Providing a timeline of events regarding a database record

    公开(公告)号:US10324922B2

    公开(公告)日:2019-06-18

    申请号:US14482691

    申请日:2014-09-10

    Abstract: Disclosed are methods, apparatus, systems, and computer program products for providing a timeline of events regarding a database record in an on-demand database service. In some non-limiting examples, the database record can be stored in a database in a cloud computing environment, and the timeline can display events or interactions related to the database record. Metadata associated with an event or interaction can be used to identify data associated with the event or interaction, and metadata can be used to determine what events or interactions are displayed in the timeline according to filtering parameters. Metadata can also be used to determine a customer satisfaction rating or health-based numeric for the database record.

    Systems and methods of viral enablement of features by peer-to-peer connection

    公开(公告)号:US10320822B2

    公开(公告)日:2019-06-11

    申请号:US15886749

    申请日:2018-02-01

    Inventor: Jason Schroeder

    Abstract: The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user's social graph by comparing the user's social graph to a list of event attendees. The identified attendees can be stratified into social graph tags that annotate, categorize and prioritize other users in the user's social graph. The technology disclosed also relates to identifying and notifying the user of nearby attendees of sessions at the event who meet introduction preferences of the user by finding matches between introduction preference attributes specified by the user and attributes of the attendees provided by the list of event attendees.

    HYBRID CODE MODIFICATION IN INTERMEDIATE LANGUAGE FOR SOFTWARE APPLICATION

    公开(公告)号:US20190171544A1

    公开(公告)日:2019-06-06

    申请号:US16271210

    申请日:2019-02-08

    Inventor: Sergey GORBATY

    CPC classification number: G06F11/36 G06F9/45508 G06F21/577

    Abstract: Computer program, methods, and systems for code modification of a programming language platform and a software application in an intermediate language at different times are disclosed. The methods and system may modify a portion of the programming language platform in the intermediate language at a first time to alter a functionality of or add a new functionality to the programming language platform; and may modify the software application in the intermediate language at a second time different from the first time, where the software application may be modified based on a runtime analysis rule that uses the altered or added new functionality of the programming language platform. The modified programming language platform may be included in a first package, and the modified software application may be included in a second package, and executed on the modified programming language platform.

    Data counter measures
    665.
    发明授权

    公开(公告)号:US10313347B2

    公开(公告)日:2019-06-04

    申请号:US14842135

    申请日:2015-09-01

    Abstract: Techniques to block unwanted third party calls are disclosed. In various embodiments, an indication is received that third party code included on a web page is attempting to write to the web page content associated with an unauthorized third party call. The unauthorized third party call is blocked. In some embodiments, the unauthorized third party call is blocked by blocking the web page content associated with the unauthorized third party call from being written to the web page.

    Environment-differentiated named credential instances for development and deployment

    公开(公告)号:US10298582B2

    公开(公告)日:2019-05-21

    申请号:US15158277

    申请日:2016-05-18

    Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.

    DATABASE SYSTEMS AND METHODS FOR AUTOMATED DATABASE MODIFICATIONS

    公开(公告)号:US20190147068A1

    公开(公告)日:2019-05-16

    申请号:US15814196

    申请日:2017-11-15

    Inventor: PRESTON TUGGLE

    Abstract: Database systems and related customization methods are provided. One exemplary method of modifying a database to support a new functionality involves receiving user input indicative of the new functionality from a client device coupled to a network, identifying existing customizations associated with a user of the client device in the database, determining a plurality of different solutions for implementing the new functionality based at least in part on the existing customizations associated with the user, providing a graphical user interface display at the client device including graphical indicia of the plurality of different solutions for implementing the new functionality, and in response to receiving indication of a selected solution of the plurality of different solutions from the client device, automatically instantiating a new customization corresponding to the selected solution in the database.

    External Change Detection
    669.
    发明申请

    公开(公告)号:US20190138608A1

    公开(公告)日:2019-05-09

    申请号:US15803408

    申请日:2017-11-03

    Abstract: Disclosed herein are system, method, and computer program product embodiments for performing external change detection without copying data from an external system. An embodiment operates by transmitting a registration request comprising data selection criteria to a data service at an external system. The external system generates a tracking token representing a transaction state of a data object satisfying the data selection criteria. The embodiment receives the tracking token. The embodiment detects a change to the data object in the external system using the tracking token. The embodiment receives the change to the data object from the external system based on the detecting. The embodiment then processes the change to the data object.

Patent Agency Ranking