Patent application number | Description | Published |
20080229412 | Associating Security Information with Information Objects - A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table. | 09-18-2008 |
20080229413 | Authorizing Information Flows - Authorizing information flows between devices of a data processing system is provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow. | 09-18-2008 |
20090119507 | Reference Monitor for Enforcing Information Flow Policies - A reference monitor that authorizes information flows between elements of a data processing system is provided. The elements of the data processing system are associated with security data structures in a reference monitor. An information flow request is received from a first element to authorize an information flow from the first element to a second element. A first security data structure associated with the first element and a second security data structure associated with the second element are retrieved. At least one set theory operation is then performed on the first security data structure and the second security data structure to determine if the information flow from the first element to the second element is to be authorized. The security data structures may be labelsets having one or more labels identifying security policies to be applied to information flows involving the associated element. | 05-07-2009 |
20110004735 | METHOD AND APPARATUS FOR TWO-PHASE STORAGE-AWARE PLACEMENT OF VIRTUAL MACHINES - Techniques for placement of a virtual machine in a computing system. A first request is sent from a pool management subsystem to a placement subsystem. The first request includes specification of available storage capacities of storage systems in a computer network. The placement subsystem automatically determines a target storage system based, at least in part, on the available storage capacities. An identification of the target storage system is received at the pool management subsystem. At least one disk image of the virtual machine is written to the target storage system. Then, a second request is sent to the placement subsystem. The placement subsystem automatically determines a target computer. The latter determination is based, at least in part, on connectivity between the target computer and the target storage system. The virtual machine is installed at the target computer. The techniques facilitate live migration of virtual machines placed thereby. | 01-06-2011 |
20110302413 | Authorizing Information Flows Based on a Sensitivity of an Information Object - A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information flow request is received from a first device to authorize an information flow from the first device to a second device. The information flow request includes an identifier of the second device. Based on an identifier of the first device and the second device, security information identifying an authorization level of the first device and second device is retrieved. A sensitivity of an information object that is to be transferred in the information flow is determined and the information flow is authorized or denied based only on the sensitivity of the information object and the authorization level of the first and second devices irregardless of the particular action being performed on the information object as part of the information flow. | 12-08-2011 |
20130198740 | INTEGRATED VIRTUAL INFRASTRUCTURE SYSTEM - A technique is provided for creating virtual units in a computing environment. A virtual system definition is received by a processor that is utilized to create the virtual units for a virtual system. Relationship constraints between the virtual units in the virtual system are received by the processor. The relationship constraints between the virtual units include a communication link requirement between the virtual units and/or a location requirement between the virtual units. The virtual units in the virtual system are deployed by the processor according to the relationship constraints between virtual units. | 08-01-2013 |
Patent application number | Description | Published |
20100274868 | Direct Memory Access In A Hybrid Computing Environment - DMA in a computing environment that includes several computers and DMA engines, the computers adapted to one another for data communications by an data communications fabric, each computer executing an application, where DMA includes pinning, by a first application, a memory region, including providing, to all applications, information describing the memory region; effecting, by a second application in dependence upon the information describing the memory region, DMA transfers related to the memory region, including issuing DMA requests to a particular DMA engine for processing; and unpinning, by the first application, the memory region, including insuring, prior to unpinning, that no additional DMA requests related to the memory region are issued, that all outstanding DMA requests related to the memory region are provided to a DMA engine, and that processing of all outstanding DMA requests related to the memory region and provided to a DMA engine has been completed. | 10-28-2010 |
20120155462 | Processing Multicast Messages In A Data Processing System - Processing multicast messages in a data processing system that includes compute nodes, each of which includes a communications controller, the communications controllers operatively coupled for data communications amongst the compute nodes, each compute node in the data processing system executing at least one logical partition, the data processing system including a hypervisor, where multicast messages are processed by receiving, by more than one of the communications controllers, a multicast message; responsive to receipt of the multicast message, signaling, by one of the communications controllers, an interrupt in the hypervisor without signaling an interrupt by any other communications controller; determining, by the hypervisor, that the message received by the interrupt signaling communications controller is a multicast message; and providing, by the hypervisor, the multicast message to at least one logical partition configured to receive multicast messages. | 06-21-2012 |
20120331260 | IIMPLEMENTING DMA MIGRATION OF LARGE SYSTEM MEMORY AREAS - A method, system and computer program product are provided for implementing memory migration of large system memory pages in a computer system. A large page to be migrated from a current location to a target location is converted into a plurality of smaller subpages for a processor or system page table. The migrated page is divided into first, second and third segments, each segment composed of the smaller subpages and each respective segment changes as each individual subpage is migrated. CPU and I/O accesses to respective subpages of the first segment are directed to corresponding subpages of the target page or new page. I/O accesses to respective subpages of the second segment use a dual write mode targeting corresponding subpages of both the current page and the target page. CPU and I/O accesses to the subpages of the third segment access the corresponding subpages of the current page. | 12-27-2012 |
20140068734 | Managing Access to a Shared Resource Using Client Access Credentials - Systems and methods to manage access to shared resources are provided. A particular method may include receiving a request to access a shared resource from a first client of a plurality of clients and determining whether the shared resource is being used. A first window credential associated with the first client may be retrieved. The first window credential may be one of a plurality of window credentials associated with the plurality of clients. The first window credential may be used to access the shared resource. | 03-06-2014 |
20140173338 | COMMUNICATION CHANNEL FAILOVER IN A HIGH PERFORMANCE COMPUTING (HPC) NETWORK - A method, apparatus and program product implement a failover of a communication channel in a cluster fabric that transfers a state of the communication channel between windows resident in a hardware fabric interface device. The failover is desirably implemented by updating a plurality of mappings between memory resources in a host memory and hardware resources in the fabric interface device, and typically without modifying the memory resources such that involvement of a client that utilizes the communication channel in the failover is minimized or eliminated. | 06-19-2014 |
20140372739 | IMPLEMENTING CONCURRENT ADAPTER FIRMWARE UPDATE FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter firmware update of a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal I/O operations. When configuration is stored in a scratchpad buffer, the adapter driver detects virtual functions (VFs) configured and operating. An enhanced error handling (EEH) process is initiated, freezing the VFs, and an updated adapter firmware image is loaded to the adapter. The adapter driver completes the EEH recovery, the adapter is restarted using the new updated adapter firmware. The VFs device drivers unfreeze the VFs, and complete the EEH recovery. | 12-18-2014 |
20140372789 | IMPLEMENTING ENHANCED ERROR HANDLING OF A SHARED ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing enhanced error handling for a hardware I/O adapter, such as a Single Root Input/Output Virtualization (SRIOV) adapter, in a virtualized system. The hardware I/O adapter is partitioned into multiple endpoints, with each Partitionable Endpoint (PE) corresponding to a function, and there is an adapter PE associated with the entire adapter. The endpoints are managed both independently for actions limited in scope to a single function, and as a group for actions with the scope of the adapter. An error or failure of the adapter PE freezes the adapter PE and propagates to the VF PEs associated with the adapter, causing the VF PEs to be frozen. An adapter driver and VF device drivers are informed of the error, and start recovery. The hypervisor locks out the VF device drivers at key points enabling adapter recovery to successfully complete. | 12-18-2014 |
20150019903 | ISOLATING A PCI HOST BRIDGE IN RESPONSE TO AN ERROR EVENT - Instead of disabling PCI communication between system resources in a host computing device and I/O devices when a PCI Host Bridge (PHB) is unable to function, the host computing device may include a redundant PCI communication path for maintaining communication between the system resources and the I/O devices after a first PHB experiences an unrecoverable error. In one embodiment, the redundant PCI communication path includes a second PHB that is maintained in a standby state so long as the first PHB is functioning normally. However, once the first PHB experiences an unrecoverable error, the second PHB is changed to the master state and assumes the responsibility for maintaining communication between the system resources and the I/O devices. | 01-15-2015 |
20150067224 | DIRECT MEMORY ACCESS (DMA) ADDRESS TRANSLATION WITH A CONSECUTIVE COUNT FIELD - DMA translation table entries include a consecutive count (CC) field that indicates how many subsequent translation table entries point to successive real page numbers. A DMA address translation mechanism stores a value in the CC field when a translation table entry is stored, and updates the CC field in other affected translation table entries as well. When a translation table entry is read, and the CC field is non-zero, the DMA controller can use multiple RPNs from the access to the single translation table entry. Thus, if a translation table entry has a value of 2 in the CC field, the DMA address translation mechanism knows it can access the real page number (RPN) corresponding to the translation table entry, and also knows it can access the two subsequent RPNs without the need of reading the next two subsequent translation table entries. | 03-05-2015 |
20150067297 | DIRECT MEMORY ACCESS (DMA) ADDRESS TRANSLATION WITH A CONSECUTIVE COUNT FIELD - DMA translation table entries include a consecutive count (CC) field that indicates how many subsequent translation table entries point to successive real page numbers. A DMA address translation mechanism stores a value in the CC field when a translation table entry is stored, and updates the CC field in other affected translation table entries as well. When a translation table entry is read, and the CC field is non-zero, the DMA controller can use multiple RPNs from the access to the single translation table entry. Thus, if a translation table entry has a value of 2 in the CC field, the DMA address translation mechanism knows it can access the real page number (RPN) corresponding to the translation table entry, and also knows it can access the two subsequent RPNs without the need of reading the next two subsequent translation table entries. | 03-05-2015 |
20150095700 | ISOLATING A PCI HOST BRIDGE IN RESPONSE TO AN ERROR EVENT - Instead of disabling PCI communication between system resources in a host computing device and I/O devices when a PCI Host Bridge (PHB) is unable to function, the host computing device may include a redundant PCI communication path for maintaining communication between the system resources and the I/O devices after a first PHB experiences an unrecoverable error. In one embodiment, the redundant PCI communication path includes a second PHB that is maintained in a standby state so long as the first PHB is functioning normally. However, once the first PHB experiences an unrecoverable error, the second PHB is changed to the master state and assumes the responsibility for maintaining communication between the system resources and the I/O devices. | 04-02-2015 |
20150127969 | SELECTIVELY COUPLING A PCI HOST BRIDGE TO MULTIPLE PCI COMMUNICATION PATHS - Instead of disabling PCI communication between system resources in a host computing device and I/O devices when a PCI Host Bridge (PHB) is reset, the host computing device may include a PCI communication path for maintaining communication between the system resources and the I/O devices. In one embodiment, the redundant PCI communication path includes a second PHB that is maintained in a standby state. The host may monitor the errors generated by a plurality of master PHBs and select a master PHB that satisfies an error threshold. The second PHB (i.e., a servant PHB) and the selected master PHB are synchronized, and the second PHB is coupled to the PCI communication path between the master PHB and a PCI switch. The master PHB can then be reset while the second PHB maintains PCI communication between the host and the I/O devices. | 05-07-2015 |
20150127971 | SELECTIVELY COUPLING A PCI HOST BRIDGE TO MULTIPLE PCI COMMUNICATION PATHS - Instead of disabling PCI communication between system resources in a host computing device and I/O devices when a PCI Host Bridge (PHB) is reset, the host computing device may include a PCI communication path for maintaining communication between the system resources and the I/O devices. In one embodiment, the redundant PCI communication path includes a second PHB that is maintained in a standby state. The host may monitor the errors generated by a plurality of master PHBs and select a master PHB that satisfies an error threshold. The second PHB (i.e., a servant PHB) and the selected master PHB are synchronized, and the second PHB is coupled to the PCI communication path between the master PHB and a PCI switch. The master PHB can then be reset while the second PHB maintains PCI communication between the host and the I/O devices. | 05-07-2015 |
20150149995 | IMPLEMENTING DYNAMIC VIRTUALIZATION OF AN SRIOV CAPABLE SAS ADAPTER - A method, system and computer program product are provided for implementing dynamic virtualization of a Single Root Input/Output Virtualization (SRIOV) capable Serial Attached SCSI (SAS) adapter. The SRIOV SAS adapter includes a plurality of virtual functions (VFs). Each individual Host Bus Adapter (HBA) resource is enabled to be explicitly assigned to a virtual function (VF); and each VF being enabled to be assigned to a system partition. Multiple VFs are enabled to be assigned to a single system partition. | 05-28-2015 |
20150301966 | SHARING MESSAGE-SIGNALED INTERRUPTS BETWEEN PERIPHERAL COMPONENT INTERCONNECT (PCI) I/O DEVICES - A PCI function, such as a device driver, may request that additional MSI resources be allocated to an I/O device coupled to a PCI Host Bridge (PHB). However, there may not be any unallocated MSI resource remaining in the PHB. Instead, a hypervisor may request to borrow MSI resources assigned to other PCI functions in the system. For example, the PCI function requesting the additional MSI resources may ask for a certain number of MSI resources for a certain period of time e.g., a lease. The hypervisor then determines which of the other PCI functions (referred to as a loaning PCI functions) are willing to lend or loan their MSI resources. Once the MSI resources available for lease are known, the hypervisor informs the requesting PCI function of these resources which, in turn, binds the additional MSI resources to the I/O device. | 10-22-2015 |
20150301967 | SHARING MESSAGE-SIGNALED INTERRUPTS BETWEEN PERIPHERAL COMPONENT INTERCONNECT (PCI) I/O DEVICES - A PCI function, such as a device driver, may request that additional MSI resources be allocated to an I/O device coupled to a PCI Host Bridge (PHB). However, there may not be any unallocated MSI resource remaining in the PHB. Instead, a hypervisor may request to borrow MSI resources assigned to other PCI functions in the system. For example, the PCI function requesting the additional MSI resources may ask for a certain number of MSI resources for a certain period of time—e.g., a lease. The hypervisor then determines which of the other PCI functions (referred to as a loaning PCI functions) are willing to lend or loan their MSI resources. Once the MSI resources available for lease are known, the hypervisor informs the requesting PCI function of these resources which, in turn, binds the additional MSI resources to the I/O device. | 10-22-2015 |
20150317274 | IMPLEMENTING COHERENT ACCELERATOR FUNCTION ISOLATION FOR VIRTUALIZATION - A method, system and computer program product are provided for implementing coherent accelerator function isolation for virtualization in an input/output (IO) adapter in a computer system. A coherent accelerator provides accelerator function units (AFUs), each AFU is adapted to operate independently of the other AFUs to perform a computing task that can be implemented within application software on a processor. The AFU has access to system memory bound to the application software and is adapted to make copies of that memory within AFU memory-cache in the AFU. As part of this memory coherency domain, each of the AFU memory-cache and processor memory-cache is adapted to be aware of changes to data commonly in either cache as well as data changed in memory of which the respective cache contains a copy. | 11-05-2015 |
20150317275 | IMPLEMENTING COHERENT ACCELERATOR FUNCTION ISOLATION FOR VIRTUALIZATION - A method, system and computer program product are provided for implementing coherent accelerator function isolation for virtualization in an input/output (IO) adapter in a computer system. A coherent accelerator provides accelerator function units (AFUs), each AFU is adapted to operate independently of the other AFUs to perform a computing task that can be implemented within application software on a processor. The AFU has access to system memory bound to the application software and is adapted to make copies of that memory within AFU memory-cache in the AFU. As part of this memory coherency domain, each of the AFU memory-cache and processor memory-cache is adapted to be aware of changes to data commonly in either cache as well as data changed in memory of which the respective cache contains a copy. | 11-05-2015 |
20150370595 | IMPLEMENTING DYNAMIC VIRTUALIZATION OF AN SRIOV CAPABLE SAS ADAPTER - A method, system and computer program product are provided for implementing dynamic virtualization of a Single Root Input/Output Virtualization (SRIOV) capable Serial Attached SCSI (SAS) adapter. The SRIOV SAS adapter includes a plurality of virtual functions (VFs). Each individual Host Bus Adapter (HBA) resource is enabled to be explicitly assigned to a virtual function (VF); and each VF being enabled to be assigned to a system partition. Multiple VFs are enabled to be assigned to a single system partition. | 12-24-2015 |
20150370642 | IMPLEMENTING CONCURRENT ADAPTER FIRMWARE UPDATE FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter firmware update of a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal I/O operations. When configuration is stored in a scratchpad buffer, the adapter driver detects virtual functions (VFs) configured and operating. An enhanced error handling (EEH) process is initiated, freezing the VFs, and an updated adapter firmware image is loaded to the adapter. The adapter driver completes the EEH recovery, the adapter is restarted using the new updated adapter firmware. The VFs device drivers unfreeze the VFs, and complete the EEH recovery. | 12-24-2015 |
Patent application number | Description | Published |
20140351345 | GENERATING INSTANT MESSAGING CONTACTS FOR CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS - A computer-implemented method, computer program product, and computing system is provided for the interaction between a CRM system and a instant messaging system. According to an implementation, a computer-implemented method may include identifying, by one or more processors, one or more individuals associated with an opportunity included within a CRM system. The method may also include creating, by the one or more processors, an instant message buddy list group associated with the opportunity. The method may also include populating, by the one or more processors, the instant message buddy list group with at least a portion of the one or more individuals. | 11-27-2014 |
20140351347 | GENERATING INSTANT MESSAGING CONTACTS FOR CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS - A computer-implemented method, computer program product, and computing system is provided for the interaction between a CRM system and a instant messaging system. According to an implementation, a computer-implemented method may include identifying, by one or more processors, one or more individuals associated with an opportunity included within a CRM system. The method may also include creating, by the one or more processors, an instant message buddy list group associated with the opportunity. The method may also include populating, by the one or more processors, the instant message buddy list group with at least a portion of the one or more individuals. | 11-27-2014 |
20150324364 | NOTIFYING A USER ABOUT RELEVANT DATA FOR OPPORTUNITIES - Notifying a user about relevant data for opportunities includes obtaining, from a database, opportunities, the opportunities representing a complex record structure in the database, in which each of the opportunities captures a number of fields of metadata, analyzing the metadata associated with the opportunities to identify patterns for the opportunities, identifying, based on the patterns, correlations for the opportunities, and notifying, based on the correlations, the user about relevant data for the opportunities. | 11-12-2015 |
20150324859 | NOTIFYING A USER ABOUT RELEVANT DATA FOR OPPORTUNITIES - Notifying a user about relevant data for opportunities includes obtaining, from a database, opportunities, the opportunities representing a complex record structure in the database, in which each of the opportunities captures a number of fields of metadata, analyzing the metadata associated with the opportunities to identify patterns for the opportunities, identifying, based on the patterns, correlations for the opportunities, and notifying, based on the correlations, the user about relevant data for the opportunities. | 11-12-2015 |
20150332287 | SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT OPPORTUNITY TEMPLATING - The method includes receiving a target customer relationship management (CRM) opportunity from a social customer relationship management application. The method also includes extracting one or more structural elements from the target CRM opportunity. The method also includes extracting one or more structural attributes of each structural element responsive to extracting the one or more structural elements. The method also includes storing the one or more structural elements and the one or more structural attributes associated with each structural element in a template database. The method also includes creating a template from the one or more structural elements and the structural attributes in the template database. | 11-19-2015 |
20150332288 | INTEGRATING METADATA FROM APPLICATIONS USED FOR SOCIAL NETWORKING INTO A CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Integrating metadata from applications used for social networking into a customer relationship management (CRM) system includes obtaining, from applications used for social networking, metadata associated with users of the applications, analyzing the metadata from the applications to infer opportunities, relationships for mapping clients, structures, and subject matter experts, and integrating the opportunities, the relationships for mapping the clients, the structures, and the subject matter experts into a CRM system to populate the CRM system. | 11-19-2015 |
20150332289 | INTEGRATING METADATA FROM APPLICATIONS USED FOR SOCIAL NETWORKING INTO A CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Integrating metadata from applications used for social networking into a customer relationship management (CRM) system includes obtaining, from applications used for social networking, metadata associated with users of the applications, analyzing the metadata from the applications to infer opportunities, relationships for mapping clients, structures, and subject matter experts, and integrating the opportunities, the relationships for mapping the clients, the structures, and the subject matter experts into a CRM system to populate the CRM system. | 11-19-2015 |
20160034831 | DETERMINING A POLICY CHANGE FOR AN OUTCOME RELATED TO AN OPPORTUNITY - Determining a policy change for an outcome related to an opportunity includes monitoring factors and outcomes associated with opportunities stored in a customer relationship management (CRM) system, extracting the factors and the outcomes associated with the opportunities stored in the CRM system into a queryable database, analyzing, via a queryable database, the factors and the outcomes associated with the opportunities to identify patterns related to the outcomes of the opportunities, and determining, based on the patterns related to the outcomes of the opportunities, a policy change to improve the outcomes related to the opportunities. | 02-04-2016 |
20160034832 | DETERMINING A MONETARY VALUE FOR AN OUTCOME BASED ON A USER'S ACTIVITY - Determining a monetary value for an outcome based on a user's activity includes monitoring activities of a user utilizing a number of applications associated with a customer relationship management (CRM) system, determining, based on monitoring the activities of the user utilizing the number of applications, outcomes for the activities of the user, the outcomes being associated with opportunities stored in the CRM system, assigning a contribution value to the outcome based on the activities of the user, and determining, based on the contribution value, a monetary value for the outcomes. | 02-04-2016 |
20160034833 | REASSIGNING A BUSINESS HIERARCHY OF ROLES ASSOCIATED WITH AN OPPORTUNITY IN A SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Reassigning a business hierarchy of roles associated with an opportunity in a social customer relationship management (CRM) system includes receiving modifications, the modifications representing an adjustment to a business hierarchy of roles, identifying, in a social CRM system, an opportunity associated with the business hierarchy of roles, and reassigning, based on the modifications, the opportunity associated with the business hierarchy of roles, in which reassigning, based on the modifications, the business hierarchy of roles associated with the opportunity includes adding or deleting a member or a department from the business hierarchy of roles. | 02-04-2016 |
20160034903 | Modifying A Number Of Opportunities In A Customer Relationship Management (CRM) System - A method for modifying a number of opportunities in a customer relationship management (CRM) system includes obtaining, from a CRM system, a number of opportunities, the opportunities representing a complex record structure in the CRM system, in which each of the opportunities captures a number of fields of metadata, comparing the metadata associated with the opportunities with a number of archived opportunity templates to create a comparison, analyzing the comparison to identify a number of patterns for the opportunities, and modifying, based on the number of patterns for the opportunities, the opportunities to create at least one new opportunity. | 02-04-2016 |
20160034904 | DETERMINING A POLICY CHANGE FOR AN OUTCOME RELATED TO AN OPPORTUNITY - Determining a policy change for an outcome related to an opportunity includes monitoring factors and outcomes associated with opportunities stored in a customer relationship management (CRM) system, extracting the factors and the outcomes associated with the opportunities stored in the CRM system into a queryable database, analyzing, via a queryable database, the factors and the outcomes associated with the opportunities to identify patterns related to the outcomes of the opportunities, and determining, based on the patterns related to the outcomes of the opportunities, a policy change to improve the outcomes related to the opportunities. | 02-04-2016 |
20160034920 | Modifying A Number Of Opportunities In A Customer Relationship Management (CRM) System - Modifying a number of opportunities in a customer relationship management (CRM) system includes obtaining, from a CRM system, a number of opportunities, the opportunities representing a complex record structure in the CRM system, in which each of the opportunities captures a number of fields of metadata, comparing the metadata associated with the opportunities with a number of archived opportunity templates to create a comparison, analyzing the comparison to identify a number of patterns for the opportunities, and modifying, based on the number of patterns for the opportunities, the opportunities to create at least one new opportunity. | 02-04-2016 |
20160034921 | REASSIGNING A BUSINESS HIERARCHY OF ROLES ASSOCIATED WITH AN OPPORTUNITY IN A SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM - Reassigning a business hierarchy of roles associated with an opportunity in a social customer relationship management (CRM) system includes receiving modifications, the modifications representing an adjustment to a business hierarchy of roles, identifying, in a social CRM system, an opportunity associated with the business hierarchy of roles, and reassigning, based on the modifications, the opportunity associated with the business hierarchy of roles, in which reassigning, based on the modifications, the business hierarchy of roles associated with the opportunity includes adding or deleting a member or a department from the business hierarchy of roles. | 02-04-2016 |
20160034926 | DETERMINING A MONETARY VALUE FOR AN OUTCOME BASED ON A USER'S ACTIVITY - Determining a monetary value for an outcome based on a user's activity includes monitoring activities of a user utilizing a number of applications associated with a customer relationship management (CRM) system, determining, based on monitoring the activities of the user utilizing the number of applications, outcomes for the activities of the user, the outcomes being associated with opportunities stored in the CRM system, assigning a contribution value to the outcome based on the activities of the user, and determining, based on the contribution value, a monetary value for the outcomes. | 02-04-2016 |
20160034967 | NOTIFYING A USER OF AN INSTANT MESSAGING (IM) SERVICE ABOUT A MODIFICATION MADE TO AN OPPORTUNITY - Notifying a user of an instant message (IM) service about a modification made to an opportunity includes receiving at least one modification to an opportunity stored in a customer relationship management (CRM) system, the opportunity representing a complex record structure in the CRM system, identifying a first user associated with the modification made to the opportunity stored in the CRM system, determining, from a list of users associated with the opportunity, a second user associated with the first user through an IM service, and sending an alert to the second user on the IM service, the alert indicating to the second user the modification made to the opportunity by the first user. | 02-04-2016 |
20160036738 | NOTIFYING A USER OF AN INSTANT MESSAGING (IM) SERVICE ABOUT A MODIFICATION MADE TO AN OPPORTUNITY - Notifying a user of an instant message (IM) service about a modification made to an opportunity includes receiving at least one modification to an opportunity stored in a customer relationship management (CRM) system, the opportunity representing a complex record structure in the CRM system, identifying a first user associated with the modification made to the opportunity stored in the CRM system, determining, from a list of users associated with the opportunity, a second user associated with the first user through an IM service, and sending an alert to the second user on the IM service, the alert indicating to the second user the modification made to the opportunity by the first user. | 02-04-2016 |