4701 patents
Page 2 of 236
Utility
Automated mass message processing
9 Jan 24
The present disclosure involves systems, software, and computer implemented methods for automated message processing.
Hemant Mangal, Mohit V Gadkari, Arpit Jaiswal, Divya Arun Patil, PankajKumar Agrawal, Mukesh Kumar, Pooja Ramarathnam, Bhavya Jha
Filed: 23 Jun 21
Utility
Method and apparatus for monitoring an in-memory computer system
9 Jan 24
An in-memory computing system for conducting on-line transaction processing and on-line analytical processing includes system tables in main memory to store runtime information.
Marc-Philip Werner, Wolfgang Auer
Filed: 21 Apr 21
Utility
Generation of filter and parameter context URIs
9 Jan 24
Disclosed herein are system, method, and computer program product embodiments for accessing a data service using a data service Uniform Resource Identifier (URI) object.
Ashish Anand, Suneet Agarwal, Bhuwan Rawat
Filed: 30 Nov 22
Utility
Landscape model verification system
9 Jan 24
Systems and methods include determination of a plurality of call map clusters, each call map cluster associated with a respective type of external call, two or more of a plurality of services, and a service call model modelling, for each of the two or more of the plurality of services, the issuance of outgoing service calls in response to received service calls.
Peter Eberlein, Volker Driesen
Filed: 29 Nov 21
Utility
Access control for object instances
9 Jan 24
The present disclosure involves systems, software, and computer implemented methods for access control for object instances.
Marco Koch, Stefan Boller, Manfred Schmid
Filed: 15 Aug 22
Utility
System to test reverse proxy configurations
9 Jan 24
Systems and methods include transmission of a first request for a first connection to a first service, usage of a first reverse proxy process to manage a first connection based on a first service configuration, change, in response to the first request, the first service configuration to a second service configuration, instantiate, in response to the change to the second service configuration, a second reverse proxy process based on the second service configuration, transmit, in response to the change to the second service configuration, a second request for a second connection to the first service an use of the second reverse proxy process to manage the second connection in response to the second request, wherein the first reverse proxy process and the second reverse proxy process execute simultaneously.
Juergen Hoelsch, Joachim Goennheimer
Filed: 2 Jun 23
Utility
Framework for Workload Prediction and Physical Database Design
4 Jan 24
According to some embodiments, methods and systems may be associated with a cloud computing environment.
Michael BRENDLE, Norman MAY, Robert SCHULZE, Alexander BOEHM, Michael GROSSNIKLAUS, Guido MOERKOTTE
Filed: 7 Sep 23
Utility
Automation of Master Data Processes with User-centric Management of Derivation Rules
4 Jan 24
In some implementations, generating enriched data includes actions of receiving a user input comprising object data.
Sabine Stellmacher, Dirk Riemer, Christian Buschmann, Andreas Seifried, Armin Maier
Filed: 30 Jun 22
Utility
Secure operations of cloud landscapes through workflow templates
2 Jan 24
In an example embodiment, a workflow engine is introduced within a cloud landscape.
Daniel Kirmse, Henning Zahn
Filed: 26 Oct 21
Utility
Messaging for OData error targets
2 Jan 24
Provided are systems and methods which provide an OData messaging protocol for HTTP messages that are processed successfully but with some errors.
Arley Triana Morin, Ralf Handl
Filed: 8 Nov 21
Utility
Partition-local partition value identifier grouping
2 Jan 24
A method for executing a query may include generating a partition value identifier for a partitioned table.
Andreas Amler, Jonathan Dees, Till Merker
Filed: 16 May 22
Utility
Materialized views as a service for analytics
2 Jan 24
Embodiments may facilitate data analytics for a cloud computing environment.
Shashank Mohan Jain
Filed: 15 Jul 22
Utility
Metadata based bi-directional data distribution of associated data
2 Jan 24
A method may include receiving, at a search engine, an indication that a first data object was created.
Tim Kornmann, Thomas Biesemann, Alexander Fuerbach
Filed: 8 May 20
Utility
Online import using system-versioned tables
2 Jan 24
Implementations include setting a session variable of each of a plurality of tenants to a first timestamp, importing, after the first timestamp, a first set of content to a shared container within a database system, during importing, each tenant in the plurality of tenants accessing pre-import data stored in the shared container based on the session variable being set to the first timestamp, and after importing the first set of content to the shared container, un-setting, at a second timestamp, the session variable of each of the plurality of tenants from the first timestamp, after the second timestamp, each tenant in the plurality of tenants accessing post-import data stored in the shared container.
Ralf-Juergen Hauck, Volker Driesen
Filed: 7 Feb 22
Utility
Data synchronization in cloud platforms without database locking
2 Jan 24
Methods, systems, and computer-readable storage media for receiving, by a messaging system, a message having a key, the key indicating a tenant of a set of tenants, providing, by the messaging system, the message in a partition of a messaging queue, reading, by a service instance, the message from the partition, the service instance being in a set of services instances, each service instance executing a service of a service-based application, and in response to the message, updating, by the service instance, at least a portion of data stored within a database system, the portion of data being associated with the tenant, the database system storing data of each tenant of the set of tenants.
Ahmad Hassan
Filed: 18 Oct 21
Utility
Secure multiparty differentially private median computation
2 Jan 24
In an example embodiment, a differentially private function is computed via secure computation.
Jonas Boehler, Florian Kerschbaum
Filed: 2 Dec 19
Utility
Security token validation
2 Jan 24
The present disclosure relates to computer-implemented methods, software, and systems for validating and revoking security tokens.
Radoslav Ivanov Sugarev
Filed: 23 Jan 23
Utility
Reuseable groupings of app extensions
2 Jan 24
The present disclosure provides techniques and solutions for enhancing or customizing the functionality of software applications, such as “apps.” More particularly, the present disclosure provides for grouping app extensions into groups, such as groups representing a particular semantic domain.
Garima Srivastava, Sushama Shadakshary
Filed: 26 Aug 22
Utility
Development landscape build system
2 Jan 24
Systems and methods are provided for executing a subset of a plurality of scripts based on traversing a decision and execution hierarchy using standard parameters and custom parameters to install and configure a new computing system for a given entity.
Joachim Stumm, Ismail Koeken
Filed: 22 Oct 21
Utility
Configuration for application using microservices
2 Jan 24
Various examples are directed to systems and methods for configuring an application that uses a plurality of microservices.
Volker Driesen, Peter Eberlein
Filed: 7 May 20