Abstract:
For a plurality of sensors, a particular sensor is indicated as a target sensor and the other sensors as input sensors. A regression model is trained using historical data from the plurality of related sensors. The trained regression model is applied to the target sensor to generate a predicted target sensor value. A difference between an actual target sensor value and the predicted target sensor value is calculated. A probability of difference for the calculated difference between the actual target sensor value and the predicted target sensor value is compared against a threshold value.
Abstract:
A computer-implemented method for disaggregating data in a spreadsheet or other data structure hosted on a client computing device includes providing an analyzer module as a plug-in or add-in to a spreadsheet application on a client computing device. The analyzer module locally performs disaggregation and aggregation processes on data in the spreadsheet on the client computing device. The method includes parsing, by the analyzer module, content entered in a subject cell of the spreadsheet to determine if sets of special syntax characters corresponding to a disaggregation instruction or command precede an amount in the entered content, and accordingly disaggregating or aggregating data in the spreadsheet.
Abstract:
The disclosure generally describes methods, software, and systems, including a method for using and managing ephemeral tables. User inputs associated with a database management system are received from an application. The user inputs are associated with a particular user and a particular application. From an auto-save cache index, one or more ephemeral tables are identified that are associated with the user inputs. The ephemeral tables are mapped to one or more tables in the database management system. Using the user inputs and the auto-save cache index, the one or more ephemeral tables are updated. Information associated with the user inputs is automatically stored on a temporal basis. The information survives database sessions, transaction boundaries, and database management system restarts.
Abstract:
The disclosure generally describes computer-implemented methods, software, and systems, including a method for presenting information. A first graph is presented that represents plural groups, each representing an aggregated set of data points grouped based on a first set of common attributes. User input selecting a particular group is received. The aggregated set of data points is analyzed to determine whether the number of aggregated set of data points exceeds a threshold. In response to determining that the number exceeds the threshold, the aggregated set of data points is re-grouped. A second set of common attributes associated with the re-grouped set of data points is identified. The data points are aggregated based on the second set of common attributes. A second graph is provided for presentation, the updated graph representing plural groups, each group representing an aggregated subset of data points from the aggregated set of data points.
Abstract:
A computer-implemented method for generating a plurality of data query suggestions is described. The method includes receiving a textual input in a user interface of a software application implementing a plurality of business processes and determining a query context for the textual input. The method also includes computing a plurality of ranked numerical scores based on the query context in which the ranked numerical scores are computed using information obtained from a plurality of usage metrics associated with the query context and determining, using the plurality of ranked numerical scores, a plurality of candidate data combinations. The method also includes ordering the plurality of candidate data combinations according to the plurality of ranked numerical scores and generating at least one data suggestion using the ordered plurality of candidate data combinations and providing the at least one data suggestion in the user interface.
Abstract:
Described herein is a descriptive framework to facilitate data visualization. In accordance with one aspect of the framework, one or more module manifests are provided, wherein a module manifest describes a module that represents a particular component of a visualization. A chart manifest may be used to coordinate the one or more module manifests. A visualization may be rendered based on the chart manifest.
Abstract:
A system receives a request from a request processor of a database connection pool to access a database. The system determines whether a database connection from the database connection pool is available for the request. A new security assertion mark-up language (SAML) assertion is generated when the database connection pool does not have an available database connection for the request. A new database connection to the database is built using the new SAML assertion.
Abstract:
A machine may be configured to subscribe a user to a data feed that corresponds to an activity. The machine may generate an optically scannable code that encodes an activity identifier of the activity. The machine may cause a first device to access this optically scannable code, and the first device may present the optically scannable code to a second device. The second device may scan the optically scannable code, and the machine may detect that the optically scannable code has been scanned by the second device. In response to this detection, the machine may subscribe a user of the second device to a data feed that corresponds to the activity. Hence, a first user may present the optically scannable code using one device, and a second user can scan the optically scannable code using another device and be subscribed to the data feed for the activity.
Abstract:
Provided are systems and methods for importing application content from a cloud environment where the application is being hosted onto a local user device. In one example, the method may include receiving, at a user device, a package exported from a host platform, extracting content of a software application hosted on the host platform and a script from the exported package, invoking the script within a runtime environment on the user device, and causing, via the script, a transfer objects of cloud content of the software application which are included in the exported package to a file system that is installed in a local storage on the user device.
Abstract:
Embodiments describe a technique for database schema migration that minimizes queries to the runtime database. A technique is described for detecting whether design time metadata has changed during a schema migration without performing a database query for runtime metadata and comparing the design time metadata with the runtime metadata. The technique may improve performance since it aims at minimizing the number of times the database is queried for runtime metadata during the schema migration.