Abstract:
Techniques for mapping from one or more source information sets to one or more target information sets are provided. Mapping ontologies associate a first declarative expression with a first information set from which to read first information, and a second declarative expression with a second information set to which second information determined based upon the read first information is written. A mapping graph having a nodes arranged according to an execution flow for obtaining the one or more target information sets is generated, at least some of these nodes representing respective ones of the mapping ontologies. The one or more target information sets are generated, each including information determined from the one or more source information sets, by traversing the mapping graph according to the execution flow. Each of the first and second declarative expressions may be associated with a mapping resolver for accessing one or more information sets.
Abstract:
Certain example embodiments relate to an event-based system configured for self-monitoring. The event-based system includes a complex event processing (CEP) engine for consuming and producing events in accordance with at least one continuous query. The CEP engine in turn includes a first continuous query for producing events of a first event type and for consuming the events of the first event type. The CEP engine also is configured to detect performance issues based on the first continuous query.
Abstract:
Certain example embodiments relate to techniques for detecting anomalies in streaming data. More particularly, certain example embodiments use an approach that combines both unsupervised and supervised machine learning techniques to create a shared anomaly detection model in connection with a modified k-means clustering algorithm and advantageously also enables concept drift to be taken into account. The number of clusters k need not be known in advance, and it may vary over time. Models are continually trainable as a result of the dynamic reception of data over an unknown and potentially indefinite time period, and clusters can be built incrementally and in connection with an updatable distance threshold that indicates when a new cluster is to be created. Distance thresholds also are dynamic and adjustable over time.
Abstract:
A computer system, a computer-readable non-transitory medium, and/or a computer-implemented method generates analytics applicable to data of an undetermined structure and type. A processor device receives data formatted in an undetermined structure. The processor device discovers, in a cross filter model processor, dynamically in response to receiving the data in the undetermined structure, a structure and a data type of the data which was received in the undetermined structure. The processor device determines, in response to the structure and the data type of the data discovered by the cross filter model processor, which of a plurality of analytic queries are applicable to the data.
Abstract:
Certain example embodiments provide efficient policy-based access to data stored in memory tiers, including volatile local in-process (L1) cache memory of an application and at least one managed (e.g., non-volatile) in-memory (L2) cache. Operations include receiving an access request for access to a data element in L2; detecting whether a copy of the data element is in L1; if so, copying the data element and the access policy from L2 to L1 and providing the user with access to the copy of data element from L1 if the access policy allows access to the user; and if not, determining, by referring to a copy of the access policy stored in L1, whether the user is allowed to access the data element, and, if the user is allowed to access the data element, providing the user with access to the copy of the data element from the L1 cache memory.
Abstract:
Certain example embodiments relate to application intelligence gathering systems and/or methods, e.g., in connection with Event Driven Applications and/or the like. More particularly, certain example embodiments relate to the effective recording of application evolution and usage information for usage learning and/or event auditing purposes. With respect to usage learning, certain example embodiments may help to capture data on the usage patterns and/or apply learning algorithms that work on the captured data to provide required intelligence to the application. With respect to event auditing, certain example embodiments may help to identify the “who”, “what”, “when”, “where”, “how”, and/or “why” of particular operations. Application intelligence optionally may be used in determining application “hotspots” or commonly used features that could help in areas such as application maintenance, performance tuning, and/or the like.
Abstract:
A computer system and computer-implemented method colorizes a UI component image on the browser side. A data provider in the system encodes the UI component image into a Base64 character sequence which includes a header part and an image data part; generates Base64 header parts for specified colored versions of the UI component image; and transfers the encoded UI component image and the Base64 header parts for the specified colored versions of the UI component image to a client icon composer. The header part has a fixed amount of characters and the image data part has a variable amount of characters. The client icon composer replaces the header parts of the encoded UI component image with the Base64 header parts for the specified colored versions of the UI component image; and transfers the specified colored versions of the UI component image to a web page/application.
Abstract:
A method and apparatus for testing a screen display for colorblind accessibility identifies when an onscreen display is likely to be accessible or inaccessible to a colorblind individual. The method and apparatus can receive data corresponding to a screen display, including information encoded in color. The method and apparatus can further apply a color filter to the screen display to remove a background color generating a filtered image. The method and apparatus can further detect an object associated with the filtered image. The method and apparatus can further detect whether there is text in the filtered image and determine a proximity of the detected text to the object when text is detected and generate a colorblindness accessibility indicator based on whether text was detected and/or the determined proximity.
Abstract:
Systems and methods for item-level restoration from and verification of an image level backup without fully extracting it. The method receives backup parameters and selection of an image level backup to restore or verify and initializes virtual storage. The method attaches the virtual storage to a hypervisor to launch a virtual machine (VM) to test and restore data objects. The method stores VM virtual disk data changes resulting from restoration and verification in a changes storage. The method optionally reconfigures VMs to use an isolated network. The method optionally uses a routing appliance to provide access to VMs running in the isolated network from a production network. The method determines if the VM operating system (OS) is able to start using restored copies of selected data objects and tests applications associated with selected data objects. The method displays restoration and test results in an interface and automatically delivers the results.
Abstract:
Certain example embodiments relate to systems and/or methods for cloud-based event-driven integration, which in essence inverts the current point-to-point integration pattern by using an event-driven system in its place. Certain example embodiments transform and normalize integration patterns in connection with an underlying framework that helps decouple data producers from data consumers and advantageously allows additional systems to simply “plug into” the framework. Data from event sources is transformed into an event with a well-defined event type that may be picked up by an event sink, transformed into a format relevant for that event sink, and subsequently processed.