Patent classifications
H04L67/561
Support for Multi-Type Users in a Single-Type Computing System
Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.
Support for Multi-Type Users in a Single-Type Computing System
Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.
Virtual research platform
Systems and methods for automated data curation and presentation are disclosed herein. The system can include a memory including a structured database and a plurality of storage bins. The system can include at least one server that can receive a packetized data file generated from a data file. This packetized data file can include a first packet generated from a content file of the data file, a second packet generated from metadata of the data file, and a third packet generated from a payload of the data file. The at least one server can automatically generate at least one tag for the packetized data file, which at least one tag is automatically generated based at least one key phrase identified in at least the targeted portion of the content file. The at least one server can index the packetized data file according to the at least one tag into a predetermined taxonomy, receive a data request including a plurality of parameters identifying attributes of packetized data, and deliver curated data selected according to the at least some of the plurality of parameters of the data request.
Multi-tenancy via code encapsulated in server requests
A multitenant infrastructure server (MTIS) is configured to provide an environment to execute a computer routine of an arbitrary application. The MTIS receives a request from a webtask server to execute the computer routine in a webtask container. The computer routine is executed in the webtask container at the MTIS. Upon successful execution of the computer routine, a result set is returned to the webtask server. If the execution of the computer routine is unsuccessful, an error notification is returned to the webtask server. The resources consumed during the execution of the computer routine are determined. The webtask container is destroyed to prevent persistent storage of the computer routine on the MTIS.
Multi-tenancy via code encapsulated in server requests
A multitenant infrastructure server (MTIS) is configured to provide an environment to execute a computer routine of an arbitrary application. The MTIS receives a request from a webtask server to execute the computer routine in a webtask container. The computer routine is executed in the webtask container at the MTIS. Upon successful execution of the computer routine, a result set is returned to the webtask server. If the execution of the computer routine is unsuccessful, an error notification is returned to the webtask server. The resources consumed during the execution of the computer routine are determined. The webtask container is destroyed to prevent persistent storage of the computer routine on the MTIS.
Sticky sessions in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
Sticky sessions in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
Customer data handling in a proxy infrastructure
Systems and methods herein provide for a proxy infrastructure. In the proxy infrastructure, a network element (e.g., a supernode) is connected with a plurality of exit nodes. At one of a plurality of messenger units of the proxy infrastructure, a proxy protocol request is received directly from a client computing device. The proxy protocol request specifies a request and a target. In response the proxy protocol request, a selection is made between one between one of the plurality of exit nodes. A message with the request is sent from the messenger to the supernode connected with the selected exit node. Finally, the message is sent from the supernode to the selected exit node to forward the request to the target.
System and method for namespace masking in an integration flow
Systems and methods for namespace masking in an integration flow. In order to mitigate issues arising due to application updates impacting integration flows, during the metadata generation phase, all the elements which are available for operation selection can be cloned and replaced with a new namespace. The original elements are deleted from the metadata. The systems and methods can maintain the original namespace and the element name at a predefined place in the metadata (e.g., as an attribute of the cloned Element). The cloned element in addition to all the original fields of the element, can have one additional field which will store the value of the original namespace.
System and method for namespace masking in an integration flow
Systems and methods for namespace masking in an integration flow. In order to mitigate issues arising due to application updates impacting integration flows, during the metadata generation phase, all the elements which are available for operation selection can be cloned and replaced with a new namespace. The original elements are deleted from the metadata. The systems and methods can maintain the original namespace and the element name at a predefined place in the metadata (e.g., as an attribute of the cloned Element). The cloned element in addition to all the original fields of the element, can have one additional field which will store the value of the original namespace.