Abstract:
A system for generating message headers where previously saved message headers are retrieved from memory when needed to satisfy a message header requirement. Message headers are comprised of segments where each message header segment has a different lifetime. In particular, a file-object response message header includes a header segment containing information linked to the requested file-object. This file-object linked header segment is retrieved when needed from a file-object header cache. A file-object response message header includes other segments such as one containing time-variant global information and time-invariant global information. Building header messages from multiple segments retrieved from their respective cache memories saves significant processing time as compared to generating a new message header each time a header is required by operation of a network server application.
Abstract:
The claimed subject matter relates to an architecture that can construct a map for summarizing analyses with respect to data included in a database. In addition, the architecture can display the map in a special canvas area. Generally, the map is a hub-and-spoke-style map in which a hub is associated with an entity (e.g., a related set of records) included in a database. Likewise, the spokes are typically representative of operations (e.g., filter, join, transform) that act upon the hub/entity from which it extends. The map can aid with open-ended analysis on complex databases by recording and ordering competing hypotheses and can also further collaborative efforts with respect to analysis.
Abstract:
Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant.
Abstract:
Advertisement management techniques are described. In one or more implementations, a plurality of identifiers are collected of advertisements communicated to respective ones of a plurality of mobile communication devices, each identifier exposed by a respective mobile communication device at a physical location of a merchant. A monetary amount is calculated to be provided to a service that was involved in providing the one or more advertisements to the mobile communication device.
Abstract:
Modifications to a collection of data are maintained in chronological order and selectively rendered as a function of time. The selective rendering can include an animated version of the modification, which can include a timeline of events. The modifications can be associated with related data that includes information as to who made the modification, when the modification was made, and so forth. The related data can also include a motivation behind the modification. Further, confidence information can be related to the modification to add further detail to the modifications and events surrounding the collection of data.
Abstract:
A visualization development system is provided. The system includes a visualization tool to develop one or more visualizations and a grammar engine that operates with the visualization tool to automatically detect visualization problems during the development of the visualizations.
Abstract:
A method and a processing device may be provided for creating a shadow database, having a size being approximately a desired percentage of a size of a relational database. Referential integrity of tables of the relational database may be preserved in the created shadow database. A representation of a connected graph may be created, based on a schema description of the relational database, and may be used to find driving tables and related tables of the relational database. Portions of driving tables of the relational database may be copied to corresponding tables of the shadow database and rows of tables of the relational database, related to the copied portions of the driving tables, may be copied to corresponding tables of the shadow database in a number of iterations until the size of the shadow database is approximately the desired percentage of the size of the relational database.
Abstract:
The adaptive bandwidth throttling system implements a graceful diminution of services to the clients by delaying a first class of services provided by a network server in response to the effective bandwidth utilized by this network server exceeding a first threshold. If the demand for the bandwidth by this network server exceeds a second threshold, the bandwidth throttling system escalates the throttling response and blocks the first class of services from execution and can also concurrently delay execution of a second class of services. The implementation of the throttling process can be varied, to include additional levels of response or finer gradations of the response, to include subsets of a class of services. In addition, the threshold levels of bandwidth used to trigger the throttling response can be selected as desired by the system administrator.
Abstract:
A transaction handling system and associated method are described for handling transactions based on a plurality of rule sets that apply to point sets (where the point sets contain points that can be consumed for goods and services, or have some other end-use connotation). Namely, the rule sets can be associated with respective point lots to define the characteristics and behavior of the respective point lots. For example, one rule in an applied rule set can determine whether a consumer is permitted to make a purchase without having sufficient points in the consumer's point lot, thus incurring a negative balance in the point lot. Another rule (e.g., a sandbox rule) can determine whether the consumer is permitted to use points only within a limited identified environment, or whether the consumer can use the points in any environment. An override rule set can override a default rule set on an individual account basis or on an individual consumer basis. Upon a transaction that affects a point lot, the transaction handling system can log the transaction in a record that is associated with the point lot.
Abstract:
A scaleable hash table for shared memory multi-processor (SMP) that supports very high rates of concurrent operations (e.g., insert, delete, and lookup), while simultaneously reducing cache misses. The SMP system has a memory subsystem and a processor subsystem interconnected via a bus structure. The hash table is stored in the memory subsystem to facilitate access to data items. The hash table is segmented into multiple buckets, with each bucket containing a reference to a linked list of bucket nodes that hold references to data items with keys that hash to a common value. Individual bucket nodes contain multiple signature-pointer pairs that reference corresponding data items. Each signature-pointer pair has a hash signature computed from a key of the data item and a pointer to the data item. The first bucket node in the linked list for each of the buckets is stored in the hash table. To enable multithread access, while serializing operation of the table, the SMP system utilizes two levels of locks: a table lock and multiple bucket locks. The table lock allows access by a single processing thread to the table while blocking access for other processing threads. The table lock is held just long enough for the thread to acquire the bucket lock of a particular bucket node. Once the table lock is released, another thread can access the hash table and any one of the other buckets.