Patent application number | Description | Published |
20080306752 | Method and system for automatic testing in a business scenario environment - A software tool for automatically executing relevant testing in an Application Platform. When an object in an Application Platform is changed, testing may be executed for the changed object as well as any related objects. | 12-11-2008 |
20080307407 | Method and system for automatically classifying and installing patches on systems - A tool for classifying and installing patches on terminals. Specifically, when a patch is designed, it may be automatically installed on a terminal if it does not have a direct impact on the terminal and is not in an area which relevant to the terminal user. | 12-11-2008 |
20090144721 | SYSTEM AND METHOD FOR PROVIDING SOFTWARE UPGRADES - A method and system provide a business scenario. The method includes executing a first deployment unit on a first application platform. The method includes replacing an original second deployment with an upgraded second deployment unit on an upgraded second application platform. The method includes executing the upgraded second deployment unit. The method including transmitting messages related to the business scenario over a communications link between the first deployment unit and the upgraded second deployment unit. The method includes storing master data related to the business scenario in a data storage. | 06-04-2009 |
20110087708 | BUSINESS OBJECT BASED OPERATIONAL REPORTING AND ANALYSIS - Methods and systems are described that involve holistic and flexible operational reporting that does not require transformation of the underlying model or data harmonization since all business data and business logic of standard business processes are modeled and exposed in a standardized way using domain specific language and the operational reports are modeled with the same meta-model as the business data. A user can simply create a given operational report by selecting needed reporting elements of one or more business objects, run the report, and see the results. | 04-14-2011 |
20120131101 | Cloud-Processing Management With A Landscape Directory - Disclosed are methods, systems, apparatus and products, including a method that includes maintaining data in a cloud landscape directory, including data regarding multiple individual landscapes. Each landscape of the multiple individual landscapes identifying at least a set of applications, the set of applications of at least one of the multiple individual landscapes including at least one cloud-based application available for cloud-processing. The at least one cloud-based application is associated with the at least one of the multiple individual landscapes and is available for access and use. The method also includes processing at least one of a plurality of service requests based, at least in part, on the data regarding the multiple individual landscapes maintained in the cloud landscape directory. | 05-24-2012 |
20120158966 | SHARED RESOURCE DISCOVERY, CONFIGURATION, AND CONSUMPTION FOR NETWORKED SOLUTIONS - A networked solution offering a software-based service via a networked architecture having a system landscape can discover a shared resource within the system landscape, for example by accessing a landscape directory comprising information about a plurality of shared resources available in the system landscape. The information about the discovered shared resource can include a second networked solution within the system landscape that has previously configured the discovered shared resource. Configuration settings can be retrieved for the discovered shared resource from the second networked solution. Using the retrieved configuration settings, a shared resource-specific communication channel can be determined for the networked solution to access the discovered shared resource in a peer-to-peer manner. A resource type-specific application programming interface can be provided to the software-based service to enable consumption of the discovered shared resource by the software-based service. Related methods, systems, and articles of manufacture are described. | 06-21-2012 |
20120166620 | SYSTEM AND METHOD FOR INTEGRATED REAL TIME REPORTING AND ANALYTICS ACROSS NETWORKED APPLICATIONS - Embodiments of the present invention may provide a system and method for providing real time analytics and reporting across networked applications. The real time analytics and reporting across networked applications may be provided by extending the reporting metadata and the corresponding design- and runtime-tools. Based on a cross NWAs MDAV-Definition, the corresponding metadata (subview and subquery definitions) may be generated and assigned to the corresponding NWA-Layer (NWA software component). At deployment and configuration time, the relevant views may be activated depending availability of underlying data. At runtime, an MDAV executer (e.g., a MDAV runtime engine) may run a distributed and optimized provisioning of reporting and analytics data. The data provisioning scheme may depend on selection parameters, filters, join conditions between parts in different NWAs, analytical functions defined in the report, and the locality of the data (local or remote). | 06-28-2012 |
20120167200 | SYSTEM AND METHOD FOR A BUSINESS DATA PROVISIONING FOR A PRE-EMPTIVE SECURITY AUDIT - Embodiments of the present invention may provide a system and method for business data provisioning for a pre-emptive security audit. In one aspect, a method embodiment may comprise the steps of identifying the business resources as expressed in business terms, ensuring that applications dealing with (parts of) the business resources are aware of the link to the resource, transmitting the information about the used business resources throughout the call stack up to the UI, making use of the highest access enforcement point possible where it can be ensured that access to the protected resource is only done through either authorized users or trusted code, and having this access enforcement point taken over by a framework to ensure adequate protection even in extensibility scenarios. | 06-28-2012 |
20130086174 | SYSTEMS AND METHODS FOR SENDING AND RECEIVING COMMUNICATIONS - A computer system includes instructions recorded on a computer-readable storage medium and executable by at least one processor. The computer system includes a process component of a first deployment unit and a component module. The process component has a handling module and an object module. The handling module is operatively coupled to the object module. The handling module is operatively coupled to the component module. The handling module is configured to receive a message from a second deployment unit. | 04-04-2013 |
20130086547 | REAL-TIME OPERATIONAL REPORTING AND ANALYTICS ON DEVELOPMENT ENTITIES - Methods and apparatus, including computer program products, are provided for reporting and analytics for development entities. In one aspect, there is provided a computer-implemented method. The method may include selecting a development entity model for generating a report including development information regarding the development entities corresponding to the selected model, the development entity model representing an element being developed for a system; configuring a report model for the selected development entity model to enable creation of the report model; and saving the report model for the selected development entity model, the saved report model stored with other report models defining other reports for operational business objects used in conjunction with the system. Related apparatus, systems, methods, and articles are also described. | 04-04-2013 |
20130097585 | PROFILE BASED VERSION COMPARISON - Various embodiments of systems and methods to compare different versions of a development object based on a version comparison profile are described herein. Identities of the different versions of the development object are received. Further, a version comparison profile and a corresponding profile definition associated with the development object are received. Furthermore, the different versions of the development object are compared to determine one or more differences based upon the received version comparison profile and the corresponding profile definition. The determined one or more differences between the different versions of the development object are returned. | 04-18-2013 |
20130125053 | DETERMINING SEMANTIC INFORMATION OF BUSINESS APPLICATIONS - Various embodiments of systems and methods to determine semantic information of a plurality of business applications are described herein. In one aspect, a selection of user interface elements of a first business application and a second business application of the plurality of business applications are received. Further, data processing paths to a business object field and a corresponding database table field associated with the user interface elements are identified. Furthermore, semantic information of the plurality of business applications is determined by grouping the identified data processing paths, which can be used for applications such as business application integration, business data migration and the like. | 05-16-2013 |
20130145371 | BATCH PROCESSING OF BUSINESS OBJECTS - A service consumer may define batch jobs (batch containers) in which business object methods can be invoked on business object instances. The invocations may be recorded. The service consumer may trigger batch execution to cause the business object instances to be modified in accordance with the recorded invocations. The batch job can be executed as a single transaction in a single process. The batch job can be partitioned into multiple transactions and processed by respective multiple processes. | 06-06-2013 |
20130167199 | On-Demand Authorization Management - Methods and apparatus, including computer program products, are provided for authorization management. In one aspect, there is provided a computer-implemented method. The method may include receiving a request to authorize at least one user to at least one module of a system; mapping the received request to a semantic tag; processing, based on the semantic tag, the request to authorize the at least one user to determine whether to grant the at least one user access to the at least one module; and sending a response to the request to authorize the at least one user, wherein the response is in accordance with the result of the processing. Related apparatus, systems, methods, and articles are also described. | 06-27-2013 |
20130339488 | ENTERPRISE SERVICES FRAMEWORK FOR MOBILE DEVICES - Methods and apparatus, including computer program products, are provided for a mobile enterprise services framework. The method may include receiving, at a mobile services interface, a request for a service to access a structured data, the mobile services interface providing an application at a mobile device with at least one of a create, a read, an update, and a delete of the structured data; determining, at the mobile services interface, whether a wireless connection is available to enable communication to a remote server including a remote repository storing the structured data; and processing, at the mobile services interface, the request for the service locally by accessing a cached version of the structured data at the mobile device, when the wireless connection is not available to enable communication to the remote server including the remote repository storing the structured data. Related systems, methods, and articles of manufacture are also disclosed. | 12-19-2013 |
20130346152 | DETERMINING CUSTOMER GROUPS FOR CONTROLLED PROVISION OF OFFERS - A controlled and optimal provision of offers to customers on associated products is described. A three dimensional matrix characterizes product, customer, and time dimensions. Each product is associated with volume constraint(s). The three dimensional matrix is populated with scores. A score characterizes likelihood of a customer to purchase a corresponding product in an associated time period. First pairs of products and customers are randomly selected. The scores associated with the first pairs are changed to zero. Using volume constraints, an optimization is performed that excludes customers of the first pairs from a provision of best offers so that those customers are provided alternate offers. Based on the volume constraints, second pairs of products and customers are selected. The scores associated with the second pairs of products and customers are changed to one. Using volume constraints, optimization is performed such that customers of the second pairs are always provided best offers. | 12-26-2013 |
20140006000 | BUILT-IN RESPONSE TIME ANALYTICS FOR BUSINESS APPLICATIONS | 01-02-2014 |
20140172409 | COMMON MULTI-LANGUAGE TEXT MANAGEMENT IN A BUSINESS-ORIENTED SOFTWARE FRAMEWORK - A system, a method, and a computer-program product for providing multi-language support in applications are disclosed. A first textual expression contained within an application is obtained. The first textual expression is expressed in a first language. A unique key from a hash of the first textual expression is generated. A language code representative of a second language is determined. Based on the generated unique key and the determined language code, a second textual expression in the second language representative of a translation from the first language into the second language indicated by the language code is determined. The second textual expression is provided to the application to replace the first textual expression in a view presented to a user. | 06-19-2014 |
20140181004 | Common Framework for Definition, Generation, and Management of Metadata Runtime-Loads - A system, a method, and a computer-program product for management of runtime-loads in business process applications are disclosed. Metadata associated with an application is identified. The metadata is configured to enable loading during a runtime of the application and is stored on at least one node in a metadata repository. A runtime-loading structure for loading the metadata during the runtime of the application is generated based on the identified metadata. The runtime-loading structure contains an identification of the at least one node storing the identified metadata in the metadata repository. The identified metadata is loaded based on the generated runtime-loading structure during the runtime of the application. | 06-26-2014 |
20140358646 | GAMIFICATION OF A NEW HIRE ONBOARDING PROCESS - The subject matter disclosed herein provides methods for monitoring the performance of activities by new and existing employees during the onboarding process using a virtual credit system. This method may maintain one or more new employee profiles and existing employee profiles. The new employee profile may include a new employee credit balance, and the existing employee profile may include an existing employee credit balance. The method may track one or more activities. Each activity may be associated with a credit value. Data indicating the performance of an activity by the new employee or existing employee may be received. At least one of the new employee profile or the existing employee profile may be updated based on the received data. The updating may adjust at least one of the new employee credit balance and the existing employee credit balance. Related apparatus, systems, techniques, and articles are also described. | 12-04-2014 |
20140372981 | AUTOMATIC CONFIGURATION OF MOBILE PROGRAMS - The subject matter disclosed herein provides methods for automatically configuring a mobile program based on a customer's access to one or more applications. This method may maintain metadata for a mobile program in a directory. The mobile program may be configured to provide one or more services when installed on a mobile device. Each service may be associated with one or more applications. Customer landscapes identifying applications accessible by a customer may be maintained in the directory. A program identifier may be received from a mobile device of the customer. The program identifier may identify a mobile program installed on the customer's mobile device. A configuration file may be generated based on the received program identifier and transmitted to the customer's mobile device. Related apparatus, systems, techniques, and articles are also described. | 12-18-2014 |
20150032655 | Facilitating Introductions During The Onboarding Process Using A Mobile Device - The subject matter disclosed herein provides methods for facilitating introductions with new employees using a mobile application. The method may maintain profiles that include one or more new employee and existing employee profiles. The profiles have identifiers that identify the employees. A first request may be received from a mobile program running on a first mobile device of a first employee when the first mobile device is within a predetermined distance of a second mobile device of a second employee. The first request may include an identifier associated with the second employee. A profile of the second employee may be accessed based on the identifier to determine whether the second employee is a new or an existing employee. A notification may be sent to the mobile program running on the first mobile device based on the determination. Related apparatus, systems, techniques, and articles are also described. | 01-29-2015 |
Patent application number | Description | Published |
20100088391 | BACKEND SERVICE ADAPTATION - A request originating at a frontend server for data encapsulated in a plurality of business objects is received. The plurality of business objects are stored in a business object layer at the backend server remote from the frontend server. In addition, the request originates from a user interface layer is received at a controller layer. A controller object is instantiated in the controller layer at the backend server. Nodes of the controller object are mapped to nodes in the plurality of business objects so that the controller object encapsulates the request data. Thereafter, transmission of data response to the request encapsulated by the controller object to the frontend server is initiated. Related apparatus, systems, techniques and articles are also described. | 04-08-2010 |
20100169387 | ANALYTICS ENABLEMENT OBJECTS - A method and system, the method may include generating a change notification in response to a change of at least one attribute associated with at least one node of a host business object (BO); and updating, based on the generated change notification, an analytic enablement object (AEO) class of business object having derived attributes based on the at least one attribute of the host BO and representing transformations of the at least one attribute. | 07-01-2010 |
20130166603 | CONSUMER-RELATED SPECIALIZATION OF METADATA MODELS BASED ON A TEMPLATE-PROJECTION APPROACH - The present description refers to a computer implemented method, computer program product, and computer system for receiving a metadata model template that generically defines structure and behavior for a plurality of metadata models, the metadata model template including a union of the attributes and services needed by runtime engines associated with any of the metadata models, receiving a first runtime engine-specific projection definition that identifies a first subset of the attributes that have been selected and the services that have been enabled for a first runtime engine, and generating a first metadata model projection based on the metadata model template and the first runtime engine-specific projection definition, the first metadata model projection associated with the first runtime engine. | 06-27-2013 |
20130174181 | FRONTEND - BACKEND COMMUNICATION DECISION BASED ON BUSINESS OBJECT METADATA - The present description refers to a technique for providing a user interface from a runtime user interface (UI) application running on a frontend server to a client application, receiving, by the runtime UI application from a business application running on a backend server, a business object that includes metadata associated with the user interface, receiving, by the runtime UI application from the client application, user input associated with a business transaction, the user input including an input of a first field for the user interface, determining, by the runtime UI application based on the business object, whether processing by the business application of the first field input is required to determine and output to the client application an updated second field of the user interface before completion of the business transaction, and triggering a round-trip communication between the runtime UI application and the business application based on the determining. | 07-04-2013 |
20130326470 | DOMAIN-SPECIFIC GENERATION OF PROGRAMMING INTERFACES FOR BUSINESS OBJECTS - A code generator may determine an object metadata model which defines structures and behaviors of objects adapted for use in at least one software application, where the code generator includes an object analyzer configured to determine at least one object instance of the object metadata model, a domain analyzer configured to determine a domain associated with the at least one object instance, and a template selector configured to select a domain-specific code template based on the domain. The code generator may generate a domain-specific application program interface (API) configured to facilitate interactions of the at least one object instance during execution of the at least one software application, using the domain-specific code template. | 12-05-2013 |
20140012799 | MOBILE DEVICE ANALYTICS ENGINE - A mobile computing platform for a mobile device, which has an interface for a remote connection to a backend server, includes a mobile analytics engine. The mobile analytics engine is configured to implement a mobile analytics model, which defines data, query and report structures for analytics of business data stored on the backend server. The mobile analytics engine uses model metadata to provide a generic reporting and analytics interface to support diverse mobile business analytics applications. | 01-09-2014 |
20140025441 | PEER SUPPORT GAMIFICATION BY APPLICATION KNOWLEDGE SCORING IN SOCIAL NETWORKS - A computer-implemented method tracks users' operation of individual components of a business application over time and stores tracking data on ways in which different users operate individual components of the business application in a user history database. The method further includes evaluating the stored tracking data in the user history database to determine each user's knowledge and proficiency in operating a particular component of the business application, and accordingly, assigning a proficiency score to each user for knowledge and proficiency in operating the particular component of the business application. | 01-23-2014 |
20140039968 | INTEGRATION OF MODELED COLLABORATION STREAM IN BUSINESS PROCESS FLOW - In accordance with aspects of the disclosure, a system and methods are provided for managing a business process flow based on business process constraints for structured business activities and collaborative process demands for unstructured business activities while maintaining a collaboration stream between the structured and unstructured business activities. The systems and methods may include integrating a collaboration business process integration model with a collaboration metadata model by aligning the business process constraints for the structured business activities with the collaborative process demands for the unstructured business activities. Further, the systems and methods may include scheduling a sequence of structured business activities based on the business process constraints for the structured business activities and the collaborative process demands for the unstructured business activities while maintaining the collaboration stream between the structured and unstructured business activities. | 02-06-2014 |
20140137075 | DEVELOPMENT OF BUSINESS APPLICATIONS - In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be provided for defining security relevance for data types associated with business objects, defining security rules for the data types associated with the business objects, and defining validation and test fulfillment of the security rules by providing one or more security runtime modules for each security rule defined by the security rules handler to ensure validation and test fulfillment of each security rule. | 05-15-2014 |
20140164933 | SMART USER INTERFACE ADAPTATION IN ON-DEMAND BUSINESS APPLICATIONS - In one aspect, there is provided a method. The method may include monitoring a process including a plurality of user interfaces, at least one of the user interfaces representing a notification of a task to be completed and at least another user interface representing information associated with an action corresponding to the notification; determining whether at least a portion of the process is a candidate for adaptation; and adapting the process by combining a first portion of the at least one of the user interface representing the notification of the task and a second portion of the at least other user interface representing the information associated with the action. Related systems, methods, and articles of manufacture are also disclosed. | 06-12-2014 |
20140195908 | UNIFORM VALUE HELP AND VALUE CHECK - In one aspect, there is provided a method for value help and check. The method may include receiving an indication associated with a user interface element, the indication representing a value help request for the user interface element; sending a request for a value help to a value help business object configured to provide the value help to a user interface including the user interface element, the user interface element bound to a portion of the value help business object; and receiving, at the user interface comprising the user interface element, a response to the request, the response comprising the value help. Related systems, methods, and articles of manufacture are also disclosed. | 07-10-2014 |
20140366002 | SEARCHING FOR AN ENTITY MOST SUITED TO PROVIDE KNOWLEDGE REGARDING AN OBJECT - In some example implementations, there is provided a method. The method may include receiving a message from a user interface, the message representing a request for an identity of an entity having information regarding a component of a system being developed; determining whether a cache includes the identity of the entity having the information regarding the component; accessing, from at least a repository, metadata including at least one of a version information for the component and an organization structure information, when the cache does not include the identity of the entity having the information regarding the component, and determining, based on the accessed metadata, the entity, when the cache does not include the identity of the entity having the information regarding the component. Related systems, methods, and articles of manufacture are also provided. | 12-11-2014 |
20150178332 | TRANSFORMATION OF DOCUMENT FLOW TO CONTRIBUTORS NETWORK - Systems and methods are disclosed for processing data in an application platform. The method may include receiving at runtime a request for data about contributors to at least one document. Data may be determined for a set of contributors to the at least one document. The data for the set of contributors may be transformed based on at least one transformation rule. The transformed data for the set of contributors may be communicated in response to the request. The request may include context data indicating one or more of a user of a computing device, a user session of the computing device, a currently active application on the computing device, and an active screen of the computing device. The determining the data may include identifying, using at least some of the context data, a document associated with the currently active application. | 06-25-2015 |
Patent application number | Description | Published |
20100125600 | PERFORMANCE OPTIMIZED RETRIEVE TRANSFORMATION NODES - Systems, methods, computer program code, and means are provided for processing retrieve requests received in a business software system. Pursuant to some embodiments, a retrieve request is processed by identifying that the requested node is a retrieve transformation node, determining that the node relates to one of a currently selected business object and a secondary business object, and retrieving the node data from one of a persistence buffer and a secondary buffer based on the determining. | 05-20-2010 |
20100161648 | FLEXIBLE MULTI-TENANT SUPPORT OF METADATA EXTENSION - A system may include reception, from a client, of a request for access to an instance of an object model, identification of extension metadata associated with the object model and associated with the client in a metadata repository, identification of client-independent metadata of the object model in the metadata repository, merging of the client-independent metadata and the extension metadata associated with the client to create a merged object model, and access of the instance based on the merged object model. | 06-24-2010 |
20100161675 | PUBLIC SOLUTION MODEL IN AN ENTERPRISE SERVICE ARCHITECTURE - A computer-implemented system may include an application platform comprising a platform model of a plurality of business objects, each of the business objects comprising a model of data and associated logic, and a public solution model comprising a subset of the platform model. The system may also include a business application, wherein a data model and access logic of the business application are defined based on the public solution model, and wherein the application platform is to provide services to the business application based on the data model, the access logic and the platform model. | 06-24-2010 |
20100161676 | LIFECYCLE MANAGEMENT AND CONSISTENCY CHECKING OF OBJECT MODELS USING APPLICATION PLATFORM TOOLS - A method includes a data structure comprising a status and action management schema associated with an object model development lifecycle. A status and action management service operates to determine a lifecycle state of a first object model based on the status and action management schema, receive a request to perform a lifecycle action on the first object model, determine, based on the lifecycle state and the status and action management schema, whether the lifecycle action is allowed to be performed, and, if so, allow the lifecycle action to be performed. | 06-24-2010 |
20100161682 | METADATA MODEL REPOSITORY - A system includes a data structure comprising a business object metadata model describing a generic business object model, executable program code of a transactional service to create a second data structure comprising a specific business object model based on the business object metadata model, and a persistent storage to store the second data structure comprising the specific business object model. Some aspects include creation of an electronic data structure comprising a business object metadata model describing a generic business object model, execution, using a processor, of program code of a transactional service to create a second electronic data structure comprising a specific business object model based on the business object metadata model, and storage of the second electronic data structure comprising the specific business object model in a persistent storage. | 06-24-2010 |
20120159446 | VERIFICATION FRAMEWORK FOR BUSINESS OBJECTS - The present disclosure involves systems, products, and methods for automatically testing and verifying business objects. One method includes operations for identifying a modified business object for testing and verification; retrieving a set of metadata associated with the identified modified business object, the set of metadata retrieved from a metadata repository and including at least one core service performed by the identified modified business object; identifying at least one verification procedure associated with at least one of the core services operable to be performed by the identified modified business object; executing each of the at least one identified verification procedures; and determining whether execution of at least one of the identified verification procedures failed. | 06-21-2012 |
20120166984 | SYSTEM AND METHOD FOR MODIFYING USER INTERFACE ELEMENTS - The present disclosure involves systems, products, and methods for modifying elements within a user interface (UI). One method includes operations for identifying an instance of a UI text element for modification within a UI associated with a software application, wherein the UI is displayed to at least one user; retrieving a set of metadata associated with the identified instance of the UI text element, where each instance of the UI text element is associated with the retrieved set of metadata; receiving at least one modification to the retrieved set of metadata associated with the identified instance of the UI text element; and persisting the modified set of metadata associated with the UI text element. | 06-28-2012 |
20120322470 | Generic Business Notifications for Mobile Devices - The present disclosure involves systems and computer-implemented methods for providing generic push notifications to mobile devices. One process includes monitoring at least one business process for an occurrence of a triggering event. In response to the occurrence of the triggering event, at least one parameter associated with the particular triggering event is identified. A user associated with the at least one business process and the particular triggering event is identified, and a message for the user is generated, where the generated message identifies a mobile business application associated with the particular triggering event and includes the at least one identified parameter. The generated message can then be sent to a mobile device associated with the user. In some instances, the generated message may be an SMS message, and can include embedded code to allow the mobile device to launch the identified mobile business application. | 12-20-2012 |
20130042219 | Automated Support for Distributed Platform Development - The present disclosure describes methods, systems, and computer program products for semantically analyzing modeled objects. One method includes identifying an object model created in a distributed development system for semantic analysis, where the distributed development system is associated with a software platform. The identified object model is then semantically analyzed based on a predetermined algorithm. A set of at least one pre-existing object models associated with the software platform is compared to the semantically analyzed object model, and a level of semantic overlap between the semantically analyzed object model and each of the set of at least one pre-existing object models is determined. In some instances, the predetermined algorithm may be selected based on and correspond to the object model type of the identified object model. The set of at least one pre-existing object models may comprise a subset of pre-existing object models available in a development system or associated with a software platform. | 02-14-2013 |
20130046894 | MODEL-DRIVEN REST CONSUMPTION FRAMEWORK - The present disclosure describes methods, systems, and computer program products for implementing web services. One method includes identifying a REST service for integration with a business application, identifying a set of metadata associated with the REST service, and generating a REST client proxy object associated with the REST service for use in consuming the REST service with the business application, where an instantiation of the REST client proxy object is consumable via the business application. In some instances, the method may include consuming the REST service using an instantiation of the generated REST client proxy object associated with the REST service. Further, the identified set of metadata associated with the REST service may include a service structure document and a metadata document. Generating the REST client proxy object may include generating at least one business configuration object and/or at least one authentication proxy artifact associated with the REST service. | 02-21-2013 |
20130144918 | MOBILE METADATA MODEL REPOSITORY - A system includes creation of a first data structure defining a generic business object model in a storage medium of a first device, creation of a second data structure defining a specific business object model in the storage medium of the first device, where the specific business object model being an instance of the generic business object model, reception of the second data structure defining the specific business object model at a mobile device, and storage of the second data structure in a storage medium of the mobile device. | 06-06-2013 |
20130144945 | ESTABLISHING BUSINESS NETWORKS USING A SHARED PLATFORM - The present disclosure describes methods, systems, and computer program products for establishing business networks based on shared usage of a common platform. One process includes receiving a set of registry data associated with a collaboration system from a first network participant executing a first application based on a first application platform. A request from a second network participant executing a second application on a compatible platform to the first application platform to access the set of registry data from the first network participant is received. Access is provided to the second network participant of a subset of data shared by the first network participant for collaboration. In some instances, providing access to the second network participant can include identifying a user associated with the second network participant to provide data access with the first network participant and assigning corresponding access authorizations to development entity instances associated with the identified user. | 06-06-2013 |
20130318061 | SHARING BUSINESS DATA ACROSS NETWORKED APPLICATIONS - The present disclosure describes methods, systems, and computer program products for sharing business data across networked applications. The method for sharing business data across networked applications can include receiving a request associated with data object instance via a first business application. The data object instance is of a specific data object type. A second business application is identified as an assigned master business application associated with the requested data object instance. The first business application and the second business application are based on a common application platform. Data associated with the requested data object instance is accessed at the second business application. | 11-28-2013 |
20130324201 | APPLYING GAMIFICATION TECHNIQUES TO PROCESS INCIDENTS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for applying gamification techniques to process incidents. A gamification environment to process service incidents received at a service management computer system is developed based on skills of service incident processors who process service incidents and a respective level for each incident processor's skill. The gamification environment is provided to process service incidents received at the service management computer system from, for example, a customer organization. When a service incident is received, tasks to be performed to resolve the incident and one or more service incident processors who possess the skill at the level to perform the tasks are identified. The service incident is identified to the identified processors who resolve the incident. Once resolved, one or more of the identified incident processors are assigned a credit determined based on the service incident. | 12-05-2013 |
20140136668 | REAL-TIME SELF-OPTIMIZING SYSTEM FOR MULTITENANT BASED CLOUD INFRASTRUCTURE - A self-optimizing business software system, based on a multi-tenant database, is aware of the technical configuration of the system. Based on configurable key performance indicators, an optimizer is controlling, diversifying, and observing the system configuration and system execution to find the optimal technical configuration by using simulation streams, which run parallel to the production streams. | 05-15-2014 |
20140156724 | PROPAGATION AND ADOPTION OF EXTENSIONS ACROSS APPLICATIONS IN NETWORKED SOLUTIONS - The present disclosure describes methods, systems, and computer program products for adoption of an extension of a service across networked applications. One process includes receiving, by a target platform operating a target networked application, a data package associated with the extension, the data package comprising data specifying the service to be extended and information associated with a technology of a source platform at which the data package was created, extracting a portion of the data from the data package, and implementing the extracted portion of the data in the service of the target application. | 06-05-2014 |
20140165150 | CONFIGURING AND MONITORING A SINGLE SIGN-ON SYSTEM - The disclosure generally describes computer-implemented methods, software, and systems for cloud-based single sign-on (SSO) capabilities. A computer-implemented method includes operations for identifying a first system for single sign-on capabilities, identifying a second system disparate from the first system for providing a single sign-on capability with the first system through a cloud-based SSO configuration manager, automatically accessing metadata associated with the sign-on information of the second system, the set of metadata identifying sign-on-related information for sharing at least one credential/certificate for logging in to the second system, using the metadata to obtain an authorization for a single sign-on between the first and second systems, receiving a request from the first system for authorization at the second system, and, in response to the request, providing the authorization and creating a cloud-based SSO system that includes the first and second systems. | 06-12-2014 |
20140372550 | METADATA-DRIVEN DYNAMIC LOAD BALANCING IN MULTI-TENANT SYSTEMS - The disclosure generally describes computer-implemented methods, computer program products, and systems for providing metadata-driven dynamic load balancing in multi-tenant systems. A computer-implemented method includes: identifying a request related to a model-based application executing in a multi-tenant system associated with a plurality of application servers and identifying at least one object in the model-based application associated with the request. At least one application server is identified as associated with a locally-cached version of a runtime version of the identified object, and a determination of a particular one of the identified application servers to send the identified request for processing is based on a combination of the availability of a locally-cached version of the runtime version at the particular application server and the server's processing load. The request is then sent to the determined application server for processing. | 12-18-2014 |
20150081744 | METADATA MODEL REPOSITORY - A system includes a data structure comprising a business object metadata model describing a generic business object model, executable program code of a transactional service to create a second data structure comprising a specific business object model based on the business object metadata model, and a persistent storage to store the second data structure comprising the specific business object model. Some aspects include creation of an electronic data structure comprising a business object metadata model describing a generic business object model, execution, using a processor, of program code of a transactional service to create a second electronic data structure comprising a specific business object model based on the business object metadata model, and storage of the second electronic data structure comprising the specific business object model in a persistent storage. | 03-19-2015 |
Patent application number | Description | Published |
20150322511 | DETECTION OF DNA THAT ORIGINATES FROM A SPECIFIC CELL-TYPE - The present invention relates to methods to detect an amount of DNA that originates from cells of a given type, where the sample comprising such DNA in admixture with DNA that does not originate from such cells. Such methods are based on differential methylation, at certain regions, of the DNA that originates from the given type of cells compared to the admixed DNA. Such methods have particular application in the detection, from a biological fluid from a pregnant female, of cell free DNA that originates from a foetus or the placenta of a foetus, or the detection, from a biological fluid from an individual, of cell free DNA that originates from cells of a tumour. Accordingly, such methods have diagnostic, prognostic and/or predictive utility for detecting an increased risk of an individual suffering from or developing a medical condition such as preeclampsia or cancer, and/or to aid subsequent diagnostic, prognostic and/or predictive methods such as the detection of chromosomal trisomy in a foetus, including for twin-pregnancies. The present invention also relates to compositions, kits, computer program products and other aspects that are used in, useful for or related to the practice of such methods. | 11-12-2015 |
20150322512 | MULTIPLEX DETECTION OF DNA THAT ORIGINATES FROM A SPECIFIC CELL-TYPE - The present invention relates to methods to detect an amount of DNA that originates from cells of a given type, where the sample comprising such DNA in admixture with DNA that does not originate from such cells. Such methods are based on different methylation, at certain regions of the DNA that originates from the given type of cells compared to the admixed DNA. Such methods have particular application in the detection, from a biological fluid from a pregnant female, of cell free DNA that originates from a foetus or the placenta of a foetus, or the detection, from a biological fluid from an individual, of cell free DNA that originates from cells of a tumour. Accordingly, such methods have diagnostic, prognostic and/or predictive utility for detecting an increased risk of an individual suffering from or developing a medical condition such as preeclampsia or cancer, and/or to aid subsequent diagnostic, prognostic and/or predictive methods such as the detection of chromosomal trisomy in a foetus, including for twin-pregnancies. The present invention also relates to compositions, kits, computer program products and other aspects that are used in, useful for or related to the practice of such methods. | 11-12-2015 |
20150322513 | MULTIPLEX DETECTION OF DNA THAT ORIGINATES FROM A SPECIFIC CELL-TYPE - The present invention relates to methods to detect an amount of DNA that originates from cells of a given type, where the sample comprising such DNA in admixture with DNA that does not originate from such cells. Such methods are based on differential methylation, at certain regions, of the DNA thst originates from the given type of cells compared to the admixed DNA. Such methods have particular application in the detection, from a biological fluid from a pregnant female, of cell free DNA that originates from a foetus or the placenta of a foetus, or the detection, from a biological fluid from an individual, of cell free DNA that originates from cells of a tumour. Accordingly, such methods have diagnostic, prognostic and/or predictive utility for detecting an increased risk of an individual suffering from or developing a medical condition such as preeclampsia or cancer, and/or to aid subsequent diagnostic, prognostic and/or predictive methods such as the detection of chromosomal trisomy in a foetus, including for twin-pregnancies. The present invention also relates to compositions, kits, computer program products and other aspects that are used in, useful for or related to the practice of such methods. | 11-12-2015 |