Patent classifications
G06F9/4493
Apparatuses, methods and systems for persisting values in a computing environment
The present disclosure is directed to persisting values in a computing environment, particularly using computer programs that are configured to run on a virtual machine. An illustrative method includes first launching a computer program, preferably within the environment of a virtual machine. The method further includes loading a plurality of classes associated with the computer program into memory by way of a specially configured class loader. This class loader is configured to scan at least one class of classes loaded into memory for at least one persistence-annotated field within that class. The specially configured class loader is further configured to write byte code into a class that contains the at least one persistence-annotated field. The byte code that is added to the class is configured to cause a first object that is later instantiated from the at least one class to have the persistence-annotated field.
Systems and methods for dynamic C# serialization
C Sharp (C#) system including one or more C Sharp (C#) computing devices for dynamically serializing C Sharp (C#) during runtime is provided. The C# system is configured to receive a serialized JSON class including at least one data object associated with at least one attribute name and deserialize the serialized JSON class. The C# system is also configured to serialize a C# class using the deserialized JSON class, and dynamically identify, from the C# class, the at least one data object during the runtime of the data objects. The C# system is further configured to generate a dynamic C# class, wherein the dynamic C# class includes a target class and a method for returning the at least one data object, and return the at least one data object.
Methods and systems to manage data objects in a cloud computing environment
The present disclosure relates to a platform that manages activity taken with respect to cloud-based software services. The platform manages data objects processed by software services and/or those entities that initiate processing events. The platform uses various identifiers such as, for example, a persistence identifier (PID) to track processing events. The platform implements rules and/or permissions related to the managed data objects and/or managed entities to determine whether processing events are in compliance. The platform may update database records, send alerts, send data graphs, or provide a real-time stream related to the managed data objects and/or managed entities.
Object mapping and conversion system
A system for mapping, converting, pruning, flattening, and persisting data amongst object-oriented systems and relational systems. Object class definitions and JSON objects define an object-oriented system and a relational database defines a relational system. An Object Relational Mapping (ORM) system exchanges data between an object-oriented system and a relational system. An ORM system includes an ORM Grammar, an ORM Specification, an ORM Data Structure, and an OR Mapping Unit. Data transfer can be achieved amongst relational and non-relational systems. An Object Conversion System (OCS) system exchanges data between one or more object-oriented systems. An OCS system includes an OCS Grammar, an OCS Specification, an OCS Data Structure, and an Object Conversion Unit. The ORM and OCS Specifications may use virtual attributes including path expressions. A path expression includes a chain of attribute names to specify a nested attribute in an object graph. Objects may be augmented with extra attributes during mapping or conversion. An OCS system can be used as an automatic object conversion machine. Multiple OCS systems may provide an Object Conversion Exchange service.
USING MULTIPLE BLOCKCHAINS FOR APPLYING TRANSACTIONS TO A SET OF PERSISTENT DATA OBJECTS IN PERSISTENT STORAGE SYSTEMS
A ledgered repository of persistent data objects is replicated on a network of persistent storage systems (PSSs) by transactions recorded across multiple blockchains. The blockchains are replicated on each of the PSSs. Using multiple blockchains enables greater parallelism; however, use of the multiple blockchains requires using measures that ensure that transactions distributed across multiple blockchains are applied in way that ensures a level of transactional consistency. Furthermore, the measures are efficient, thereby reducing overhead of maintaining a level of transactional consistency and increasing throughput of applying the transactions using multiple blockchains.
Identification of potentially sensitive information in data strings
Methods for identifying potentially sensitive information and protecting such potentially sensitive information include scanning systems that collect and/or disseminate such information. Without limitation, systems collect and/or disseminate personal identification numbers (e.g., personal identification numbers, tax identification numbers, etc.), such as merchant systems, bank systems, healthcare systems, and the like, that collect, use, or disseminate sensitive information may be scanned to identify sequences of data that are likely to be sensitive, and may take actions to protect such sequences of data. Scanning and protection systems are also disclosed.
METHOD AND SYSTEM FOR HANDLING DATA VALUES AND STRUCTURE IN A MEMORY
A method and system allow to store and retrieve data values and data structure in a memory of an embedded system, the memory also storing executable code uploaded to the embedded system by a first external system through a first version of a firmware. A serializer is configured to receive from the executable code, sizes of data, corresponding to a number of chunks of the data, together with values of the chunks, to form a series of bytes therewith through concatenation, to calculate a total size of the series of bytes, and to write to the memory, successively the total size and the formed series of bytes. A deserializer is configured to read from the memory, successively a total size and a series of bytes, to deconcatenate the series of bytes into successively sizes of data, corresponding to a number of chunks of the data, together with values of the chunks, and to send the same to the executable code.
Persistent node framework
A node framework capable of rendering any aspect of a computer model with persistence onto a graphical rendering surface of a computing device is disclosed. Initially, a plurality of nodes are received, where each of the plurality of nodes is associated with a payload, at one of the plurality of nodes is a persistent node, and another of the plurality of nodes has a predefined relationship with the persistent node. Next, the payload associated with each of the plurality of nodes extracted. Finally, display of information based on the extracted payload associated with each of the plurality of nodes is enabled.
Reusable dynamic object in runtime environment
An embodiment of the disclosure provides a method for using a reusable dynamic object in a runtime environment. The method includes: (a) configuring, using an object dictionary, properties of the dynamic object; (b) setting a persistence state for the dynamic object; (c) setting a hierarchy state for the dynamic object; (d) establishing a create data buffer, a read data buffer, an update data buffer, and a delete data buffer; and (e) instantiating the dynamic object at runtime, wherein the object dictionary includes an object structure, a logical to physical mapping, a persistence configuration, and object relationships for a plurality of dynamic objects, and the create data buffer, the read data buffer, the update data buffer, and the delete data buffer execute data persistence mechanisms based on the persistence configuration of the dynamic object.
Method invocation for persistent objects with dynamic multikeys
A mechanism is disclosed that enables the invocation of methods of object instances that have persistent data and a mutable key. A mutable key capability is advantageous in a variety of applications, such as monitoring a set of users and their login status on a plurality of media servers (e.g., an email server, an instant messaging server, a voice mail server, a video server, an audio-conferencing server, etc.). The methods that can be invoked include get methods, set methods, unset methods, finder methods, destructors, and business methods. Implementations based on the Enterprise JavaBean specification are disclosed for three illustrative embodiments of the present invention. The illustrative embodiments of the present invention can also be implemented in accordance with object persistence mechanisms other than Enterprise JavaBeans.