Patent application number | Description | Published |
20090019424 | SYSTEM AND METHOD OF APPLICATION CONTEXT DRIVEN ACCESS RESTRICTION - A method and system for providing application context restrictions are provided. The method may include, responsive to a request from a first object to a second object, comparing an application context of the first object with an application context of the second object. The method may include, if the comparison succeeds as determined by predefined rules, allowing a response from the second object to be transmitted to the first object. The method may include, if the comparison fails as determined by predefined rules, restricting the response from the second object to the first object. | 01-15-2009 |
20090024552 | UNIFIED DEVELOPMENT GUIDELINES - This disclosure relates to creating, facilitating, or otherwise managing unified development guidelines. Software for managing development guidelines can comprise computer readable instructions operable when executed to, in response to a trigger, identify a first guideline rule and a second guideline rule based, at least in part, on the trigger, where the guideline rules are at least partially stored in a central rules repository for a development group and each rule is associated with a validity period. This software then generates a development guideline using the identified first guideline rule and the second guideline rule. | 01-22-2009 |
20090024880 | System and method for triggering control over abnormal program termination - Methods and systems for handling errors in applications are provided. A comparison may be executed to confirm that actual results are in accordance with expected results. If the comparison results in an application error, a special execution software object is executed. The special execution software object obtains and maintains a copy of the application context associated with the application error found. A user may then view the application context to determine the source of the error. A logbook may be maintained to store all of the application errors and associated application contexts. | 01-22-2009 |
20100153713 | Systems and methods for detecting exposure of private keys - A system and method can include comparing entities associated with public certificates and private keys in a keystore to detect compromised private keys. This increases security of systems implementing public key cryptography over a network. The comparison can be triggered by a trigger event in one embodiment. If a private key belonging to a certificate authority is detected, a notification can be generated. Alternatively or in addition, a revocation request can be generated for public certificates corresponding to the compromised private key. | 06-17-2010 |
20100153921 | SYSTEM AND METHOD FOR SOFTWARE DEBUGGING USING VARIABLE LOCATION - This disclosure provides software hat identifies a variable in a computer program as a target variable. The software automatically processes a first source code statement in the computer program for the target variable. The software determines if the target variable is not found in the particular processed statement and progresses through preceding statements until the target variable is found. The software determines if the particular statement involves an indirect assignment to the target variable and can return that particular statement as the origination statement. Additionally, the software determines if the particular statement involves a direct assignment to the target variable from a second variable. If the particular statement involves a direct assignment to the target variable from a second variable, the software can change the target variable to the second variable and can progress through preceding statements until the new target variable is found in a particular of the statements. | 06-17-2010 |
20100153925 | Systems and methods for enhanced profiling of computer applications - Systems, methods, and computer-readable media are disclosed for enhanced profiling. An exemplary method includes initiating an execution of a software application which includes a plurality of routines, storing information related to data inputs to the plurality of routines during the execution of the software application, storing resource consumption information for the plurality of routines during the execution of the software application, correlating the resource consumption information for the plurality of routines to a size of the data inputs, and analyzing the correlated resource consumption information to determine a subset of the plurality of routines that exhibit at least a threshold amount of resource consumption with increasing size of the data inputs. | 06-17-2010 |
20100185621 | Systems and methods for performing authorization - Systems, methods, and computer program products are provided for performing an authorization check for a user. In one implementation, a data processing system is provided that includes means for storing first data descriptive of at least one directed acyclic graph and for storing second data descriptive of an assignment of a user to a first node of the graph. The data processing system also includes means for receiving an access request of the user, the access request specifying a second node of the graph. Furthermore, the data processing system includes means for determining a least common ancestor of the first and second nodes of the graph and means for performing an authorization check adapted to grant authorization for the access request if the least common ancestor of the first and second nodes is the first node. | 07-22-2010 |
20110133945 | Metric for Planned Downtime - A metric of a system is monitored using a monitoring tool that receives an operation metric and a planned downtime metric that reflects whether the monitored system is currently in a planned downtime, the planned downtime metric received as another one of the multiple metric inputs. The operation metric and the planned downtime metric are combined into a processed operation metric for the monitored system. | 06-09-2011 |
20110295896 | SYSTEMS AND METHODS FOR EXECUTING A NAVIGATION QUERY - Systems and methods consistent with the invention may include receiving a navigation query including input text, determining, via a processor, whether the input text is satisfies a predetermined criteria, generating a response including data representing a screen associated with the input text when the input text satisfies the predetermined criteria, selecting a language preference when the input text fails to satisfy the predetermined criteria, performing a fuzzy search based on the input text, the language preference, and usage history, and generating a response to the navigation query based on a result of the fuzzy search. | 12-01-2011 |
20110320876 | Systems and methods for processing source code during debugging operations - Systems and methods consistent with the invention may include displaying, during debugging of source code having corresponding executable code, a screen including a first section, wherein a variable name included in the source code is displayed in a first format in the first section, receiving a user selection of the variable name, converting, by using a processor, the first format of the variable name to a second format in response to the received selection, wherein the variable name includes a plurality of characters and converting the first format of the variable name to the second format includes converting the characters to uppercase, searching for a corresponding variable name in the executable code, and displaying, on the display device, a second section including the corresponding variable name, wherein the variable name is displayed in a third format in the second section. | 12-29-2011 |
20120159259 | Optimizing Performance Of An Application - An indication of a start of an execution of a process can be received, and a time counter associated with measuring a time elapsed can be initiated by the execution of the process. The time elapsed by the execution of the process can be compared with a predetermined threshold timeout value, and a report indicating the time elapsed by the execution of the process and whether the elapsed time exceeded the predetermined threshold timeout value can be automatically generated. | 06-21-2012 |
20120159522 | Application Level Contexts - A call for an application programming interface can be received from an application component at a context checking module, and a current application context of the application component within which the call for the application programming interface was generated can be determined. A context token of the application programming interface can be compared with the current application context, and if the context token does not match the context token, a remedial action can be executed. Related methods, systems, and articles of manufacture are disclosed. | 06-21-2012 |
20120166982 | CODE LIST CACHE FOR VALUE HELP - Methods and apparatus, including computer program products, are provided for providing value help. In one aspect, there is provided a computer-implemented method. The method may include receiving, at a code list provider, a request from a user interface for code list value help; accessing, by the code list provider, a cache including at least one code list, the cache implemented in memory; and sending, by the code list provider, the at least one code list accessed from cache to a user interface to enable the user interface to provide code list value help based on at least one code list. Related apparatus, systems, methods, and articles are also described. | 06-28-2012 |
20130014080 | BULK ACCESS TO METADATA IN A SERVICE-ORIENTED BUSINESS FRAMEWORK - A bulk service interface can be instantiated for each of at least one service provider providing a plurality of business objects using a stored definition of a plurality of metadata properties relating to generation of a user interface that incorporates content of a plurality of business objects. The bulk service interface can query the stored definition and access, in a bulk metadata access process, dynamic metadata required for instantiation of the plurality of business objects. If the stored definition has not previously been received, a default bulk services access process that queries an existing dynamic metadata access interface of each of the plurality of business objects can be initiated to retrieve the dynamic metadata from each of the plurality of business objects. An instance of the user interface can be generated using dynamic metadata accessed by the bulk service interface and/or the retrieved by the default bulk services access process. | 01-10-2013 |
20130086097 | QUERY LANGUAGE BASED ON BUSINESS OBJECT MODEL - Methods and apparatus, including computer program products, are provided for providing a query language based on a model. In one aspect, there is provided a computer-implemented method. The method may include receiving a first query; generating, based on a model including metadata representing a data structure, a second query specific to the data structure stored in a database; and sending the second query to the database. Related apparatus, systems, methods, and articles are also described. | 04-04-2013 |
20130111427 | IMPACT ANALYSIS AND ADOPTION PLANNING BASED ON GLOBAL WHERE-USED LISTS | 05-02-2013 |
20130163028 | ACCESSING CURRENT DATA BY USING CODE IMAGES - Techniques for accessing current data by using code images are described herein. In one aspect, a unique reference is generated in a computer system to a set of report parameters, and transformed to a scannable code image embedded in a document. In further aspect, the code image embedded in the document is captured at a smart device. A scanned copy of the code image or the extracted reference contained by the code image is sent to the computer system. A data report created based on the set of report parameters is executed in response to the receiving of the reference. In yet another aspect, the result from the execution of the data report is exposed to a consumer through an indicated output channel. | 06-27-2013 |
20130166675 | Computer System and Computer Method for Coarse-Grained Data Access - A computerized method for accessing business object data stored in a data buffer of a server computer includes providing an application program interface (API) having a function for specifying a set of paths through a business object stored as a data structure in a data buffer of a server computer. Each of the paths included in the set of paths specifies a plurality of nodes of the business object for accessing hosted data at the plurality of nodes. The method further includes receiving a set of parameters for the function of the API. The set of parameters specify the set of paths. The method further includes issuing the set of parameters to the server computer, retrieving hosted data from the plurality of nodes for each path in the set of paths; and transmitting to a client the hosted data retrieved from the plurality of nodes. | 06-27-2013 |
20130167036 | EXECUTING SYSTEM ACTIONS CORRESPONDING TO USER INPUTS - In an embodiment, the user input and a corresponding user input pattern is received on a computer generated user interface (UI). Based upon the user input pattern, a probable succeeding user input is predicted, and a network repository is queried to determine a system action corresponding to the probable succeeding user input. The system action may be an action that is estimated to be processed based upon the user input. This system action is processed to determine associated metadata, which is persisted in a UI buffer associated with the UI. A correlation between the succeeding user input and the predicted probable succeeding user input is determined; and based upon the correlation the metadata is retrieved from the UI buffer for execution. | 06-27-2013 |
20130268834 | CREATING INTERACTIVE FORMS FROM APPLICATIONS' USER INTERFACE - In one aspect, an interactive form container is generated for creation of an interactive form based on a UI of an application. The interactive form container establishes communication with the UI of the application. A data is received indicative of interactions with the UI of the application to execute a task associated with the application. Based on the interactions, a script records the interactions with the UI. In another aspect, copied UI objects from the UI of the application are added to the interactive form container to create the UI of the interactive form. The UI of the interactive form in association with the recorded script are stored to create the interactive form. | 10-10-2013 |
20140100995 | Collection and Use of Consumer Data Associated with Augmented-Reality Window Shopping - A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Vendors can benefit from various data aggregation and consumer incentive features. Related methods, systems, articles of manufacture, and the like are described. | 04-10-2014 |
20140100996 | DETERMINING NETWORKED MOBILE DEVICE POSITION AND ORIENTATION FOR AUGMENTED-REALITY WINDOW SHOPPING - A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Visual image processing based on one or more inputs from sensors on the mobile device can be used to compute and efficiently provide the two dimensional projection of the three dimensional model to be presented on the screen of the mobile device. Related methods, systems, articles of manufacture, and the like are described. | 04-10-2014 |
20140100997 | AUGMENTED-REALITY SHOPPING USING A NETWORKED MOBILE DEVICE - A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Related methods, systems, articles of manufacture, and the like are described. | 04-10-2014 |
20140173362 | Automatic Training Proposal For Data Transport - The subject matter disclosed herein provides methods and apparatus, including computer program products, for proposing training based on the prediction or measurement of different metrics associated with a transport request. In one aspect there is provided a method that may include preparing a transport request including one or more objects configured to provide an update of an application. The transport request may be associated with one or more metrics, each metric having a metric value. The method may also include determining whether the transport request includes at least one error by at least evaluating the metric value for each of the one or more metrics and comparing the metric value for each of the metrics with a threshold value; and proposing, based on the determining, at least one training course when the transport request includes the at least one error. Related systems, apparatus, methods, and/or articles are also described. | 06-19-2014 |