Patent classifications
G06F16/95
Tenant separation for analytical applications in a remote application integration scenario
A tenant separation architecture is provided to adopt tenant separation for remote integration of various OEM systems with a cloud-based analytics application. The tenant separation architecture provided herein allows for tenant separation in a wide range of modules in different OEM integration scenarios through a token-base authentication. Application server tenants and database tenants may be accessed for application of the tenant separation. Moreover, the tenant separation implementations disclosed herein may be applied to different modules for metadata, tenant configuration, authorization concepts, and general data protection regulation (GDPR) adoption.
Personalized search result rankings
The present concepts relate to an improved personalized search engine that can generate personalized rankings of search results in view of individual user's personal preferences and interests. Information about a segment of online content is collected. Certain activities by a user are tracked, including search queries submitted by the user, search results clicked on by the user, and/or web pages browsed by the user. From these activities, the user's preferences relating the segment are inferred using the collected segment information. When the user conducts a search directed to the segment, certain search results that the user is more likely to be interested in, based on the user's preferences, are ranked higher to generate the personalized rankings.
Cloud environment analytics using snapshotting
The technology disclosed relates to streamlined analysis of security posture of a cloud environment. In particular, the disclosed technology relates to a system that analyzes data posture in a cloud environment database using a snapshot of the database. A computer-implemented method includes receiving a request to access a database in the cloud environment, wherein the database includes a first authentication requirement. The method includes identifying a snapshot of the database, wherein the snapshot includes a second authentication requirement that is different than the first authentication requirement. The method includes accessing the snapshot using the second authentication requirement, generating a representation of the database using the snapshot, and generating a data posture analysis result indicative of a data posture of the database based on scanning the representation of the database.
System and method for rich short messaging service
A method and system employing a rich short message service application (RSAPP) for creating and transmitting a rich message are provided. The rich message includes a message and a brand identity. The RSAPP receives a request to send a short message service (SMS) message to a mobile number of a user (MNU). The RSAPP processes the request to send the SMS message and determines whether the MNU is enabled on one or more rich messaging channels (RMCs). Upon determining that the MNU is enabled on the RMCs, the RSAPP creates and transmits the rich message to the MNU on the enabled RMCs. Upon determining that the MNU is not enabled on the RMCs, the RSAPP confirms whether a setting specifies transmission of the received SMS message to the MNU as a SMS message if the MNU is not enabled on the RMCs. and the RSAPP transmits the received SMS message as a SMS message to the MNU.
Extending RESTful Web Service Resources in a JAVA-Component-Driven-Architecture Application
A system and method are disclosed for an application server having one or more web application archives and one or more endpoints, determining whether a functionality of one or more endpoints is to be changed, and responsive to the determination of whether an endpoint of the one or more endpoints is to be changed, determining a link to a functionality component located external to the one or more web application archive that is to replace the functionality of the endpoint, and causing the external functionality component to link to the endpoint.
Extending RESTful Web Service Resources in a JAVA-Component-Driven-Architecture Application
A system and method are disclosed for an application server having one or more web application archives and one or more endpoints, determining whether a functionality of one or more endpoints is to be changed, and responsive to the determination of whether an endpoint of the one or more endpoints is to be changed, determining a link to a functionality component located external to the one or more web application archive that is to replace the functionality of the endpoint, and causing the external functionality component to link to the endpoint.
Managing session secrets for continuous packet capture systems
Embodiments are direct to monitoring communication between computers may be using network monitoring computers (NMCs). Network packets that are communicated between the computers may be captured and stored in a data store. If the NMCs identify a secure communication session established between two computers, the NMCs may obtain key information that corresponds to the secure communication session that includes a session key that may be provided by a key provider. Correlation information associated with the secure communication session may be captured by the NMCs. The correlation information may include tuple information associated with the secure communication session. And, the key information and the correlation information may be stored in a key escrow. The key information may be indexed in the key escrow using the correlation information.
Managing session secrets for continuous packet capture systems
Embodiments are direct to monitoring communication between computers may be using network monitoring computers (NMCs). Network packets that are communicated between the computers may be captured and stored in a data store. If the NMCs identify a secure communication session established between two computers, the NMCs may obtain key information that corresponds to the secure communication session that includes a session key that may be provided by a key provider. Correlation information associated with the secure communication session may be captured by the NMCs. The correlation information may include tuple information associated with the secure communication session. And, the key information and the correlation information may be stored in a key escrow. The key information may be indexed in the key escrow using the correlation information.
Analytics system onboarding of web content
Analytics system onboarding of web content is described. In one example, an analytics onboarding system is configured to process web content to generate recommendations, automatically and without user intervention. The recommendations are configured to assist in mapping of web content variables in web content to data elements supported by an analytics system to generate metrics that describe occurrence of events as part of user interaction with web content.
Automated sequential site navigation
A website is navigated automatically in a sequential manner, for example by performing a series of specific network requests in a specified order, without necessarily using a browser, and without necessarily rendering each web page in the sequence. Interactions with a website are automatically recorded, stored, and analyzed. Requests and responses can be associated with particular in-put/output operations. Based on the analysis, the system can determine what data is expected by web servers, so that it can effectively simulate browser operations in connection with those web servers, and extract useful information from the data received in response to those operations. Thus, data extraction and/or other operations can be performed more efficiently and more quickly, while reducing the computing resources needed.