Class / Patent application number | Description | Number of patent applications / Date published |
707684000 | Undo (i.e., roll back) | 42 |
20100185593 | METHODS AND SYSTEMS FOR RECURSIVE SAVING OF HIERARCHICAL OBJECTS TO A DATABASE - Methods and systems include embodiments that recursively save parent, grandparent, and other records in a database that depend from a record. User-provided code within a save event or trigger can thus call further save methods without corrupting the database. Junction objects, objects that reflect records with two or more parents, can also be recursively saved. | 07-22-2010 |
20110029490 | Automatic Checkpointing and Partial Rollback in Software Transaction Memory - While speculatively executing a given one of a plurality of transactions concurrently executing on a computer, carry out write operations in a local data block, and automatically create an entry in a checkpoint log when reading from a shared memory. Continuously conflict check during read and tentative commit operations, and carry out a partial rollback upon detection of a conflict. The partial rollback is based upon the checkpoint log. | 02-03-2011 |
20110040731 | PROVISIONING CONFIGURATION CHANGES TO A CONTENT PLAYER DEVICE - A device may include a network interface for communicating with another device over a network, a storage unit to store content, and a processor. The processor may be configured to receive a request from a user to change usable storage space on the storage unit, send a message that describes the request to a service provider, receive a reply allowing the user to change the usable storage space from the service provider, provide at least one option to the user in response to the reply, receive information from the user selecting a first one of the at least one option, and set a size of the usable storage space to a value corresponding to the first option. | 02-17-2011 |
20110071986 | Method for mass-deleting data records of a database system - The present invention concerns a method for mass-deleting a plurality of data records ( | 03-24-2011 |
20110167047 | EDITING APPARATUS, METHOD, AND STORAGE MEDIUM - An editing apparatus includes: a storage unit to store, as execution information in a time-series order of edit or undo process, an edit content indicating a content of edit of data and an undo content indicating a content of undo of the data; an edit executor to edit the data and to store on the storage unit the edit content as the execution information; and an undo executor to undo the data to a state prior to the execution of the edit content if the updated execution information stored on the storage unit indicates the edit content, or to undo the data to a state prior to the execution of the undo content if the updated execution information stored on the storage unit indicates the undo content, and to store as the execution information a content of the executed undo on the memory unit. | 07-07-2011 |
20110191303 | System and method for generating automatic user interface for arbitrarily complex or large databases - A software system automatically and dynamically generates a fully functional user interface (UI) based upon, and connected directly to, an underlying data model (as instantiated within a relational database management system (RDBMS)). The UI derives from an automated interrogation of the RDBMS, and comprises all mode displays (e.g., browse, search, edit, add) for all tables, and a full complement of mechanisms—integrated directly into the mode displays—for representing, navigating, and managing relationships across tables, regardless of the complexity of the underlying RDBMS schema. It utilizes a hierarchical “context stack” for suspending the working state of a particular table while “drilling down” to work with related-table information and return relevant changes to the base table. The embodiment further provides methods to enhance and extend the internal representation of table structures, constraints, relationships, and—special requirements (“business rules”) for improved revelation of the schema structure through external interrogation. | 08-04-2011 |
20110196843 | Instance Management of Code in a Database - The compiled code of a computer program is stored in multiple pieces within a database. Each piece is optionally stored within a separate data record. Execution of the computer program includes using database queries to retrieve pieces of the compiled code for execution. The database and associated database management logic are used to provide numerous advantages in execution and management of the computer program. For example, in some embodiments, database queries are used to help facilitate program flow logic. In another example, database queries are based on a command line or universal resource locator. These queries may be used to select functionality of a computer program in response to the command line or universal resource locator. | 08-11-2011 |
20110213756 | CONCURRENCY CONTROL FOR EXTRACTION, TRANSFORM, LOAD PROCESSES - System and methods manage concurrent ETL processes accessing a database. Exemplary embodiments include a method for concurrency management for ETL processes in a database having database tables and communicatively coupled to a computer, the method including establishing a session lock for the database, determining that a current ETL process is accessing the database at a current time, associating a current expiration time with the session lock, the expiration time being stored in a lock table in the database, sending the session lock to the current ETL process and performing ETL-level locking for the current ETL process. | 09-01-2011 |
20110270804 | AGILE RE-ENGINEERING OF INFORMATION SYSTEMS - Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved. | 11-03-2011 |
20120191664 | COORDINATING SYNC POINTS BETWEEN A NON-VOLATILE MEMORY AND A FILE SYSTEM - Systems and methods for coordinating sync points between a non-volatile memory (“NVM”) and a file system are provided. In some embodiments, a file system can issue one or more commands to control circuitry of a NVM, which can indicate whether a transaction is journaled or non-journaled. This way, the control circuitry can maintain a list of journaled transactions and corresponding LBA(s). By keeping track of journaled transactions, the control circuitry can ensure that sync points are not prematurely erased during a garbage collection process. In addition, upon detecting device failure events, the control circuitry can roll back to sync points corresponding to one or more journaled transactions. | 07-26-2012 |
20120296875 | OPTIMISTIC APPLICATION OF DATA EDITS - A data representation that represents source data at a data source can be maintained. A request to perform an edit can be received from a client, and a request to make the edit to the source data can be sent to the data source. The edit can be optimistically applied to the data representation. Additionally, a change notification can be sent to the client. The change notification can indicate one or more changes to the data representation, where the change(s) resulted from the application of the edit to the data representation. A notification can be received from the data source after applying the edit to the data representation and after sending the change notification. The notification from the data source can indicate whether the edit to the source data succeeded. | 11-22-2012 |
20120303591 | MANAGING ROLLBACK IN A TRANSACTIONAL MEMORY ENVIRONMENT - According to one aspect of the present disclosure, a method and technique for managing rollback in a transactional memory environment is disclosed. The method includes, responsive to detecting a begin transaction directive by a processor supporting transactional memory processing, detecting an access of a first memory location not needing rollback and indicating that the first memory location does not need to be rolled back while detecting an access to a second memory location and indicating that a rollback will be required. The method also includes, responsive to detecting an end transaction directive after the begin transaction directive and a conflict requiring a rollback, omitting a rollback of the first memory location while performing rollback on the second memory location. | 11-29-2012 |
20120303592 | RESTORING DATA SEGMENTS OF ROLLED-BACK TRANSACTIONS IN A CLUSTERED FILE SYSTEM - Systems, Methods, and Computer Program Products are provided for restoring data segments in a clustered file system (CFS). Contents of the data segments, that were modified during a transaction, which is being rolled-back to the most recent contents of the data segments prior to the transaction commencing, are restored. Locations of the most recent contents of the data segments, which are restored, are identified. | 11-29-2012 |
20130103650 | STORAGE ARRAY SNAPSHOTS FOR LOGGED ACCESS REPLICATION IN A CONTINUOUS DATA PROTECTION SYSTEM - Methods and apparatus for storage snapshots for logged access replication using a data protection appliance in a continuous data protection system having a splitter. In one embodiment, out of band data transfer reduces disruption on the replica site while accessing an image. | 04-25-2013 |
20130117238 | ORACLE REWIND: METADATA-DRIVEN UNDO - Metadata-driven undo is described. In an embodiment, a metadata repository stores metadata that is associated with operations. Attributes associated with each operation are also stored in the metadata. Each operation is associated with an undolet that includes instructions for generating undo entries for operations of a particular operation type. Undo log entries are generated using the metadata and the undolet when a request is intercepted that includes an undoable operation. When an undo command is issued, the instructions in the undo log that are associated with a particular business transaction are executed to “rewind” the transaction. | 05-09-2013 |
20130179406 | FILE EDITING APPARATUS AND FILE EDITING METHOD - A file editing apparatus for revoking (Undo) destructive segmentation. | 07-11-2013 |
20130218844 | SPECULATIVE THREAD EXECUTION AND ASYNCHRONOUS CONFLICT EVENTS - In an embodiment, asynchronous conflict events are received during a previous rollback period. Each of the asynchronous conflict events represent conflicts encountered by speculative execution of a first plurality of work units and may be received out-of-order. During a current rollback period, a first work unit is determined whose speculative execution raised one of the asynchronous conflict events, and the first work unit is older than all other of the first plurality of work units. A second plurality of work units are determined, whose ages are equal to or older than the first work unit, wherein each of the second plurality of work units are assigned to respective executing threads. Rollbacks of the second plurality of work units are performed. After the rollbacks of the second plurality of work units are performed, speculative executions of the second plurality of work units are initiated in age order, from oldest to youngest. | 08-22-2013 |
20130275388 | ORACLE REWIND: METADATA-DRIVEN UNDO - Metadata-driven undo is described. In an embodiment, a metadata repository stores metadata that is associated with operations. Attributes associated with each operation are also stored in the metadata. Each operation is associated with an undolet that includes instructions for generating undo entries for operations of a particular operation type. Undo log entries are generated using the metadata and the undolet when a request is intercepted that includes an undoable operation. When an undo command is issued, the instructions in the undo log that are associated with a particular business transaction are executed to “rewind” the transaction. | 10-17-2013 |
20130290269 | BULK MANAGEMENT OF REGISTRY OBJECTS - A system and method for modifying a bulk set of domain names through bulk operations. A request to modify a bulk set of data associated with domain names is received by a registry. A bulk processing engine associated with the registry can analyze the requested update job, and enforce compliance with a set of policies governing the operation of registry. A priority level can also be assigned to the requested job, so that it will be executed before or after other pending jobs. The user can likewise provide user-supplied policies, which can also be validated against the set of registry policies. Data faults can be reduced or eliminated, and update operations can be performed by comparatively inexperienced personnel. | 10-31-2013 |
20140025642 | METHODS AND SYSTEMS FOR RECURSIVE SAVING OF HIERARCHICAL OBJECTS TO A DATABASE - Methods and systems include embodiments that recursively save parent, grandparent, and other records in a database that depend from a record. User-provided code within a save event or trigger can thus call further save methods without corrupting the database. Junction objects, objects that reflect records with two or more parents, can also be recursively saved. | 01-23-2014 |
20140067768 | METHOD AND APPARATUS FOR CONTENT ASSOCIATION AND HISTORY TRACKING IN VIRTUAL AND AUGMENTED REALITY - A machine-implemented method includes establishing a virtual or augmented reality entity, and establishing a state for the entity having a state time and state properties including a state spatial arrangement. The data entity and state are stored, and are subsequently received and outputted at a time other than the state time so as to exhibit a “virtual time machine” functionality. An apparatus includes a processor, a data store, and an output. A data entity establisher, a state establisher, a storer, a data entity receiver, a state receiver, and an outputter are instantiated on the processor. | 03-06-2014 |
20140089267 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a search unit, a selection unit, and a mounting processor. The search unit is configured to search for a plurality of roll back points of a file system. The selection unit is configured to select, from the plurality of roll back points searched for by the search unit, a roll back point corresponding to an operation made by a user. The mounting processor is configured to mount the file system at the roll back point selected by the selection unit to a read-only state, and further mount the file system to a readable and writable state according to an operation made by the user. | 03-27-2014 |
20140136487 | CONTENT MANAGEMENT TARGETED ROLLBACK - A computer-implemented system and method for content management targeted rollback, including receiving at least one change to be made to a field on a document. A rollback document representing the document is stored. Metadata associated with the change and the rollback document is stored. The change is executed. A rollback request is received containing targeting metadata designating the rollback document. The document is rolled back to the rollback document that is associated with the stored metadata that corresponds to the targeting metadata. | 05-15-2014 |
20140195492 | SYSTEMS, METHODS, AND APPARATUSES FOR FIXING LOGICAL OR PHYSICAL CORRUPTION IN DATABASES USING LSM TREES - In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for fixing logical or physical corruption in databases using LSM trees including, for example, means for storing records in a LSM database at the host organization; processing transactions to the LSM database by writing the transactions into immutable extents for subsequent merge into the LSM database; recording a history of the transactions in a log; identifying corruption in at least one of the records of the LSM database represented within the immutable extents prior to use of the immutable extents in the LSM database; and correcting the identified corruption to the at least one of the records of the LSM database based at least in part on the recorded history of the transactions in the log during live operation of the LSM database. Other related embodiments are disclosed. | 07-10-2014 |
20140214773 | RECONSTRUCTING A STATE OF A FILE SYSTEM USING A PRESERVED SNAPSHOT - A technique includes receiving a request to restore a state of a file system. The request defines a rollback period, which extends from a restoration time that is specified by the request to a time at which the request was made. The technique includes reconstructing a state of the file system in response to a query using a preserved snapshot of the file system. The reconstruction including reconstructing the state at an arbitrary query time based at least in part on a dynamically inheritable attribute of an entity stored on the file system and the rollback period. | 07-31-2014 |
20140250085 | ROLLBACK COUNTERS FOR STEP RECORDS OF A DATABASE - A rollback record may be created for each step identifier (ID). The rollback record indicates how many times the step record identified by the step ID has been rolled back during operation of the database. The rollback record may be stored in a periodic save record (PSR), separate from or stored in an audit trail containing the step records. By processing the rollback records in the periodic save record during a recovery, a database may identify a time on an audit trail for initiating a recovery prior to the last resume point for a step without going back in the audit trail to a time before the initial start of the step. | 09-04-2014 |
20140279932 | AUGMENTING MIDDLEWARE COMMUNICATION SERVICES - Various embodiments herein include one or more of systems, methods, and software providing augmenting middleware communication services. Embodiments generally include services executable to provide communication capabilities between a middleware platform and an application, such as an enterprise-class application, to facilitate access to data and functionality of the application by mobile applications that access application functionality and data via the middleware platform. Some embodiments include augmenting the application with at least one service to receive a call from a middleware object requesting data and to identify data to be included in a response to the request. The identified data may then be retrieved and returned to the calling middleware object. The call of the middleware object is typically received from a mobile device application and the middleware object provides data received in response to the request to the mobile application. | 09-18-2014 |
20140297599 | ASYNCHRONOUS MULTI-LEVEL UNDO SUPPORT IN JAVASCRIPT GRID - Architecture for multi-level undo on a client in grid-based applications. The architecture is a control driven cascading changes system where change tracking works seamlessly in asynchronous (and synchronous) scenarios. A client application is associated with a grid object and, instantiates and configures the grid object. The application can initiate a change to data in the grid and/or the user can edit the data in the grid directly. A result of the change is a notification to the application, the notification including an order key. The application consumes the notification and can then append new changes based on synchronous or asynchronous computations by calling an update function using the order key. The application uses the key to attach further updates which are properly collected together for undo/redo. | 10-02-2014 |
20140344224 | Tools for Storing, Accessing and Restoring Website Content via a Website Repository - Systems and method of the present invention provide for one or more server computers configured to identify, within a database transaction log, a dynamic website content in a database and a command modifying the dynamic website content, write the dynamic website content and the command modifying the dynamic website content to a website repository as a delta, receive a request to reverse the command modifying the dynamic website content, identify, within the delta, the command modifying the dynamic website content, and generate and execute a database query configured to reverse the command modifying the dynamic website content. | 11-20-2014 |
20150039566 | UNDO SYSTEM - Systems and methods for undo mechanism are provided. Computer systems can have many different software elements, including application elements and file management elements. System elements can be used for user input, providing output, and manipulating data or files. In the course of using a computer system, the user may wish to return to a previous system state by undoing one or more events. In one aspect, an undo operation can be performed across multiple elements in the system (e.g., cross-application undo functionality). In another aspect, past information displayed on a display can be “recorded” so that it can later be rewound as part of a media player metaphor, and events associated with the rewound/displayed information can be undone. The media player and rewind metaphors assist users in recalling past events and/or finding actions to undo. | 02-05-2015 |
20150046405 | FIGHT-THROUGH NODES WITH DISPOSABLE VIRTUAL MACHINES AND ROLLBACK OF PERSISTENT STATE - A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database. | 02-12-2015 |
20150052110 | AGILE RE-ENGINEERING OF INFORMATION SYSTEMS - Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved. | 02-19-2015 |
20150052111 | Method and system for interfacing to cloud storage - An interface between an existing local file system and a data store generates and exports to the data store a versioned file system. The state of the local file system at a given point in time can be determined using the versioned file system. In operation, the interface creates and exports to the data store structured data representations, which correspond to versions of the local file system, as well as actual file system data that these structured data representations represent. A cache associated with the interface stores recently used data and metadata, as well as all write data and metadata waiting to be transferred to the data store. Prior to transfer, one or more data transformations may be applied to the data and metadata. In one embodiment, the data store comprises one or more cloud storage service providers. A content control system is used to configure and manage the interface. | 02-19-2015 |
20150081645 | SYSTEMS AND METHODS FOR SUPPORTING TRANSACTIONAL MESSAGE HANDLING - In accordance with embodiments disclosed herein, there are provided methods, systems, and apparatuses including, for supporting transactional message handling in an on-demand service environment including, for example: enqueuing a message specifying a transaction to be processed via a host organization; inserting a row into a database of the host organization associating the message with a status of pending, wherein the row is autocommitted to the database upon insertion; updating the status for the row to ready if a commit operation for the transaction is initiated; requesting a lock on the row; and performing final processing for the transaction based on the status for the message and based further on whether the lock is obtained for the row. Final processing may include, for example, a transaction roll back, a transaction commit, a transaction requeue, a termination of transaction processing, or an orphaned transaction clean up. | 03-19-2015 |
20150106339 | UNDOING CHANGES MADE TO A COMMUNICATION NETWORK - Systems and methods for undoing changes or modifications made to a communication network are described. In some embodiments, the systems and methods access a request to rollback one or more changes made to parameters of managed objects associated with a communication network within a given time period, retrieve information identifying the one or more changes made to the parameters of the managed objects within the given time period, and, for each managed object, determine a cumulative changetype (e.g., add, deleted, or update) associated with the one or more changes made to the parameters of the managed object and perform an action to apply the determined cumulative changetype to the managed object. | 04-16-2015 |
20150149415 | Rollback Mechanism for Linear Tape File Systems - A mechanism is provided for restoring a file recorded on a storage medium to a previous version of the file. At least two different versions of a file recorded on the storage medium are presented to a user via a graphical user interface, where the at least two different versions of the file are identified from at least two different indexes recorded on the storage medium. Responsive to a selection of the previous version of the file from the at least two different versions of the file, the file is restored to the previous version of the file by recording a new index on the storage medium for the file that matches an index of the file associated with the previous version of the file. | 05-28-2015 |
20160062839 | UNDO CHANGES ON A CLIENT DEVICE - In some implementations, a user can be notified when a content item operation initiated by the user on a client device may render a shared or linked content item inaccessible to the user or others. The notification can give the user an option to undo the content item operation. In some implementations, movement of a content item from one directory location to another directory location can be recorded in entries of a local content journal. The local content journal entries can be shared with a content management system and other client devices so that the corresponding content items on the client devices can be moved without downloading additional copies of the content item to the client devices. | 03-03-2016 |
20160062840 | SYSTEM AND METHOD FOR MAINTAINING A DISTRIBUTED AND FAULT-TOLERANT STATE OVER AN INFORMATION CENTRIC NETWORK - A replica management system facilitates maintaining a distributed and fault-tolerant state for a variable over an Information Centric Network (ICN) by replicating the variable across a set of ICN nodes. During operation, a variable-hosting ICN node can receive an Interest that includes a value-updating command for a replica instance of the variable, current values for a set of replicas of the variable, and a new value for the variable. The ICN node can determine, based on the current values for the set of replica variables, whether the current value for the local replica variable is an authoritative value. If so, the ICN node updates the local replica variable to the new value. However, if the current local value is not the authoritative value, the ICN node rolls back a state of the local replica variable to a previous state, and updates the local replica variable to the new value. | 03-03-2016 |
20160092315 | FILE SYSTEM FOR ROLLING BACK DATA ON TAPE - Rolling back data on tape in a file system is provided. A management tape is prepared. The management tape has only index files recorded thereon. The index files contain information about start positions and lengths of corresponding data files recorded on normal tapes. The index files further contain identification information for the normal tapes. A first index file of the management tape is read. The first index file is related to a data file to be rolled back. The first index file is read out from the management tape mounted on a first tape drive. The data file to be rolled back is read out of a first normal tape. The first normal tape is identified based on information in the first index file. The first normal tape is mounted on a second tape drive. | 03-31-2016 |
20160124813 | RESTORATION OF MODIFIED DOCUMENT TO ORIGINAL STATE - Techniques are disclosed for restoring a modified document to an original state. The modified document is scanned into a digital form using an optical scanning device. The content of the modified digital document including one or more annotations is then grouped into several components, including text, images, form fields and text boxes, and marked shapes, based on corresponding component specifications. Each component is then categorized as being structured or unstructured. Structured components that correspond with representative entries in a component repository, such as text in a standard font size, weight and style, are identified as core document content. Unstructured components are identified as annotated document content or highlighted document content, depending on certain characteristics of the components. The categorized and identified components can then be presented separately or in various combinations. | 05-05-2016 |
20160147616 | RECOVERY STRATEGY WITH DYNAMIC NUMBER OF VOLUMES - A system includes reception of a command to recover a database to a point in time, determining a log backup which covers the point in time, determination of a sequence identifier associated with the log backup, collection of log backups which are older than the determined log backup and associated with the sequence identifier, and a data backup associated with the sequence identifier, and execution of a recovery of the database based on the determined log backup and the collected log backups and data backup. | 05-26-2016 |
20160170842 | WRITING TO FILES AND FILE META-DATA | 06-16-2016 |