Oracle International Corp Patent applications |
Patent application number | Title | Published |
20100281017 | Partition pruning via query rewrite - Systems, methods, and other embodiments associated with query pruning via query rewrite are described. One example method includes receiving a query on a partitioned table that will result in a first query plan that includes accessing a local domain index on each partition in the database. The query is rewritten to generate a second query that will result in a second query plan that includes accessing a global domain index instead of the local domain index on each partition in the database. | 11-04-2010 |
20100169306 | Type neutral container - Systems, methods, and other embodiments associated with an artifact type neutral container are described. This artifact type neutral container is achieved through an artifact type neutral architecture that is managed using a central type neutral registration mechanism. Queries are executed on type neutral registration tables to return data stores that store the artifacts found within a given artifact type neutral container. The data stores are queried to return the artifacts in the artifact type neutral container. The artifact type neutral container can be used in systems in which the artifact type neutral container and artifact data are stored in the same database as well as in systems in which the artifact type neutral container and artifact data are stored in different databases. | 07-01-2010 |
20100161645 | Change management - Systems, methods, and other embodiments associated with artifact type neutral change management are described. One example method includes maintaining an access table for each artifact in a collaborative software environment that records a most recent access of an artifact on a per user basis. An artifact type registration table is also maintained that maps each artifact type to the access table that records access information for artifacts of the given type and to a data store that stores artifacts of that type. For a given user, artifact pair, queries on the type registration table, access table, and data store are generated to return the last modification time for the artifact and the user's last access time for the artifact. This information is used to determine a change status of the artifact for the given user. This common framework can be used for artifacts of any type that are registered in the type registration table. | 06-24-2010 |
20100114966 | Security audit in user interface mode - Systems, methods, and other embodiments associated with a security audit performed on a displayed page generated from an executing application are described. One example method includes determining one or more current objects on the displayed page and determining access rights to the one or more current objects. The method may further include comparing access rights of the one or more current objects to access rights assigned to a user to determine accessible objects and non-accessible objects. The accessible objects and the non-accessible objects are visually distinguished on the displayed page. | 05-06-2010 |
20100114850 | Event recording with local event record locking - Systems, methods, and other embodiments associated with event recording are described. One example method includes locally locking a record in an event data store corresponding to an event having a same event type as a given event when a prior occurrence of the given event has not yet been recorded. The event data store is updated to record the given event while the record is locked. One example system includes an event data store configured to store records corresponding to events, an event recorder configured to record event data in the event data store and a local lock actuable by the event recorder. The event recorder is configured to update the locked record to correspond to a received event. | 05-06-2010 |
20100088251 | Business Process Diagram (BPD) component analysis - Systems, methods, and other embodiments associated with business process diagram (BPD) component analysis are described. One example method includes accessing a BPD having a BPD component for which a mapping to a business process execution language (BPEL) component is to be automatically produced by a computer. The example method may also include detecting a join gateway in the BPD. The example method may also include manipulating the mapping to identify that resolution of the join gateway is to be determined by gateway resolution upon determining that the join gateway is not going to receive a loop back edge. | 04-08-2010 |
20100042643 | Virtual masked database - Systems, methods, and other embodiments associated with virtual masked databases are described. One example system includes a masking logic to mask an unmasked column of a database table to produce a masked column. The masked column is then added to the database creating a bi-masked database. A portion of the bi-masked database is then selected by a view logic and provided to a user. The view provided to the user may allow fast, conflict free queries and updates to the database. By providing the user either masked or unmasked data based on information associated with the user, an added layer of data security may be achieved. | 02-18-2010 |
20100030795 | Maintaining referential integrity while masking - Systems, methods, and other embodiments associated with maintaining referential integrity while masking database columns are described. One example method includes determining a transitive closure for dependency relationships involving a column to be masked and other columns related to the column to be masked through a dependency relationship. The example method may also include identifying a root column for a column in the transitive closure and creating a mapping table that stores original values and masking values for the root column. The method includes masking the root column and related child columns based on the mapping table in a manner that maintains referential integrity between the root column and the child column. Integrity may be maintained by masking corresponding values in the root column and a child column(s) with identical mask values from the mapping table. | 02-04-2010 |
20090300654 | Collection access in a parallel environment - Systems, methods, and other embodiments associated with collection access are described. One example system includes a data store to store a set of listener object identifiers. A listener object identifier identifies a member of a set (or collection) of listener objects. A Listener object initiates an action in response to an occurrence of an event associated with a member of a set of external logics. A member of the set of external logics invokes a notify process to trigger actions. The example system may also include storing the listener object identifiers in an array to allow instances of the notify process to operate in parallel. | 12-03-2009 |
20090287720 | Cluster health indicator with dynamic load correlation - Systems, methods, and other embodiments associated with producing a proximity display of correlated load metrics associated with members of a cluster are described. One example method includes acquiring metrics data (e.g., load data) from nodes in a cluster. The example method may also include determining a cluster element state based on the metrics data and determining relationships between members of the set of related cluster elements. The method may also include identifying element metric representations for cluster elements based on cluster element states and identifying locations on a proximity display at which element metric representations are to be displayed. The locations may depend on relationships between cluster element states. The method may also include displaying element metric representations at the computed locations to produce a proximity display of correlated load metrics. | 11-19-2009 |
20090276269 | Software identifier based correlation - Systems, methods, and other embodiments associated with software identifier based correlation are described. One example system includes an identifier data store to store a first identifier that uniquely identifies a discovered instance of a software title installed in an enterprise. The first identifier is discoverable from the discovered instance and may be provided by a discovery logic. The second identifier identifies a known instance of a software title associated with the enterprise and is provided from an enterprise resource planning (ERP) data store by an ERP logic. The example system may also include a correlation logic to identify a correlation between the discovered instance and the known instance based on a relationship between the identifiers. The example system may also include an update logic to selectively update a value in the ERP data store based on the correlation. | 11-05-2009 |
20090271794 | Global avoidance of hang states in multi-node computing system - Systems, methods, and other embodiments associated with avoiding resource blockages and hang states are described. One example computer-implemented method for a clustered computing system includes determining that a first process is waiting for a resource and is in a blocked state. The resource that the first process is waiting for is identified. A blocking process that is holding the resource is then identified. A priority of the blocking process is compared with a priority the first process. If the priority of the blocking process is lower than the priority of the first process, the priority of the blocking process is increase. In this manner the blocking process can be scheduled for execution sooner and thus release the resource. | 10-29-2009 |
20090271361 | Non-repeating random values in user specified formats and character sets - Systems, methodologies, media, and other embodiments associated with producing non-repeating random values for use in data masking are described. One example method includes accessing data describing a mask for a value in a database table column to be masked. The example method may also include identifying a number of distinct values in the database table column to be masked and determining a field width for a mask to provide unique random numbers to mask the distinct values. The method may include identifying locations in a mask value to store the unique random value and locations in a mask value to store filler values. The mask value may include different character sets and may comply with user specified formats. The method may include generating a set of statements that when executed produce a mapping table that includes masks for distinct values in the database table column to be masked. | 10-29-2009 |
20090210458 | Tag based backup and recovery - Systems, methods, and other embodiments associated with selective tag-based file backup and recovery are described. One example method includes selectively tagging a file for inclusion in a snapshot-based backup image by associating a tag with the file. The associating may include encoding file metadata with a tag. The method may include selectively adding a file to the backup image upon determining that the file has experienced a write event and that the file is associated with a tag. The method may also include receiving a request to provide a recovery file from the backup image and selectively providing the recovery file upon determining that the recovery file is associated with a recovery tag specified in the request. | 08-20-2009 |
20090193054 | Tracking changes to a business object - Systems, methods, and other embodiments associated with database auditing are described. One example method includes generating a first extensible markup language (XML) document using data from a database object. A database object may include data from multiple relational data tables. The method includes generating a second XML document in response to an event causing a change to the database object. The method also includes comparing the first and second XML documents to identify changed values. The method also includes displaying the identified changes. | 07-30-2009 |
20090193049 | Electronic control batch record - Systems, methods, and other embodiments associated with batch process monitoring are described. One example method may include monitoring an external batch process (e.g. food manufacture, drug manufacture). The method may include collecting data (e.g. material usage, material yield, resource usage, quality results, process parameters, actions performed on batches) from the external batch process. The method may also include generating an XML document based, at least in part, on data collected from the external batch process. The contents of the XML document are to represent a required record that relates to a consumable product manufacturing event. In one example, the record may comply with Title 21 of the United States Code. | 07-30-2009 |
20090171971 | Server-centric versioning virtual file system - Systems, methods, and other embodiments associated with a server-centric virtual file system (VFS) that securely provides version control for file system objects associated with the VFS are described. One example system includes a VFS logic to provide virtual access to file system objects associated with a server. The VFS logic may receive a file handle from an NFS server in response to a VFS mount request made by a client computing system. The example system may also include a version logic that encodes a workspace identifier and a file system object identifier into the provided file handle. The version logic then provides file-handle based version control for the set of file system objects. | 07-02-2009 |
20090112795 | Query statistics - Systems, methods, and other embodiments associated with selectively acquiring and utilizing query statistics are described. One example method includes selectively acquiring statistics associated with search queries submitted to a search process during a sample period. The statistics may be associated with an index and tokens associated with the index and search queries. The method may also include selecting tokens and/or queries to optimize based, at least in part, on the statistics. In one example, whether and/or how the tokens and/or queries are optimized may depend on estimating index fragmentation based, at least in part, on the statistics. | 04-30-2009 |
20090106701 | Interactive Complex Event Pattern Builder and Visualizer - Systems, methods, and other embodiments associated with complex event pattern building are described. One example method includes receiving, on a server-side, requests associated with user interactions with interactive menus. The method includes responding to the requests with commands that build a set of event-condition-action, data that describes an action to take in response to an occurrence of a complex event pattern. The example method may also include automatically converting the event-condition-action data into a programmatic construct that configures a complex event pattern engine to initiate the specified action in response to detecting an occurrence of the complex event pattern. | 04-23-2009 |
20090100039 | Extensible mechanism for grouping search results - Systems, methods, and other embodiments associated with grouping automated search results are described. One embodiment includes a computer-readable medium storing computer-executable instructions operable to perform a method that includes identifying items to group. The method also includes selectively grouping a first item and a second item upon determining that a comparison of a metadata attributes indicates that the first item and the second item are to be treated as members of a group. | 04-16-2009 |
20090094010 | Three dimensional surface and solid query processing - Systems, methods, and other embodiments associated with determining whether geometries represented by geometry objects intersect are described. One example method recursively decomposes a higher order geometry (e.g., solid) into a set of lower order geometries (e.g., surfaces) and examines the lower order geometries, continuing the recursion until an intersection decision is reached. The example method includes accessing geometry objects and accessing a spatial index that stores MBVs associated with the geometry objects. The method includes extracting candidate pairs of intersecting features upon determining MBVs associated with the geometry objects intersect and providing the candidate features to a feature-feature logic. The method includes providing an intersection signal based on a features intersection signal provided by the feature-feature logic. | 04-09-2009 |