Patent application number | Description | Published |
20080295000 | METHOD AND SYSTEM FOR REMOVING RECIPIENTS FROM A MESSAGE THREAD - A system for conveniently removing recipients from a message being added to a message thread that enables a user to filter people from a recipient list of a message being added to a message thread. The system advantageously enables a user to filter out potential recipients based on a) their previous non-participation in the thread, b) their lack of registered interest in a topic of the thread, and/or c) their being listed only as recipients by way of their being contained in a group indicated in the recipient list. | 11-27-2008 |
20120078802 | APPLYING BUSINESS PROCESSES TO COLLABORATION TOOLS - A computer implemented method for providing a business process in an online collaboration includes associating a business process model with the collaboration based on entries made by one or more participants. The business process model may include one or more business processes or process steps. The method may also include providing a graphical interface module to the collaboration participants associated with the business process, the graphical interface module configured to receive data from one or more participants of the collaboration. Data received from the participant interacting with the interface module may be processed in accordance with the process steps associated with the business process. Data received throughout the collaboration may be stored in a memory. | 03-29-2012 |
20140058789 | PROCESS MODEL GENERATION AND WEAK-SPOT ANALYSIS FROM PLAIN EVENT LOGS - Various embodiments of systems and methods for process model extraction and weak-spot analysis from plain event logs are described herein. In an aspect, the method involves obtaining an event log that includes events grouped by process instances. Based on analyzing the event log a process graph is generated. In another aspect, one or more visual representations of the generated process graph, indicating the weak-spots, are generated. At least one of the one or more visual representations of the process model is rendered in response to receiving a selection of the at least one visual representation. In yet another aspect, the weak-spots are transformed into a data structure and provided as input to a rule mining algorithm for generating a set of rules defining the weak-spots. The set of rules received from the rule mining algorithm are rendered on a graphical user interface (GUI). | 02-27-2014 |
20140074968 | MANAGING A SERVER NODE INFRASTRUCTURE - Techniques for managing nodes include receiving a message from a particular tenant of a plurality of tenants; identifying a particular node of a plurality of nodes that is based on the message and that is mapped to the particular tenant, each node providing one or more functionalities and each tenant mapped to one or more nodes; identifying a particular version, of one or more versions, of the particular node that is based on the message, the particular tenant mapped to each version of the particular node; and providing the message to the particular version of the particular node. | 03-13-2014 |
20140136274 | PROVIDING MULTIPLE LEVEL PROCESS INTELLIGENCE AND THE ABILITY TO TRANSITION BETWEEN LEVELS - The present disclosure involves systems, software, and computer implemented methods for providing process intelligence by allowing analysis of running business processes at multiple levels of detail. One computer-implemented method includes identifying a first data layer, a second data layer, and a third data layer associated with a business process management system, the third data layer derived from the second data layer and including at least one reference to the second data layer and the second data layer derived from the first data layer and including at least one reference to the first data layer, presenting at least a portion of one of the first data layer, the second data layer, or the third data layer as a first presented data layer, identifying a request to present a data layer different than the first presented data layer, the request identifying at least a portion of the data included in the first presented data layer, and presenting at least a portion of the requested data layer associated with the identified data included in the first presented data layer as a second presented data layer. | 05-15-2014 |
20140188916 | COMBINING ODATA AND BPMN FOR A BUSINESS PROCESS VISIBILITY RESOURCE MODEL - The present disclosure describes methods, systems, and computer program products for providing a business process visibility resource model. One computer-implemented method includes receiving a request for process data from a client device, parsing the received request to determine a type of process data to return and to recover request parameters, determining the type of process data requested, accessing a process resource model and retrieving process data based upon the recovered request parameters, generating a response returning data in a format compliant with the type of process data requested, and transmitting the generated response data. | 07-03-2014 |
20140250040 | CORRELATING DATA FROM MULTIPLE BUSINESS PROCESSES TO A BUSINESS PROCESS SCENARIO - The present disclosure involves systems, software, and computer-implemented methods for providing process intelligence by correlating events from multiple business process systems to a single business scenario using configurable correlation strategies. An example method includes identifying a raw event associated with a sending business process and a receiving business process, identifying a sending business process attribute associated with the sending business process and a receiving business process attribute associated with the receiving business process, determining a correlation strategy for associating the raw event with a business scenario instance, the determination based at least in part on the sending business process attribute and the receiving business process attribute, and generating a visibility scenario event from the raw event according to the correlation strategy, the visibility scenario event associated with the business scenario instance. | 09-04-2014 |
20140250121 | TRANSLATING BUSINESS SCENARIO DEFINITIONS INTO CORRESPONDING DATABASE ARTIFACTS - The present disclosure involves systems, software, and computer-implemented methods for providing process intelligence by translating a business scenario definition into one or more corresponding data storage system artifacts. One example method includes identifying a process intelligence scenario associated with one or more business processes and including one or more definitions defining an observable behavior of the one or more business processes, processing the one or more definitions to produce an executable description including one or more artifacts associated with a data storage system, the one or more artifacts associated with the one or more definitions, storing the executable description in the data storage system, and processing one or more flow events associated with the one or more business processes using the executable description in the data storage system to expose the observable behavior of the business process defined in the process intelligence scenario. | 09-04-2014 |