Patent classifications
G06F9/4493
Drag and drop interaction between components of a web application
A user of a web application can perform a drag and drop operation from a first component of the web application to a second component of the web application. The drag and drop operation can include three actions. The first action can be initializing a drag of an object within a first component of a web application. The second action can be dragging the object from within the first component over a drop target located within a second component of the web application. The third action can be dropping the object onto the drop target located within the second component of the web application. One of the first and second components can be a web component, and the other component can be a visualization component. The first and second components of the web application can communicate with each other using a communication component of the web application.
OBJECT DESERIALIZER USING OBJECT-RELATIONAL MAPPING FILE
A method and system for performing a unit test in a self-contained environment. The system may include using an object relationship mapping file to generate data objects that can be used for code for a unit test without having to refer to a database to perform a unit test. The data objects may further provide for simultaneous unit tests and a self-contained environment to perform the unit tests to improve the quality and resources required to perform such unit tests. The system may perform the unit tests independent of access to a database.
Controlling Service Functions
Techniques for controlling reactivation of service functions are described. Implementations, for example, enable various ways of controlling and storing service objects that provide service functions.
Methods for facilitating persistent storage of in-memory databases and devices thereof
A method, non-transitory computer readable medium, and application host computing device that parses assembly language code to identify a transaction block including an assignment to a memory location, the assembly language code associated with an application and output by a compiler. The assembly language code is modified to insert an invocation of a plurality of functions collectively configured to facilitate persistent storage of one or more data updates associated with the assignment at run-time. The assembly language code is assembled to generate object code and the object code is linked with at least a run-time library including a definition for each of the plurality of inserted functions to generate an executable file for the application.
Controlling service functions in response to service instigation and service reactivation messages
A service is delivered by a computer system comprising a processor, a memory accessible to the processor and computer storage. The memory holds code which defines service object classes. The service object classes are configured to provide service functions, and the service object classes are instantiated to create service objects which implement the service functions. For each service object, an associated service object identifier is generated in the memory which distinguishes that service object from any other service object. The service objects are serialized to generate serialized data, the serialized data comprising a representation of each service object, and the representation comprising that service object's service object identifier, that service object's associated state data and the service object identifier of any other service object referenced by that service object. Following deactivation, the service objects can be recreated by following the chain of references.
IDENTIFICATION OF POTENTIALLY SENSITIVE INFORMATION IN DATA STRINGS
Methods for identifying potentially sensitive information and protecting such potentially sensitive information include scanning systems that collect and/or disseminate such information. Without limitation, systems collect and/or disseminate personal identification numbers (e.g., personal identification numbers, tax identification numbers, etc.), such as merchant systems, bank systems, healthcare systems, and the like, that collect, use, or disseminate sensitive information may be scanned to identify sequences of data that are likely to be sensitive, and may take actions to protect such sequences of data. Scanning and protection systems are also disclosed.
SYSTEM AND METHOD OF RECONSTRUCTING COMPLEX CUSTOM OBJECTS
A system and method is provided for reconstructing one or more collections of objects across platforms. More particularly, Java Annotations are used to assist a Web Services Description Language (WSDL) wizard in reconstructing a collection of objects. In implementation, the system and method parses the object types such that a wizard can recreate or reconstruct the collection of objects for use by a receiving service. The method includes reconstructing a collection using one or more annotations that document a base object of the collection.
GENERATION APPARATUS, PROGRAM, AND GENERATION METHOD
A generation apparatus that generates a mapping between individual properties included in an object in a program and individual elements of a structured document. The generation apparatus includes: an object tree generation unit that generates a tree structure representing hierarchical structure of the object by assigning the individual properties included in the object to nodes of the tree structure; and a selection unit that selects a mapping minimizing conversion cost of converting the tree structure of the object to a tree structure that includes the individual elements of the structured document as its nodes. The selection is from mappings that associate the individual properties included in the object with the individual elements of the structured document.
System and method of reconstructing complex custom objects
A system and method is provided for reconstructing one or more collections of objects across platforms. More particularly, Java Annotations are used to assist a Web Services Description Language (WSDL) wizard in reconstructing a collection of objects. In implementation, the system and method parses the object types such that a wizard can recreate or reconstruct the collection of objects for use by a receiving service. The method includes reconstructing a collection using one or more annotations that document a base object of the collection.
Using multiple blockchains for applying transactions to a set of persistent data objects in persistent storage systems
A ledgered repository of persistent data objects is replicated on a network of persistent storage systems (PSSs) by transactions recorded across multiple blockchains. The blockchains are replicated on each of the PSSs. Using multiple blockchains enables greater parallelism; however, use of the multiple blockchains requires using measures that ensure that transactions distributed across multiple blockchains are applied in way that ensures a level of transactional consistency. Furthermore, the measures are efficient, thereby reducing overhead of maintaining a level of transactional consistency and increasing throughput of applying the transactions using multiple blockchains.