Abstract:
Disclosed are some examples of database systems, methods, and computer program products for processing log files. In some implementations, log files can be accessed and identifiers can be generated for the data entries of the log files. The generated identifiers can be used to determine whether data entries in the log files are new, and therefore, should be extracted for analysis.
Abstract:
Disclosed are examples of systems, apparatus, methods, and computer program products for release management of content in an educational content management system. In some implementations, first educational content can be received from a first user device, and second educational content can be received from a second user device. A packaging object can be generated based on the first educational content and the second educational content. A release object including the packaging object can be generated. A modification to the packaging object can be processed, and the first educational content and the second educational content can be displayed in a user interface of a display device.
Abstract:
Disclosed are examples of systems, apparatus, methods, and computer program products for generating content objects using an integrated development environment. In some implementations, an integrated development environment is displayed. A request to generate or update an educational content object can be processed, and a presentation including metadata selection options can be provided. After a selection of one of the metadata selection options is received, the presentation can be updated. A different request is received from a rich text editor provided in a new presentation, and the new presentation can be updated.
Abstract:
Computer-implemented methods and systems are provided for writing events to a data store. An application server generates events, the data store that stores the events, and a temporary events file storage system (TEFSS) temporarily stores groups of events as events files. When events are unable to be written directly to the data store, an indirect events writer is invoked that includes event capture threads each being configured to generate a particular events file, and write it to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service. An events file uploader service reads the events file(s) from the TEFSS, and then writes the events from each of the events files to the data store.
Abstract:
Computer-implemented methods and systems are provided. The system includes a data store that is configured to store events in an event table, a temporary events file storage system (TEFSS), and a cluster of application servers. The cluster includes a first application server that generates events, and a second application server that includes an events file uploader service. When the first application server is unable to directly write events to the data store, an indirect events writer generates events file(s), and writes the events file(s) to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service at the first application server. When the events file uploader service determines that the first application server is inactive, it reads the events file(s) from the TEFSS, and writes the events from each of the events files to the data store.
Abstract:
In an example, a processing system of a database system may categorize event data taken from logged interactions of users with a multi-tenant information system to provide a metric. Event roll-up aggregate metrics used to provide the metric may be generated in connection with event capture. The processing system of the database system may periodically calculate the metric for a particular one of the tenants, and electronically store the periodically calculated metrics for accessing responsive to a query of the particular tenant.
Abstract:
Disclosed are examples of systems, apparatus, methods and computer program products for providing user-customizable permissions governing user access to computing resources in a computing system. For example, a database storing data objects identifying permissions of users, sets of the permissions, and users can be maintained. One or more fields can be displayed on a display of a user device. The one or more fields can be configured to receive input to perform one or more operations. Input can be received from a user via the user interface on the display of the user device. One or more operations can be performed. The database can be updated such that the data objects identify a custom permission or a permission set to which a custom permission has been assigned.
Abstract:
A permission management system enables a system administrator to more effectively manage the large number of permissions associated with database systems. The permission management system accumulates groups of permissions associated with selected users, profiles, or permission sets. The permission management system then performs selectable comparisons on the different groups of permissions, such as identifying common permissions, unique permissions, and differing permissions. The permission management system also may identify permissions in a first permission group that do not exist in a second permission group and assign the identified permissions to the second permission group.
Abstract:
Disclosed are some examples of systems, apparatus, methods and storage media for configuring the presentation of a user interface (UI) based on a role of the user with respect to a data object. In some implementations, a database system stores a plurality of data objects and user profiles. The system further includes processors operable to receive a first request for a data object from a user device, identify available UI configurations based on the user profile and on the data object, communicate first information to the user device for displaying a UI having a first one of the available UI configurations, receive a second request to change the UI to have a second one of the available UI configurations, and communicate second information to the user device for displaying the second UI configuration.
Abstract:
Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the validation of assessments in an eLearning environment. Validation is facilitated using an assessment definition that includes one or more application programming interfaces (APIs) and identifies, for each of the APIs, a corresponding plugin and handler. Each of the APIs is configurable to obtain at least one user response to a corresponding challenge task via the corresponding plugin and each handler is configurable to validate the user response returned via the corresponding API. The accuracy of the user response to each challenge task is determined via the corresponding handler identified within the assessment definition. APIs can include a third party API, enabling validation of user responses across different systems. The user's knowledge may be assessed based upon the accuracy of the user's responses to all of the challenge tasks.