A system for secure sharing of documents via a content management repository is provided. The system includes a content management unit, a filtering unit, a graphical user interface, and a memory communicatively coupled to the content management unit. The content management unit is configured to receive content restriction rules for content stored in the content management repository. The content management unit is further configured to inject the content restriction rules into policy rules. The content management unit is configured to intercept an Application Programming Interface call for the content from a user. The filtering unit is configured to dynamically filter the content based on the content restriction rules. The graphical user interface is configured to render the filtered content to display the filtered content to the user.
According to various embodiments a device may provide an interactive searching interface for securely searching of textual content across a plurality of documents stored in a plurality of repositories comprising heterogenous data, the securely searching of the textual content comprising using a flexible search criteria and enforcing user access privileges to the plurality of documents A device may use unified searching, using a unified search criteria definition, the plurality of repositories in response to the feedback from the user, the unified searching being interactive, iterative, and using a unified index resulting in faster query response times than the metadata searching the plurality of repositories.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for multi-platform computing, communication systems, and computer network performance and capacity management, monitoring, streaming, analysis and reporting; downloadable computer software for monitoring, reporting, streaming, analyzing, and displaying the performance of mainframe computers; downloadable computer software for monitoring, reporting, streaming, analyzing and displaying the performance of operating system software, middleware, computer networking and communication system hardware and software components, and computer databases; downloadable publications, namely user manuals, installation guides, case studies, infographics, datasheets, and brochures, all in the fields of performance and capacity management, monitoring, streaming, analysis and reporting for multi-platform computing, computer networks, and communications systems. Providing educational information via a website, in the fields of multi-platform computing and computer network performance and capacity management, monitoring, streaming, analysis and reporting; providing non-downloadable videos in the field of multi-platform computing, communication systems, and computer network performance and capacity management, monitoring, streaming, analysis and reporting. Providing technical information via a website, in the fields of multi-platform computing and computer network performance and capacity management, monitoring, streaming, analysis and reporting.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer programs for use in information management, database management, operations management, administration, performance, recovery and migration; downloadable computer programs for monitoring of direct and network attached data storage devices across the enterprise and management and automation for backup and recovery of the data stored in such storage devices; downloadable computer programs used for monitoring and optimizing the performance of and detecting and diagnosing problems in IT infrastructure, computer network management and performance; service assurance applications, namely, downloadable computer programs used for monitoring and reporting on performance in connection with the management of enterprises and service providers; downloadable network operating system programs and computer utility programs for use therewith; downloadable computer programs for use in identity management, namely, the establishment and management of associations between names or numbers and subjects or objects, and attributes of those associations; downloadable computer programs for use in the telecommunications industry, namely, operational support system applications that manage and interpret wireless data and wire line and mobile networks; downloadable computer programs used for connecting to the global computer network to measure performance data; downloadable computer programs used for monitoring and reporting on performance in connection with IT infrastructure and computer network security; downloadable computer programs used for system level computer network software connectivity and problem-resolution technologies for computer networks and IT infrastructure, namely, root cause analysis and event correlation to prioritize and filter problem symptoms and other system metrics; downloadable computer programs used for interactive guidance and training solutions for real-time self-service performance support; downloadable computer programs for use in the development of software applications, namely, software used for configuration, management, and reporting of business data and enterprise operations; downloadable computer programs used for visual applications, namely, software used for graphically displaying IT infrastructure and computer network behavior; automated scorecards, namely, downloadable computer programs for use in managing and measuring strategic operational performance; downloadable computer programs for the retention of, archiving, recovery, back-up, automated tier management, and protection of data; downloadable computer programs for machine learning, reasoning, distributing, sharing, organizing, migrating, cloning, encrypting, managing, preparing, analyzing, visualizing, reporting, gathering, indexing, translating, and searching structured, semi-structured, and unstructured data, including machine generated data; downloadable computer programs that provide high availability and disaster recovery for business applications and data; downloadable computer programs for managing the lifecycle of business applications and data; downloadable computer programs that provide self-service and collaborative business intelligence; downloadable computer programs for terminal emulation and workflow automation; downloadable computer programs for creating and managing application programming interfaces (APIs); downloadable computer programs for developing, managing, monitoring, and deploying mobile and web applications; downloadable computer programs for transforming, enhancing, integrating, migrating, and consolidating legacy applications, data, and systems; downloadable computer programs for the development of applications delivered on personal devices and web browsers; downloadable computer programs for virtualizing data; downloadable computer programs for virtualizing application programs and applications screens as data; downloadable computer programs for query decomposition, routing, and assimilation from heterogeneous data stores; downloadable computer programs for migrating, moving, copying, and cloning data between homogeneous and heterogeneous devices and computing platforms; downloadable computer programs for sharing and synchronizing data between organizations; computer programs for translating, processing, and managing Electronic Data Interchange messages and transaction; downloadable computer programs for deployment on premises, in cloud-based infrastructures, and in hybrid cloud infrastructures; downloadable computer programs that provide multi-factor authentication, encryption of data, and key management; downloadable computer programs that provide development environments and administration environments for development of software applications, data analysis, and administration and management of databases; downloadable computer programs for sorting data and computer programs for porting open source software to multiple platforms; downloadable computer programs used for content management and publishing digital content; downloadable computer programs for automating audit report generation and compliance analysis; downloadable software for use in business process management, employee collaboration, and workflow automation; downloadable software for creating and providing virtual workspaces; downloadable computer software development tools; downloadable electronic publications in the nature of analyst reports, brochures, datasheets, ebooks, infographics, reference guides, technical specifications, case studies, manuals, and white papers in the field of computers, computer hardware, computer software, cloud and mobile computing, data storage, data virtualization, and information technology; downloadable, videos, webinars and presentations in the field of computers, computer hardware, computer software, cloud and mobile computing, data storage, data virtualization, and information technology; downloadable computer program instruction manuals in the field of database management, administration, performance, recovery, migration, storage management and optimization, network management and performance, service assurance, security and directory, and identity management; downloadable computer program instruction manuals for programs in the telecommunications industry in the field of operational support system applications, wire line and mobile networks, accessing the global computer network, ATM and frame relay networks, and submarine ground, and satellite communications; downloadable computer program instruction manuals for programs associated with computer security, asset protection and account management, time synchronization and management, system-level software connectivity, and problem-resolution technologies, interactive guidance, training and performance support solutions; downloadable computer program instruction manuals for programs used in the development, deployment, configuration and management of business intelligence solutions, visual applications, executive dashboards, reporting solutions, automated scorecards, data management solutions, administrative consoles and platform configuration tools Providing technical support services, namely, troubleshooting of computer software problems and monitoring computer network systems to monitor security and detect unauthorized access or a data breach, monitor performance, and to detect breakdowns; computer software design for others; computer programming for others; design of graphical user software for others; maintenance of computer software; computer software consultancy in the field of operations management, information management, and applications management; Anything as a service (XaaS) services, namely, software as a service (SaaS) featuring non-downloadable software for managed file transfer and logistics, file syncing and sharing, data transfer, migration, integration, and management, data interchange and shaping, transforming, enhancing, integrating, migrating, and consolidating legacy applications, data and systems, self-service business intelligence, enterprise performance, disaster recovery, automating audit reporting and compliance analysis, content management, content publishing, web and mobile application development, and providing virtual workspaces; Infrastructure as a service (IaaS), namely, hosting software and servers for use by others for back-up and archive management, network management, cloud connector, and data service; Business process as a service (BPaaS) featuring non-downloadable software, servers, and computer software platforms for self-service business intelligence and enterprise performance management, content management, file sharing, data interchange, business process management, collaboration, and workflow automation, all of the foregoing provided via cloud-based infrastructures and global computer network
5.
Systems using an authorization service user interface for secure role-based access control
The disclosure is directed to systems and methods for enterprise-wide fine-grained role-based access control to a plurality of organizational assets. In various embodiments exemplary methods include receiving, via an authorization service client API, identification of an asset for fine-grained role-based access control; a definition of an asset type of the asset; a definition of an asset value; receiving, a definition of an organizational role with fine-grained role-based access control to at least one of the asset, the asset type, and the asset value. Furthermore, receiving permissions for fine-grained role-based access by the organizational role to at least one of the asset, the asset type, and the asset value. Furthermore, the exemplary method may comprise providing an authorization service user interface (UI) for enabling fine-grained role-based access control to the asset based on the fine-grained role-based access control database schema.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for multi-platform computing, communication systems, and computer network performance and capacity management, monitoring, streaming, analysis and reporting; downloadable computer software for monitoring, reporting, streaming, analyzing, and displaying the performance of mainframe computers; downloadable computer software for monitoring, reporting, streaming, analyzing and displaying the performance of operating system software, middleware, computer networking and communication system hardware and software components, and computer databases; downloadable publications, namely user manuals, installation guides, case studies, infographics, datasheets, and brochures, all in the fields of performance and capacity management, monitoring, streaming, analysis and reporting for multiplatform computing, computer networks, and communications systems Providing online non-downloadable videos in the field of multi-platform computing, communication systems, and computer network performance and capacity management, monitoring, streaming, analysis and reporting Providing technological information via a website, in the fields of multi-platform computing and computer network performance and capacity management, monitoring, streaming, analysis and reporting; providing educational information via a website, regarding the technological aspects of multi-platform computing and computer network performance and capacity management, monitoring, streaming, analysis and reporting
7.
Applying Multi-Faceted Trust Scores for Decision Making Using a Decision Table and Predetermined Action Triggering
Provided are methods and systems for applying multi-faceted trust scores in data security. A method may commence with determine a plurality of data facets for a data item. The method may further include determining a plurality of parameters and weights corresponding to the plurality of data facets associated with the data item. Upon determining the plurality of parameters and weights, at least one trust score for the data item may be calculated based on the plurality of parameters and weights. The method may further include selectively taking an action based on the at least one trust score.
According to various embodiments a device may provide an interactive searching interface for securely searching of textual content across a plurality of documents stored in a plurality of repositories comprising heterogenous data, the securely searching of the textual content comprising using a flexible search criteria and enforcing user access privileges to the plurality of documents A device may use unified searching, using a unified search criteria definition, the plurality of repositories in response to the feedback from the user, the unified searching being interactive, iterative, and using a unified index resulting in faster query response times than the metadata searching the plurality of repositories.
A device may store a plurality of documents in a source content library using a web-based, the plurality of documents in the source content library being unredacted and the plurality of documents in the source content library comprising a private content document, the private content document comprising unprivileged content and privileged content. A device may store a plurality of document hyperlinks in a target content retrieval library, the plurality of document hyperlinks being access hyperlinks for the plurality of documents in the source content library and the plurality of document hyperlinks comprising a private content document hyperlink, the private content document hyperlink being a hyperlink to the private content document. A device may automatically synchronize in real-time the plurality of documents in the source content library with the plurality of document hyperlinks in the target content retrieval library.
A system for providing geolocation-based policy rules is provided. The system includes a policy engine and a memory communicatively coupled to the policy engine. The policy engine is configured to receive geolocation data for a plurality of objects. The policy engine is configured to create, based on the geolocation data, location policy attributes for the plurality of objects. The policy engine is configured to incorporate the location policy attributes into policy rules. The policy rules include rules for accessing the plurality of objects. The policy engine is further configured to execute the policy rules with regard to the plurality of objects.
Provided are methods and systems for federated redaction of select content in documents stored across multiple repositories. With the presently disclosed technology, multi-layer redaction policies can be defined in either regular expression or with pattern matching. The redaction policies are associated with one or more document classes, and applied to the associated documents in substantially real-time. Further, document governance policies can be defined such that users of certain roles may view certain content in an unredacted form, despite the presence of a redaction policy for the document.
The disclosure is directed to systems and methods for secure policies-based information governance. In various embodiments exemplary methods include displaying a Graphical User Interface (GUI), the graphical user interface receiving a business rule input from a business user; receiving a policy from a policy engine based on the business rule input, the policy engine generating a policy hierarchy; and defining a plurality of domain objects and a plurality of domain object representations in the Graphical User Interface (GUI) based on the policy and the policy hierarchy. Furthermore, exemplary methods include defining an extensible hierarchical domain model definition using the policy hierarchy, the extensible hierarchical domain model definition being modified using the plurality of domain object representations in the Graphical User Interface (GUI); and defining a Policy Enforcement Point (PEP) in an application based on the extensible hierarchical domain model definition.
The disclosure is directed to systems and methods for enterprise-wide fine-grained role-based access control to a plurality of organizational assets. In various embodiments exemplary methods include receiving, via an authorization service client API, identification of an asset for fine-grained role-based access control; a definition of an asset type of the asset; a definition of an asset value; receiving, a definition of an organizational role with fine-grained role-based access control to at least one of the asset, the asset type, and the asset value. Furthermore, receiving permissions for fine-grained role-based access by the organizational role to at least one of the asset, the asset type, and the asset value. Furthermore, the exemplary method may comprise providing an authorization service user interface (UI) for enabling fine-grained role-based access control to the asset based on the fine-grained role-based access control database schema.
Provided are methods and systems for combining business process management (BPM) and robotic process automation (RPA) into a unified BPM and RPA process. An example method commences with creating a BPM process flow. The BPM process flow can include one or more BPM models for executing BPM tasks. The method then proceeds with creating an RPA process flow. The RPA process flow can include one or more RPA models for executing the one or more RPA tasks. The method can further include linking the one or more RPA models to the BPM process flow. Thereafter, the method proceeds with creating an application package associated with the unified BPM and RPA process. The application package can include the one or more BPM models and the one or more RPA models. The method can further include exporting the application package for deployment.
Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.
Provided are computer-implemented methods and systems for optimization of publication of an application to a web browser. An example method for optimization of publication of an application to a web browser may include capturing, by a server-side agent, a video frame of a virtual screen associated with the application. The method may further include comparing, by the server-side agent, the video frame to a previous video frame of the virtual screen to detect a change in the video frame. The method may continue with generating, by the server-side agent, an image of the change based on the detection. The method may further include sending, by the server-side agent, the image of the change to a client device. The virtual screen may be re-rendered on the client device based on the image of the change and the previous video frame.
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
A system for secure sharing of documents via a content management repository is provided. The system includes a content management unit, a filtering unit, a graphical user interface, and a memory communicatively coupled to the content management unit. The content management unit is configured to receive content restriction rules for content stored in the content management repository. The content management unit is further configured to inject the content restriction rules into policy rules. The content management unit is configured to intercept an Application Programming Interface call for the content from a user. The filtering unit is configured to dynamically filter the content based on the content restriction rules. The graphical user interface is configured to render the filtered content to display the filtered content to the user.
A system for providing geolocation-based policy rules is provided. The system includes a policy engine and a memory communicatively coupled to the policy engine. The policy engine is configured to receive geolocation data for a plurality of objects. The policy engine is configured to create, based on the geolocation data, location policy attributes for the plurality of objects. The policy engine is configured to incorporate the location policy attributes into policy rules. The policy rules include rules for accessing the plurality of objects. The policy engine is further configured to execute the policy rules with regard to the plurality of objects.
Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 67/567 - Integrating service provisioning from a plurality of service providers
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Disclosed herein are systems and methods for intelligent metadata management and data lineage tracing. In exemplary embodiments of the present disclosure, a data element can be traced throughout multiple applications, platforms, and technologies present in an enterprise to determine how and where the specific data element is utilized. The data element is traced via a hierarchical key that defines it using metadata. In this way, metadata is interpreted and used to trace data lineage from one end of an enterprise to another.
Provided are methods and systems for combining business process management (BPM) and robotic process automation (RPA) into a unified BPM and RPA process. An example method commences with creating a BPM process flow. The BPM process flow can include one or more BPM models for executing BPM tasks. The method then proceeds with creating an RPA process flow. The RPA process flow can include one or more RPA models for executing the one or more RPA tasks. The method can further include linking the one or more RPA models to the BPM process flow. Thereafter, the method proceeds with creating an application package associated with the unified BPM and RPA process. The application package can include the one or more BPM models and the one or more RPA models. The method can further include exporting the application package for deployment.
Provided are computer-implemented methods and systems for optimization of publication of an application to a web browser. An example method for optimization of publication of an application to a web browser may include capturing, by a server-side agent, a video frame of a virtual screen associated with the application. The method may further include comparing, by the server-side agent, the video frame to a previous video frame of the virtual screen to detect a change in the video frame. The method may continue with generating, by the server-side agent, an image of the change based on the detection. The method may further include sending, by the server-side agent, the image of the change to a client device. The virtual screen may be re-rendered on the client device based on the image of the change and the previous video frame.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
Provided are methods and systems for determining multi-faceted trust scores for data. A method may commence with receiving data and determining a plurality of metadata items associated with the data. The method may continue with determining one or more facets associated with each of the plurality of metadata items. The method may further include determining a parameter and a weight associated with each of the one or more facets. Upon determining the parameter and the weight, a trust score associated with each of the plurality of metadata items may be calculated based on the parameter and the weight associated with each of the one or more facets. The method may further include calculating a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items.
Provided are methods and systems for combining business process management (BPM) and robotic process automation (RPA) into a unified BPM and RPA process. An example method commences with creating a BPM process flow. The BPM process flow can include one or more BPM models for executing BPM tasks. The method then proceeds with creating an RPA process flow. The RPA process flow can include one or more RPA models for executing the one or more RPA tasks. The method can further include linking the one or more RPA models to the BPM process flow. Thereafter, the method proceeds with creating an application package associated with the unified BPM and RPA process. The application package can include the one or more BPM models and the one or more RPA models. The method can further include exporting the application package for deployment.
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
Various embodiments of the present technology are directed to methods for workload management and automation. In some embodiments the methods include (A) executing a workflow using a request/response API, the workflow design-time comprising: (i) defining a task and process and run-time requirements of the workflow; (ii) assembling and sequencing of the work into a workflow; (iii) defining execution affinities, dependencies, and completion criteria of the workflow; and (iv) scheduling the workflow; (B) executing a workflow run-time, the workflow run-time comprising: (i) receiving a request for the work using the request/response API; (ii) executing the workflow using the workflow design-time and the request/response API; and (iii) sending a response after the executing of the workflow using the request/response API.
Systems and methods for discovering a unique identifier for an integrated development environment editor for receiving a single code base with a same functionality from a plug-in are disclosed herein. Exemplary implementations may include: accessing an integrated development environment's plug-in registry using publicly available tools and publicly available published information; identifying a unique identifier for the integrated development environment's editor using the plug-in registry; adding the unique identifier for the integrated development environment editor to a plug-in; and repeating the process for other integrated development environment editors, allowing functions developed for the integrated development environment editor to be available in the other integrated development environments.
The disclosure is directed to systems and methods for enterprise-wide fine-grained role-based access control to a plurality of organizational assets. In various embodiments exemplary methods include receiving, via an authorization service client API, identification of an asset for fine-grained role-based access control; a definition of an asset type of the asset; a definition of an asset value; receiving, a definition of an organizational role with fine-grained role-based access control to at least one of the asset, the asset type, and the asset value. Furthermore, receiving permissions for fine-grained role-based access by the organizational role to at least one of the asset, the asset type, and the asset value. Furthermore, the exemplary method may comprise providing an authorization service user interface (UI) for enabling fine-grained role-based access control to the asset based on the fine-grained role-based access control database schema.
The disclosure is directed to systems and methods for secure policies-based information governance. In various embodiments exemplary methods include displaying a Graphical User Interface (GUI), the graphical user interface receiving a business rule input from a business user; receiving a policy from a policy engine based on the business rule input, the policy engine generating a policy hierarchy; and defining a plurality of domain objects and a plurality of domain object representations in the Graphical User Interface (GUI) based on the policy and the policy hierarchy. Furthermore, exemplary methods include defining an extensible hierarchical domain model definition using the policy hierarchy, the extensible hierarchical domain model definition being modified using the plurality of domain object representations in the Graphical User Interface (GUI); and defining a Policy Enforcement Point (PEP) in an application based on the extensible hierarchical domain model definition.
Provided are methods and systems for federated redaction of select content in documents stored across multiple repositories. With the presently disclosed technology, multi-layer redaction policies can be defined in either regular expression or with pattern matching. The redaction policies are associated with one or more document classes, and applied to the associated documents in substantially real-time. Further, document governance policies can be defined such that users of certain roles may view certain content in an unredacted form, despite the presence of a redaction policy for the document.
Provided are methods and systems for using multi-faceted trust scores in data security. A method may commence with determine a plurality of data facets for a data item. The method may further include determining a plurality of parameters and weights corresponding to the plurality of data facets associated with the data item. Upon determining the plurality of parameters and weights, at least one trust score for the data item may be calculated based on the plurality of parameters and weights. The method may further include selectively taking an action based on the at least one trust score.
Provided are computer-implemented methods and systems for dynamically deploying a web component in an application. An example method for dynamically deploying a web component in an application may include deploying a client-side application to a web browser associated with a client device. The method may continue with receiving a request to deploy a web component in the client-side application. The method may further include dynamically loading the web component in the client-side application. With this method, web components can be dynamically added to a current operating version of a web application. Further, a user can use a web application as if it is operating locally on the web browser of the client device, even though it is not actually stored locally on the client device.
Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Provided are methods and systems for enabling seamless integration between multiple products as a common layer by using a common visual modeler. An example system may include an application server and a common visual modeler. The common visual modeler may include a visual modeling environment for building an application by an end user. The visual modeling environment may include a modeler for creating the application, wherein the modeler comprises at least one component from at least one enterprise software product, the at least one component comprising at least one UI-based modeling tool for creating at least one artifact and a configuration module for managing settings of the at least one component. The common visual modeler may also include a server runtime environment for executing the application, the server runtime environment comprising at least one runtime engine for the at least one artifact created by the modeler.
Provided are computer-implemented methods and systems for dynamically deploying a component in an application. An example method for dynamically deploying a component in an application may include building, by a front-end application platform, a client-side application. The method may further include deploying the client-side application to a browser associated with a client device. The method may continue with receiving, from a customer associated with the client device, a request to deploy a component in the client-side application. The method may further include dynamically loading the component in the client-side application.
Provided are computer-implemented methods and systems for publishing an application to a web container. An example method for publishing an application to a web container may include establishing a channel of communication with a user device associated with an end user. The method may further include embedding a web container into a web portal associated with a plurality of applications. The method may include executing an application in a user session associated with the end user. The method may further include capturing images of a virtual screen associated with the application executed on the application server. After the capture, the method may continue with sending the images to the web container of the web portal running in a web browser of the user device. The web container may publish the images to the web browser to display the application as part of the web portal in the web browser.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Provided are computer-implemented methods and systems for optimization of publication of an application to a web browser. An example method for optimization of publication of an application to a web browser may include capturing, by a server-side agent, a video frame of a virtual screen associated with the application. The method may further include comparing, by the server-side agent, the video frame to a previous video frame of the virtual screen to detect a change in the video frame. The method may continue with generating, by the server-side agent, an image of the change based on the detection. The method may further include sending, by the server-side agent, the image of the change to a client device. The virtual screen may be re-rendered on the client device based on the image of the change and the previous video frame.
Disclosed herein are systems and methods for intelligent metadata management and data lineage tracing. In exemplary embodiments of the present disclosure, a data element can be traced throughout multiple applications, platforms, and technologies present in an enterprise to determine how and where the specific data element is utilized. The data element is traced via a hierarchical key that defines it using metadata. In this way, metadata is interpreted and used to trace data lineage from one end of an enterprise to another.
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer application software for workforce mobility, namely, software for enterprise security and cost savings by providing secure access to content archived
09 - Scientific and electric apparatus and instruments
Goods & Services
(Based on Use in Commerce) Computer software for enterprise metadata repository for use in centralizing the management of metadata from data sources throughout an organization
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Database management software, namely, network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting and archiving; and computer software for use in electronic invoice, bill and statement presentment and processing of payments Educational services, namely, computer management training in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting and archiving, bill and statement presentment and processing of payments Computer software consultation, design, development, programming, installation, and maintenance for others in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting, archiving and electronic invoice, bill, and statement presentment and processing of payment; technical support services, namely, troubleshooting of computer software problems in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting, archiving, and electronic invoice, bill and statement presentment and processing of payments
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Database management software, namely, network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting and archiving; and computer software for use in electronic invoice, bill and statement presentment and processing of payments Educational services, namely, computer management training in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting and archiving, bill and statement presentment and processing of payments Computer software consultation, design, development, programming, installation, and maintenance for others in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting, archiving and electronic invoice, bill, and statement presentment and processing of payment; technical support services, namely, troubleshooting of computer software problems in the fields of network and web-based document and information management, capture, storage, retrieval, formatting, indexing, conversion, migration, viewing, reporting, archiving, and electronic invoice, bill and statement presentment and processing of payments
09 - Scientific and electric apparatus and instruments
Goods & Services
computer software used for data management, namely to store, archive, retrieve, and display information, and instruction manuals distributed together as a unit