CONTROL MECHANISM OF EXTRACT TRANSFER AND LOAD (ETL) PROCESSES TO IMPROVE MEMORY USAGE

    公开(公告)号:US20240126774A1

    公开(公告)日:2024-04-18

    申请号:US17968057

    申请日:2022-10-18

    Applicant: SAP SE

    CPC classification number: G06F16/254 G06F16/2358 G06F16/2386 G06F16/258

    Abstract: Embodiments are described for a data processing tool configured to cease operations of a plurality of database readers when detecting a congestion condition in the data processing tool. In some embodiments, the data processing tool comprises a memory, one or more processors, and a plurality of database readers. The one or more processors, coupled to the memory and the plurality of database readers are configured to determine a congestion condition in at least one data pipeline of a plurality of data pipelines of the data processing tool. Each data pipeline of the plurality of data pipelines connects a database reader and a transformer of the data processing tool, a transformer and a database writer of the data processing tool, or two transformers of the data processing tool. The one or more processors are further configured to refrain from reading data from one or more databases responsive to the congestion condition.

    SYSTEMS AND METHODS FOR AUTHORIZING ACCESS TO COMPUTING RESOURCES

    公开(公告)号:US20190319958A1

    公开(公告)日:2019-10-17

    申请号:US15952739

    申请日:2018-04-13

    Applicant: SAP SE

    Inventor: Alexander Ocher

    Abstract: Embodiments of the present disclosure pertain to accessing computing resources. In one embodiment, the present disclosure includes a computer implemented method comprising storing at least one credential for accessing a first system, storing a plurality of user credentials for a plurality of users having access to a second system, linking the plurality of user credentials for the plurality of users having access to the second system to the at least one credential for accessing the first system, receiving a first user credential for a first user from the second system over a first connection, authenticating the first user credential, wherein the first user credential is authenticated when the first user credential matches one of the stored plurality of user credentials, and establishing a second connection between the first system and the second system using the at least one credential when the first user credential is authenticated.

    Neural network model generation and distribution with client feedback

    公开(公告)号:US11562245B2

    公开(公告)日:2023-01-24

    申请号:US16586035

    申请日:2019-09-27

    Applicant: SAP SE

    Abstract: Technologies described herein can be used to generate and distribute neural network models and executable code using feedback data received from one or more client computing devices. A neural network model can be generated by a server computer. Executable code can also be generated by the server that, when executed by a client computing device, causes the client device to generate a prediction using the neural network model. The server can transmit the model and code to one or more client computing devices. The server can receive feedback data from the client device(s) based on predictions generated by the client device(s) using the neural network model and the executable code. The server can generate an updated version of the neural network model and/or an updated version of the executable code base on the feedback data, and can transmit the updated model and/or the updated code to the client device(s).

    Systems and methods for authorizing access to computing resources

    公开(公告)号:US11057389B2

    公开(公告)日:2021-07-06

    申请号:US15952739

    申请日:2018-04-13

    Applicant: SAP SE

    Inventor: Alexander Ocher

    Abstract: Embodiments of the present disclosure pertain to accessing computing resources. In one embodiment, the present disclosure includes a computer implemented method comprising storing at least one credential for accessing a first system, storing a plurality of user credentials for a plurality of users having access to a second system, linking the plurality of user credentials for the plurality of users having access to the second system to the at least one credential for accessing the first system, receiving a first user credential for a first user from the second system over a first connection, authenticating the first user credential, wherein the first user credential is authenticated when the first user credential matches one of the stored plurality of user credentials, and establishing a second connection between the first system and the second system using the at least one credential when the first user credential is authenticated.

    NEURAL NETWORK MODEL GENERATION AND DISTRIBUTION WITH CLIENT FEEDBACK

    公开(公告)号:US20210097395A1

    公开(公告)日:2021-04-01

    申请号:US16586035

    申请日:2019-09-27

    Applicant: SAP SE

    Abstract: Technologies described herein can be used to generate and distribute neural network models and executable code using feedback data received from one or more client computing devices. A neural network model can be generated by a server computer. Executable code can also be generated by the server that, when executed by a client computing device, causes the client device to generate a prediction using the neural network model. The server can transmit the model and code to one or more client computing devices. The server can receive feedback data from the client device(s) based on predictions generated by the client device(s) using the neural network model and the executable code. The server can generate an updated version of the neural network model and/or an updated version of the executable code base on the feedback data, and can transmit the updated model and/or the updated code to the client device(s).

    Secure cloud storage system
    9.
    发明授权

    公开(公告)号:US10754973B2

    公开(公告)日:2020-08-25

    申请号:US15872336

    申请日:2018-01-16

    Applicant: SAP SE

    Abstract: Disclosed herein are system, method, and computer program product embodiments for a secured cloud storage system. An embodiment operates by receiving a compressed file comprising data that has been compressed using a compression algorithm. The compressed data is divided into a plurality of separate files. A password for each of the separate files is determined. Each of the separate files is encrypted with its corresponding password. The encrypted files are stored across a plurality of servers.

Patent Agency Ranking