摘要:
The claims of the present application recite a method and system for accessing information in an otherwise inaccessible application database of a DBMS using view definitions that implement a security protocol.
摘要:
In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader access than necessary or not adequate levels of access, transferable restricted security tickets are employed to determine an appropriate level of access for third parties. Tickets with expiration and restriction roles define a duration and level of access for a third party. The restrictions are determined through an intersection of the authorizing user's security role and restriction roles defined in the system.
摘要:
A method and system for generating and maintaining property sets is provided. In a preferred embodiment, a property set stream is generated. The stream comprises three parts: a header, a section locator array, and one or more sections. The header contains information for uniquely identifying the property set and for identifying the number of sections within the property set. The section locator array contains a unique identifier for each section and an offset indicating where the section resides within the stream. The third part, the section definitions, contains the information necessary to maintain groups of properties for each section. Each section contains a section header, a property locator array, and an array of property type/value pairs. The section header indicates both the size of the section and the number of properties defined within the section. The property locator array contains unique property identifiers for each property defined in the section and a relative offset, from the beginning of the section, to the property definition. Each property definition appears as a type/value pair, the type indicator indicating the data format for the property and the value field containing or referencing the data. In a preferred embodiment, a property set is generated by allocating appropriate storage and by storing values in the standard structure for a property set.
摘要:
A method and system for assisting a user in constructing a formula in a cell of a spreadsheet operating on a computer system. A function dialog box is displayed that lists various functions that may be selected by the user to be entered into the formula. By selecting a button in the function dialog box, an insert function dialog box is displayed that lists additional functions by category. When the user selects a function, a parameter dialog box associated with the selected function is displayed. Parameters may include cell addresses as well as numerical or other data entered directly by the user. The parameter dialog box displays the formula as it is being constructed. After the parameters have been entered, a result dialog box is displayed that allows the user to select the result cell in which to place the formula. The user selects the result cell and the result dialog box is removed from the display screen, the formula is entered in the result cell, and the result of the formula is displayed in the result cell.
摘要:
Architecture that facilitates the attachment of multiple visualization types (e.g., charts) to the data of a grid and the presentation of the visualization next to the grid. The infrastructure allows each data view to be associated with a set of visualizations. These visualizations are rendered along with the grid (in a separate presentation pane) so that the user does not have to switch context to perform analyses. The visualizations available include charts that show aggregate and/or non-aggregate data. In a server farm scenario, all user interactions such as drill-downs are provided. Server farm drill-downs for these visualizations can be obtained using MHTML (MIME hypertext markup language). The visualizations can be automatically updated when filters are applied on the grid, and when drill-down is performed on the visualization, the grid is automatically updated. The visualizations can be consumed from a web-based browser client and/or thick client, for example.
摘要:
Various technologies and techniques are disclosed for integrating a customer relationship management application with a mail merge operation on a client-side word processor. Mail merge settings are received from a user, including a record set to use in a mail merge operation. A new mail merge document is created. The record set is added to the mail merge document. A link is added to a template that will control the mail merge operation on a client-side word processor. The linked template gets attached to the new mail merge document when opened on the client-side word processor. Techniques for beginning a mail merge operation on a client-side word processor are described. A downloaded mail merge document is validated. The record set contained in the downloaded mail merge document is separated into one or more separate files. A mail merge wizard is started and advanced to a proper stage.
摘要:
In association with a computer system, a method and system for detecting and correcting errors in a spreadsheet formula. A token is created corresponding to each entry in the formula. As the formula is constructed, each token is added to the top of a formula token stack. When the formula is completed, a parser parses the formula token stack starting at the bottom of the stack and parsing each subsequent token. By examining the tokens in the formula token stack and their relationship to other tokens, the system determines whether an error exists in the formula. If an error is found to exist in the formula, an error class code is assigned to the error corresponding to the type of error. An error corrector rule corresponding to the error class code is applied and identifies a correction for the error. After a correction for the error is identified, the remainder of the formula token stack is parsed to detect and correct any other errors. When the entire formula token stack has been parsed and all detected errors have been corrected, a dialog box is displayed containing the completely corrected formula.
摘要:
Various technologies and techniques are disclosed for integrating a customer relationship management application with a mail merge operation on a client-side word processor. Mail merge settings are received from a user, including a record set to use in a mail merge operation. A new mail merge document is created. The record set is added to the mail merge document. A link is added to a template that will control the mail merge operation on a client-side word processor. The linked template gets attached to the new mail merge document when opened on the client-side word processor. Techniques for beginning a mail merge operation on a client-side word processor are described. A downloaded mail merge document is validated. The record set contained in the downloaded mail merge document is separated into one or more separate files. A mail merge wizard is started and advanced to a proper stage.
摘要:
Architecture that facilitates the attachment of multiple visualization types (e.g., charts) to the data of a grid and the presentation of the visualization next to the grid. The infrastructure allows each data view to be associated with a set of visualizations. These visualizations are rendered along with the grid (in a separate presentation pane) so that the user does not have to switch context to perform analysis. The visualizations available include charts that show aggregate and/or non-aggregate data. In a server farm scenario, all user interactions such as drill-downs are provided. Server farm drill-downs for these visualizations can be obtained using MHTML (MIME hypertext markup language). The visualizations can be automatically updated when filters are applied on the grid, and when drill-down is performed on the visualization, the grid is automatically updated. The visualizations can be consumed from a web-based browser client and/or thick client, for example.
摘要:
In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader access than necessary or not adequate levels of access, transferable restricted security tickets are employed to determine an appropriate level of access for third parties. Tickets with expiration and restriction roles define a duration and level of access for a third party. The restrictions are determined through an intersection of the authorizing user's security role and restriction roles defined in the system.