摘要:
A graphical user interface (GUI) for presenting representations of selected objects in a computer system. The GUI presents an object selected from a collection of objects using a selected visual representation selected from at least first and second visual representations to be initiated using different initiation techniques. A first input control causes the selected object to be presented using another visual representation instead of the selected visual representation. A second input control causes another object to be presented instead of the selected object using any visual configuration that is currently used in presenting the selected object. The first and second input controls may be located in an object header area that remains essentially unchanged when changing between the at least first and second visual representations.
摘要:
A client computer and a server computer communicate via a network; the server computer receives user identification via the client computer that is selectively a first device or a second device. The server computer stores at least first and second application services for a single predetermined application class, wherein the first and second application services are adapted to client computer type. Upon receiving user identification, the server computer further receives a device attribute from the client computer, compares the device attribute with reference attributes, and selectively sends a representation of the first application service or of the second application service to the client computer according to the device attribute.
摘要:
Data structures for use in controlling access to data objects by users of a computer system or computing device are described. The data structures include an access control group data structure, a user access data structure, and a data object access data structure. The access control group data structure stores access control group data. The user access data structure stores user access data. The user access data relates to at least one entry in the access control group data structure. The data object access data structure stores data object access data, which relates to at least one entry in the access control group. Additional data structures described include an access control rule data structure and a characteristic method data structure.
摘要:
Systems, methods and techniques relating to managing process logs are described. A described technique includes identifying an end-to-end business process from a first system; identifying a plurality of systems that execute at least a portion of the end-to-end business process based on a definition of the end-to-end business process within the process registry; identifying a plurality of local process logs associated with the end-to-end business process for the a plurality of systems as defined by the process registry; and generating a federated process log based on at least a portion of each of the a plurality of local process logs.
摘要:
Data structures for use in controlling access to data objects by users of a computer system or computing device are described. The data structures include an access control group data structure, a user access data structure, and a data object access data structure. The access control group data structure stores access control group data. The user access data structure stores user access data. The user access data relates to at least one entry in the access control group data structure. The data object access data structure stores data object access data, which relates to at least one entry in the access control group. Additional data structures described include an access control rule data structure and a characteristic method data structure.
摘要:
A method for updating a business software system is provided that includes installing a support package in the business software system and providing an option to an administrator to activate at least one new functionality in the business software system continuously after the installing operation. The support package may be adapted to not provide the new functionality until activated by the administrator. A business software system is provided that includes a support package adapted to provide at least one new functionality upon being activated by an administrator of the business software system. The support package is adapted to not provide the new functionality until activated by the administrator. The support package provides an option to the administrator to activate the new functionality continuously after the installing operation. A method for updating a business software system is provided.
摘要:
Various embodiments of systems and methods for process model extraction and weak-spot analysis from plain event logs are described herein. In an aspect, the method involves obtaining an event log that includes events grouped by process instances. Based on analyzing the event log a process graph is generated. In another aspect, one or more visual representations of the generated process graph, indicating the weak-spots, are generated. At least one of the one or more visual representations of the process model is rendered in response to receiving a selection of the at least one visual representation. In yet another aspect, the weak-spots are transformed into a data structure and provided as input to a rule mining algorithm for generating a set of rules defining the weak-spots. The set of rules received from the rule mining algorithm are rendered on a graphical user interface (GUI).
摘要:
Systems, methods and techniques relating to managing process logs are described. A described technique includes identifying an end-to-end business process from a first system; identifying a plurality of systems that execute at least a portion of the end-to-end business process based on a definition of the end-to-end business process within the process registry; identifying a plurality of local process logs associated with the end-to-end business process for the a plurality of systems as defined by the process registry; and generating a federated process log based on at least a portion of each of the a plurality of local process logs.
摘要:
Various embodiments of systems and methods for providing business process visibility at real time are described herein. One or more business activity events are received at a local business activity event manager. Further, business process binding information associated with the one or more business activity events is retrieved at the business activity manager from a business process model manager. A relationship of the one or more business activity events with a business process using the business process binding is identified at the business activity event manager. Upon determination, a business process log manager is triggered for logging a business activity log of a business process instance at real time. Furthermore, the business activity log is extracted to monitor and analyze the business process instance at real time.
摘要:
The object based navigation is an intelligent user interface that uses a source object to determine which target information is to be presented to the user. This is done by associating an object to one or more operations, so that selection of a given source object would result in a predefined operation to be activated. The role of the user may also affect the predefined operation that is activated. If multiple operations are associated with a given source object, these operations may be prioritized, so that the one with the highest priority is performed as a default operation.