Patent application number | Description | Published |
20090204583 | METHOD FOR PROVIDING ACCESS TO DATA STORED IN A DATABASE TO AN APPLICATION - Access to data stored in a database within a data processing system is provided to an application in the following manner. At least one criterion for providing data is determined based at least on a service level agreement. A provisioning and deployment description identifying at least data units of a database to be provided to the application is received, and a system description including status and resource usage information of possible target systems within the data processing system is maintained. A placement technology description describing properties of data placement technologies is received. At least one target system and at least one data placement technology are selected based on said at least one criterion and said descriptions. Access to said data units is provided for said application using said selected at least one target database system and said at least one data placement technology. | 08-13-2009 |
20100169148 | INTERACTION SOLUTIONS FOR CUSTOMER SUPPORT - The present invention provides a system, architecture and process to support new interaction paradigms in customer support. Specifically, the approach of the present invention will unify through a new process and innovative system architecture the two basic methods of in house support and online support. To accomplish this unification, the present invention enables customers to work together as peers in problem resolution by exploiting the customer expertise (they work with the products on a daily basis and often have deep understanding what works/does not work). Among other things, the present invention provides: incentives for customers to participate in this new support; a rating infrastructure in which multiple good ratings helps to become “THE EXPERT” by increasing the score; incentives upon receipt of good ratings and or certain score levels; a problem routing mechanism; Master Data Management (MDM) for insights in customers and products. | 07-01-2010 |
20100185510 | METHOD AND SYSTEM FOR TURNING VIRTUAL WORLD PARTICIPANTS INTO REAL LIFE LEADS - The present disclosure details a method and system used for turning human participants who control avatars in a virtual world setting into real life marketing leads. In one embodiment, a virtual location is presented within a virtual world to facilitate interaction with an avatar. The avatar is identified within a master data management system, and a profile of the human behind the avatar is created or retrieved. To encourage the human user to provide real-world information through the avatar within the virtual world, an incentive is offered and awarded as necessary. The real-world information about the human user, such as address or demographic information about the human user is collected and stored in the profile, and eventually synchronized with a CRM system. As appropriate, the data collected and compiled in the CRM system may be used to launch marketing campaigns. | 07-22-2010 |
20100250620 | ONE CLICK CREATION OF LINKAGES BETWEEN MASTER DATA RECORDS - A method and system for creating interrecord relationships between master data records stored in a relational database are provided. The method includes receiving information for a first master data record from a user, searching a plurality of master data records in the relational database for candidates that have a potential of being related to the processed master data record, the searching performed automatically in response to the receiving, determining at least one possible relationship type between the candidates found as a result of the searching and the first master data record, and presenting the at least one possible relationship type and the candidates found as a result of the searching to the user. The disclosed method and system allow a user to create and maintain relationships between multiple master data records with minimal steps. | 09-30-2010 |
20110131510 | SPLITTING AVATARS IN A VIRTUAL WORLD - Systems, methods and articles of manufacture are disclosed for splitting an avatar a split point in a virtual world. In one embodiment, a location in the virtual world may be designated as the split point. It may be determined that a first avatar has encountered the split point. The user may be prompted to specify whether to split the first avatar in a virtual world. Responsive to a request to split the first avatar, a second avatar may be created from the first avatar. The first avatar and the second avatar may be controlled independently in the virtual world and in response to user input. A user may also request to merge the first avatar and the second avatar. A third avatar may be created from the first avatar and the second avatar, responsive to the request to merge. The third avatar may include assets of both the first avatar and the second avatar. | 06-02-2011 |
20120131181 | WORKLOAD MANAGEMENT IN HETEROGENEOUS ENVIRONMENTS - A system for managing a workload in a heterogeneous environment comprising at least one application, an interoperability layer for inter-application communication, and at least one adapter for connecting the at least one application to the interoperability layer, is disclosed. Such a system includes a self-adapting application connector management component which includes the following: a monitoring component for monitoring the performance and workload characteristics of one or more applications and/or one or more adapters; a computing component for computing a configuration change based on the monitored performance and workload characteristics; a change component for changing the configuration of the one or more adapters in accordance with the computed configuration change; and a change component for changing the configuration of the one or more applications in accordance with the computed configuration change. | 05-24-2012 |
20120155290 | CARRYING OUT PREDICTIVE ANALYSIS RELATING TO NODES OF A COMMUNICATION NETWORK - The invention relates to a method for carrying out predictive analysis relating to nodes of a communication network. The method comprises the steps of providing communication event information for a first set of nodes and a second set of nodes of the communication network, providing a set of attributes for the nodes of the first set, using said attributes and said communication event information for determining a set of groups among the first set of nodes, assigning each node of the second set to at least one group of the set of groups based at least on the communication event information available for the second group, the assigning resulting in membership information of the nodes of the second set as well as deriving or applying a prediction model for the second set of nodes based on the communication event information for the second set and the membership information. | 06-21-2012 |
20120158625 | Creating and Processing a Data Rule - A data rule is created and processed by receiving an expression defining a logic of a rule and at least one logical variable, creating a rule definition including the expression and the at least one logical variable for binding each logical variable of the rule with at least one column, associating a characteristic enabling comparison of columns with a first logical variable of the rule definition, and storing the characteristic as part of the rule definition. | 06-21-2012 |
20120173479 | APPLICATION CACHE PROFILER - In an embodiment of the invention, a method for data profiling incorporating an enterprise service bus (ESB) coupling the target and source systems following an extraction, transformation, and loading (ETL) process for a target system and a source system is provided. The method includes receiving baseline data profiling results obtained during ETL from a source application to a target application, caching the updates, determining current data profiling results within the ESB for cached updates, and triggering an action if a threshold disparity is detected upon the current data profiling results and the baseline data profiling results. | 07-05-2012 |
20120173823 | APPLICATION CACHE PROFILER - In an embodiment of the invention, a method for data profiling incorporating an enterprise service bus (ESB) coupling the target and source systems following an extraction, transformation, and loading (ETL) process for a target system and a source system is provided. The method includes receiving baseline data profiling results obtained during ETL from a source application to a target application, caching the updates, determining current data profiling results within the ESB for cached updates, and triggering an action if a threshold disparity is detected upon the current data profiling results and the baseline data profiling results. | 07-05-2012 |
20120197681 | SOFTWARE TOOL FOR GENERATING TECHNICAL BUSINESS DATA REQUIREMENTS - A computer implemented method, system, and/or computer program product generates technical business data requirements from functional process requirements. Such method, system, and/or computer program product include data processing infrastructure. The data processing infrastructure may further include at least one data persistence component and at least one business process hierarchy. The computer implemented method, system, and/or computer program product obtain a set of technical elements concerning functional process requirements for each business process within the business process hierarchy. Such method, system, and/or computer program product classify technical elements into functional objects, link each of the functional objects to at least one process within the business process hierarchy and generate a plurality of business data roadmap templates in the data processing infrastructure. The generated business data roadmap templates are stored in the persistence component of the data processing infrastructure. | 08-02-2012 |
20120197861 | INTELLIGENT CONTENT DISCOVERY FOR CONTENT CONSUMERS - Embodiments of the present invention provide a method, system and computer program product for intelligent content discovery for content consumers in the global Internet. In an embodiment of the invention, a method for intelligent content discovery for content consumers includes parsing a list of previously viewed content in a content browser executing in memory of a computer to identify different content sources for the previously viewed content. The method also includes directing crawling of the content sources over a computer communications network to retrieve updated content from the content sources. The method yet further includes filtering the updated content into a subset of updated content according to at least one parameter corresponding to one of an end user profile of an end user and an end user preference of the end user. Finally, the method includes presenting a list of the subset of updated content in the content browser. | 08-02-2012 |
20120203551 | AUTOMATED FOLLOW UP FOR E-MEETINGS - Embodiments of the present invention provide a method, system and computer program product for automated follow-up for e-meetings. In an embodiment of the invention, a method for automated follow-up for e-meetings is provided. The method includes monitoring content provided to an e-meeting managed by an e-meeting server executing in memory of a host computer. The method also includes applying a rule in a rules base to the monitored content. Finally, the method includes triggering generation of a follow up item in response to applying the rule to the monitored content. | 08-09-2012 |
20120203845 | AUTOMATED SOCIAL NETWORK INTRODUCTIONS FOR E-MEETINGS - Embodiments of the present invention provide a method, system and computer program product for automated social networking for e-meetings. In an embodiment of the invention, a method for automated social networking for e-meetings is provided. The method includes monitoring content provided to an e-meeting managed by an e-meeting server executing in memory of a host computer. The method further includes detecting a name in the monitored content and comparing the detected name to names in a contact list for a social networking system executing externally to the e-meeting. Finally, the method includes triggering generation of a social networking introduction for the name to different participants to the e-meeting in response to matching the detected name to a name in the contact list. | 08-09-2012 |
20120246132 | MANAGING OVERFLOW ACCESS RECORDS IN A DATABASE - Overflow access records (OARs) are managed in a database system. An OAR is created in response to receiving an update command for a data record and to the updated data record generated by the update command not fitting onto the page in the table where the data record was stored. The OAR that is created includes an index counter that indicates a number of indexes associated with the table. When an OAR is accessed in response to a query command, an identifier of the accessed OAR is replaced in the index by an identifier of a data record pointed to by the OAR, and the index counter in the accessed OAR is changed by a predefined amount. When the index counter reaches a predefined value, the accessed OAR is removed from the table. | 09-27-2012 |
20120290608 | DATA MANAGEMENT IN RELATIONAL DATABASES - At least one user table in a relational database management system (RDBMS) using a first operator within a structured query language (SQL) command is identified. The first operator within the SQL command is utilized to transfer one or more data items from the at least one user table to a data array within the RDBMS. The data array is processed within the RDBMS, and one or more output values are generated based on the processing. | 11-15-2012 |
20120310874 | Determination of Rules by Providing Data Records in Columnar Data Structures - A method includes providing a columnar database comprising a plurality of columnar data structures associated with one column attribute; providing first data records having a plurality of first attribute-value pairs comprising counting information indicative of a number of first data records having the respective first attribute-value pair; providing mask data structures comprising one or more second attribute-value pairs; selecting second data records by intersecting the columnar data structures and the mask data structures; selecting one of the column attributes and one value contained in the column data structure associated with said selected column attribute as the destination attribute-value pair; creating one second rule for each first attribute-value pair; calculating, for each second rule, a co-occurrence-count between its respective source attribute-value pair and its destination attribute-value pair; and specifically selecting one or more of said second rules as the first rules in dependence on the calculated co-occurrence-count. | 12-06-2012 |
20120330911 | AUTOMATIC GENERATION OF INSTANTIATION RULES TO DETERMINE QUALITY OF DATA MIGRATION - During migration of data from at least one data source to a target system, data quality is determined by obtaining metadata associated with the target system, automatically generating instantiated rules for assessing a quality of data to be loaded from the at least one data source into the target system, where the instantiated rules are dependent upon the obtained metadata associated with the target system, and applying a quality analysis based upon the instantiated rules to the data to be loaded into the target system. The quality analysis provides an indication of a level of compliance of the data with requirements of the target system. | 12-27-2012 |
20120331340 | Method and Arrangement for Fault Handling in a Distributed IT Environment - An improved method for fault handling in a distributed IT environment. The distributed IT environment executes at least one workflow application interacting with at least one application by using interface information about the at least one application. The method comprises: storing at least one fault handling description in a implementation-independent meta language associated with the at least one application; associating the interface information with the at least one fault handling description based on at least one defined fault handling policy, created based on at least one service definition; and the workflow application if a fault response from the at least one application is received: retrieving at least one associated fault handling description based on at least one fault handling policy, and interpreting and executing a particular meta language code of the at least one associated fault handling description in order to continue the defined workflow application. | 12-27-2012 |
20130006931 | DATA QUALITY MONITORING - A computer implemented method, computer program product and system for data quality monitoring includes measuring a data quality of loaded data relative to a predefined data quality metric. The measuring the data quality includes identifying delta changes in at least one of the loaded data and the data quality rules relative to a previous measurement of the data quality of the loaded data. Logical calculus defined in the data quality rules is applied to the identified delta changes. | 01-03-2013 |
20130030850 | CREATING A DATA GOVERNANCE ASSESSMENT - For creating a data governance assessment, a response module receives responses to an automated questionnaire. A scoring module computes a data governance assessment comprising a maturity level describing organizational adoption of data governance, a data governance model describing a data centralization level, and a framework describing a tier of data governance by calculating the maturity level, the data governance model, and the framework from the responses. | 01-31-2013 |
20130091094 | ACCELERATING DATA PROFILING PROCESS - A data profile request is handles by utilizing data in a distributed file system. Tabular data is extracted from a data source and stored in a distributed file system. Each table in the tabular data is split by columns, which are each stored in separate files in a set of physical nodes of the distributed file system. In response to a data profiling request, a master node determines, based on the profiling request, which groups of files are needed to be on a same physical node in order to perform the profiling analysis. The master node creates jobs using physical nodes that contain the requisite files needed for each job. | 04-11-2013 |
20130212072 | Generating and Utilizing a Data Fingerprint to Enable Analysis of Previously Available Data - According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above. | 08-15-2013 |
20130212073 | Generating and Utilizing a Data Fingerprint to Enable Analysis of Previously Available Data - According to one embodiment of the present invention, a system analyzes data in response to detecting occurrence of an event, and includes a computer system including at least one processor. The system maps fields between the data and a fingerprint definition identifying relevant fields of the data to produce a fingerprint for the data. The data is deleted after occurrence of the event. The produced fingerprint is stored in a data repository, and retrieved in response to detection of the event occurrence after the data has been deleted. The system analyzes the retrieved fingerprint to evaluate an impact of the event on corresponding deleted data. Embodiments of the present invention further include a method and computer program product for analyzing data in response to detecting occurrence of an event in substantially the same manner described above. | 08-15-2013 |
20130219054 | WORKLOAD MANAGEMENT IN HETEROGENEOUS ENVIRONMENTS - A system for managing a workload in a heterogeneous environment comprising at least one application, an interoperability layer for inter-application communication, and at least one adapter for connecting the at least one application to the interoperability layer, is disclosed. Such a system includes a self-adapting application connector management component which includes the following: a monitoring component for monitoring the performance and workload characteristics of one or more applications and/or one or more adapters; a computing component for computing a configuration change based on the monitored performance and workload characteristics; a change component for changing the configuration of the one or more adapters in accordance with the computed configuration change; and a change component for changing the configuration of the one or more applications in accordance with the computed configuration change. | 08-22-2013 |
20130268734 | CACHE HANDLING IN A DATABASE SYSTEM - Embodiments relate to cache handling in a database system. An aspect includes controlling operations of a set of caches in the database system and determining whether a value of a cache quality parameter of a first cache out of the set of caches meets a cache image creation criterion relating to the first cache. Moreover, an aspect includes selecting at least one cache entry from the first cache, if a value of a related cache entry parameter meets a cache entry criterion, and if the value of the cache quality parameter of the first cache exceeds the predefined value of the cache image creation criterion, and creating a cache image based on the selected at least one cache entry and storing the cache image for further use. | 10-10-2013 |
20130283089 | METHOD FOR FAULT HANDLING IN A DISTRIBUTED IT ENVIRONMENT - An improved method provides fault handling in a distributed IT environment. The distributed IT environment executes at least one workflow application interacting with at least one application by using interface information about the at least one application. The method comprises: storing at least one fault handling description in a implementation-independent meta language associated with the at least one application; associating the interface information with the at least one fault handling description based on at least one defined fault handling policy, created based on at least one service definition; and the workflow application if a fault response from the at least one application is received: retrieving at least one associated fault handling description based on at least one fault handling policy, and interpreting and executing a particular meta language code of the at least one associated fault handling description in order to continue the defined workflow application. | 10-24-2013 |
20140046927 | DETECTING MULTI-COLUMN COMPOSITE KEY COLUMN SETS - An aspect includes a computer-implemented method for detecting one or more multi-column composite key column sets. The method includes accessing a plurality of first columns, each first column representing a parameter, each first column including a set of distinct parameter values of its respective parameter, each distinct parameter value being stored in association with one or more object identifiers. Two or more of the first columns are selected for use as a current candidate column set, the current candidate column set including at least a first and a second candidate column, the current candidate column set being of a current cardinality. The method also includes determining, by comparing object-identifiers, whether for the current candidate column set at least one tuple of parameter values exists with parameter values respectively stored in association with two or more shared ones of the object identifiers to identify a multi-column composite key column set. | 02-13-2014 |
20140089319 | ONLINE MEDIA SHARING WITH ACTIVITY BALANCING AND INCENTIVES - Activity is balanced in a media sharing environment. To balance the activity, a computer determines the uploading activity of a plurality of members of a media sharing environment, as well as the tagging activity of the plurality of members. The computer compares the uploading activity to the tagging activity and determines a scoring coefficient responsive to the comparison. The computer determines a member score for one of the plurality of members based on the scoring coefficient. The computer can subject the member to discipline if the member score violates a low threshold, or to a reward if the member score violates a high threshold. The scoring coefficient can be determined to induce the plurality of members to favor either one of the uploading activity and the tagging activity over the other. | 03-27-2014 |
20140101299 | TECHNIQUES FOR IMPLEMENTING INFORMATION SERVICES WITH TENTANT SPECIFIC SERVICE LEVEL AGREEMENTS - A technique for selecting an information service implementation includes receiving a service request that includes a tenant identifier that uniquely identifies a calling tenant. Transformation logic to service the service request is selected based on the received tenant identifier. One or more data sources and one or more data targets are selected for the service request based on the received tenant identifier. Data from the selected data sources is processed using the selected transformation logic and the processed data is stored at the selected data targets. | 04-10-2014 |
20140136576 | DESTRUCTION OF SENSITIVE INFORMATION - Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information. | 05-15-2014 |
20140136577 | DESTRUCTION OF SENSITIVE INFORMATION - Provided are techniques for deleting sensitive information in a database. One or more objects in a database that are accessed by a statement are identified. It is determined that at least one object among the identified one or more objects contains sensitive information by checking an indicator for the at least one object. One or more security policies associated with the at least one object are identified. The identified one or more security policies are implemented for the at least one object to delete sensitive information. | 05-15-2014 |
20140280342 | SECURE MATCHING SUPPORTING FUZZY DATA - Provided are techniques for secure matching supporting fuzzy data. A first bloom filter for a first data element is retrieved, wherein each of the characters in the data element has been encrypted with a beginning offset position of the character and encrypted with an end offset position of the character to produce two encrypted values that are added to the first bloom filter. A second bloom filter for a second data element is retrieved. The first bloom filter and the second bloom filter are compared to determine whether there is a match between the first data element and the second data element. | 09-18-2014 |
20140350983 | PROVIDING BEST PRACTICE WORKFLOW TO AID USER IN COMPLETING PROJECT THAT IS CONSTANTLY UPDATED BASED ON USER FEEDBACK - A method, system and computer program product for providing a best practice workflow to aid a user in completing a project. A system receives practice instances for completing a project (e.g., obtaining a job), where a “practice instance” refers to a graph of nodes and directed edges, where each node represents a task in a process for completing the project and each directed edge illustrates an execute sequence between two tasks. The system receives rankings from users (“crowdsourcing”) for each of these practice instances and computes a single ranking for each practice instance based on these received rankings. The system may then generate a workflow for completing a project based on these practice instances with a single ranking that exceeds a threshold and are directed to completing the same project. By using user feedback to rank these practice instances, a more effective and useful workflow will be generated. | 11-27-2014 |
20140350994 | PROVIDING BEST PRACTICE WORKFLOW TO AID USER IN COMPLETING PROJECT THAT IS CONSTANTLY UPDATED BASED ON USER FEEDBACK - A method, system and computer program product for providing a best practice workflow to aid a user in completing a project. A system receives practice instances for completing a project (e.g., obtaining a job), where a “practice instance” refers to a graph of nodes and directed edges, where each node represents a task in a process for completing the project and each directed edge illustrates an execute sequence between two tasks. The system receives rankings from users (“crowdsourcing”) for each of these practice instances and computes a single ranking for each practice instance based on these received rankings. The system may then generate a workflow for completing a project based on these practice instances with a single ranking that exceeds a threshold and are directed to completing the same project. By using user feedback to rank these practice instances, a more effective and useful workflow will be generated. | 11-27-2014 |
20140365106 | Method For Collecting And Processing Relative Spatial Data - A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items. | 12-11-2014 |
20140365423 | Method For Collecting And Processing Relative Spatial Data - A method and system are disclosed for determining relative connectedness from temporal data. A user iterates through a list of items implemented on a mobile device. As each item on the list is located it is marked to generate a corresponding timestamp. The timestamps are then used to generate a timestamped list, which in turn is processed to determine the amount of elapsed time between each item on the list being located. The timestamped list data is then processed to generate relative connectedness data, which in turn is processed to generate a relative connectedness graph. The relative connectedness graph is then processed to assign coordinates to each item on the list. In turn, the coordinates are used to generate a map of the items. | 12-11-2014 |
20150058280 | DATA QUALITY MONITORING - A computer implemented method, computer program product and system for data quality monitoring includes measuring a data quality of loaded data relative to a predefined data quality metric. The measuring the data quality includes identifying delta changes in at least one of the loaded data and the data quality rules relative to a previous measurement of the data quality of the loaded data. Logical calculus defined in the data quality rules is applied to the identified delta changes. | 02-26-2015 |
20150066987 | METHOD AND SYSTEM FOR ACCESSING A SET OF DATA TABLES IN A SOURCE DATABASE - Embodiments relate to accessing a set of data tables in a source database. A set of table categories is provided for tables in the source database and a set of metrics is provided. For each table of the set of the data tables: the set of metrics is evaluated, the evaluated set of metrics is analyzed, and the table is categorized into one of the set of table categories using the result of the analysis. Information indicative of the table category of each table of the set of tables is output, and in response, a request to select data tables of the set of data tables is received according to a part of the table categories for data processing. A subset of data tables of the set of data tables is selected using the table categories for performing the data processing on the subset of data tables. | 03-05-2015 |
20150134589 | PROCESSING DATA IN DATA MIGRATION - A computer-implemented method for processing information related to an extract-transform-load (ETL) data migration, including aggregating operational metadata and determining: a plurality of metrics, organized by business object, corresponding to the migration; a number of business object instances not successfully loaded; a first end-to-end execution time for at least one business object; relevant input metadata; load readiness status per business object; impact of a business object that is not load ready by analyzing business process hierarchies; business object load readiness by reference to incomplete development status or data defects; scope per test cycle based, at least in part, upon business object load readiness; and high-priority defects of business objects that stop testing based, at least in part, upon analysis of business process hierarchies. | 05-14-2015 |
20150178359 | INTELLIGENTLY PROVISIONING CLOUD INFORMATION SERVICES - A computer-implemented method, computer program product, and computer system for intelligently provisioning cloud information services. The computer system determines a target computing zone based on location constraints defined in service processing rules, in response to receiving service request. The computer system determines whether a merger or a split is needed, based on a score for the resources, scores for the respective processing nodes, and operational metadata. The computer system determines whether request processing constraints defined in the service processing rules allow the merger or the split. The computer system processes, in the target computing zone, the service request with the merger or the split, in response to determining that the merger or the split is needed and in response to determining that the request processing rules allow the merger or the split. | 06-25-2015 |
Patent application number | Description | Published |
20110087732 | LINKING VIRTUAL WORLDS AND COLLABORATION PLATFORMS BI-DIRECTIONALLY USING A CENTRAL IDENTITY MANAGEMENT SYSTEM - A method, information processing system, and computer program storage product link information associated with a virtual world with information associated with a social collaboration platform. A virtual world user identifier and a social collaboration platform user identifier are stored. The virtual world identifier is associated with a set of virtual world contacts for the respective user. The social collaboration platform user identifier is associated with a set of social collaboration contacts for the user. The virtual world user identifier is linked to the social collaboration platform user identifier. An association is determined between at least one of the set of social collaboration contacts and the virtual world identifier set of virtual world contacts and the social collaboration platform user identifier, respectively, for the respective user. An information set associated with at least one of the virtual world user identifier and the social collaboration identifier is updated to include the association. | 04-14-2011 |
20110087968 | MANAGING CONNECTIONS BETWEEN REAL WORLD AND VIRTUAL WORLD COMMUNITIES - A method, information processing system, and computer program storage product manage connections between a virtual world and a social network. A set of virtual world information and a set of social network information are analyzed. A graph including a plurality of vertices is generated. Each vertex represents one of virtual world information and social network information. Each vertex is coupled to at least one other vertex by a respective edge. At least one edge of the graph couples a first vertex representing virtual world information and a second vertex representing social network information. At least one vertex is determined to be an articulation point having a respective edge. The removal of the respective edge of the articulation point causes a disconnection of the virtual world information from the social network information within the graph. A user is notified via a graphical user interface that the graph comprises the articulation point. | 04-14-2011 |
20110191289 | MANAGING INFORMATION ABOUT AVATARS ACROSS VIRTUAL WORLDS - Systems, methods and articles of manufacture are disclosed for managing relationship information across virtual worlds. In one embodiment, information about avatars in virtual worlds may be received. A correlation may be derived between two avatars based on the received information. The derived correlation between the two avatars may be stored. Applications may query for derived correlations. | 08-04-2011 |
20110295866 | ONTOLOGY GUIDED REFERENCE DATA DISCOVERY - Mapping and translating reference data from multiple databases using an enterprise ontology. This is achieved by various means, including mapping values of a first database to corresponding fields within the ontology, mapping values of a second database to corresponding fields within the ontology, and determining relationships between the values of the first database and the values of the second database based on their respective mappings to common fields within the ontology. | 12-01-2011 |
20120066214 | Handling Data Sets - A method, system and computer program product provides a first characteristic associated with a first data set and a single data value, and a second characteristic associated with a second data set; and calculates at least one of: 1) the similarity of the first data set with the second data set based on the first and second characteristics, 2) the similarity of the first data set with the single data value based on the first characteristic and the single data value, 3) confidence indicating how well the first characteristic reflects properties of the first data set based on the first characteristic, and 4) confidence indicating how well the similarity of the first data set with the single data value reflects properties of the single data value based on the first characteristic and the single data value. | 03-15-2012 |
20120089791 | HANDLING STORAGE PAGES IN A DATABASE SYSTEM - An operation is disclosed for handling storage pages in a database system. The database system may include a management component and a storage component. The storage component may include storage locations with different hierarchical levels. Each storage page of the storage pages may include a number of records. The operation may include copying a storage page from the storage component to a buffer pool controlled by the management component, monitoring which records of the storage page in the buffer pool are being accessed, and setting information indicating access for each record accessed. The operation may also include determining, based on the information indicating access, whether to split the storage page into at least two resulting storage pages. The operation may also include writing the at least two resulting storage pages to the storage component at storage locations, where the at least two resulting storage pages have different hierarchy levels. | 04-12-2012 |
20120221555 | GENERATING A SEMANTIC GRAPH RELATING INFORMATION ASSETS USING FEEDBACK RE-ENFORCED SEARCH AND NAVIGATION - Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise. | 08-30-2012 |
20120221556 | MANAGING INFORMATION ASSETS USING FEEDBACK RE-ENFORCED SEARCH AND NAVIGATION - Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise. | 08-30-2012 |
20120221558 | IDENTIFYING INFORMATION ASSETS WITHIN AN ENTERPRISE USING A SEMANTIC GRAPH CREATED USING FEEDBACK RE-ENFORCED SEARCH AND NAVIGATION - Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise. | 08-30-2012 |
20120254205 | ONTOLOGY GUIDED REFERENCE DATA DISCOVERY - Mapping and translating reference data from multiple databases using an enterprise ontology. This is achieved by various means, including mapping values of a first database to corresponding fields within the ontology, mapping values of a second database to corresponding fields within the ontology, and determining relationships between the values of the first database and the values of the second database based on their respective mappings to common fields within the ontology. | 10-04-2012 |
20120284261 | GENERATING A SEMANTIC GRAPH RELATING INFORMATION ASSETS USING FEEDBACK RE-ENFORCED SEARCH AND NAVIGATION - Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise. | 11-08-2012 |
20120284262 | MANAGING INFORMATION ASSETS USING FEEDBACK RE-ENFORCED SEARCH AND NAVIGATION - Embodiments of the invention provide an approach for creating, evolving and using a weighted semantic graph to manage and potentially identify certain information assets within an enterprise. The semantic graph may be generated by monitoring users navigating through search results which provide a set of information assets responsive to a search query. By recording the navigation path taken by many users, relationships between information assets may be identified. Further, once generated, the semantic graph may be used to present users with in indication of related information assets as part of the search results. Further still, the semantic graph may also be used to identify information assert “hubs” as well as information assets that may provide low utility to individuals within the enterprise. | 11-08-2012 |
20130031117 | Auto-Mapping Between Source and Target Models Using Statistical and Ontology Techniques - A system maps data within a data source to a target data model, and comprises a computer system including at least one processor. The system determines an identifier for each data object of the data source based on the data within that data object, wherein the identifier indicates for that data object a corresponding concept within a domain ontological representation of a data model of the data source. The determined identifiers for the data objects of the data source are compared to the target data model to determine mappings between the data objects of the data source and the target data model. Data objects from the data source are extracted for the target data model in accordance with the mappings. Present invention embodiments further include a method and computer program product for mapping data within a data source to a target data model. | 01-31-2013 |
20130054285 | COMPUTING AND MANAGING CONFLICTING FUNCTIONAL DATA REQUIREMENTS USING ONTOLOGIES - In one or more embodiments of the invention, functional data analysts may use a functional data authoring module to capture functional metadata in a consistent manner. Conflict reports for the business processes may be generated for a subset of the business processes or as an overall report across all business processes. One or more embodiments of the invention may provide early detection of data usage and type conflicts from functional data requirements, automated detection of conflicts from functional data requirements, reports listing detected conflicts, conflicts resolution tracking mechanism, ongoing notification regarding changes in functional data requirements or detected conflicts, and avoidance of conflicting functional requirement in the realization phase, thereby reducing costs and project risks and avoiding project delays. | 02-28-2013 |
20130054286 | COMPUTING AND MANAGING CONFLICTING FUNCTIONAL DATA REQUIREMENTS USING ONTOLOGIES - In one or more embodiments of the invention, functional data analysts may use a functional data authoring module to capture functional metadata in a consistent manner. Conflict reports for the business processes may be generated for a subset of the business processes or as an overall report across all business processes. One or more embodiments of the invention may provide early detection of data usage and type conflicts from functional data requirements, automated detection of conflicts from functional data requirements, reports listing detected conflicts, conflicts resolution tracking mechanism, ongoing notification regarding changes in functional data requirements or detected conflicts, and avoidance of conflicting functional requirement in the realization phase, thereby reducing costs and project risks and avoiding project delays. | 02-28-2013 |
20130110812 | ACCOUNTING FOR AUTHORSHIP IN A WEB LOG SEARCH ENGINE | 05-02-2013 |
20130205252 | CONVEYING HIERARCHICAL ELEMENTS OF A USER INTERFACE - Techniques are disclosed for generating a view of a data flow model. One or more groupings of data flow objects in the data flow model is determined, based on an ontology. At least a first one of the groupings is collapsed in the view. The view is output for display in a user interface configured to selectively expand and collapse the first group based on user input. | 08-08-2013 |
20130238557 | MANAGING TENANT-SPECIFIC DATA SETS IN A MULTI-TENANT ENVIRONMENT - A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed. | 09-12-2013 |
20130238641 | MANAGING TENANT-SPECIFIC DATA SETS IN A MULTI-TENANT ENVIRONMENT - A method, computer program product and system for managing tenant-specific data sets in a multi-tenant system, by receiving a request to convert a data set in a physical data store from a first type of multi-tenant deployment to a second type of multi-tenant deployment, retrieving tenant identification metadata identifying a tenant making the request, modifying the data set in the physical data store based on the second type of multi-tenant deployment, and modifying metadata associated with an abstraction layer to allow the modified data set to be accessed. | 09-12-2013 |
20130275170 | INFORMATION GOVERNANCE CROWD SOURCING - A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction. | 10-17-2013 |
20130275803 | INFORMATION GOVERNANCE CROWD SOURCING - A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction. | 10-17-2013 |
20130289991 | Application of Voice Tags in a Social Media Context - According to a present invention embodiment, a system utilizes a voice tag to automatically tag one or more entities within a social media environment, and comprises a computer system including at least one processor. The system analyzes the voice tag to identify one or more entities, where the voice tag includes voice signals providing information pertaining to one or more entities. One or more characteristics of each identified entity are determined based on the information within the voice tag. One or more entities appropriate for tagging within the social media environment are determined based on the characteristics and user settings within the social media environment of the identified entities, and automatically tagged. Embodiments of the present invention further include a method and computer program product for utilizing a voice tag to automatically tag one or more entities within a social media environment in substantially the same manner described above. | 10-31-2013 |
20140006339 | DETECTING REFERENCE DATA TABLES IN EXTRACT-TRANSFORM-LOAD PROCESSES | 01-02-2014 |
20140089926 | BUSINESS PROCESS MODEL ANALYZER AND RUNTIME SELECTOR - In a method for determining appropriate runtime environments for execution of a process model, a computer receives a process model. The process model includes a plurality of activities, wherein two activities are linked by a relationship. The computer determines that the two activities linked by a relationship match a process pattern. The computer determines one or more runtime environments for execution of the process model, wherein each of the one or more runtime environments is capable of executing the process pattern. | 03-27-2014 |
20140108639 | TRANSPARENTLY ENFORCING POLICIES IN HADOOP-STYLE PROCESSING INFRASTRUCTURES - Method, system, and computer program product to facilitate selection of data nodes configured to satisfy a set of requirements for processing client data in a distributed computing environment by providing, for each data node of a plurality of data nodes in the distributed computing environment, nodal data describing the respective data node of the plurality of data nodes, receiving a request to process the client data, the client data being identified in the request, retrieving the set of requirements for processing the client data, and analyzing the retrieved data policy and the nodal data describing at least one of the data nodes, to select a first data node of the plurality of data nodes as a delegation target, the first data node selected based on having a higher suitability level for satisfying the set of requirements than a second data node of the plurality of data nodes. | 04-17-2014 |
20140108648 | TRANSPARENTLY ENFORCING POLICIES IN HADOOP-STYLE PROCESSING INFRASTRUCTURES - Method, system, and computer program product to facilitate selection of data nodes configured to satisfy a set of requirements for processing client data in a distributed computing environment by providing, for each data node of a plurality of data nodes in the distributed computing environment, nodal data describing the respective data node of the plurality of data nodes, receiving a request to process the client data, the client data being identified in the request, retrieving the set of requirements for processing the client data, and analyzing the retrieved data policy and the nodal data describing at least one of the data nodes, to select a first data node of the plurality of data nodes as a delegation target, the first data node selected based on having a higher suitability level for satisfying the set of requirements than a second data node of the plurality of data nodes. | 04-17-2014 |
20140188563 | CUSTOMER DEMOGRAPHIC DATA CHANGE DETECTION BASED ON MONITORED UTILITY CONSUMPTION - In general, the present disclosure describes techniques for detecting changes in demographic data of a customer based on energy consumption data of the customer. For example, a customer data management system receives energy consumption data of a customer and detects, based at least in part on the received energy consumption data of the customer, a change in demographic data associated with the customer. The customer data management system then outputs, based at least in part on the detecting, at least one demographic change report associated with the demographic data. | 07-03-2014 |
20140188565 | CUSTOMER DEMOGRAPHIC DATA CHANGE DETECTION BASED ON MONITORED UTILITY CONSUMPTION - In general, the present disclosure describes techniques for detecting changes in demographic data of a customer based on energy consumption data of the customer. For example, a customer data management system receives energy consumption data of a customer and detects, based at least in part on the received energy consumption data of the customer, a change in demographic data associated with the customer. The customer data management system then outputs, based at least in part on the detecting, at least one demographic change report associated with the demographic data. | 07-03-2014 |
20140222991 | SENTRY FOR INFORMATION TECHNOLOGY SYSTEM BLUEPRINTS - Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 08-07-2014 |
20140223001 | SENTRY FOR INFORMATION TECHNOLOGY SYSTEM BLUEPRINTS - Lifecycle management for blueprints of information technology systems includes determining, using a processor, a component referenced by a blueprint defining an information technology system and determining a component tool used to manage the component. The component is registered with a sensor within the component tool. Responsive to detecting a change in status of the component within the component tool, the sensor sends a notification. | 08-07-2014 |
20140281856 | DETERMINING LINKAGE METADATA OF CONTENT OF A TARGET DOCUMENT TO SOURCE DOCUMENTS - Provided are to a computer program product, system, and method for determining linkage metadata of content of a target document to source documents. In response to a determination that a target fragment in a target document matches a source fragment in a source document, linkage metadata is generated for the target fragment | 09-18-2014 |
20150095361 | DETERMINING LINKAGE METADATA OF CONTENT OF A TARGET DOCUMENT TO SOURCE DOCUMENTS - Provided are to a computer program product, system, and method for determining linkage metadata of content of a target document to source documents. In response to a determination that a target fragment in a target document matches a source fragment in a source document, linkage metadata is generated for the target fragment | 04-02-2015 |
20150120346 | Clustering-Based Learning Asset Categorization and Consolidation - A mechanism is provided in a data processing system for categorization of assets. The mechanism receives attribute values for a set of information technology (IT) assets. The mechanism performs k-means clustering analysis to cluster together IT assets with similar attributes to form a set of asset clusters. The mechanism uses a knowledge representation associated with the set of IT assets to assign the IT assets into a set of tentative clusters. The mechanism categorizes the set of IT assets into categories based on a combination of the set of asset clusters and the set of tentative clusters. | 04-30-2015 |
20150121456 | EXPLOITING TRUST LEVEL LIFECYCLE EVENTS FOR MASTER DATA TO PUBLISH SECURITY EVENTS UPDATING IDENTITY MANAGEMENT - System, method, and computer program product to exploit trust level lifecycle events for master data to publish security events updating identity management, assigning, in a master data management (MDM) system, an initial trust level, to a first individual based on a level of association of the first individual with an entity owning the MDM system, the initial trust level corresponding to access rights in the MDM system, collecting data about the first individual from one or more social networking sites, computing a trust score for the first individual based on data pertaining to the first individual from the MDM system and the collected data, and updating the trust level for the first individual based on the trust score. | 04-30-2015 |
20150186547 | USING ONTOLOGIES TO COMPREHEND REGULAR EXPRESSIONS - Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression. | 07-02-2015 |
20150186783 | USING ONTOLOGIES TO COMPREHEND REGULAR EXPRESSIONS - Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression. | 07-02-2015 |
20150254474 | GENERATION OF ANALYSIS REPORTS USING TRUSTED AND PUBLIC DISTRIBUTED FILE SYSTEMS - The invention provides for a data processing system comprising an application server comprising at least one processor. Execution of the instructions cause the processor to: receive an analysis request, the analysis request comprising multiple data analysis commands for generating an analysis report descriptive of a structured data file; divide the commands into private analysis commands and public analysis commands; send the private analysis commands to a trusted distributed file system; send a portion of the public analysis commands to a public distributed file system; send a remainder of the public analysis commands to the trusted distributed file system; and generate the analysis report using public analysis results from the public distributed file system and trusted analysis results from the trusted distributed file system. | 09-10-2015 |