Subscribe: freepatentsonline.com: Data processing: database and file management or data structures
http://www.freepatentsonline.com/rssfeed/rsspat707.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
data  database  includes  information  method  object  processing  request  search  server  stream processing  system  user 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: freepatentsonline.com: Data processing: database and file management or data structures

Untitled





 



Transaction begin/end instructions

Tue, 24 May 2016 08:00:00 EDT

A TRANSACTION BEGIN instruction and a TRANSACTION END instruction are provided. The TRANSACTION BEGIN instruction causes either a constrained or nonconstrained transaction to be initiated, depending on a field of the instruction. A constrained transaction has one or more restrictions associated therewith, while a nonconstrained transaction is not limited in the manner of a constrained transaction. The TRANSACTION END instruction ends the transaction started by the TRANSACTION BEGIN instruction.



Maintaining a relationship between two different items of data

Tue, 17 Nov 2015 08:00:00 EST

Data is stored persistently. At least two different items of the data are stored in two different non-conflicting regions or two different physical clusters. A relationship is maintained between the two different items of data. The relationship enables a process to reach any one of the data items from the other data item. Consistency of the relationship is maintained notwithstanding updates of either or both of the items.



Systems and methods for remote deletion of contact information

Tue, 03 Nov 2015 08:00:00 EST

An exemplary system for providing remote deletion of contact information includes a first device associated with a first user. The first device is configured to generate and send a delete request message to a second device. In some embodiments, the delete request message includes a request to delete contact information for the first user from the second device. The second device can be configured to receive the delete request message and delete the first user's contact information. A method for providing remote deletion of contact information includes a delete request message being generated at a first device, associated with a first user. The delete request message can include a request to delete contact information for the first user. The first device can send the delete request message to a second device. The delete request message can instruct the second device to delete the first user's contact information.



Object arrangement apparatus for determining object destination, object arranging method, and computer program thereof

Tue, 13 Oct 2015 08:00:00 EDT

Disclosed is an object arrangement apparatus which arranges a plurality of objects approximately uniformly to a plurality of arrangement destinations by a comparatively easy processing configuration. This object arrangement apparatus includes an arrangement destination determination means. The arrangement destination determination means refers to sequence information generated based on unique information for objects and refers to corresponding information between arrangement destination identifiers identifying arrangement destinations of the objects and second numbers associated with the arrangement destination identifiers. The arrangement destination determination means generates first numbers by using the sequence information, the first numbers not having a correlation therebetween when the first numbers are generated with different sequence information, and repeats generating a new first number until the first number matches the second number contained in the corresponding information. The arrangement destination determination means determines, when the first number matches any of the second numbers, to arrange the object to an arrangement destination corresponding to the arrangement destination identifier related to the matched second number.



Method and apparatus for providing information about an identified object

Tue, 29 Sep 2015 08:00:00 EDT

A method and apparatus for identifying an object from an image or context aware information and providing information about the identified object. The method includes identifying at least one object included in an image being displayed or to be displayed on a user device, obtaining relationship information of an identified object based on identification information of the identified object, and outputting the relationship information to at least one of the user device and a device of the identified object.



Query rewrite with a nested materialized view

Tue, 15 Sep 2015 08:00:00 EDT

A query, issued to a database server, is re-written with a nested materialized view. The selected materialized view is nested within a “parent” materialized view that has one or more nesting levels for one or more nested materialized views. The selected nested materialized view has a cardinality associated therewith, which is lower than the cardinality associated with any of the other nested materialized views, and is nested at a final nesting level of the one or more nesting levels.



Distributed data management system

Tue, 01 Sep 2015 08:00:00 EDT

A distributed data management system has multiple virtual machine nodes operating on multiple computers that are in communication with each other over a computer network. Each virtual machine node includes at least one data store or “bucket” for receiving data. A digital hash map data structure is stored in a computer readable medium of at least one of the multiple computers to configure the multiple virtual machine nodes and buckets to provide concurrent, non-blocking access to data in the buckets, the digital hash map data structure including a mapping between the virtual machine nodes and the buckets. The distributed data management system employing dynamic scalability in which one or more buckets from a virtual machine node reaching a memory capacity threshold are transferred to another virtual machine node that is below its memory capacity threshold.



Information organizing sytem and information organizing method

Tue, 25 Aug 2015 08:00:00 EDT

An information organizing system includes a reference information database storing reference information, a generalized expression unit to map measurement data and non-measurement data in a space in such a manner that the more they resemble each other, the shorter a distance between them becomes, an extended reference database in which the reference information is expressed in an extended manner by using the generalized expression unit, extended log data in which log data is expressed in an extended manner by using the generalized expression unit, a relevance detection unit to detect extended reference information having high relevance with the extended log data, and a template creation unit to create a predetermined template in which the log data is summarized by using the detected extended reference information.



Associative search engine

Tue, 18 Aug 2015 08:00:00 EDT

This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlating the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user.



System and method for collecting and accessing product information in a database

Tue, 11 Aug 2015 08:00:00 EDT

A database system is disclosed. The database system includes a matching module configured to query a database for users which have data matching an interest of another user and to selectively grant to one or more of the users access to data of the other user based at least in part on a result of the query and on an access control list.



Mistake avoidance and correction suggestions

Tue, 14 Jul 2015 08:00:00 EDT

In an illustrative embodiment, an apparatus, computer-readable medium, or method may be configured to avoid command mistakes and suggest corrections. Known commands may be accessed which may include at least one expected identifier, alternative identifier, and/or identifier pattern. The frequencies of occurrence of the known commands may be calculated. A command with entered identifiers may be received and at least one possible mistake in the entered identifiers may be detected. A first numerical score for the known commands may be calculated using a string matching algorithm, a keystroke penalty matrix, and/or the detected at least one possible mistake. A second numerical score may be calculated using the frequencies of occurrence of the known commands and the first numerical score. Expected identifiers may be selected using the first and second numerical scores. A user-selectable command may be created using the expected known commands and displayed.



Merging apparatus and merging method

Tue, 16 Jun 2015 08:00:00 EDT

A merging apparatus includes a first database in which a plurality of attributes including a key attribute that is set in advance as a key for merging is set and a second database in which one or a plurality of attributes excluding the key attribute is set. Furthermore, the merging apparatus checks an attribute that is set in the first database against an attribute that is set in the second database and extracts a common attribute that is set in common in both the first database and the second database. Then, the merging apparatus merges the first database with the second database by determining whether attribute values classified under the extracted common attribute match.



Public electronic document dating list

Tue, 09 Jun 2015 08:00:00 EDT

Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.



Method and apparatus of determining product category information

Tue, 02 Jun 2015 08:00:00 EDT

A user may submit product title information to a server. The server may generate a phrase based on the product title information. The server may then search a database to find relevancies between the phrase and product categories corresponding to multiple nodes in a product category tree. Based on the relevancies, the server may select a node from the multiple nodes. The server may associate the product title information with the node corresponding to a product category when the node is a leaf node of the product category tree.



Crawling multiple markets and correlating

Tue, 26 May 2015 08:00:00 EDT

A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.



Information sharing

Tue, 26 May 2015 08:00:00 EDT

Systems and methods for the sharing of information between organizations are disclosed. Policies that govern the permissions for the sharing of information are represented as Boolean functions such as Binary Decision Diagrams.



System and method for event-driven live migration of multi-process applications

Tue, 26 May 2015 08:00:00 EDT

A system, method, and computer readable medium for asynchronous live migration of applications between two or more servers. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Asynchronous live migration is provided through a combination of process replication, logging, barrier synchronization, checkpointing, reliable messaging and message playback. The live migration is transparent to the application and requires no modification to the application, operating system, networking stack or libraries.



Method and apparatus for accelerating connections in a cloud network

Tue, 26 May 2015 08:00:00 EDT

Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission of encrypted data from an application server uses an encryption scheme that encrypts static data using a first encryption scheme that derives keys from the content itself and encrypts dynamic data, such as dynamic website content with personalized user data, using a second encryption scheme.



Managing CPU resources for high availability micro-partitions

Tue, 26 May 2015 08:00:00 EDT

A partition manager relocates a logical partition from a primary shared processor pool to a secondary shared processor pool in response to a predetermined condition, such as a hardware failure. The relocated logical partition is allocated a smaller quantity of processing units from the secondary pool than it was allocated from the primary pool. A quantity of processing units reserved for a second logical partition is identified in the secondary shared processor pool, and a portion of those reserved processing units are allocated to the relocated logical partition. The reserved processing units may be redistributed among multiple relocated logical partitions.



Multipass programming in buffers implemented in non-volatile data storage systems

Tue, 26 May 2015 08:00:00 EDT

The various implementations described herein include systems, methods and/or devices used to enable multipass programming in buffers implemented in non-volatile data storage systems (e.g., using one or more flash memory devices). In one aspect, a portion of memory (e.g., a page in a block of a flash memory device) may be programmed many (e.g., 1000) times before an erase is required. Some embodiments include systems, methods and/or devices to integrate Bloom filter functionality in a non-volatile data storage system, where a portion of memory storing one or more bits of a Bloom filter array may be programmed many (e.g., 1000) times before the contents of the portion of memory need to be moved to an unused location in the memory.



Network control apparatus and method for port isolation

Tue, 26 May 2015 08:00:00 EDT

Some embodiments provide a method for managing a logical switching element that includes several logical ports. The logical switching element receives and sends data packets through the logical ports. The logical switching element is implemented in a set of managed switching elements that forward data packets in a network. The method provides a set of tables for specifying forwarding behaviors of the logical switching element. The method performs a set of database join operations on the tables to specify in the tables that the logical forwarding element drops a data packet received through a first logical port when the data packet is headed to a second logical port different than the first logical port.



Methods and apparatus for a plug-in model for publishing structured meta-data based discovery

Tue, 26 May 2015 08:00:00 EDT

Methods and apparatus for publishing services and performing queries for service in a network are described herein. Service descriptions writing in a native search description language are translated to a normalized schema. The normal schema is published to the network. Queries to the network, which may be written in any native search description language, are also translated to normalized schema prior to performing the search. Accordingly, all services available can be published and located in a query without consideration of the native search description language.



Flow control method and apparatus for enhancing the performance of web browsers over bandwidth constrained links

Tue, 26 May 2015 08:00:00 EDT

Flow control is applied to increasing the performance of a browser while pre-fetching Web objects while operating over bandwidth constrained links to increase the level of concurrency, thus reducing contention for limited bandwidth resources with increased levels of concurrency. Using an agent or a gateway to speed up its Internet transactions over bandwidth constrained connections to source servers. Assisting a browser in the fetching of objects in such a way that an object is ready and available locally before the browser requires it, without suffering congestion on any bandwidth constrained link. Providing seemingly instantaneous availability of objects to a browser enabling it to complete processing the object to request the next object without much wait.



Stream processing using a client-server architecture

Tue, 26 May 2015 08:00:00 EDT

A method for responding to requests using stream processing includes, responsive to a server request received from a server, a stream processing request being sent to a first stream processing node. Responsive to a create response message received from a second stream processing node, a stream processing result is correlated with the server request. A write response message including the stream processing result is sent to the server. The stream processing request is derived from the server request and includes a request identifier associated with the server request. The create response message includes the stream processing result and the request identifier.



Stream processing using a client-server architecture

Tue, 26 May 2015 08:00:00 EDT

A computer hardware system configured to respond to requests using stream processing includes a HTTP stream server including at least one processor. The at least one processor is configured to initiate and/or perform the following. Responsive to a server request received from a server, a stream processing request is sent to a first stream processing node. Responsive to a create response message received from a second stream processing node, a stream processing result is correlated with the server request. A write response message including the stream processing result is sent to the server. The stream processing request is derived from the server request and includes a request identifier associated with the server request. The create response message includes the stream processing result and the request identifier.



Searching the internet for common elements in a document in order to detect plagiarism

Tue, 26 May 2015 08:00:00 EDT

A method and system for detecting plagiarism of software source code is disclosed. In one embodiment, a database exists of program elements that have previously been found to be matching within the source code for two different programs. This embodiment searches the Internet for occurrences of these matching program elements to determine how many times they appear and thus whether they are commonly used or not. The elements and their associated number of hits are placed in a spreadsheet for further observation and manipulation. One of skill in the art will see that this invention also applies to other kinds of text documents.



System and method for efficient data storage

Tue, 26 May 2015 08:00:00 EDT

A system and method for efficient data storage, which reduces data entropy of data on a data storage device. The technique organizes related data entities (such as files on a hard drive) in close physical proximity and in a predictive or ordered sequence, to reduce the amount of time and effort (mechanical, computational, or otherwise) a storage/retrieval device needs to expend locating each data related entity as it processes a sequence of requests. In addition, the data may be organized and stored according to a file directory index structure, whereby file fragmentation is reduced.



System and method for efficient data storage

Tue, 26 May 2015 08:00:00 EDT

A system and method for efficient data storage, which reduces data entropy of data on a data storage device. The technique organizes related data entities (such as files on a hard drive) in close physical proximity and in a predictive or ordered sequence, to reduce the amount of time and effort (mechanical, computational, or otherwise) a storage/retrieval device needs to expend locating each related data entity as it processes a sequence of requests. In addition, the data may be organized and stored according to a file directory index structure, whereby file fragmentation is reduced.



Metadata subsystem for a distributed object store in a network storage system

Tue, 26 May 2015 08:00:00 EDT

A network storage server system includes a distributed object store and a metadata subsystem. The metadata subsystem stores metadata relating to the stored data objects and allows data objects to be located and retrieved easily via user-specified search queries. It manages and allows searches on at least three categories of metadata via the same user interface and technique. These categories include user-specified metadata, inferred metadata and system-defined metadata. Search queries for the metadata can include multi-predicate queries.



Storing information in a trusted environment for use in processing data triggers in an untrusted environment

Tue, 26 May 2015 08:00:00 EDT

A server system having memory and one or more processors running a trusted internal process receives, from an untrusted external process of one or more external processes, a request to interact with a data item. In response to the request, the server system interacts with the first data item and stores a marker indicative of the interaction with the data item. After storing the marker, the server system identifies a plurality of markers corresponding to a plurality of data items and retrieves information corresponding to the plurality of markers. The retrieved information enables a determination, for each data item in the plurality of data items, as to whether an operation corresponding to the data item is to be executed. When a determination has been made that an operation corresponding to the data item is to be executed, the server system deletes the markers in conjunction with execution of the operation.



Online database availability during upgrade

Tue, 26 May 2015 08:00:00 EDT

An online service includes databases that are upgraded while still processing requests. For example, web servers continue to request operations on the database while it is being upgraded. The schema of the database is upgraded before the web servers are upgraded to utilize the upgraded schema. Changes that are made to the upgraded schema are backwards compatible with the schema being used during the upgrade process. Restrictions are placed on the operations performed on the database during the upgrade process. After upgrading the schema, the web servers of the online service are upgraded to use the upgraded schema.



Metadata brokering server and methods

Tue, 26 May 2015 08:00:00 EDT

Exemplary embodiments of the present invention provide methods and systems for supplying rich multimedia metadata usable to generate, e.g., sophisticated entertainment user interfaces in the home. These methods and systems can be implemented as a server-based software application that feeds multiple, diverse clients. The server functionality could be distributed, even co-located physically with one or more clients, or centralized. The server aggregates, filters, validates, augments and links metadata from disparate sources. The server transforms the metadata into a more manageable and extensible internal format. The server communicates with client devices using a schema-independent protocol, providing metadata in the appropriate format that suites the clients needs.



Interfacing an R language client environment with a database engine

Tue, 26 May 2015 08:00:00 EDT

A method, system, and computer program product for interfacing an R language client with a separate database engine environment. The method commences by interpreting an R language code fragment to identify and select R language constructs and transforming the R language constructs into queries or other database language constructs to execute within the database engine environment. The method further implements techniques for transmitting marshalled results (resulting from the execution of the database language constructs) back to the R client environment. In some situations, the marshalled results include an XML schema or DTD or another metadata description of the structure of the results. User conveniences in the form of transparent database query construction, and transparent exploitation of parallelism is achieved by determining the computation resource requirements of executable language constructs, and mapping the execution to one (or more) of, a local R client, a database engine, or a remote execution engine.



Self-learning data lenses for conversion of information from a first form to a second form

Tue, 26 May 2015 08:00:00 EDT

A semantic conversion system (1900) includes a self-learning tool (1902). The self-learning tool (1902) receives input files from legacy data systems (1904). The self-learning tool (1902) includes a conversion processor (1914) that can calculate probabilities associated with candidate conversion terms so as to select an appropriate conversion term. The self-learning tool (1902) provides a fully attributed and normalized data set (1908).



High performance map editor for business analysts

Tue, 26 May 2015 08:00:00 EDT

A method for implementing a map editor for business analysts is disclosed herein. In one embodiment, such a method includes receiving a business object model including at least one business object. The business object model is transformed into an XSD-based model including at least one XML schema. The XSD-based model is then fed into an XML mapping infrastructure for model map processing. After processing, the XSD-based model is transformed into a resulting business object model. The resulting business object model may then be displayed for use by a business analyst. A corresponding computer program product and system are also disclosed herein.



Peer to peer (P2P) federated concept queries

Tue, 26 May 2015 08:00:00 EDT

Embodiments of the invention are generally related to data processing, and more specifically to retrieving results for a query from one or more devices coupled to a network. A first device may receive an abstract query including logical fields defined by a first data abstraction model and retrieve query results stored in the first device. The query may be sent to one or more other devices via the network. The one or more other devices may be configured to convert the abstract query to local abstract queries including logical fields defined in local data abstraction models. The local queries may be issued against local databases to retrieve additional results for the query.



System and method for providing an intelligent configuration rationalization solution

Tue, 26 May 2015 08:00:00 EDT

A system and method are disclosed for rationalizing configurations associated with one or more products. The system includes a database associated with one or more customers. The system further includes an order analysis system coupled with the database. The order analysis system is capable of rationalizing the differences between configurations of various combinations of options that are stored in the database.



System and method for performing memory management using hardware transactions

Tue, 26 May 2015 08:00:00 EDT

The systems and methods described herein may be used to implement a shared dynamic-sized data structure using hardware transactional memory to simplify and/or improve memory management of the data structure. An application (or thread thereof) may indicate (or register) the intended use of an element of the data structure and may initialize the value of the data structure element. Thereafter, another thread or application may use hardware transactions to access the data structure element while confirming that the data structure element is still part of the dynamic data structure and/or that memory allocated to the data structure element has not been freed. Various indicators may be used determine whether memory allocated to the element can be freed.



Custom entities and fields in a multi-tenant database system

Tue, 26 May 2015 08:00:00 EDT

Systems and methods for hosting variable schema data such as dynamic tables and columns in a fixed physical database schema. Standard objects, such as tables are provided for use by multiple tenants or organizations in a multi-tenant database system. Each organization may add or define custom fields for inclusion in a standard object. Custom fields for multiple tenants are stored in a custom data column within the object data structure, and this single custom data column may contain different data types for each tenant.



Migration of data from a legacy system

Tue, 26 May 2015 08:00:00 EDT

A method and system for translating data to be migrated from an older legacy database to a newer recipient database. Legacy data elements in the older legacy database are translated to correspond the one or more recipient data elements in the newer recipient database by utilizing a translation table in the older legacy database. The translation table defines recipient data elements in the newer recipient database based upon metadata of the older legacy database. The metadata of the older legacy database describes legacy data fields in the older legacy database. The older legacy database utilizes a first operating system. The newer recipient database utilizes a second operating system that differs from the first operating system. The legacy data elements translated in the older legacy database are used to migrate the legacy data elements translated from the older legacy database to the newer recipient database.



Display entity relationship

Tue, 26 May 2015 08:00:00 EDT

Method, system, and programs for providing one or more explanations. An inquiry is received via a communication platform where the inquiry is about how a set of entities are related. Information is retrieved from a knowledge storage in accordance with the set of entities and such information describes a plurality of entities and relationships existing among the plurality of entities. Based on such retrieved information, one or more explanations with respect to each relationship by which the set of entities are connected are generated. The one or more explanations are then transmitted as a response to the inquiry.



Internal linking co-convergence using clustering with no hierarchy

Tue, 26 May 2015 08:00:00 EDT

Certain implementations of the disclosed technology include systems and methods for linking entities in an internal database by utilizing co-convergence and clustering. The method may include clustering database records into a first set of clusters having corresponding first cluster identifications (IDs). The clustering may be based at least in part on determining similarity among corresponding field values. The method may include associating mutually matching database records, by performing at least one matching iteration for each of the database records. The method may include determining similarity among corresponding field values of the database records, re-clustering at least a portion of the database records into a second set of clusters, the re-clustering based at least in part on the associating mutually matching database records and on the determining similarity among corresponding field values of the database records.



Enterprise search over private and public data

Tue, 26 May 2015 08:00:00 EDT

A unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user.



System and method for identifying a component for a tire pressure monitoring system

Tue, 26 May 2015 08:00:00 EDT

A system and method for identifying a component, such as a sensor, for a Tire Pressure Monitoring System (TPMS) to be replaced for a vehicle of interest by performing a Quick Search or an Advanced Search of a TPMS Manager database. In the Quick Search, the user inputs year/make/model (Y/M/M) or Vehicle Identification Number (VIN). In the Advanced Search, the user inputs various physical attributes of the component to be replaced. All related superseded, alias or interchange parts with like communication or physical structure and relevant service components are determined and the results displayed to the user. A relearn procedure for the replacement TPMS component for the vehicle of interest identifies and validates scan tool compatibility. A report to the user of a cause/failure analysis of the component to be replaced can be displayed.



Document processing method and system

Tue, 26 May 2015 08:00:00 EDT

A method and system for expanding a document set as a search data source in the field of business related search. The present invention provides a method of expanding a seed document in a seed document set. The method includes identifying one or more entity words of the seed document; identifying one or more topic words identifying one or more topic words related to a based entity word in the seed document where the entity word is located; forming an entity word-topic word pair from each identified topic word and the entity word on the basis of which each topic word is identified; and obtaining one or more expanded documents by taking the entity word and topic word in each entity word-topic word pair as key words for web searching at the same time. A system for executing the above method is also provided.



Apparatuses, methods and systems for a journal entry automator

Tue, 26 May 2015 08:00:00 EDT

The APPARATUS, METHODS AND SYSTEMS FOR A JOURNAL ENTRY AUTOMATOR (hereinafter “JEA”) implement efficient and scalable monitoring, regulation, and allocation of computational processing, data, labor, and/or the like resources within an enterprise. In some embodiments, the JEA may facilitate, in various implementations, transaction classification through the use of universal variables and economical interface features. In one embodiment, classification rules for assigning accounting Classes/Subclasses to transactions may be defined. Upon receipt of an indication of a transaction, the transaction is tagged with transaction characteristics. Based on relevant transaction characteristics, accounting Classes/Subclasses may be assigned to the transaction using the applicable classification rules.



Apparatuses, methods and systems for an automated data extractor

Tue, 26 May 2015 08:00:00 EDT

The APPARATUSES, METHODS AND SYSTEMS FOR AN AUTOMATED DATA EXTRACTOR (hereinafter “ADE”) implement efficient and scalable monitoring, regulation, and allocation of computational processing, data, labor, and/or the like resources within an enterprise. In some embodiments, the ADE may access data via a plurality of universal variables linked to tables and/or fields across multiple, otherwise disparate database systems, providing economical access to data in those tables and/or fields. In some implementations, the universal variables may be selectively chosen for broad applicability to a vast swath of enterprise data types and organizations, and may themselves be organized in accordance with a hierarchical schema facilitating business understanding and decision making. The ADE may further facilitate, in various implementations, report generation, data accessibility, scheduled and/or triggered distribution of data updates, and/or the like through the use of universal variables and economical interface features.



Query stream execution using priority gradient multiprogramming

Tue, 26 May 2015 08:00:00 EDT

A workload management system and operating method are configured for query stream execution using priority gradient programming. The workload management system comprises a database system that executes queries at a priority gradient wherein no more than a predetermined number of queries execute at a particular priority, and a scheduler that schedules queries for execution on the database system and restricts the queries to a number that consumes less than total system memory.



Method for searching document objects on a network

Tue, 26 May 2015 08:00:00 EDT

Methods for searching relationships between and among documents are detailed. One method includes steps for selecting one or more initial search items from a group consisting of: (a) document objects, (b) link references to document objects, (c) link reference attributes, and (d) link relationship attributes. The method also includes steps for identifying one or more link relationships using the selected initial search items, and for presenting one or more link relationships attributes describing the identified link relationships. A user interface for presenting and searching relationships between document objects located on a network is also detailed. The user interface may include a first portion of a screen display for displaying one or more link relationship attributes and a second portion of the screen display for displaying one or more entries from a group consisting of: (a) link references that represent the document objects, (b) link relationship attributes describing the link relationships, (c) link reference attributes describing the link references, and (d) document objects. The displayed entries in the second portion of the user interface are related to the displayed one or more link relationship attributes in the first portion.



Determining search query specificity

Tue, 26 May 2015 08:00:00 EDT

Systems and methods described and suggested herein utilize various techniques to assess the degree of specificity of search queries. By assessing the degree of specificity of search queries, the systems and methods may be used to determine where the submitting users' intentions fall along the continuum between specific and general searching. Thus, the systems and methods may be used to, among other uses, deliver search results that more closely coincide with the users' intentions. For example, if data associated with a search query indicates that users typically submit the search query with the intention of specific searching, embodiments may tailor search results to include a limited number of highly relevant search-result items. On the other hand, for example, if data associated with a search query indicates that users typically submit the search query with the intention of general searching, embodiments may tailor search results to include a diverse set of search-result items from multiple categories.