Abstract:
In accordance with embodiments, there are provided mechanisms and methods for creating an application within a system. These mechanisms and methods for creating an application within a system can enable improved application diversity and productivity, enhanced customer experience, increased user flexibility, etc.
Abstract:
Disclosed are methods, apparatus, systems, and computer-readable storage media for determining user access to custom metadata. In some implementations, a server receives a request by or on behalf of a first user of a computing environment for a first custom metadata entity. A custom metadata entity may be a metadata component customized for use in the computing environment and having an entity type specifying a class or a category of the metadata component. The server may identify an association record indicating that the first user has permission to access the requested custom metadata entity. In some implementations, the association records are stored in an association database accessible by the server, wherein each association record identifies a user and a custom metadata entity. The server may also provide data including the requested custom metadata entity to a computing device.
Abstract:
Methods and corresponding systems and apparatuses for configuring user access to data stored in and/or accessed through an external computer system are described. Access permissions can be configured through defining a permission set relative to a proxy entity and assigning the permission set to one or more users. A proxy entity is a local representation of an external data entity. A proxy entity can be a virtual entity in that the proxy entity does not contain underlying data. A proxy entity can, however, include metadata describing its corresponding external data entity. A computer system maintaining a proxy entity can store mapping information linking the proxy entity to an external data entity. The mapping information and the permission set can be used to determine an access permission relative to the external data entity and to communicate this access permission to the external computer system so that access can be provided accordingly.
Abstract:
Technologies are provided for integrating learning data provided by an external learning platform (ELP) to create a custom learner experience within a context of an application provided by a cloud computing platform (CCP). The system can include the CCP, the ELP, learner APIs that expose a common learning data schema on the CCP, and a user interface platform (UIP). The UIP can include a compiler that transforms source code of UICs of a componentized learner user interface for usage on the CCP, and a bundler that generates a package of UI components (UICs) that are compatible for usage on the CCP. The UICs are specific to the learning data schema shared with the learner APIs. The UIP exports the package to the CCP, which composes the learning data provided via learner APIs and UICs from the package to provide the custom learner experience within the context of the application.
Abstract:
Disclosed are examples of systems, apparatus, methods, and computer program products for generating content objects using an integrated development environment. In some implementations, an integrated development environment is displayed. A request to generate or update an educational content object can be processed, and a presentation including metadata selection options can be provided. After a selection of one of the metadata selection options is received, the presentation can be updated. A different request is received from a rich text editor provided in a new presentation, and the new presentation can be updated.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the validation of assessments in an eLearning environment. Validation is facilitated using an assessment definition that includes one or more application programming interfaces (APIs) and identifies, for each of the APIs, a corresponding plugin and handler. Each of the APIs is configurable to obtain at least one user response to a corresponding challenge task via the corresponding plugin and each handler is configurable to validate the user response returned via the corresponding API. The accuracy of the user response to each challenge task is determined via the corresponding handler identified within the assessment definition. APIs can include a third party API, enabling validation of user responses across different systems. The user's knowledge may be assessed based upon the accuracy of the user's responses to all of the challenge tasks.
Abstract:
Disclosed are some examples of database systems, methods, and computer program products for processing log files. In some implementations, a server of a database system accesses a metadata file indicating algorithms that can be applied to data of log files. The server generates customer-facing log files using the log file and metadata file. The customer-facing log files include new data derived from using the algorithms and the data of the log files.
Abstract:
Computer-implemented methods and systems are provided for writing events to a data store. An application server generates events, the data store that stores the events, and a temporary events file storage system (TEFSS) temporarily stores groups of events as events files. When events are unable to be written directly to the data store, an indirect events writer is invoked that includes event capture threads each being configured to generate a particular events file, and write it to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service. An events file uploader service reads the events file(s) from the TEFSS, and then writes the events from each of the events files to the data store.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing user-customizable permissions governing user access to computing resources in a computing system. For example, a database storing data objects identifying permissions of users, sets of the permissions, and users can be maintained. One or more fields can be displayed on a display of a user device. The one or more fields can be configured to receive input to perform one or more operations. Input can be received from a user via the user interface on the display of the user device. One or more operations can be performed. The database can be updated such that the data objects identify a custom permission or a permission set to which a custom permission has been assigned.
Abstract:
Disclosed are methods, apparatus, systems, and computer program products for provisioning log file data. To provision the log file data, a server can parse through log files by identifying particular log entries and data fields. Customer-facing log files can be generated based on the identified log entries and data fields. A customer-facing log file has log file data specific to a particular customer, which can be a tenant of a multi-tenant database system. A security mechanism can be configured to prevent one tenant from accessing the customer-facing log file of another tenant of the multi-tenant database system.