Abstract:
A method and system to evaluate process objects for acceptability for use. New metrics that measure both object components and their relationships are used. The method selects metrics for the process objects that measure both the components and their relationships, compares measurements of the selected metrics with corresponding metric norms, and, based on the comparison, determines whether the process objects are acceptable. The system includes a memory to store metrics and process objects and a processor to select applicable metrics for the process objects, calculate the measurements of the selected metrics, compare the measurements to corresponding metric norms, and, based on the comparison, determine whether the process objects are acceptable.
Abstract:
Systems and methods are disclosed for managing a lock on an object dependent upon a nested LUW. The disclosed systems and methods may include registering a lock manager with an LUW manager responsible for managing a nested LUW on a buffer. The nested LUW may comprise an inner LUW and an outer LUW. The systems and method may further include locking an object affected by the inner LUW of the nested LUW. The LUW manager may transmit to the lock manager any events pertaining to the inner LUW. The lock manager may be operative to determine, based on the events pertaining to the LUW received from the LUW manager, whether the lock should be retained or released such that the status of the lock is consistent with the state of the nested LUW.
Abstract:
When a person receives an incoming telephone call, one or more files that the person is most likely to need are provided. The files are identified by analyzing information about what the person did in previous phone conversations with the same caller. That is, when the person opens files in the computer system during a phone call, this is recorded in a register that can be analyzed to identify the most likely needed files. Calls from more than one specific telephone number may be covered by the technique and several answering persons' actions may be tracked.
Abstract:
A computer implemented method and apparatus for managing a selection list include accessing previous entries in the history log for a particular field and displaying such entries in a selection list pull-down menu. A determination is made whether the selection is related to other recently made selections. Items from the selection list that are considered to be incorrect may be automatically deleted.
Abstract:
Pseudo-random numbers (PRNs) generated by a PRN generator are mapped to predefined number ranges or target ranges. The target range may be smaller or larger than the range of the PRN generator. Mapping to a smaller target range may include generating PRNs (e.g., integers) from a particular bit-input stream (e.g., 32-bit) having a uniform distribution across the range of numbers; selecting an optimal subset of the generated PRNs to map; and mapping the selected PRNs to a corresponding number in a target range such that the mapped numbers are uniformly distributed across the target range. Mapping to a larger target range may include generating uniformly distributed PRNs; applying a generation function to the PRNs to generate uniformly distributed packed numbers; and applying a mapping function to map selected packed numbers to the target range such that the mapped numbers are uniformly distributed.
Abstract:
A snapshot of data to be changed is stored prior to the change being made. A time when the data is changed is also stored. When a read of the data by a process is initiated, it is determined whether the data was changed within a security period. If the data was changed within the security period, the snapshot of data is provided to the process.
Abstract:
A process to evaluate selected data is started. An earliest effective date of changed selected data is determined, and data generated by prior run processes occurring after the earliest effective data is recalculated. In one embodiment, a coarse exclusive lock may be used to ensure only one evaluation is processed until completed. A fine exclusive lock may be used on a record which is the subject of a currently running evaluation process. In a further embodiment, a coarse lock is used on the data, and no lock is required for other evaluation processes. In yet a further embodiment, a snapshot of data prior to change is used during a predetermined security period.
Abstract:
A paint conduit has a jacket surrounding an interior and a hose arranged in the interior of the jacket. At least one end member is attached to a first end of the jacket and secures a first end of the hose in the jacket. The at least one end member has an end member section inserted between the jacket and the hose. The first end of the hose is at least as long as the jacket within the at least one end member. The hose extends through the at least one end member and an insert is inserted into the first end of the hose and presses the hose radially against the at least one end member.
Abstract:
The present system provides an efficient and reliable method for name searching within an email, workflow or groupware application. The present invention uses a plurality of different searching algorithms such as an exact algorithm and a fuzzy algorithm. The exact algorithm is used to provide a first set of a limited number of results from a names database. The fuzzy algorithm is then used to search through only the first set of results to quickly provide a ranked results list of names that is displayed to a user. The user is then able to select the appropriate name from the results list for further processing using the computer application.
Abstract:
A paint conduit has a jacket surrounding an interior and a hose arranged in the interior of the jacket. At least one end member is attached to a first end of the jacket and secures a first end of the hose in the jacket. The at least one end member has an end member section inserted between the jacket and the hose. The first end of the hose is at least as long as the jacket within the at least one end member. The hose extends through the at least one end member and an insert is inserted into the first end of the hose and presses the hose radially against the at least one end member.