Patent application number | Description | Published |
20100113709 | POLYETHYLENE IMINE BASED DENDRITIC DISPERSANT - The invention relates to a liquid dispersant of the formula I | 05-06-2010 |
20100174046 | POLYETHYLENE IMINE BASED PIGMENT DISPERSANTS - This invention refers to a novel process for the synthesis of polyethylene imine (PEI)-based pigment dispersants characterized by a “grafting from” approach, allowing the manufacture of solvent based dispersant systems. The polyethylene imine (PEI)-based pigment dispersant can be presented by the formula (I) X-(T) | 07-08-2010 |
20100184886 | NITROCELLULOSE BASED DISPERSANT - The invention relates to a polysaccharide-g-polyether dispersant represented as a compound of Formula 1 or a mixture of compounds of Formula (I) and Formula (II) wherein, T is the backbone polymer and is a residue of a modified cellulose or chitosan, with a molecular weight of 500-1000,000 g/mol; A and B are each, independently, —O— or —NH—; R is linear or branched —(C | 07-22-2010 |
20110153672 | Systems and Methods for Freezing Data - In one embodiment the present invention includes a computer-implemented for determining whether or not a data object is frozen. The method comprises accessing, by a user on a computer, a first data object of a plurality of data objects in one or more computer software applications. The plurality of data objects are assigned to a plurality of entities, where each entity specifies a category, and each of the plurality of data objects belong to a specific entity. The method determines if the first data object is frozen based on a relationship between the first entity and a second entity. | 06-23-2011 |
20110251930 | DATA MANAGEMENT FOR TOP-DOWN RISK BASED AUDIT APPROACH - Particular embodiments generally relate to providing risk management. In one embodiment, a first risk is linked to an account group assertion in a data structure. A second risk is linked to a control objective in the data structure. Access to the first risk is granted through the account group's assertion. Access to the second risk is granted through the control objective. Risk management is then performed using the accessed first risk and second risk. | 10-13-2011 |
20130247051 | IMPLEMENTATION OF A PROCESS BASED ON A USER-DEFINED SUB-TASK SEQUENCE - Various embodiments of systems and methods for implementation of a process based on a user-defined sub-task sequence are described herein. The process includes a set of sub-tasks. A plan owner defines the sequence in which the one or more sub-tasks are to be processed. In one embodiment, the plan owner defines the sequence by setting a fore-task for each sub-task in the sequence. The plan owner also defines a tester who would be processing each sub-task in the set of sub-tasks. A workflow template is triggered for implementing the process. The workflow template loops on the steps defined in the workflow template for processing each sub-task in the set of sub-tasks according to the sequence defined by the plan owner. Each tester after processing the sub-task assigned to them submits the processed sub-task. The process is implemented after all the sub-tasks in the set of sub-tasks have been processed. | 09-19-2013 |
20140258250 | Flexible Control Framework Featuring Standalone Rule Engine - A database system features a standalone rule-based engine that is decoupled from internal controls implemented by a separate existing control engine. The standalone rule engine is configured to execute business rules during runtime, in order to produce outcomes relevant to stored database information. The standalone rule engine offers enhanced flexibility, allowing its reuse by outside entities. For example, certain embodiments allow the outcomes of the standalone rule engine to be consumed by third parties, including but not limited to: Key Risk Indication (KRI), Audit Management, Analytics tools, and 3rd party compliance management tools. | 09-11-2014 |
20140279836 | Configurable Rule for Monitoring Data of In Memory Database - Embodiments relate to the implementation of configurable rules that automatically monitor large volumes of data stored in a database. Certain embodiments may leverage the high processing power available to the database engine of an in memory database, in order to perform analysis of large data volumes for compliance and other purposes. Particular embodiments may utilize ABAP Database Connectivity (ADBC) to a HANA in memory database available from SAP AG, in order to implement and execute configurable rules in connection with governance, risk, and compliance (GRC) of large volumes of data stored therein. In various embodiments, an analysis engine in the application layer may rely upon the in memory database engine to execute at least some logic of the configurable rules. | 09-18-2014 |