摘要:
Processing proposed changes to data includes notifying a server of a proposed change to master data, receiving, from the server, an indication as to whether there is a concurrent change to the master data, where the concurrent change corresponds to a change to the master data in addition to the proposed change, and deciding whether to make the proposed change or to abort the change.
摘要:
A request is received to initiate an operation (e.g., a query, etc.) on a view on a business object type. Such a request contains data characterizing the view which in turn characterizes a plurality of hierarchically arranged elements. Such elements characterized are associated with elements characterized by one or more business objects types. Thereafter, the operation is performed on the elements of the two or more business objects types. Responsive results of the operation responsive are mapped to the elements of the virtual business object type. After such mapping occurs, a message is generated that contains the results of the request in a structure compatible with the view.
摘要:
The present disclosure describes methods, systems, and computer program products for integrating authorizations. One computer-implemented method includes: reading enterprise data warehouse (EDW) authorizations for a user from an authorization database in response to a query generated by the user for EDW data; responsive to a determination that the user is assigned to an environment, reading environment authorizations from a business planning and consolidation (BPC) system; enhancing the EDW authorizations for the user with the environment authorizations read from the BPC system to create a new authorization set; reading a user-based data access profile (DAP) from the BPC; and intersecting the new authorization set with the DAP to create an overall user authorization set.
摘要:
A directory includes information about various systems (e.g., applications, processes, tasks, objects, services) and data, and may include data ownership information. The directory may define existing systems, corresponding locations by address, and corresponding semantic names. The directory may also specify the role of each system, e.g., a consumer or provider role. The directory may also define a scope of data a provider system can provide. As such, the directory may also include information about whether and how such data is being replicated. When a user requests data, a service may, based on the directory, determine and select an appropriate provider system for the data. The service may further create a subscription process to provide the user a local cache of the requested data. With such directory information, a service can provide data access services that integrate subscription processes.
摘要:
Memory stores data for access by a computer program that is capable of being executed on a data processing system. A data structure is stored in the memory, which includes information resident in a database used by the computer program. The information includes payload data made up of data objects, process data for a process associated with the data objects, and a header that includes technical data for transmitting the data structure.
摘要:
The present disclosure describes methods, systems, and computer program products for integrating authorizations. One computer-implemented method includes: reading enterprise data warehouse (EDW) authorizations for a user from an authorization database in response to a query generated by the user for EDW data; responsive to a determination that the user is assigned to an environment, reading environment authorizations from a business planning and consolidation (BPC) system; enhancing the EDW authorizations for the user with the environment authorizations read from the BPC system to create a new authorization set; reading a user-based data access profile (DAP) from the BPC; and intersecting the new authorization set with the DAP to create an overall user authorization set.
摘要:
Embodiments consistent with the invention provide a computer-implemented method for providing a cross-system log in a distributed computer system environment having multiple computer systems. The method comprises electronically receiving data in a first system, the data including cross-system characteristics of a cross-system activity originating from a second computing system, electronically storing the data, electronically receiving a request to access the data, and electronically providing the requested data.
摘要:
Memory stores data for access by a computer program that is capable of being executed on a data processing system. A data structure is stored in the memory, which includes information resident in a database used by the computer program. The information includes payload data made up of data objects, process data for a process associated with the data objects, and a header that includes technical data for transmitting the data structure.
摘要:
A request is received to initiate an operation (e.g., a query, etc.) on a view on a business object type. Such a request contains data characterizing the view which in turn characterizes a plurality of hierarchically arranged elements. Such elements characterized are associated with elements characterized by one or more business objects types. Thereafter, the operation is performed on the elements of the two or more business objects types. Responsive results of the operation responsive are mapped to the elements of the virtual business object type. After such mapping occurs, a message is generated that contains the results of the request in a structure compatible with the view.
摘要:
Methods and apparatus, including computer program products, are provided for processing messages including structured data, such as objects and business objects. The method may include a receiver inhibiting processing of a first message including a first object referencing a second object, when the receiver of the first message does not include key mapping information for the second object. The receiver may then receive key mapping information determined for the second object, when a second message, received at the receiver, includes the second object without references to another dependent object. The mapping information may be representative of a location of the second object. The receiver may then automatically resume processing of the first message, when the key mapping information is received. Related apparatus, systems, methods, and articles are also described.