Patent application number | Description | Published |
20110320426 | RICH SITE MAPS - Providing a website map to a user. A method includes gathering information about web pages in a website, including information related to web page relationships, controls, and executable code underlying one or more web pages in the website. A relationship map is created. The relationship map includes representations of relationships between the web pages, the controls and the executable code underlying one or more web pages in the website. The method further includes graphically displaying at least a portion of the relationship map in a graphical user interface at the computing system. | 12-29-2011 |
20130262419 | SEMANTIC DIFF AND AUTOMERGE - Resolving conflicting changes to structured data files. A method includes for a structured data file which has both a generic structure and dialects built on top of the generic structure, for which conflicting changes have been made, and where an original version of the structured data, a first version of the structured data and a second version of the structured data exist, determining a dialect of the structured data. The method further includes, based on the determined dialect performing at least one of merge or diff operations on the original version of the structured data, the first version of the structured data and the second version of the structured data. | 10-03-2013 |
20130346917 | CLIENT APPLICATION ANALYTICS - A sequence of user actions is generated from a runtime trace of a client application that is analyzed against a set of detectors to infer a feature-level usage analytic. The feature-level usage analytic identifies a common trait among the various users that use a feature of the application and is used as a basis to reflect the user's experience with the feature. The feature-level usage analytic may be a level of the user's ability with the application or an application state that indicates an outcome of a group of users' usage with a particular feature. The feature-level usage analytic provides a developer with insight into the user's behavior when using the application. | 12-26-2013 |
20140331206 | IDENTIFYING IMPACTED TESTS FROM STATICALLY COLLECTED DATA - The present invention extends to methods, systems, and computer program products for identifying impacted tests from statically collected data. In general, static dependency data, possibly augmented with some dynamic data, is used to find an appropriate set of impacted tests for code changes. In some embodiments, static dependency analysis is used to identify tests impacted by a code change. Heuristics can be used to assist with identifying an appropriate set of impacted tests to run for a code change. Dynamic data can be used to augment static dependency data to identify more optimal sets of impacted tests to run for a code change. | 11-06-2014 |
20160070633 | MEMORY LEAK ANALYSIS BY USAGE TRENDS CORRELATION - Tools and techniques assist developers with the detection of memory leaks by using correlation of data type memory usage trends. In particular, investigations of memory leaks can be prioritized without always resorting to the use of bulky and performance-degrading memory dumps, by using these tools and techniques to identify leaky correlated data types. Data about a program's memory usage is processed to identify memory usage trends over time for respective data types, and the trends are searched for significant correlations. Correlated trends (and hence their corresponding data types) are grouped. Memory usage analysis information is displayed for grouped data types, such as the names of the most rapidly leaking data types, the names of correlated data types, leak rates, and leak amounts in terms of memory size and/or data object counts. Memory usage data may also be correlated with processing load requests to indicate which requests have associated memory leaks. | 03-10-2016 |
Patent application number | Description | Published |
20090254639 | CONFIGURING NETWORK SETTINGS USING PORTABLE STORAGE MEDIA - A portable computer-readable media device and method of use enable automatic configuration of a computing device, such as a conventional network device or a thin client device, for operation in a network. Configuration information, including network settings and security information, is incorporated in an XML file written to the portable media device while it is installed in a first device. This configuration is then automatically transferred to a second device by installing the portable media device in the second device. The second device then writes device information, incorporated in an XML file, to the portable media device, to be uploaded to the first device. | 10-08-2009 |
20110196946 | CONFIGURING NETWORK SETTINGS USING PORTABLE STORAGE MEDIA - A portable computer-readable media device and method of use enable automatic configuration of a computing device, such as a conventional network device or a thin client device, for operation in a network. Configuration information, including network settings and security information, is incorporated in an XML file written to the portable media device while it is installed in a first device. This configuration is then automatically transferred to a second device by installing the portable media device in the second device. The second device then writes device information, incorporated in an XML file, to the portable media device, to be uploaded to the first device. | 08-11-2011 |
Patent application number | Description | Published |
20160117160 | PREPARING INSTALLATIONS AND UPDATES FOR SOFTWARE SYSTEMS - The present invention extends to methods, systems, and computer program products for preparing installations and updates for software systems. Aspects of the invention include creating software update packages that are selectable to automatically install essentially any number of code changes for any number of software components to update a software system (e.g., a cloud appliance). In one aspect, a software update package includes: references to code changes for a plurality of software components and references to installation artifacts for installing the code changes, and also indicates interdependencies between the plurality of software components. In another aspect, a software update package includes references to validation code for validating that a software update package transitioned a software system to a goal state. In a further aspect, a software update package expressly indicates that installation artifact references for different installation artifacts are to be processed during different passes in a multi-pass installation process. | 04-28-2016 |
20160117161 | INSTALLING AND UPDATING SOFTWARE SYSTEMS - The present invention extends to methods, systems, and computer program products for installing and updating software systems. Aspects of the invention include selecting software update packages that automatically installs essentially any number of code changes for any number of software components to update a software system (e.g., a cloud appliance). In one aspect, a software system is updated by implementing a software update package that includes: references to code changes for a plurality of software components and references to installation artifacts for installing the code changes, and also indicates interdependencies between the plurality of software components. In another aspect, validation code is used to validate that a software update package transitioned a software system to a goal state. In a further aspect, a multi-pass installation process is orchestrated to perform portions of a software update package in a plurality of different passes. | 04-28-2016 |
Patent application number | Description | Published |
20100306008 | EXTENSIBLE ROLE-BASED ACCESS CONTROL MODEL FOR SERVICES - Architecture removes the limitation of a fixed set of roles and scopes, allows more effective permission auditing, and provides a convenient delegation model. Administrators can create roles fine-tuned to business needs without changing permissions on the resources. The new roles can be easily examined and delegated to other administrators. Moreover, scoping and delegation is simplified. This is possible because permissions are granted as a role (a unit of permission assignment is a role), which can include multiple entries. The entries correspond to end-user actions and are not related to implementation-dependent resource rights. The actions can include web services or API calls, script or executable file names, specialized commands that implement particular operation, and associated parameters, etc., essentially any action that the end-user performs. | 12-02-2010 |
20100306817 | DELEGATION MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION - Role-based security architecture that facilitates delegated role assignments where role functionality is monotonically decreasing. In furtherance thereof decreasing monotonicity roles are arranged in a hierarchy. Moreover, delegated roles can be obtained by creating a derived role (from a parent role) and removing entries from the derived role to decrease the permissions for the derived role. Delegated role assignments are scoped (bounded), which automatically applies a given scope to the assignment created by the user receiving the delegation. | 12-02-2010 |
20100325160 | EXCLUSIVE SCOPE MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION - Architecture that creates a class of role-based scopes that can be declared “exclusive”, which automatically means that no user can access the scope unless the user is granted that exact scope. The exclusive scope excludes an object from the new scopes and existing scopes. In other words, the exclusive scope is a write restriction from a domain scope. The exclusive scope denies user access unless the user is granted the exclusive scope. The exclusive scope can be applied to a group of user objects. The exclusive scope is explicitly assigned to the object to grant access to an exclusive group. Moreover, the exclusive scope is immediately write-protected upon creation. | 12-23-2010 |
20100325684 | ROLE-BASED SECURITY FOR MESSAGING ADMINISTRATION AND MANAGEMENT - A role-based access control (RBAC) for the administration of complex services, such as for messaging. The RBAC architecture facilitates the creation of a role mechanism that describes any end-user, administrator, or partner action, of a set of scopes that address all populations, and a single authorization mechanism to handle role assignments through various mechanisms. Moreover, role and scope concepts are provided that universally apply to various management scenarios. A common set of primitives is defined that represent actions of enterprise and tenant end-users, partners, tenant administrators, datacenter administrators, and enterprise administrators. The primitives can include actions, action parameters, and API calls. Additionally, a set of scopes is defined that include self-relative scopes for end-users and tenants, and, absolute and filter-based scopes for administrators. | 12-23-2010 |
20100325724 | SCOPE MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION - Architecture that provides centrally located role-based administration where role assignments that are used to calculate scopes for each operation and create a filtered request that only returns objects that the user is allowed to manage. No access checks are needed. The architecture addresses the proliferation of scope definitions by at least creating a set of relative scopes such as that can generically apply to multiple users at once. More specifically, self-relative scopes and absolute scopes are provided. | 12-23-2010 |
20130133024 | Auto-Approval of Recovery Actions Based on an Extensible Set of Conditions and Policies - Recovery action approval may be provided. A request to perform an action may be received from a user. If the user is not always authorized to request the action, then the action may be performed if a policy rule permits the user to request the action. | 05-23-2013 |
20150150028 | COMPOSE APPLICATION EXTENSION ACTIVATION - Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed. | 05-28-2015 |
20150287040 | SYSTEM ENFORCED TWO-PARTY VERIFICATION PROCESS IN CUSTOMER SUPPORT WORKFLOW - A system-enforced two party verification process is described. An action to be taken on a resource is permitted when that resource is tagged with a same code by both a service vendor and the customer to whom the resource is associated. The system issues the code to the service vendor and relies on the service vendor to provide the code to the customer. The system then permits the action to be taken on the resource or automatically causes the action to be taken upon receipt of the code being applied by the customer to the same resource as previously indicated by the service vendor. | 10-08-2015 |
Patent application number | Description | Published |
20100070503 | IDENTIFYING PRODUCT ISSUES USING FORUM DATA - Product issues are identified through an analysis of forum data stored in a forum database. Forum threads are identified within the forum data and clustered together by grouping related forum threads. Once the forum threads have been clustered, the clustered forum threads can be analyzed to identify product issues. Once the product issues have been identified, steps may be taken in an attempt to resolve the identified issues. | 03-18-2010 |
20100153215 | ENHANCED SEARCH RESULT RELEVANCE USING RELATIONSHIP INFORMATION - Systems and methods for utilizing information pertaining to one or more individuals or entities with whom a user has at least one pre-defined type of relationship (e.g., a social networking relationship) and information pertaining to the user's behavior with respect to the one or more individuals (e.g., manual designation, interaction with communications received from and/or sent to the user, and the like) to present relevant search results and/or advertisements to a user in response to receiving a search request are provided. Upon receiving a search request from a user, information about the user's relationships and behavior with respect to those relationships is utilized to determine user-relevant search results and/or advertisements. The search results and/or advertisements that are determined to be relevant to that particular user based upon the user's behavior and presented. | 06-17-2010 |
20120143893 | Pattern Matching Framework for Log Analysis - A pattern matching framework for log analysis is described. In one or more implementations, one or more inputs are received via a user interface of a computing device that describe a filter pattern that specifies data that is to be matched and extracted from a log and a projection pattern that specifies how at least a portion of the data extracted using the filter pattern is to be output. A query is formed from the filter pattern and the projection pattern by the computing device that is configured to analyze the log. | 06-07-2012 |
20140111550 | USER AND DEVICE MOVEMENT BASED DISPLAY COMPENSATION - A direction and distance of movement of a display device as well as of a user of the display device are determined. Based on these determined directions and distances of movement, compensation to apply to content displayed on the display device to compensate for movement of the user with respect to the device is determined and applied to the content. A portion of the display device at which the user is looking can also be detected. The compensation is applied to the content only if applying the compensation would not result in the portion being positioned beyond the display device. If applying the compensation would result in the portion being positioned beyond the display device then appropriate corrective action is taken, such as not applying the compensation to the content. | 04-24-2014 |