Abstract:
A provisioning system for a multi-tenant platform including a presentation component operably coupled to a supervisory component and a registry database and configured to present registry information in accordance with criteria defined in one or more rules and receive requests to access the registry information. The one or more rules define a supply chain including multiple of a plurality of tenants in the multi-tenancy system, the supervisory component configured to automatically implement the supply chain in response to the request.
Abstract:
Methods, systems and computer-readable media enable various techniques related to semantic navigation. One aspect is a technique for displaying semantically derived facets in the search engine interface. Each of the facets comprises faceted search results. Each of the faceted search results is displayed in association with user interface elements for including or excluding the faceted search result as additional search terms to subsequently refine the search query. Another aspect automatically infers new metadata from the content and from existing metadata and then automatically annotates the content with the new metadata to improve recall and navigation. Another aspect identifies semantic annotations by determining semantic connections between the semantic annotations and then dynamically generating a topic page based on the semantic connections.
Abstract:
The systems and methods described herein relate to a system for documenting transactions. A filter is provided that captures content associated with transactions. The filter may be configured to start and stop the capture at predetermined times, and may be further configured to specify what content is to be captured during a transaction. The system may store any documents or data associated with a transaction, including dynamic content and user selections and inputs. A document repository may be provided for storing unstructured data representing data, text, forms, and so forth presented to a party during a transaction. A viewer may be provided for displaying data stored in the document repository.
Abstract:
The invention provides a system and method for file synchronization. One embodiment of the system of this invention includes a software program stored on a computer readable medium. The software program can be executed by a computer processor to receive a file from a server; store the file as a cached file in a cache; determine if the cached file has been modified; and if the cached file has been modified, communicate the cached file directly to the database.
Abstract:
An ad in a movie can be a static ad having a position in the movie that cannot be moved, or a dynamic ad having a position in the movie that can be changed. When a viewer of the movie wishes to skip a portion of the movie containing the ad, the playback system determines whether the ad is static or dynamic. If the ad is static, then only the portion of the movie preceding the static ad can be skipped, that is, the ad is unskippable; this technique is referred to as “bounceback” since the end of the skip bounces back to the start of the static ad. If the ad is dynamic, then the ad is moved to after the end of the skip; this technique is referred to as “slipad” since the ad slips to later in the movie. When a movie has multiple ads, some can be static and some can be dynamic.
Abstract:
Information related to activity of a user may be provided using a method or a data processing system program product to perform the method. In one embodiment, the method includes sending a first view request to a first electronic site, receiving a first view from the first electronic site, and first information related to the first view request to a second entity that is different from the first entity. In another embodiment, a data processing system program product may perform a method of sending information related to a view request from the user for an electronic site. The information is to be sent to an entity that is different from an entity that substantially controls or owns the electronic site and different from an Internet service provider of the user, if the user is to use the Internet service provider in accessing the electronic site.
Abstract:
Techniques for transmitting information to a recipient under their control are described. In some situations, the techniques are used in conjunction with a fax delivery system to provide, as part of a connection established to perform a fax transmission, a variety of functionalities to a human recipient that is participating as part of the connection, such as when the human recipient is contacted in error. In addition, in some situations, an interactive voice response system is used to receive and interpret input from a human recipient, such as in response to one or more control selections or options provided to the human recipient.
Abstract:
Techniques for transmitting information to a recipient under their control are described. In some situations, the techniques are used in conjunction with a fax delivery system to provide, as part of a connection established to perform a fax transmission, a variety of functionalities to a human recipient that is participating as part of the connection, such as when the human recipient is contacted in error. In addition, in some situations, an interactive voice response system is used to receive and interpret input from a human recipient, such as in response to one or more control selections or options provided to the human recipient.
Abstract:
A user authorization system may include a database server maintaining, in a database, a cached user rights list specifying associations between users and related entities from which the users inherit rights and an access control list specifying permissions of entities to access objects. A server may receive a request from a user to access an object and pass access information to the database server. The database server may filter the access control list based on the cached user rights list to generate a filtered access control list specifying permissions to the object for the user and return the filtered access control list to the server. The server may then utilize the filtered access control list returned from the database server to determine whether the user has permission to access the object.
Abstract:
Disclosed can improve rights list management as well as performance of systems utilizing an access control list. A database server having a transitive closure management module may receive an identification of an entity defined in a database storing a cached transitive closure. The transitive closure management module may incrementally update the cached transitive closure stored in the database by generating a new transitive closure for the entity and determining a delete transitive closure record. The delete transitive closure record may be determined by analyzing the cached transitive closure and the new transitive closure, determining a first transitive closure path for the entity that is not specified in the new transitive closure and that is specified in the cached transitive closure, and selecting as the delete transitive closure record a record specifying the first transitive closure path. The delete transitive closure record can then be deleted from the cached transitive disclosure.