Abstract:
In accordance with embodiments, there are provided mechanisms and methods for interacting with a process diagram. These mechanisms and methods for interacting with a process diagram may allow for a user's enhanced interactive experience with the process diagram. The ability of embodiments to provide such enhancements may allow for improved navigation of the process diagram, searching of the process diagram, editing of the process diagram, etc.
Abstract:
Techniques are disclosed relating to automating authentication decisions for a multi-factor authentication scheme based on computer learning. In disclosed embodiments, a mobile device receives a first request corresponding to a factor in a first multi-factor authentication procedure. Based on user input approving or denying the first request, the mobile device sends a response to the first request and stores values of multiple parameters associated with the first request. The mobile device receives a second request corresponding to a factor in a second multi-factor authentication procedure where the second request is for authentication for a different account than the first request. The mobile device automatically generates an approval response to the second request based on performing a computer learning process on inputs that include values of multiple parameters for the second request and the stored values of the multiple parameters associated with the first request. The approval response is automatically generated and sent without receiving user input to automate the second request.
Abstract:
Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).
Abstract:
Techniques are disclosed relating to multi-tenant database systems with underlying key/value storage. In some embodiments, a computing system generates first logical table information for a first portion of a multi-tenant dataset corresponding to a first tenant and second logical table information for a second portion of the dataset corresponding to a second tenant. The system may store the first and second logical tables using non-relational key/value data structures in one or more storage elements, including: storing entries from the first logical table across a first set of multiple key/value store buckets and storing entries from the second logical table across a second set of multiple key/value store buckets. Disclosed techniques may reduce performance issues due to hotspots while allowing efficient data access for a given tenant by limiting the number of buckets per tenant, relative to traditional techniques.
Abstract:
A system is disclosed for acquiring and managing data regarding external IP (EIP) addresses of services offered in a trusted public cloud environment. The system monitors an application program interface of a service executing in a trusted public cloud environment for occurrence of an event that is related to an EIP of the service. When an event is detected, the system extract EIP related data and metadata of the service, generates a message with the extracted EIP data, and posts the message to a central message queue. The system monitors the message queue for the presence of a new message. Upon detecting a new message, the system processes the message, extracts EIP related data. metadata, and identifies an action. A central database that stores EIP related information of services executing in the trusted public cloud environment is updated based on the identified action.
Abstract:
Systems, devices, and techniques are disclosed for data shards for distributed processing. Data sets of data for users may be received. The data sets may belong to separate groups. User identifiers in the data sets may be hashed to generate hashed identifiers for the data sets. The user identifiers in the data sets may be replaced with the hashed identifiers. The data sets may be split to generate shards. The data sets may be split into the same number of shards. Merged shards may be generated by merging the shards using a separate running process for each of the merged shards. The merged shards may be generated using shards from more than one of the two or more data sets. An operation may be performed on all of the merged shards.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for implementing a scalable computing system. The scalable computing system includes an intermediate system that facilitates communications between a core server system and a third-party system. The core server system processes a client request for a third-party service in association with a web page having a corresponding web address. The intermediate system communicates with the core server system to obtain a session token, and transmits the session token and web address to the third-party system. The third-party system may then access the web page via the web address using the session token.
Abstract:
A method by one or more electronic devices to provision an infrastructure for a machine learning application in a multi-tenant on-demand serving infrastructure. The method includes storing a plurality of templates, wherein each of the plurality of templates indicates a scoring interface, a web server, a definition of a continuous integration pipeline, and a definition of a continuous deployment pipeline, receiving a request to provision the infrastructure for the machine learning application using a specified template from the plurality of templates, and provisioning the infrastructure for the machine learning application using the specified template to create a version control system repository, a continuous integration pipeline, and a continuous deployment pipeline.
Abstract:
In an embodiment, a method includes maintaining, by a web-based online data storage system, a data store separating first data that is accessible by a first group of users from second data that is accessible by a second group of users. A first data object of the first data is stored and is specified to be made accessible by the second group of users. Access to the first data object for the second group of users is confirmed and a first copy of the first data object is generated in the second data of the data store, accessible by the second group of users. A first change is applied to the first data object in the data store originating from the first group of users, and the first change is synchronized to the first copy in the second data.
Abstract:
Disclosed are database systems, computing devices, methods, and computer program products for identifying recurring sequences of user interactions with an application. In some implementations, a server of a database system provides a user interface of the application for display at a computing device. The database system stores data objects identifying a first plurality of user interactions with the application. The server receives information representing a second plurality of user interactions with the application. The server updates the database system to further identify the second user interactions. The server identifies a recurring sequence of user interactions from the first and second user interactions as resulting in a first target state of the application. The server updates the database system to associate the recurring sequence of user interactions with the first target state of the application.