Patent classifications
G06F16/289
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS
The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.
Object storage system with control entity quota usage mapping
Example object storage systems, bookkeeping engines, and methods provide quota usage monitoring for control entities, such as accounts, users, and buckets. An object data store is configured to enable control entities to access data objects associated with each control entity. Data objects are mapped to the control entities and the data objects are processed to identify object usage values corresponding to each combination of data object and control entity. Total usage values are calculated for each control entity and used to determine a data object access response for a target data object and associated control entities.
System for detecting data relationships based on sample data
A method of identifying relationships between data collections is disclosed. Each data collection comprises a plurality of data records made up of data fields. The method comprises performing a relationship search process based on a first seed value and a second seed value. A first set of records from the data collections is identified based on the first seed value. A second set of records from the data collections is identified based on the second seed value. The process then searches for a common value across the first and second record sets, wherein the common value is a value which appears in a first field in a first record of the first record set and in a second field in a second record of the second record set, wherein the first record is from a first data collection and the second record is from a second data collection. In response to identifying the common value, an indication is output identifying a candidate relationship between the first field of the first data collection and the second field of the second data collection.
Mechanism for Deprecating Object Oriented Data
Techniques are described to allow the deprecation of classes in an object-oriented data model, such as a CDM for a CMDB. When a class is deprecated and replaced by another existing or new class, data associated with instances of the deprecated class may be migrated to the replacement class. A mapping between the deprecated class and its replacement class may be provided to allow existing applications to continue to access data using the deprecated class without change until the deprecated class is finally deleted or the application is updated to use the replacement class. New applications written to use the object-oriented data model after the deprecation may use the replacement class to access data instances created using the original data model.
RIS/PACS INTEGRATION SYSTEMS AND METHODS
Example integration systems and methods are disclosed and described. An example apparatus includes a processor and a memory at a first system. The example processor is to be configured by program instructions to at least: authenticate, at the first system, an identity of a first user; when the identity of the first user is positively authenticated by the first system, locate a first content requested by the first user at a second system; receive, at the first system, an authorization from the second system for the first user to access the first content at the second system; when the first user is positively authorized by the second system, provide, via a first viewer, access to the first content at the second system; and facilitate, via the first viewer, manipulation of the first content at the second system according to an access rule for the first content at the second system.
VALUE RANGE SYNOPSIS IN COLUMN-ORGANIZED ANALYTICAL DATABASES
The method may include providing, in accordance with a column-oriented storage technique, the data table as columns corresponding to the plurality of attributes, whereby each column includes a plurality of separate data blocks. The method may also include determining the plurality of records of the provided data table for which a plurality of attribute values of at least one selected column is contained in a plurality of predetermined data blocks. The method may further include determining, for each column of at least a part of the plurality of columns within the determined plurality of records, a plurality of attribute value information descriptive of an associated attribute within the column and providing an indication of the one or more data blocks for which the plurality of attribute value information is determined. The method may also include storing the determined plurality of attribute value information for enabling query processing.
SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT
In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.
Processing Techniques for Database Transaction Requests with Operations Defined by Different ORM Libraries
Techniques are disclosed relating to processing database transactions that include application operations defined by different object relational mapping (ORM) libraries. A transaction router module executing on a computer system receives, from an application, a request for a first database transaction, where the first database transaction includes first and second application operations. The transaction router module then translates the first application operation to one or more first database operations using a first ORM library and the second application operation to one or more second database operations using a second ORM library. Then, the transaction router module determines one or more database connections for the one or more first database operations and the one or more second database operations. Such techniques may advantageously allow applications to switch between using different persistence frameworks and message broker frameworks without substantial adjustments to application code.
Incorporating at-rest data encryption into a cloud-based storage architecture
Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
Interactive graphical user interfaces for simulated systems
Systems, computer program products, and computer-implemented methods for visualizing and interacting with a plurality of models that collectively represent a real world system depicted in a graphical user interface (GUI). The system described herein may generate an interactive GUI with multiple modes and a plurality of panels associated with the plurality of models. These panels and modes lay the framework for how a user can properly visualize and analyze the models at a particular point in time or over a period of time. The systems, computer program products, and computer-implemented methods may thus, according to various embodiments, enable a plurality of models that collectively represent a real world system be interacted with and visualized by a graphical user interface.