A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also be inventions.
A contacts database can store digital objects for each person who may be able to help in achieving a goal. Each object usually consists of a few standard fields, such as first name, last name, company name, job title, address, telephone number, e-mail address, fax number, and mobile phone number. Contacts database users may create custom objects to store non-standard information. There is significant value in enriching a contacts database with information identifying the job responsibilities of a contact. This information may enable sales and marketing users to prospect and build lists by job responsibilities, in addition to other criteria.
In the following drawings like reference numbers are used to refer to like elements. Although the following figures depict various examples, the one or more implementations are not limited to the examples depicted in the figures.
General Overview
Systems and methods are provided for associating job responsibilities with job titles. As used herein, the term multi-tenant database system refers to those systems in which various elements of hardware and software of the database system may be shared by one or more customers. For example, a given application server may simultaneously process requests for a great number of customers, and a given database table may store rows for a potentially much greater number of customers. As used herein, the term query plan refers to a set of steps used to access information in a database system. Next, methods and mechanisms for associating job responsibilities with job titles will be described with reference to example embodiments. The following detailed description will first describe a method for associating job responsibilities with job titles. Next, example graphs for associating job responsibilities with job titles are described.
In accordance with embodiments described herein, there are provided systems and methods for associating job responsibilities with job titles. A database system identifies a job level and a job department associated with a job title stored by an object. The database system identifies level-based job responsibilities associated with the job level. The database system identifies department-based job responsibilities associated with the job department. The database system identifies at least one job responsibility associated with the job title based on the level-based job responsibilities and the department-based job responsibilities. The database system stores each identified job responsibility in metadata and/or a field associated with the object. The database system outputs a message based on the object to a user device, in response to a search that specifies any identified job responsibility.
For example, the database system identifies the job level Vice President and the job department Sales from the contact John Smith's job title Vice President of Sales. The database system determines that a data set indicates that 80% of Vice President-level jobs in a sales department have Business Development job responsibilities and that 40% of Vice President-level jobs in a sales department have Channel Marketing job responsibilities. The database system determines that the data set indicates that 45% of vice president level Sales jobs have Account Management job responsibilities, 40% of vice president level Sales jobs have Partner Management job responsibilities, and that 35% of vice president level Sales jobs have Business Development job responsibilities. The database system identifies a Business Development job responsibility associated with the job title Vice President of Sales based on the Vice President-level job responsibilities and the Sales department-based job responsibilities. The database system stores the identified Business Development job responsibility in metadata associated with John Smith's contact object. The database system outputs John Smith's contact object as a lead to a marketer in response to the marketer's search for contacts with the identified Business Development job responsibility.
While one or more implementations and techniques are described with reference to an embodiment in which associating job responsibilities with job titles is implemented in a system having an application server providing a front end for an on-demand database service capable of supporting multiple tenants, the one or more implementations and techniques are not limited to multi-tenant databases nor deployment on application servers. Embodiments may be practiced using other database architectures, i.e., ORACLE®, DB2® by IBM and the like without departing from the scope of the embodiments claimed.
Any of the embodiments described herein may be used alone or together with one another in any combination. The one or more implementations encompassed within this specification may also include embodiments that are only partially mentioned or alluded to or are not mentioned or alluded to at all in this brief summary or in the abstract. Although various embodiments may have been motivated by various deficiencies with the prior art, which may be discussed or alluded to in one or more places in the specification, the embodiments do not necessarily address any of these deficiencies. In other words, different embodiments may address different deficiencies that may be discussed in the specification. Some embodiments may only partially address some deficiencies or just one deficiency that may be discussed in the specification, and some embodiments may not address any of these deficiencies.
A hierarchical job responsibilities algorithm can organize a given set of job responsibilities into a multilevel taxonomy, and leverage the taxonomy in identifying job responsibilities based on job titles. The hierarchical algorithm can use three levels: level 1 for department, level 2 for top level job responsibilities in a department, and level 3 for job responsibilities within a level 2 job responsibility. This multilevel taxonomy is a directed acyclic graph, instead of a tree. Multiple departments can have the same level 2 job responsibility, and multiple level 2 job responsibilities can have the same level 3 job responsibility. As examples, Marketing is a department (level 1 taxonomy item) with Brand Management as one of its children (level 2 item), and Data Science is a level 2 job responsibility with Predictive Analytics as one of its children (level 3 item).
The hierarchical algorithm is:
The operation “add job responsibility to R” is assumed to only add a job responsibility to R if the job responsibility is not already in R. The hierarchical algorithm has three distinct components in the pseudocode above: identify job responsibilities in job title, identify from job level and job departments of job title, and identify related job responsibilities. These components are covered separately below by corresponding algorithms.
To understand why the identify job responsibilities in job title algorithm is a somewhat elaborate algorithm instead of a simpler algorithm, consider the following scenario. The following are some members in the level 2 taxonomy: interactive marketing, digital marketing, online marketing, mobile marketing, and social marketing. The identify job responsibilities in job title algorithm should be able to identify the interactive marketing job responsibility and the digital marketing job responsibility in the Vice President of Interactive and Digital Marketing job title, and should be able to identify the online marketing job responsibility, the mobile marketing job responsibility, and the social marketing job responsibility in the Vice President—Online Marketing, Mobile and Social job title. To efficiently realize such identifications, which involves accounting for word reversals and intervening words, the identify job responsibilities in job title algorithm creates a custom inverted index from the full set of level 2 job responsibilities. This index maps words to (identifiers of) job responsibilities in which they appear. The table below is an extremely simplified example of a map for an index.
A portion of the example inverted index for these job responsibilities includes:
interactive→{1}
marketing→{1-5}
This portion of the inverted index indicates that the word interactive appears only in job responsibility 1, whereas the word marketing appears in job responsibilities 1 through 5.
Let I denote this index, with Iw denoting what I maps w to. The identify job responsibilities in job title algorithm also maintains the job responsibilities in tokenized form. Wr denotes the set of tokens in job responsibility r. The slop parameter d controls how far apart the words in a job responsibility are allowed to be when these words are in a job title.
The identify job responsibilities in job title algorithm's inputs are Title T and slop parameter d. The identify job responsibilities in job title algorithm includes two major steps: Step 1 tokenizes T (after downcasing) into the words sequence <w1, . . . wk>, and creates an inverted index I(T) where, for a word w in T, Iw(T) is the set of positions in the job title in which this word appears. Step 2 identifies the job responsibilities that occur in T using the sorted <w1, . . . wk>, I(T), and {Wr} Step 2 is described in detail in the pseudo-description below.
Step 1 runs fast because k is typically small. In step 2, the key operations that ensure speed are Iw and Iw(T), i.e. looking up the job responsibilities that a word is contained in, and looking up positions in the job title in which a word appears. The identify job responsibilities in job title algorithm is illustrated by the following example for the job title Vice President Online Marketing Mobile and Social. In this example, the level 2 job responsibilities are interactive marketing, digital marketing, online marketing, mobile marketing, and social marketing. For this example, the identify job responsibilities in job title algorithm uses the slop d=1. I(T) is {vice→empty, president→empty, online→{3}, marketing→{4}, mobile→{5}, and →empty, social→{7}}
The following table depicts values of key variables in a certain (interesting) iteration of the outermost for loop.
The contents of this table are read as follows. marketing is the 4th word in this job title, and appears in job responsibilities {1-5}. One of these job responsibilities is mobile marketing. The identify job responsibilities in job title algorithm checks whether the word mobile in this job responsibility appears in the job title and, if so, where. mobile does appear as the 5th word in the job title. The 5th word is close enough to the 4th word, which is where the word marketing appears in this job title. That is, these two words from the job responsibility appear sufficiently close by in the job title for the identify job responsibilities in job title algorithm to deem this job responsibility a match in job title.
A job level/job department algorithm identifies job responsibilities associated with the job level and the job department(s) identified for a job title. Let r denote a job responsibility, lT the job level of title T, and dT the job departments of title T. The job level/job department algorithm assumes that lT is a single job level, whereas dT could be one or more job departments. For example, the job level/job department algorithm processes the title Vice President of Sales and Marketing, identifies the job level is VPlevel, and identifies the job departments are Sales and Marketing. Using a Bayesian treatment, the job level/job department algorithm assigns the numerator of the right hand side of Equation 1 below as the score S(r, lT, dT):
P(r|lT,dT)=[P(lT|r)*(Πd∈d
The denominator of the right hand side of Equation 1 does not depend on r. Therefore, since the job level/job department algorithm uses the score only for ranking, the score may be defined as the numerator of the right hand side of Equation 1.
For estimating the probability distributions in the right hand side of Equation 1, the job level/job department algorithm assumes the availability of the data set TDR={(d, r)} of (job department, level 2 job responsibility) pairs. Such a dataset is available for purchase on the market. A(d, r) pair in this dataset means that at least some job title in job department d has the job responsibility r. The same job responsibility can appear in multiple job departments. If information indicating that certain (d, r) pairs are more common than other pairs is available, this information can be captured in TDR by repeating such (d, r) pairs more often than other pairs. The job level/job department algorithm constructs a data set of (job level, job departments, and job responsibilities) tuples that occur in the same job title as follows. The job level/job department algorithm assembles a data set of job titles. For example, data.com has access to a large data set containing tens of millions of job titles. Let J denote this dataset. Then the job level/job department algorithm does the following.
For Each Title T in J
1. Compute the job level lT of T using a job level classifier.
2. Compute the set of job departments dT={dTl, . . . dTn} of T using a job department classifier. (a title can correspond to multiple departments)
3. Compute the job responsibilities r1, . . . rk in T using the approach used by the identify job responsibilities in job title algorithm. (T may not contain any responsibilities in it)
endfor
The job level/job department algorithm generates data in the form of TDLR={(lT, dTl, . . . dTn, r1, . . . rk), TϵJ}
The job level/job department algorithm extracts suitable training sets from the data set for two reasons. For estimating P(dT|r) and P(r), pooling the information from TDR and TDLR potentially provides richer training data. The resulting training sets may be reused by the related job responsibilities algorithm for more advanced modeling. The extracted training sets are TLR projection of (l, r) from TDLR. In particular, from every tuple (l, d1, . . . dp, r1, . . . rq) in TDLR, the job level/job department algorithm generates pairs (l, r1), . . . (l, rq) and adds each pair to TLR.
TPDR projection of (d, r) from TDLR pooled with (d, r) pairs from TDR. In particular, from every tuple (l, d1, . . . dp, r1, . . . rq) in TDLR, the job level/job department algorithm generates pairs (d1, r1), . . . (d1, rq), . . . (dp, r1), . . . (dp, rq) and adds each pair to TPDR. Next, for each pair (d, r) in TDR, the job level/job department algorithm adds w copies of the pair into TPDR.
TPR projection of (r) from TDLR pooled with projection of (r) from TDR. In particular, from every tuple (l, d1, . . . dp, r1, . . . rq) in TDLR, the job level/job department algorithm generates (r1), . . . (rq) tuples and adds each tuple to TPR. Next, from each pair (d, r) in TDR, the job level/job department algorithm adds w copies of (r) into TPR.
To each of these three training sets, the job level/job department algorithm adds suitable pseudo-instances to guard against their possible incompleteness. To TLR, the job level/job department algorithm adds a>0 copies of (l, r), for every lϵL, rϵR. To TPDR, the job level/job department algorithm adds b>0 copies of (d, r), for every dϵD, rϵR. To TPR, the job level/job department algorithm adds c>0 copies of (r), for every rϵR. Here a, b, and c are free parameters, which can take on values less than 1. P(lT−r), P(r), and P(d|r) are estimated in the usual ways from TLR, TPR, and TPDR, respectively.
A related job responsibilities algorithm assumes the availability of a data set of the form D={Ri}, i=1, . . . n. i denotes a particular person or contact, and Ri denotes the known set of job responsibilities of that person. A related job responsibilities graph has nodes that represent job responsibilities that occur at least once in D. Two nodes u and v are connected by an edge of weight wuv=Puv/Pu*Pv. Here Puv=|{Ri|uϵRi and v ϵRi}|/n, Pu=|{Ri|uϵRi}|/n, and Pv=|{Ri|vϵRi}|/n. All edges whose weight is below a certain threshold are dropped. For example, if many people have both Business Analyst and Business Intelligence as job responsibilities the related job responsibilities graph will likely have a strongly weighted edge between the nodes in the related job responsibilities graph that correspond to these terms.
The approach by the job level/job department algorithm, as embodied in Equation 1, assumes that a job responsibility does not depend on the contents of an actual job title, provided the job level and the job department(s) of the job title are known. This simplifying assumption is reasonably effective. That is, for the purposes of scoring job responsibilities, the contents of a job title do not usually provide information beyond what is already captured in the job title's job level and job department(s). However, sometimes the contents of a job title provides more information. Consider the job titles Sales Analyst and Sales Representative. Both job titles have the same job department (Sales) and the same job level (Staff), yet their job responsibilities are different. A particular job responsibility is scored against a given job title by combining information from the contents of the job title with information about the job title's job level and job department(s). To estimate the probability of a job responsibility given a job title, the job title's job department(s) and job level are treated as latent variables, and marginalized over them. More formally, this involves probabilistic modeling on (T, D, R, L), where T, D, R, and L denote random variables (and also their universes) denoting job titles, job departments, job responsibilities, and job levels respectively. Whether a symbol is meant to denote a random variable or a universal set will be resolved from context. A sensible score function may be formulated which scores how well a particular job responsibility r ϵR fits a given job title tϵT, using the job level and job departments oft as additional features. The score function models as:
P(R|T)=Σd∈D,l∈LP(R|T,d,l)P(d,l|T) (Equation 2)
In principle P(d, l|T) can be estimated from a slightly enriched version of TDLR described above for the job level/job department algorithm, for which the job title is also kept along with the rest of the tuple. This version is denoted as TTDLR. That said, by assuming that D and L are conditionally independent given T, Equation 2 simplifies considerably in terms of model complexity. This means that more accurate models may be built from TTDLR under this assumption, so long as this assumption is justified, which it is. Therefore, a job department and a job level can be predicted independently from a job title. Based on this assumption:
P(R|T)=Σd∈D,l∈LP(R|T,d,l)*P(d|T)*P(l|T) (Equation 3)
In Equation 3, for efficient computation, the sum can be truncated to those pairs (d, l) in which both P(d|T) and P(l|T) are greater than 0. Job titles are modeled in terms of certain features. As an example, the features in a job title may be chosen to be the word-level k grams in the job title, for suitably chosen positive integers k. T will be used to also denote the feature vector of a job title. Equation 3 is computed under the assumption that the features of a job title are conditionally P(d|T) independent of each other given a job department. This results in the Naive Bayes formulation:
P(D|T)=[P(D)*Πi=1nP(Ti|D)]/Σd∈DP(d)*Πi=1nP(Ti|d) (Equation 4)
D is a random variable in the numerator. In the denominator, the set of departments. P(D) and P(Ti|D) are estimated from the projection TTD of the training set TTDLR in the usual way. TTD permits the same job title to be classified to different job departments. P(D|T) leverages such cases sensibly, specifically classifying such job titles probabilistically to the job departments. Likewise, P(l|T) is computed under the assumption that the features of a job title are conditionally independent of each other given a job level.
P(L|T)=[P(L)*Πi=1nP(Ti|L)]/Σl∈LP(d)*Πi=1nP(Ti|l) (Equation 5)
P(L) and P(Ti|l) are estimated from the projection TTL of the training set TTDLR in the usual way. TTL permits the same job title to be classified to different job levels. P(L|T) leverages such cases sensibly, specifically classifying such job titles probabilistically to the job levels. To compute P(R|T, d, l) in Equation 3 from Bayes rule,
P(R|T,d,l)=[P(T,d,l|R)*P(R)]/[Σr∈RP(T,d,l|r)*P(r)] (Equation 6)
R denotes the random variable of the job responsibilities in the numerator of the right hand side and the universe of the job responsibilities in denominator of the right hand side. Based on assuming that T, D, and L are conditionally independent given R:
P(T,D,L|R)=P(T|R)*P(D|R)*P(L|R) (Equation 7)
Based on assuming further that the features of T are conditionally independent given R:
P(T|R)=Πi=1nP(Ti|R) (Equation 8)
The probability distributions in Equations 6, 7, and 8 are estimated as follows. P(Ti|R) is estimated from the projection TTR of TTDLR in the usual way. P(D|R), P(L|R) and P(R) are estimated from TPDR, TLR, and TDR, respectively, in the usual way. The aforementioned data sets are suitably expanded versions of ones described in the section for the job level/job department algorithm. The expansion is that R is the full set of job responsibilities, not just the level 2 job responsibilities.
Non-probabilistic alternatives exist for computing P(R|T, d, l). The Bayes approach assumes certain conditional independencies, in Equations 7 and 8, and implicitly assumes, that the training set TTDLR is rich enough for learning to estimate P(R|T, d, l) An alternative to making the first set of assumptions is to use some machine learning method to learn to estimate P(R|T, d, l) that can exploit combinations of features to try to predict better. The chosen features might include bags of words of T, d, and l. If on the other hand the issue is that the training set TTDLR is not rich enough, then the approach below is appropriate, which uses unsupervised methods for estimating P(R|T, d, l). Start by imagining a nonnegative score function S(R, T, D, L). From any such function, an empirical P(R|T, d, l) may be obtained by computing, for the given (T, d, l), the score of all R's, and normalizing in the usual way. Since the interest in this score function is only in comparing scores of different R's for the same (T, d, l), it makes sense for the score function to score R against (T, d, l), not to additionally score the internal compatibility of (T, d, l). One sensible example of this score function is:
S(R,T,d,l)=R*d+R*l+R*T
where X*Y denotes cosine similarity of idf-weighted bag-of-word vectors of strings X and Y. A more complex score function might take the form:
S(R,T,d,l)=f(S(R,d))+f(S(R,l))+f(S(R,T))
where, for two strings X and Y, S(X, Y) is a similarities vector constructed via multiple metrics, and f is a suitable aggregation function. So Si(X, Y) is the similarity of X and Y according to metric i. A sensible example would be to use two metrics. Metric 1 is cosine similarity, as described below Metric 2 is a suitable metric derived from semantic relatedness of words in semantic networks such as WordNet. A concrete example of metric 2 is to measure semantic relatedness of two words as the inverse of the graph distance (restricted to ISA relationships) between their WordNet nodes. Graph distance between two nodes is the length of the shortest path between them. This captures synonym relationships as well as the somewhat broader hyponym and hypernym relationships. Therefore, the semantic relatedness of two strings can be defined as the inverse of the average graph distances between pairs of words in them. A sensible aggregate function might be an approximate OR of the two. That is, two strings are deemed related if they are either lexically similar or semantically related.
A database system identifies a job level and a job department associated with a job title stored by an object, block 102. For example and without limitation, this can include the database system identifying the job level Vice President and the job department Sales from the contact John Smith's job title Vice President of Sales.
After identifying the job level, the database system identifies level-based job responsibilities associated with the job level, block 104. By way of example and without limitation, this can include the database system determining that a data set indicates that 80% of Vice President-level jobs in a sales department have Business Development job responsibilities and that 40% of Vice President-level jobs in a sales department have Channel Marketing job responsibilities.
Having identified the job department, the database system identifies department-based job responsibilities associated with the job department, block 106. In embodiments, this can include the database system determining that the data set indicates that 45% of vice president level Sales jobs have Account Management job responsibilities, 40% of vice president level Sales jobs have Partner Management job responsibilities, and that 35% of vice president level Sales jobs have Business Development job responsibilities.
After identifying the level-based job responsibilities and the department-based job responsibilities, the database system identifies at least one job responsibility associated with the job title based on the level-based job responsibilities and the department-based job responsibilities, block 108. For example and without limitation, this can include the database system identifying a Business Development job responsibility associated with the job title Vice President of Sales based on the Vice President-level job responsibilities and the Sales department-based job responsibilities. Although this example describes identifying one job responsibility based on the job level and the job department identified for a job title, the database system may identify many such job responsibilities. While this example describes identifying a job responsibility associated with a job title based on a job responsibility that was identified by both the level-based job responsibilities and the department-based job responsibilities, the database system may identify a job responsibility for a job title without the job responsibility being identified by both the level-based job responsibilities and the department-based job responsibilities. The database system may identify a job responsibility for a job title based on scoring the level-based job responsibilities and the department-based job responsibilities, and comparing the resulting scores for a corresponding job responsibility to a score threshold.
The database system identifying a job responsibility may also be based on a set of general job responsibilities, with each of the set of general job responsibilities associated with a corresponding job responsibility frequency. For example, the database system may also use a set of general job responsibilities that include level-based job responsibilities other than the Vice President level job responsibilities and department-based job responsibilities other than Sales department-based job responsibilities, such as a data set which indicates that 2% of jobs have a cooking responsibility and 1% of jobs have a cleaning responsibility.
Having identified at least one job responsibility, the database system optionally identifies a second job responsibility by identifying tokens in the job title and identifying the tokens in a listed job responsibility of listed job responsibilities, block 110. By way of example and without limitation, this can include the database system identifying that Mobile Marketing is a listed job responsibility, the word Marketing is the 4th word in Jane Doe's job title Vice President—Online Marketing, Mobile, and Social, the word Mobile is the 5th word in her job title Vice President—Online Marketing, Mobile, and Social, and that the 4th position in the job title is within the specified 2 word gap of the 5th position in this job title.
After identifying at least one job responsibility, the database system optionally identifies a third job responsibility related to the at least one job responsibility and/or the second job responsibility, block 112. In embodiments, this can include the database system identifying the Digital Marketing job responsibility as related to the Interactive Marketing job responsibility by first identifying the Interactive Marketing job responsibility, then identifying a graph node for the Interactive Marketing job responsibility, and finally identifying a 50% weighted arc from the graph node for the Interactive Marketing job responsibility to a related graph node for the Digital Marketing job responsibility. The graph indicates that 50% of jobs with the Interactive Marketing job responsibility also have the Digital Marketing job responsibility. Examples of graphs for associating job responsibilities with job titles are depicted in
Having identified at least one job responsibility, the database system stores each identified job responsibility in metadata and/or a field associated with the object, block 114. For example and without limitation, this can include the database system storing the identified Business Development job responsibility in metadata associated with John Smith's contact object. In another example, the database system stores the identified Mobile Marketing job responsibility in metadata associated with Jane Doe's contact object. In yet another example, the database system stores the identified Interactive Marketing job responsibility and the Digital Marketing job responsibility in metadata associated with the corresponding contact object. In a further example, the database system stores the identified Business Development job responsibility in a field in John Smith's contact object. In an additional example, the database system stores the identified Business Development job responsibility in a field of an object that is a child object for John Smith's contact object.
After storing each identified job responsibility, the database system outputs a message based on the object to a user device, in response to a search that specifies any identified job responsibility, block 116. By way of example and without limitation, this can include the database system outputting John Smith's contact object in response to a system user's search for contacts with the identified Business Development job responsibility. In another example, the database system outputs Jane Doe's contact object as a suggested lead to a marketer because the database system identified the marketer's previous success at prospecting leads with the Mobile Marketing job responsibility, searched for contacts with the identified Mobile Marketing job responsibility, and identified Jane Doe's contact object with the identified Mobile Marketing job responsibility, which may be referred to as predictive lead scoring.
The database system may provide automated discovery of success predicting job functions. Consider a historical data set of success-labeled leads. “Success-labeled” means it is known whether pursuing a lead yielded success or failure. The database system predicts job function(s) of these leads in the manner described in the previous section. This yields a data set of (features, label) pairs where features are the job functions of the lead, and label is success or failure. From such a data set, the database system may algorithmically (i.e. automatically) associate a success-prediction strength with each job function. Using this, the database system may identify which, if any, job functions strongly predict success. Such insights could be shared with suitable marketing or sales reps to help in their prospecting.
Although these examples describe the database system outputting an object to a user, the database system may or may not enable the user to view any identified job responsibilities associated with the object, based on privacy settings. While these examples describe the database system outputting a message that includes an object that is associated with an identified job responsibility, the message may not include such an object when the message references an account or an executive. For example, the database system may calculate the number of contacts whose contact objects are associated with the same identified job responsibility and who also work for the same company, such as the 100 contacts at Acme Corporation who are associated with the identified Business Development job responsibility, and the 50 contacts at MegaCorp who are associated with the Mobile Marketing job responsibility.
Continuing this example, the database system outputs Acme Corporation's account object, but not any individual's contact object associated with the identified Business Development job responsibility, in response to a system user's search for accounts with the identified Business Development job responsibility. Further to this example, the database system outputs MegaCorp's account object as a suggested account to a marketer because the database system identified the marketer's previous success at prospecting accounts with the Mobile Marketing job responsibility, searched for accounts with the identified Mobile Marketing job responsibility, and identified the MegaCrop account object with the identified Mobile Marketing job responsibility, which may be referred to as predictive account scoring. Similarly, the database system may calculate the number of contacts whose contact objects are associated with the same identified job responsibility and who also work for the same person, such as the 100 contacts at Acme Corporation who are associated with the identified Business Development job responsibility and who work under John Smith, Acme Corporation's Vice President of Sales. For this example, the database system outputs John Smith's contact object in response to a system user's search for Vice Presidents whose employees have the identified Business Development job responsibility, even if John Smith's contact record is not associated with the identified Business Development job responsibility.
The method 100 may be repeated as desired. Although this disclosure describes the blocks 102-116 executing in a particular order, the blocks 102-116 may be executed in a different order. In other implementations, each of the blocks 102-116 may also be executed in combination with other blocks and/or some blocks may be divided into a different set of blocks.
System Overview
The environment 310 is an environment in which an on-demand database service exists. A user system 312 may be any machine or system that is used by a user to access a database user system. For example, any of the user systems 312 may be a handheld computing device, a mobile phone, a laptop computer, a work station, and/or a network of computing devices. As illustrated in
An on-demand database service, such as the system 316, is a database system that is made available to outside users that do not need to necessarily be concerned with building and/or maintaining the database system, but instead may be available for their use when the users need the database system (e.g., on the demand of the users). Some on-demand database services may store information from one or more tenants stored into tables of a common database image to form a multi-tenant database system (MTS). Accordingly, the “on-demand database service 316” and the “system 316” will be used interchangeably herein. A database image may include one or more database objects. A relational database management system (RDMS) or the equivalent may execute storage and retrieval of information against the database object(s). The application platform 318 may be a framework that allows the applications of the system 316 to run, such as the hardware and/or software, e.g., the operating system. In an embodiment, the on-demand database service 316 may include the application platform 318 which enables creation, managing and executing one or more applications developed by the provider of the on-demand database service, users accessing the on-demand database service via user systems 312, or third party application developers accessing the on-demand database service via the user systems 312.
The users of the user systems 312 may differ in their respective capacities, and the capacity of a particular user system 312 might be entirely determined by permissions (permission levels) for the current user. For example, where a salesperson is using a particular user system 312 to interact with the system 316, that user system 312 has the capacities allotted to that salesperson. However, while an administrator is using that user system 312 to interact with the system 316, that user system 312 has the capacities allotted to that administrator. In systems with a hierarchical role model, users at one permission level may have access to applications, data, and database information accessible by a lower permission level user, but may not have access to certain applications, database information, and data accessible by a user at a higher permission level. Thus, different users will have different capabilities with regard to accessing and modifying application and database information, depending on a user's security or permission level.
The network 314 is any network or combination of networks of devices that communicate with one another. For example, the network 314 may be any one or any combination of a LAN (local area network), WAN (wide area network), telephone network, wireless network, point-to-point network, star network, token ring network, hub network, or other appropriate configuration. As the most common type of computer network in current use is a TCP/IP (Transfer Control Protocol and Internet Protocol) network, such as the global internetwork of networks often referred to as the “Internet” with a capital “I,” that network will be used in many of the examples herein. However, it should be understood that the networks that the one or more implementations might use are not so limited, although TCP/IP is a frequently implemented protocol.
The user systems 312 might communicate with the system 316 using TCP/IP and, at a higher network level, use other common Internet protocols to communicate, such as HTTP, FTP, AFS, WAP, etc. In an example where HTTP is used, the user systems 312 might include an HTTP client commonly referred to as a “browser” for sending and receiving HTTP messages to and from an HTTP server at the system 316. Such an HTTP server might be implemented as the sole network interface between the system 316 and the network 314, but other techniques might be used as well or instead. In some implementations, the interface between the system 316 and the network 314 includes load sharing functionality, such as round-robin HTTP request distributors to balance loads and distribute incoming HTTP requests evenly over a plurality of servers. At least as for the users that are accessing that server, each of the plurality of servers has access to the MTS' data; however, other alternative configurations may be used instead.
In one embodiment, the system 316, shown in
One arrangement for elements of the system 316 is shown in
Several elements in the system shown in
According to one embodiment, each of the user systems 312 and all of its components are operator configurable using applications, such as a browser, including computer code run using a central processing unit such as an Intel Pentium® processor or the like. Similarly, the system 316 (and additional instances of an MTS, where more than one is present) and all of their components might be operator configurable using application(s) including computer code to run using a central processing unit such as the processor system 317, which may include an Intel Pentium® processor or the like, and/or multiple processor units. A computer program product embodiment includes a machine-readable storage medium (media) having instructions stored thereon/in which can be used to program a computer to perform any of the processes of the embodiments described herein. Computer code for operating and configuring the system 316 to intercommunicate and to process webpages, applications and other data and media content as described herein are preferably downloaded and stored on a hard disk, but the entire program code, or portions thereof, may also be stored in any other volatile or non-volatile memory medium or device as is well known, such as a ROM or RAM, or provided on any media capable of storing program code, such as any type of rotating media including floppy disks, optical discs, digital versatile disk (DVD), compact disk (CD), microdrive, and magneto-optical disks, and magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data. Additionally, the entire program code, or portions thereof, may be transmitted and downloaded from a software source over a transmission medium, e.g., over the Internet, or from another server, as is well known, or transmitted over any other conventional network connection as is well known (e.g., extranet, VPN, LAN, etc.) using any communication medium and protocols (e.g., TCP/IP, HTTP, HTTPS, Ethernet, etc.) as are well known. It will also be appreciated that computer code for implementing embodiments can be implemented in any programming language that can be executed on a client system and/or server or server system such as, for example, C, C++, HTML, any other markup language, Java™, JavaScript, ActiveX, any other scripting language, such as VBScript, and many other programming languages as are well known may be used. (Java™ is a trademark of Sun Microsystems, Inc.).
According to one embodiment, the system 316 is configured to provide webpages, forms, applications, data and media content to the user (client) systems 312 to support the access by the user systems 312 as tenants of the system 316. As such, the system 316 provides security mechanisms to keep each tenant's data separate unless the data is shared. If more than one MTS is used, they may be located in close proximity to one another (e.g., in a server farm located in a single building or campus), or they may be distributed at locations remote from one another (e.g., one or more servers located in city A and one or more servers located in city B). As used herein, each MTS could include one or more logically and/or physically connected servers distributed locally or across one or more geographic locations. Additionally, the term “server” is meant to include a computer system, including processing hardware and process space(s), and an associated storage system and database application (e.g., OODBMS or RDBMS) as is well known in the art. It should also be understood that “server system” and “server” are often used interchangeably herein. Similarly, the database object described herein can be implemented as single databases, a distributed database, a collection of distributed databases, a database with redundant online or offline backups or other redundancies, etc., and might include a distributed database or storage network and associated processing intelligence.
The user systems 312, the network 314, the system 316, the tenant data storage 322, and the system data storage 324 were discussed above in
The application platform 318 includes the application setup mechanism 438 that supports application developers' creation and management of applications, which may be saved as metadata into the tenant data storage 322 by the save routines 436 for execution by subscribers as one or more tenant process spaces 404 managed by the tenant management process 410 for example. Invocations to such applications may be coded using the PL/SOQL 434 that provides a programming language style interface extension to the API 432. A detailed description of some PL/SOQL language embodiments is discussed in commonly owned U.S. Pat. No. 7,730,478 entitled, METHOD AND SYSTEM FOR ALLOWING ACCESS TO DEVELOPED APPLICATIONS VIA A MULTI-TENANT ON-DEMAND DATABASE SERVICE, by Craig Weissman, filed Sep. 21, 2007, which is incorporated in its entirety herein for all purposes. Invocations to applications may be detected by one or more system processes, which manages retrieving the application metadata 416 for the subscriber making the invocation and executing the metadata as an application in a virtual machine.
Each application server 400 may be communicably coupled to database systems, e.g., having access to the system data 325 and the tenant data 323, via a different network connection. For example, one application server 4001 might be coupled via the network 314 (e.g., the Internet), another application server 400N-1 might be coupled via a direct network link, and another application server 400N might be coupled by yet a different network connection. Transfer Control Protocol and Internet Protocol (TCP/IP) are typical protocols for communicating between application servers 400 and the database system. However, it will be apparent to one skilled in the art that other transport protocols may be used to optimize the system depending on the network interconnect used.
In certain embodiments, each application server 400 is configured to handle requests for any user associated with any organization that is a tenant. Because it is desirable to be able to add and remove application servers from the server pool at any time for any reason, there is preferably no server affinity for a user and/or organization to a specific application server 400. In one embodiment, therefore, an interface system implementing a load balancing function (e.g., an F5 Big-IP load balancer) is communicably coupled between the application servers 400 and the user systems 312 to distribute requests to the application servers 400. In one embodiment, the load balancer uses a least connections algorithm to route user requests to the application servers 400. Other examples of load balancing algorithms, such as round robin and observed response time, also can be used. For example, in certain embodiments, three consecutive requests from the same user could hit three different application servers 400, and three requests from different users could hit the same application server 400. In this manner, the system 316 is multi-tenant, wherein the system 316 handles storage of, and access to, different objects, data and applications across disparate users and organizations.
As an example of storage, one tenant might be a company that employs a sales force where each salesperson uses the system 316 to manage their sales process. Thus, a user might maintain contact data, leads data, customer follow-up data, performance data, goals and progress data, etc., all applicable to that user's personal sales process (e.g., in the tenant data storage 322). In an example of a MTS arrangement, since all of the data and the applications to access, view, modify, report, transmit, calculate, etc., can be maintained and accessed by a user system having nothing more than network access, the user can manage his or her sales efforts and cycles from any of many different user systems. For example, if a salesperson is visiting a customer and the customer has Internet access in their lobby, the salesperson can obtain critical updates as to that customer while waiting for the customer to arrive in the lobby.
While each user's data might be separate from other users' data regardless of the employers of each user, some data might be organization-wide data shared or accessible by a plurality of users or all of the users for a given organization that is a tenant. Thus, there might be some data structures managed by the system 316 that are allocated at the tenant level while other data structures might be managed at the user level. Because an MTS might support multiple tenants including possible competitors, the MTS should have security protocols that keep data, applications, and application use separate. Also, because many tenants may opt for access to an MTS rather than maintain their own system, redundancy, up-time, and backup are additional functions that may be implemented in the MTS. In addition to user-specific data and tenant specific data, the system 316 might also maintain system level data usable by multiple tenants or other data. Such system level data might include industry reports, news, postings, and the like that are sharable among tenants.
In certain embodiments, the user systems 312 (which may be client systems) communicate with the application servers 400 to request and update system-level and tenant-level data from the system 316 that may require sending one or more queries to the tenant data storage 322 and/or the system data storage 324. The system 316 (e.g., an application server 400 in the system 316) automatically generates one or more SQL statements (e.g., one or more SQL queries) that are designed to access the desired information. The system data storage 324 may generate query plans to access the requested data from the database.
Each database can generally be viewed as a collection of objects, such as a set of logical tables, containing data fitted into predefined categories. A “table” is one representation of a data object, and may be used herein to simplify the conceptual description of objects and custom objects. It should be understood that “table” and “object” may be used interchangeably herein. Each table generally contains one or more data categories logically arranged as columns or fields in a viewable schema. Each row or record of a table contains an instance of data for each category defined by the fields. For example, a CRM database may include a table that describes a customer with fields for basic contact information such as name, address, phone number, fax number, etc. Another table might describe a purchase order, including fields for information such as customer, product, sale price, date, etc. In some multi-tenant database systems, standard entity tables might be provided for use by all tenants. For CRM database applications, such standard entities might include tables for Account, Contact, Lead, and Opportunity data, each containing pre-defined fields. It should be understood that the word “entity” may also be used interchangeably herein with “object” and “table”.
In some multi-tenant database systems, tenants may be allowed to create and store custom objects, or they may be allowed to customize standard entities or objects, for example by creating custom fields for standard objects, including custom index fields. U.S. Pat. No. 7,779,039, filed Apr. 2, 2004, entitled “Custom Entities and Fields in a Multi-Tenant Database System”, which is hereby incorporated herein by reference, teaches systems and methods for creating custom objects as well as customizing standard objects in a multi-tenant database system. In certain embodiments, for example, all custom entity data rows are stored in a single multi-tenant physical table, which may contain multiple logical tables per organization. It is transparent to customers that their multiple “tables” are in fact stored in one large table or that their data may be stored in the same table as the data of other customers.
While one or more implementations have been described by way of example and in terms of the specific embodiments, it is to be understood that one or more implementations are not limited to the disclosed embodiments. To the contrary, it is intended to cover various modifications and similar arrangements as would be apparent to those skilled in the art. Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements.
Number | Name | Date | Kind |
---|---|---|---|
5577188 | Zhu | Nov 1996 | A |
5608872 | Schwartz | Mar 1997 | A |
5649104 | Carleton | Jul 1997 | A |
5715450 | Ambrose et al. | Feb 1998 | A |
5761419 | Schwartz | Jun 1998 | A |
5819038 | Carleton | Oct 1998 | A |
5821937 | Tonelli et al. | Oct 1998 | A |
5831610 | Tonelli et al. | Nov 1998 | A |
5873096 | Lim et al. | Feb 1999 | A |
5918159 | Fomukong et al. | Jun 1999 | A |
5963953 | Cram et al. | Oct 1999 | A |
6092083 | Brodersen et al. | Jul 2000 | A |
6161149 | Achacoso et al. | Dec 2000 | A |
6169534 | Raffel et al. | Jan 2001 | B1 |
6178425 | Brodersen et al. | Jan 2001 | B1 |
6189011 | Lim et al. | Feb 2001 | B1 |
6216135 | Brodersen et al. | Apr 2001 | B1 |
6233617 | Rothwein et al. | May 2001 | B1 |
6266669 | Brodersen et al. | Jul 2001 | B1 |
6295530 | Ritchie et al. | Sep 2001 | B1 |
6324568 | Diec et al. | Nov 2001 | B1 |
6324693 | Brodersen et al. | Nov 2001 | B1 |
6336137 | Lee et al. | Jan 2002 | B1 |
D454139 | Feldcamp et al. | Mar 2002 | S |
6367077 | Brodersen et al. | Apr 2002 | B1 |
6393605 | Loomans | May 2002 | B1 |
6405220 | Brodersen et al. | Jun 2002 | B1 |
6434550 | Warner et al. | Aug 2002 | B1 |
6446089 | Brodersen et al. | Sep 2002 | B1 |
6535909 | Rust | Mar 2003 | B1 |
6549908 | Loomans | Apr 2003 | B1 |
6553563 | Ambrose et al. | Apr 2003 | B2 |
6560461 | Fomukong et al. | May 2003 | B1 |
6574635 | Stauber et al. | Jun 2003 | B2 |
6577726 | Huang et al. | Jun 2003 | B1 |
6601087 | Zhu | Jul 2003 | B1 |
6604117 | Lim et al. | Aug 2003 | B2 |
6604128 | Diec | Aug 2003 | B2 |
6609150 | Lee et al. | Aug 2003 | B2 |
6621834 | Scherpbier | Sep 2003 | B1 |
6654032 | Zhu | Nov 2003 | B1 |
6665648 | Brodersen et al. | Dec 2003 | B2 |
6665655 | Warner et al. | Dec 2003 | B1 |
6684438 | Brodersen et al. | Feb 2004 | B2 |
6711565 | Subramaniam et al. | Mar 2004 | B1 |
6724399 | Katchour et al. | Apr 2004 | B1 |
6728702 | Subramaniam et al. | Apr 2004 | B1 |
6728960 | Loomans et al. | Apr 2004 | B1 |
6732095 | Warshavsky et al. | May 2004 | B1 |
6732100 | Brodersen et al. | May 2004 | B1 |
6732111 | Brodersen et al. | May 2004 | B2 |
6754681 | Brodersen et al. | Jun 2004 | B2 |
6763351 | Subramaniam et al. | Jul 2004 | B1 |
6763501 | Zhu | Jul 2004 | B1 |
6768904 | Kim | Jul 2004 | B2 |
6772229 | Achacoso et al. | Aug 2004 | B1 |
6782383 | Subramaniam et al. | Aug 2004 | B2 |
6804330 | Jones et al. | Oct 2004 | B1 |
6826565 | Ritchie et al. | Nov 2004 | B2 |
6826582 | Chatterjee et al. | Nov 2004 | B1 |
6826745 | Coker | Nov 2004 | B2 |
6829655 | Huang et al. | Dec 2004 | B1 |
6842748 | Warner et al. | Jan 2005 | B1 |
6850895 | Brodersen et al. | Feb 2005 | B2 |
6850949 | Warner et al. | Feb 2005 | B2 |
7062502 | Kesler | Jun 2006 | B1 |
7340411 | Cook | Mar 2008 | B2 |
7356482 | Frankland et al. | Apr 2008 | B2 |
7401094 | Kesler | Jul 2008 | B1 |
7620655 | Larsson | Nov 2009 | B2 |
7698160 | Beaven et al. | Apr 2010 | B2 |
7779475 | Jakobson et al. | Aug 2010 | B2 |
7851004 | Hirao et al. | Dec 2010 | B2 |
8010663 | Firminger et al. | Aug 2011 | B2 |
8014943 | Jakobson | Sep 2011 | B2 |
8015495 | Achacoso et al. | Sep 2011 | B2 |
8032297 | Jakobson | Oct 2011 | B2 |
8082301 | Ahlgren et al. | Dec 2011 | B2 |
8095413 | Beaven et al. | Jan 2012 | B1 |
8095594 | Beaven et al. | Jan 2012 | B2 |
8195488 | Taix | Jun 2012 | B1 |
8209308 | Jakobson et al. | Jun 2012 | B2 |
8275836 | Beaven et al. | Sep 2012 | B2 |
8484111 | Frankland et al. | Jul 2013 | B2 |
8490025 | Jakobson et al. | Jul 2013 | B2 |
8504945 | Jakobson et al. | Aug 2013 | B2 |
8510664 | Rueben et al. | Aug 2013 | B2 |
8566301 | Rueben et al. | Oct 2013 | B2 |
8646103 | Jakobson et al. | Feb 2014 | B2 |
9679264 | B'Far | Jun 2017 | B2 |
9830353 | Dalmia | Nov 2017 | B1 |
20010044791 | Richter et al. | Nov 2001 | A1 |
20020072951 | Lee et al. | Jun 2002 | A1 |
20020082892 | Raffel | Jun 2002 | A1 |
20020129352 | Brodersen et al. | Sep 2002 | A1 |
20020140731 | Subramanian et al. | Oct 2002 | A1 |
20020143997 | Huang et al. | Oct 2002 | A1 |
20020162090 | Parnell et al. | Oct 2002 | A1 |
20020165742 | Robbins | Nov 2002 | A1 |
20030004971 | Gong | Jan 2003 | A1 |
20030018705 | Chen et al. | Jan 2003 | A1 |
20030018830 | Chen et al. | Jan 2003 | A1 |
20030066031 | Laane et al. | Apr 2003 | A1 |
20030066032 | Ramachandran et al. | Apr 2003 | A1 |
20030069936 | Warner et al. | Apr 2003 | A1 |
20030070000 | Coker et al. | Apr 2003 | A1 |
20030070004 | Mukundan et al. | Apr 2003 | A1 |
20030070005 | Mukundan et al. | Apr 2003 | A1 |
20030074418 | Coker et al. | Apr 2003 | A1 |
20030120675 | Stauber et al. | Jun 2003 | A1 |
20030151633 | George et al. | Aug 2003 | A1 |
20030159136 | Huang et al. | Aug 2003 | A1 |
20030187921 | Diec et al. | Oct 2003 | A1 |
20030189600 | Gune et al. | Oct 2003 | A1 |
20030204427 | Gune et al. | Oct 2003 | A1 |
20030206192 | Chen et al. | Nov 2003 | A1 |
20040001092 | Rothwein et al. | Jan 2004 | A1 |
20040015981 | Coker et al. | Jan 2004 | A1 |
20040027388 | Berg et al. | Feb 2004 | A1 |
20040128001 | Levin et al. | Jul 2004 | A1 |
20040186860 | Lee et al. | Sep 2004 | A1 |
20040193510 | Catahan et al. | Sep 2004 | A1 |
20040199489 | Barnes-Leon et al. | Oct 2004 | A1 |
20040199536 | Barnes Leon et al. | Oct 2004 | A1 |
20040249854 | Barnes-Leon et al. | Dec 2004 | A1 |
20040260534 | Pak et al. | Dec 2004 | A1 |
20040260659 | Chan et al. | Dec 2004 | A1 |
20040268299 | Lei et al. | Dec 2004 | A1 |
20050050555 | Exley et al. | Mar 2005 | A1 |
20050091098 | Brodersen et al. | Apr 2005 | A1 |
20060143161 | Munro | Jun 2006 | A1 |
20060143194 | Stewart | Jun 2006 | A1 |
20060218394 | Yang | Sep 2006 | A1 |
20060229899 | Hyder | Oct 2006 | A1 |
20080162207 | Gross | Jul 2008 | A1 |
20080168063 | Whitson | Jul 2008 | A1 |
20090063415 | Chatfield et al. | Mar 2009 | A1 |
20090076865 | Rousselle | Mar 2009 | A1 |
20090100342 | Jakobson | Apr 2009 | A1 |
20090177744 | Marlow et al. | Jul 2009 | A1 |
20090222298 | Atmaja | Sep 2009 | A1 |
20100049574 | Paul | Feb 2010 | A1 |
20120095799 | Jacobson | Apr 2012 | A1 |
20120233137 | Jakobson et al. | Sep 2012 | A1 |
20120239454 | Taix | Sep 2012 | A1 |
20120253872 | Peters | Oct 2012 | A1 |
20130218948 | Jakobson | Aug 2013 | A1 |
20130218949 | Jakobson | Aug 2013 | A1 |
20130218966 | Jakobson | Aug 2013 | A1 |
20140214945 | Zhang | Jul 2014 | A1 |
20140359537 | Jakobson et al. | Dec 2014 | A1 |
20150007050 | Jakobson et al. | Jan 2015 | A1 |
20150095162 | Jakobson et al. | Apr 2015 | A1 |
20150135043 | Apps | May 2015 | A1 |
20150172563 | Jakobson et al. | Jun 2015 | A1 |
20150317610 | Rao | Nov 2015 | A1 |
20160034305 | Shear | Feb 2016 | A1 |
20160292248 | Garcia | Oct 2016 | A1 |
20160314123 | Ramachandran | Oct 2016 | A1 |
20170235848 | Van Dusen | Aug 2017 | A1 |
20170236081 | Smith | Aug 2017 | A1 |
Entry |
---|
Nagl_Till, Duval_Erick, Moere_Vande, Kloeckl_Krisitan, and Ratti_Carlo, 2012, Sankey Arcs—Visualizing edge weights in path graphs, Europrahics Confernce on Visualization (Euro Vis), pp. 1-5. |
Nagl Till, DuvaLErick, Moere_Vande, KloeckLKrisitan, and Ratti_Carlo, 2012, Sankey Arcs—Visualizing edge weights in path graphs, Europrahics Confernce on Visualization (Euro Vis), pp. 1-5 (Year: 2012). |
U.S. Appl. No. 13/986,251, filed Apr. 16, 2013. |
Number | Date | Country | |
---|---|---|---|
20170316361 A1 | Nov 2017 | US |