Abstract:
In an example embodiment, a system and method to store and retrieve application data from a cache and a database are provided. The example method may comprise receiving location data associated with application data from a user device, using the location data to determine a cache or database on which the application data is stored, and requesting application data from the cache or database. The system and method may further include monitoring requests for application data associated with instructions having a set of characteristics, identifying application data as associated with the instructions having the set of characteristics, and requesting the application data based on receiving subsequent instructions sharing the same set of characteristics.
Abstract:
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Abstract:
In various embodiments, a system, method, and related computer-readable storage medium to process data transactions are provided. In one example, a system is arranged to process data transactions in a data store including a plurality of databases. The system includes a computer interface module to receive a data transaction request from at least one requesting computer and a data access layer having one or more processors to identify at least one database in the plurality of databases. The data access layer is to define an abstraction layer between a computer interface module and the plurality of databases. Other embodiments are disclosed.
Abstract:
Methods and system for managing resource connections are described. In one embodiment, an initial user request to access data stored at a resource is received. The initial user request is generated by an application of a plurality of applications having access to the resource. An existing connection from the application is utilized to provide the data to the application. A current user request to access data stored at the resource is received. Based on a determination that the existing connection is unavailable, the current user request is assigned to a waiter queue. A number of requests assigned to the waiter queue during a pre-defined time period is determined to exceed a threshold. A new connection from the application to the resource is created based on the availability of a further connection to the resource and the exceeding of the threshold.
Abstract:
A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol.
Abstract:
There is provided a method to automatically generate software code. The method receives a request for the data, queries at least two data sources for the data based on the request; and receiving results that include the data that is populated to at least one data object.
Abstract:
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link.
Abstract:
There are provided systems and methods to respond to a request for data. The system receives a request to search for the data based on a criterion and to populate data objects with the data. The request is further used to identify columns that determine data sources to query. The system performs a search of a logical table based on the criterion to identify a plurality of rows in the logical table. The system further generates a first plurality of tuples based on the plurality of rows to identify a first plurality of physical tables that are mapped to the logical table. The first plurality of tuples includes a first tuple and a second tuple. The system further queries the data sources for the data to generate results by using the first plurality of tuples. The queries of the data sources are partially successful.
Abstract:
There is provided a method to automatically generate software code. The method receives a request for the data, queries at least two data sources for the data based on the request; and receiving results that include the data that is populated to at least one data object.