Abstract:
In one embodiment, a method includes defining a slice of a dimensional database. The slice includes at least one dimension and at least one measurement and is expressable as a table. The method further includes building, in a structured query language (SQL) dialect, a single query that queries the slice and one or more non-dimensional databases. The SQL dialect represents the at least one dimension, the at least one measurement, and data attributes of the one or more non-dimensional databases. In addition, the method includes parsing the single query. The parsing includes generating a dimensional query for the dimensional database and a non-dimensional query for each of the one or more non-dimensional databases. Furthermore, the method includes executing the dimensional query on the dimensional database. Moreover, the method includes, for each non-dimensional database of the one or more non-dimensional databases, executing the non-dimensional query on the non-dimensional database.
Abstract:
A method for accessing variables in an application is described. The method includes accessing application source code and parsing the application source code to identify a set of variables. For each variable from the set of variables, the method can include determining a variable type of the variable. In response to determining that the variable type is a complex variable, the method can include parsing the complex variable, which can include repeating the method for each variable of the complex variable. In response to determining that the variable is associated with a database, the method can include resolving a variable name and determining whether the variable exists in a data dictionary associated with the database. The method can further include determining metadata associated with the variable based, at least in part, on the variable type. The variable type and metadata of the variable can then be presented to a user.
Abstract:
A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection.
Abstract:
A database statement categorization system can enable DBAs or other users to more easily find tunable database statements by categorizing the database statements. The database categorization system can analyze a DBMS to identify the types of database statements executed on the DBMS and can then categorize the statements automatically, outputting the categorization for presentation to a DBA (or other user). This categorization can advantageously separate less relevant statements that warrant less tuning or investigation from more relevant statements that may have a measurable impact on the performance of the database. By allowing users to focus on statements that are more likely to warrant attention, in certain embodiments the database categorization system streamlines the tuning process.
Abstract:
In one embodiment, a method includes receiving an identity of a metric of interest and a future time point. The method further includes retrieving a prediction configuration previously associated with the metric of interest. The prediction configuration comprising a period combination. The period combination comprises a plurality of time periods, each time period comprises one or more segments, and each segment of the one or more segments comprises adapted historical values of the metric of interest incrementally inserted therein. The method also includes, for each time period of the plurality of time periods, identifying, for the future time point, a corresponding segment of the one or more segments, accessing a set of adapted historical values from the corresponding segment, and computing an intermediate predicted value from the set of adapted historical values. Moreover, the method includes calculating a predicted value for the metric of interest based on the computing.
Abstract:
A system for provisioning, allocating, and managing virtual and physical desktop computers in an enterprise network computing environment allows for these physical and desktop computers to be grouped logically based on personnel, organizational, or networking efficiencies without regard to the hardware or server that will ultimately run the virtual machine terminal once it is accessed. A connection broker connects incoming connections to one desktop in a desktop group, based on information relating to that incoming connection.
Abstract:
In one embodiment, a method includes selecting a group of transactions having a common end-to-end transaction path comprising a plurality of transaction-path nodes. Each transaction of the group is associated with either an acceptable category or an unacceptable category based, at least in part, on an end-to-end response time for the transaction. The method further includes separately determining, for each transaction-path node, an execution-time pair. The execution-time pair includes first aggregate information indicative of execution time by the transaction-path node for transactions associated with the acceptable category. The execution-time pair also includes second aggregate information indicative of execution time by the transaction-path node for transactions associated with the unacceptable category. Additionally, the method includes generating a visualization of the end-to-end transaction path. The visualization depicts each determined execution-time pair in relation to a corresponding transaction-path node.
Abstract:
In an embodiment, a method includes receiving, from a data source, time-series data of a time-series data stream produced by the data source. The method further includes identifying a target compression algorithm for the time-series data, wherein the target compression algorithm is linked to the data source in memory pursuant to a dynamically-variable assignment. The method also includes compressing the time-series data using the target compression algorithm and transmitting the compressed time-series data to a destination. Furthermore the method includes periodically optimizing the dynamically-variable assignment in real-time as the time-series data is received.
Abstract:
In one embodiment, a method is performed by a computer system. The method includes receiving a request to authenticate a user of an enterprise computing system. The method further includes, responsive to the request, selecting a set of previous user-initiated events of the user on the enterprise computing platform. Further, the method includes accessing user-specific event information related to the selected set of previous user-initiated events. In addition, the method includes generating, from at least a portion of the user-specific event information, a user-specific authentication sequence comprising a plurality of event-information requests. Additionally, the method includes administering the user-specific authentication sequence to the user, the administering comprising requiring the user to provide a valid response to each of the event-information requests as a precondition to successful authentication.
Abstract:
In one embodiment, a method includes receiving a trigger to deploy a particular container on cloud resources accessible thereto such that the cloud resources are provided by a plurality of cloud providers and such that the computer system and the plurality of cloud providers are configured to negotiate container deployment using an information exchange protocol. The information exchange protocol includes a preconfigured inquiry format and a preconfigured inquiry-response format. The method further includes generating a performance inquiry in relation to the particular container. In addition, the method includes transmitting the performance inquiry to the plurality of cloud providers. Moreover, the method includes receiving inquiry responses from at least some of the plurality of cloud providers. Additionally, the method includes causing the particular container to be deployed on resources of the particular cloud provider.