m key fields and determining numbers (yl to ym) of different values (Val_1.1 to Val_m.ym) of the key fields 1 to m; - the lock service determining consecutively from a first to i-th field where i < =m until yl*...*yi > = k and in case the condition is satisfied, - creating one or more lock objects comprising the names of the key fields 1 to m and values Val_1.1 to Val_(i-1).y(i-1) for the key fields 1 to i-l and comprising wildcards for the remaining key fields.
The present invention relates to a method of displaying customising parameters of an application program, the customising parameters being stored in database tables, the method comprising: - execution of the application program, - acquisition of trace data during execution of the application program, the trace data comprising a path for each of the results provided by the application program, each path being descriptive of a sequence of database table entries of the database tables holding a sub-set of the customising parameters used for a calculation of the corresponding result, - displaying of the results, - interactively selecting one of the results for further analysis, - displaying the database table entries identified by the path of the selected one of the results.
A query transformation system for transforming nested aggregates in a query is provided. The query transformation system comprises a nested aggregate analysis module for analysing a query that is not supported by a target database system, and a nested aggregate transformation module for transforming the query into a semantically equivalent query that is supported by the target database system.
Methods and systems for managing marketing campaigns. A communication module is capable of executing a first step of a marketing campaign, and is capable of handling customer responses to the marketing campaign received through a variety of communication channels, regardless of which channel was used for contacting the customers. Customers may respond by email, telephone, fax, in person, through an internet site, by letter or by other modes of communication. An object generation module generates an object containing information from the response, uses the information to match the response with the marketing campaign, and links the object to the marketing campaign. A person may override the object generation module's matching by inputting the identity of another marketing campaign for matching. A campaign management module receives the object from the object generation module. A user may modify how the system matches responses with marketing campaigns.