Business intelligence (BI) refers to a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help information workers (IWs) make better business decisions. BI applications typically address activities such as decision support systems, querying, reporting, online analytical processing (OLAP), statistical analysis, forecasting, and data mining. BI tools allow IWs to create and execute a certain class of BI applications over a multi-dimensional data model, such a pivot table, a cube, or other hierarchical dimensional storage, thereby achieving sophisticated analytical results from increasingly complex data.
Data mining is a process that typically involves extracting patterns or relationships from data, particularly from large volumes of aggregated data. Often, the magnitude and complexity of the aggregated data makes it difficult for information workers (IW) to discover or discern patterns of interest within the data. Moreover, IWs may also be unable even to articulate which patterns might be of interest. Accordingly, the process of extracting useful patterns from increasingly copious and complex data presents a significant challenge.
Implementations described and claimed herein address the foregoing problems by providing functionality for testing a hypothesis on aggregated data in a business intelligence (BI) document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the BI document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data. The solution is then presented through the user interface of the spreadsheet-like document, such as in a table, graph, histogram, etc., in association with the BI document and the BI application.
Other implementations are also described and recited herein.
The described technology enhances a BI application by allowing designation of remote data and computations within a BI document. In this manner, the BI application can offload certain computations to remote data sources, thereby avoiding local data collection, transformation, storage, and computation at a local computing system for certain aspects of its operation. For example, circumstances may exist to make local storage and analysis of certain relevant data impractical (e.g., on a mobile device, a heavily loaded server, or a device not equipped with the best available solver). Accordingly, offloading certain computations on certain data to a remote system may improve resource utilization in a BI environment.
A BI document of the described technology can group arbitrary expressions (e.g., transformations) into individual entities, which can be connected as nodes in a graph, to compose the BI application. An output of one entity may be connected to the input of another entity to create a pipeline of expression-containing entities. Each entity may be designated for local or remote computation, independent of each other entity, and the expressions of each entity may be evaluated by either a local system or a remote system, depending on the designation of the entity. As such, the content and connections of each entity can combine to yield a sophisticated BI application specifying arbitrary combinations of local and remote computations using local and remote data sources.
It should be understood that data sources may emit either data (e.g., remotely-resident data, remotely-computed solutions) or expressions. For example, a data source may return data from a database residing at a remote data warehouse or may return solutions based on remote or local data, wherein the solutions were evaluated at a remote computing system. Where the remote computing system does not provide its own data, the data source may be referred to as a “pure solver.” A data source that emits expressions may also be referred to as a “service.”
Furthermore, in the described technology, a user can articulate a hypothesis in the form of a data mining assertion to identify relationships within the data. An assertion mode in the BI tool allows a user to input a data mining assertion and then iterate through the data and expressions within the scope of the BI document. The solution presentation then displays the data that is within the scope of the BI document and further satisfies the data mining assertion (e.g., makes the assertion true).
The BI document defines the BI application using a data structure of arbitrary expressions that can be specified by a non-programmer. In one implementation, a BI application defined by sets of such arbitrary expressions are grouped into distinct entities, which may have input variables and output variables, wherein the relationships among inputs and outputs of these entities defined by the sets of expressions that define the entities. The expressions are generally not unique to any particular system but may be evaluated by either a local or remote system. However, an entity (and therefore the contained expressions) may be designated for local or remote computation on local or remote data, thereby directing computation to an appropriate system based on this designation.
Individual entities may be connected into a pipeline of entities, such that an output of one entity (e.g., an external equation set entity for remote computation) is connected to the input of another entity (e.g., an internal equation set entity of local computation), and so on. The input and output formats of connected entities are matched, such that the data output by one entity is compatible with the input format (e.g., schema) required by the entity to which that data is input. The pipeline-connection of multiple entities allows a user to specify a BI application for evaluating complex and arbitrary combinations of expressions using local or remote data and computation to obtain sophisticated BI solutions.
Furthermore, a non-programmer can develop a BI application defined by such expressions. In some implementations, the skill level adequate for a person to develop a BI application defined by expressions may be similar to the skill level adequate to use a spreadsheet software application, such as Microsoft EXCEL®.
An expression is a symbolic representation of a computation to be performed and may include operators and operands. Example operators of an expression may include without limitation mathematical operators (e.g., addition, subtraction, etc.), relational transformations (e.g., group, ungroup, join, filter, sort, etc.), aggregate transformations over nested structures (e.g., hierarchical filtering), classifiers (e.g., Bayesian algorithm that classified an unstructured set of data), BI aggregations and transformations, and arbitrary or customized transform expressions (e.g., sets of rules, equations, and/or constraints). Example operands of an expression may include without limitation data (e.g., numbers or strings), hierarchical data (such as records, tuples, and sequences), symbols that represent data, and other expressions that resolve to specific data. An expression may thus be recursive in that an expression may be defined by other expressions.
For example, an expression may take the form of a symbolic representation of an algebraic expression, such as x2+2xy+y2, where x and y are symbols that represent data or other expressions. A symbol may represent any type of data, including without limitation an integer, a rational number, a string, a Boolean, a sequence of data (potentially infinite), a tuple, or a record. In some implementations, a symbol may also represent an irrational number, although in other implementation, a symbol may be prohibited from representing an irrational number. Any expression may take the form of an equation, such as E=mc2, where E, m, and c are symbols representing data or other expressions. An expression may also take the form of a functional definition, such as ƒ(x)=x2−1, where ƒ is a symbol representing the function, x is a symbol representing an operand or argument of the function, and x2−1 is an expression that defines the function. In addition, an expression may take the form of a function invocations, such as ƒ(3), which indicates that the function ƒ is to be invoked with an argument of “3”.
An expression may be solved by an expression engine (see expression engine 216 in
In evaluating an expression, the expression engine may apply the operators to the operands to the extent that the operators and operands are defined and to the extent that the expression engine is configured to apply the operators to the operands. For example, where the symbol x represents the number “3” and the symbol “y” is not yet defined, the expression x2+2xy+y2 may be solved by replacing the known symbol “x” with the value it represents (e.g., 22+2·2·y+y2) and then applying the operators to the operands to solve the entire expression as 4+4y+y2. Where the symbol x represents the number “3” and the symbol y represents the string “hello”, the expression x2+2xy+y2 may be solved as 4+4·hello+hello2, since the expression engine may not be configured to perform arithmetic operations on the string “hello”.
Each expression can further specify a data source, whether local or remote. For example, an expression in which data values for x are taken from a local data source and data values for y are taken from a remote data source may be declared as follows:
x2+2xy+y2| where x in local_table_contacts·Age and y in remote_table_contacts·Income
Furthermore, each expression can further designate local or remote computation. For example, the computation entity may be specifically identified for an expression as such:
x2+2xy+y2|local_source·Solver
or
x2+2xy+y2|remote_source·Solver
In some implementations, expressions without a computation identifier are deemed local by default.
In some implementations, expression may be declarative. A declarative expression can identify a computation to be performed without specifying how to compute it. A declarative expression may be contrasted with an imperative expression, which may provide an algorithm or other specification for computing the expression. Declarative expressions may be input manually, such as into a field in a spreadsheet tool, or created through a declaration-generating control, such as a visual control element associated with a visualization.
In some implementations, expressions may be immutable. An expression is immutable if it cannot be changed. For example, once a definition is given to an immutable expression, such as if E=mc2 is designated immutable, the expression E cannot later be given a different definition. One advantage of immutability is that a BI application having one or more expressions designated as immutable prevents users of the BI application from altering those expressions. Where expressions are being solved in a distributed execution environment, immutability may be advantageous in that devices can rely on the immutable expression having the same definition throughout the lifetime of the expression. Immutability of expressions can make it easier for independent parts of a BI application to execute in parallel.
As discussed, a BI application may be defined by a data structure of expressions. In one implementation, the BI application is represented by a graph of nodes or entities specified in the BI document, wherein one or more expressions are partitioned into individual entities and connected via related inputs and outputs. Based on the BI document, the BI application can provide spreadsheet-like, incremental recalculation behavior (“recalc”), solving expressions as the data upon which they depend changes. In addition, the BI tool and the BI document are coordinated to allow BI and other operations over heterogeneous complex data, including data sourced from local and remote data sources.
In one implementation, declarative expressions are recorded in the BI document to define one or more entities in the graph, each entity representing without limitation a data structure, an external data source, a control element, an external event source, a visualization, or an update service. In one implementation, each entity transforms its inputs (if any) into its outputs (if any) and is associated with:
More details pertaining to entities are described with regard to
The representation 100 displays data referenced by and resulting from a BI document. The BI document specifies data from designated data sources (local or remote) and expressions representing business logic that can be evaluated by an expression engine. (In one implementation, the BI document represents a form of an entity graph described in
In addition to displaying data, the user interface also provides a capability for specifying a data mining assertion (e.g., a hypothesis) to be tested within the scope of the BI document. For example, in the illustrated representation 100, a row 104 of data has been selected, as indicated by the bolder borders shown in that row. An assertion mode can be invoked on the selected row (e.g., via a toolbar button or menu item). In one aspect, the user can change the data of a given transaction to specify data for an assertion. For example, Transaction ID 38496 previously pertained only to “Diapers,” but the user has changed the Product(s) data item in that record to “Diapers, Beers” to specify a data component of a data mining assertion.
Furthermore, the assertion mode decorates the cells in the row with controls (e.g., arrow 106), each control providing access to a menu of options. Example options may include without limitation:
For example, the “Transaction ID” values may be designated as without constraint, the “Timestamp” values may be constrained to weekdays (Monday, Tuesday, Wednesday, Thursday, or Friday), the “Product(s)” may be constrained to those that contain both “Diapers” and “Beer,” and the Gender may be unconstrained. (Other values of a transaction record may also be specified as part of the data mining assertion, but these constraints were omitted in this example. In one implementation, the default property is “unconstrained.”) These selections assert a hypothesis that there exist one or more transactions that occur on a weekday and that include both diapers and beer. The data mining assertion instructs the BI application specified by the BI document to solve for the data mining assertion and display the solution in the solution presentation 102, which shows that based on the available data, all of the single transactions for both beer and diapers on a weekday were made by males. This solution is presented in association with the BI document and the BI application and reveals an apparent gender relationship pertaining to purchases of diapers and beer on weekdays. The solution presentation 102 may be displayed to replace the representation 100 or presented separately (e.g., in a separate worksheet or BI document).
In one implementation, the representation 100 annotates the “visible” data (e.g., the data values that are visible to a user in a current user interface view, present on a single page, or resident on a single worksheet) to indicate which data values may be changed for the purposes of data mining for a particular assertion. For example, such data values may be highlighted via a highlight color/style or border color/style to identify the data values that may be changed for the current assertion.
It should also be understood that, while the example shows a data mining assertion based on data variations, variations in transformation properties may also be asserted and constrained. As discussed, a BI document may specify transformations (e.g., in the form of expressions). Properties of such transformations can therefore be varied in a data mining assertion. For example, if an expression “0.5x=y” is specified as a transformation in a BI document, where x represents a total purchase price in each transaction and y represents the total wholesale cost in each transaction, the properties (e.g., coefficients) in the transformation can be designated for variation (e.g., the coefficient of x can be varied between 0.45 and 0.55 to assert a hypothesis about transactions having margins between 45% and 55%). Accordingly, a hypothesis can be tested by varying one or more expressions (e.g., transformation properties) within the scope of the BI document.
Another type of constraint may be applied to those data values that are not within the visible data. For example, when changing a visible data value relative to a current assertion, the user may limit the scope of the data values that may be varied to the data values that are “visible,” as previously described. As such, data value variation can be constrained by a property identifying whether a particular data value is visible to the user in the current user interface view, page, or worksheet. If the data value is not visible, then it may be constrained as invariable.
A solution is computed from the data and transformation, subject to the variations and constraints, to yield a presentation of data that satisfies the data mining assertion. A data mining assertion can include just data variations, just expression variations, or both expression variations and data variations. For example, the beer/diapers assertion can be combined with the margin assertion to present transaction data in which both beer and diapers were purchased at a margin between 45% and 55%.
In another example (not shown), an assertion expression editor can be invoked to provide a user interface for specifying a data mining assertion to be evaluated against the scope of the BI document. In such an implementation, a user can enter a textual expression (e.g., a declaration or formula) representing the data mining assertion. For example, the user can represent the combined beer/diapers/margin assertion as:
As both the assertion specified in row 104 and the assertion specified in the assertion expression editor above are equivalent, the solution presentation 102 also shows the data satisfying the data mining assertion specified using the assertion expression editor.
The examples above provided two possible implementations for articulating a data mining assertion to be applied to data and expressions specified by a BI document. Other mechanisms for articulating a data mining assertion may be employed.
One of the BI tools 210 can input the BI document 212, process an entity graph 214 represented in the BI document 212, process data mining assertions, and invoke data mining operations. As discussed with regard to
In one implementation, the BI tool 210 analyzes the entity graph 214 and determines the data source designated to operate on each entity. Each entity designates data against which its expressions are to be evaluated. Some entities designate expressions for local computation on local data; other entities designate expression for remote computation on remote data. For local computation entities, the local computing system 200 employs a local expression engine 216, and one or more local data sources 218 to solve the expressions defined in the entities. It should be understood that “local” refers to data or computation within a device or a local area network (LAN) (e.g., at a local server), as compared with “remote,” which refers to data or computation outside of a LAN, such as on a wide area network (WAN). Examples of remote data and computation would reside in the “cloud,” such as at one or more Internet connected web services or data warehouses. A solution 226 of the BI application is output to the user, such as via a visualization (e.g., a map, a graph, etc.) displayed on a display device via one or more of the user interfaces 204.
In addition, the computing system 200 also includes a data mining engine 228 that manages the processing of data mining assertions, including the varying of data and/or expressions within the scope of the BI document 212. The data mining engine 228 can receive a data mining assertion through a user interface, such as a user interface executed by one of the business intelligence tools 210. The data mining engine 228 then determines the data and expressions variations available within the scope of the BI document 212 and within any constraints imposed by the user. The data mining engine 228 iterates through the variations to determine the data and transformations that would make the assertion true, presenting such data in a solution presentation. It should be understood that presenting can represent a display or other output, or preparing data for display or other output, such as generating a data object, file or signal for transmission to another system for display or other output.
Each entity can represent without limitation a data structure (e.g., a table or a hierarchical table), a terminal entity (e.g., a visualization or update service), a set of expressions with its bindings to identified data, an external data source (e.g., a remote data source, a query-able data source, a non-query-able data source, a control element that provides user interaction to allow data input, a remote service, etc.), and external event sources (e.g., timers). Each entity also defines the format of its one or more inputs and/or outputs. If the entity has an input, the entity further defines the source of the input data. The one or more expressions specified by each entity define transforms to be performed by the entity on its inputs (if any), the result of which is the output (if any) of the entity.
Individual entities may be characterized in a variety of ways, as described with regard to the example list below:
It should be understood that other types of entities and connections are also contemplated in other implementations. In particular, multiple entities may be connected in a pipeline to produce a complex and arbitrary sequence of expressions designated for local and/or remote computation.
As data that is input to an entity changes, the expression engine re-evaluates the expressions specified by the entity. Accordingly, data changes and re-computation results can ripple through the directed graph, changing the output data that is altered by the re-computations and leaving the outputs of other entities unchanged (where the initial data changes do not ripple to these entities). This incremental change provides a spreadsheet-like recalculation (“recalc”) effect—some data changes in the spreadsheet when data is changed, while other data remains unchanged.
Turning back to
A control element source entity 312 also has no input and one output. The output data of the control element source entity 312 changes based on the state of an associated control element (e.g., a visual slider control), which can be manipulated by a user. For example, the associated control element may be presented to the user as a slider that the user can slide back and forth within a predetermined range to change the output value of the entity 312. A control element source entity 318 is also connected to the input of a visualization entity 309.
As illustrated, individual entities may be connected into a pipeline, where the local or remote location of the data and the computation for one entity are immaterial to any previous or subsequent entity in the pipeline. For example, an output of the invariable data source entity 302 is connected to the external equation set entity 314 and an output connected to the internal equation set entity 306. The external equation set entity 314 has one output connected to an input of the internal equation set entity 306. It should be understood that the input and output formats of connected entities are compatible to allow a first entity to output data directly to a second entity.
Further, among other connections, inputs to the internal equation set entity 306 are connected to outputs of the invariable data source entity 302, the event source entity 304, and the control element source entity 312. Also, as shown, outputs of the entities 306, 314 and 318 are input to the visualization entity 30, which has three inputs and no outputs. The visualization entity 309 alters a visualization presented to the user based on the data received at its inputs from the entities 306, 314, and 318. In this manner, changes to the outputs of the entities 306, 314, and 318 results in changes to the visual display viewed by user.
The BI document 404 and local data 406 are received by a data-application binder 408, which binds the local data 406 to the expressions specified in the BI document 404 and passes the expressions to an expression engine 410 to evaluate the expression based on the available data. It should be understood that remote data and/or remote computations may also be specified by the BI document 404, such that the intermediate solutions arising from the remote data and/or computations are also bound to the expressions of the BI document by the data-application binder 408. The expression engine 410 produces solution data 412 based on available data (such as solution data presented in the representation 100 of
If the user wishes to test a hypothesis about the data, the user can invoke an assertion mode in the computing system 400, such as via a user interface of a BI tool or a BI application defined by the BI document 404. Within the assertion mode, the user can input a data mining assertion 402 through an assertion interface 414 (e.g., an expression editor). The data mining assertion 402 articulates the hypothesis with one or more constraints on variations of data and/or expressions. A data mining engine 416 then induces variations in the data and/or expressions identified in the data mining assertion 402 within the specified constraints to produce an assertion solution 428 that includes the data that makes the assertion true (e.g., a table of all of the transaction data that satisfies the hypothesis).
A variation operation 504 varies data and/or expression properties within constraints articulated in the data mining assertion. With regard to data and/or expression properties for which constraints have been specified, the variation operation 504 varies the data in accordance with the specified constraints (e.g., to equal those data values and/or expression properties specified by the BI document that satisfy the constraints). A solver operation 506 solves the data mining assertion within the specified constraints. For example, if a particular data item (e.g., purchase price) has values between $5 and $500 but the user has imposed a constraint limiting the data item to between $100 and $500, then the data mining assertion will only be true for transactions having a purchase price between $100 and $500.
With regard to data and/or expression properties for which constraints have not been specified, the variation operation 504 varies the data within the scope of the document (e.g., to equal all data values and/or expression properties specified by the BI document). For example, if a particular data item (e.g., purchase price) has values between $5 and $500 and the user has imposed no constraint, then the solver operation 506 can determine that the data mining assertion is true at any purchase price, if all other conditions of the data mining assertion are true for a given transaction.
A presentation operation 508 presents the data that makes the data mining assertion true. For example, a new worksheet can be generated to display the solution. In another example, a histogram, line graph, or other graphical solution may be presented.
The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, a switched fabric, point-to-point connections, and a local bus using any of a variety of bus architectures. The system memory may also be referred to as simply the memory, and includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system (BIOS) 26, containing the basic routines that help to transfer information between elements within the computer 20, such as during start-up, is stored in ROM 24. The computer 20 further includes a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM, a DVD, or other optical media.
The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical disk drive interface 34, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computer 20. It should be appreciated by those skilled in the art that any type of computer-readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, random access memories (RAMs), read only memories (ROMs), and the like, may be used in the example operating environment.
A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24, or RAM 25, including an operating system 35, one or more application programs 36, other program modules 37, and program data 38. A user may enter commands and information into the personal computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor, computers typically include other peripheral output devices (not shown), such as speakers and printers.
The computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as remote computer 49. These logical connections are achieved by a communication device coupled to or a part of the computer 20; the invention is not limited to a particular type of communications device. The remote computer 49 may be another computer, a server, a router, a network PC, a client, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 20, although only a memory storage device 50 has been illustrated in
When used in a LAN-networking environment, the computer 20 is connected to the local network 51 through a network interface or adapter 53, which is one type of communications device. When used in a WAN-networking environment, the computer 20 typically includes a modem 54, a network adapter, a type of communications device, or any other type of communications device for establishing communications over the wide area network 52. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the personal computer 20, or portions thereof, may be stored in the remote memory storage device. It is appreciated that the network connections shown are example and other means of and communications devices for establishing a communications link between the computers may be used.
In an example implementation, an expression engine, a data mining engine, an assertion interface, a data-application binder, a data source, and other modules and services may be embodied by instructions stored in memory 22 and/or storage devices 29 or 31 and processed by the processing unit 21. Source data, BI documents, data mining assertions, and other data may be stored in memory 22 and/or storage devices 29 or 31 as persistent datastores. Further, local computing systems, remote data sources and/or services, and other associated logic represent hardware and/or software configured to provide BI functionality for network-connected systems. Such sources and services may be implemented using a general purpose computer and specialized software (such as a server executing service software), a special purpose computing system and specialized software (such as a mobile device or network appliance executing service software), or other computing configurations.
The embodiments of the invention described herein are implemented as logical steps in one or more computer systems. The logical operations of the present invention are implemented (1) as a sequence of processor-implemented steps executing in one or more computer systems and (2) as interconnected machine or circuit modules within one or more computer systems. The implementation is a matter of choice, dependent on the performance requirements of the computer system implementing the invention. Accordingly, the logical operations making up the embodiments of the invention described herein are referred to variously as operations, steps, objects, or modules. Furthermore, it should be understood that logical operations may be performed in any order, unless explicitly claimed otherwise or a specific order is inherently necessitated by the claim language.
The above specification, examples, and data provide a complete description of the structure and use of exemplary embodiments of the invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended. Furthermore, structural features of the different embodiments may be combined in yet another embodiment without departing from the recited claims.
This application is a continuation of U.S. patent application Ser. No. 12/971,638, filed Dec. 17, 2010, and entitled “Data Mining in a Business Intelligence Document,” which is incorporated herein by reference. This application is also related to U.S. patent application Ser. No. 12/971,462, entitled “Business Intelligence Document”; Ser. No. 12/971,685, entitled “Data Feed Having Customizable Analytic and Visual Behavior”; Ser. No. 12/971,725, entitled “Automated Generation of Analytic and Visual Behavior”; Ser. No. 12/971,782, entitled “Decision Application Publication”; Ser. No. 12/972,205, entitled “Representation of an Interactive Document as a Graph of Entities”; and Ser. No. 12/972,205, entitled “Representation of an Interactive Document as a Graph of Entities”; each filed on Dec. 17, 2010 and each of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4633430 | Cooper | Dec 1986 | A |
5669007 | Tateishi | Sep 1997 | A |
5867714 | Todd et al. | Feb 1999 | A |
6326962 | Szabo | Dec 2001 | B1 |
6512530 | Rzepkowski et al. | Jan 2003 | B1 |
6662355 | Caswell et al. | Dec 2003 | B1 |
6691100 | Alavi et al. | Feb 2004 | B1 |
6865720 | Otani et al. | Mar 2005 | B1 |
6931589 | Baltsan et al. | Aug 2005 | B2 |
6995768 | Jou et al. | Feb 2006 | B2 |
7028306 | Boloker et al. | Apr 2006 | B2 |
7263663 | Ballard et al. | Aug 2007 | B2 |
7263694 | Clewis et al. | Aug 2007 | B2 |
7315305 | Crotty et al. | Jan 2008 | B2 |
7315861 | Seibel et al. | Jan 2008 | B2 |
7343585 | Lau et al. | Mar 2008 | B1 |
7349947 | Siage et al. | Mar 2008 | B1 |
7440902 | Greenstein et al. | Oct 2008 | B2 |
7506243 | Kotler et al. | Mar 2009 | B2 |
7603620 | Erol et al. | Oct 2009 | B2 |
7672950 | Eckardt et al. | Mar 2010 | B2 |
7752314 | Trevor et al. | Jul 2010 | B2 |
7752536 | Megiddo et al. | Jul 2010 | B2 |
7774791 | Appelbaum et al. | Aug 2010 | B1 |
7802230 | Mendicino et al. | Sep 2010 | B1 |
7870545 | Saha et al. | Jan 2011 | B2 |
7900111 | Kim et al. | Mar 2011 | B1 |
7908186 | Gabelmann | Mar 2011 | B2 |
7941791 | Wang et al. | May 2011 | B2 |
8032875 | Kosche et al. | Oct 2011 | B2 |
8117606 | Chakrabarti et al. | Feb 2012 | B2 |
8135655 | Oaten et al. | Mar 2012 | B2 |
8201160 | Hauser | Jun 2012 | B2 |
8301585 | Mourey et al. | Oct 2012 | B2 |
8332772 | Janzen et al. | Dec 2012 | B2 |
8429630 | Nickolov et al. | Apr 2013 | B2 |
8473473 | Wang et al. | Jun 2013 | B2 |
8589172 | Alonso et al. | Nov 2013 | B2 |
8635211 | Jiang et al. | Jan 2014 | B2 |
8713058 | Nagoski et al. | Apr 2014 | B2 |
8930204 | Igoe et al. | Jan 2015 | B1 |
20010047372 | Gorelik et al. | Nov 2001 | A1 |
20020065673 | Rooke | May 2002 | A1 |
20020066782 | Swaminathan et al. | Jun 2002 | A1 |
20020091609 | Markowski | Jul 2002 | A1 |
20020143800 | Lindberg et al. | Oct 2002 | A1 |
20020169658 | Adler | Nov 2002 | A1 |
20020191199 | Imada et al. | Dec 2002 | A1 |
20030040962 | Lewis | Feb 2003 | A1 |
20030041104 | Wingard et al. | Feb 2003 | A1 |
20030144868 | MacIntyre et al. | Jul 2003 | A1 |
20040015481 | Zinda | Jan 2004 | A1 |
20040098358 | Roediger | May 2004 | A1 |
20040148586 | Gilboa et al. | Jul 2004 | A1 |
20040153992 | Molina-Moreno et al. | Aug 2004 | A1 |
20040162842 | Ono et al. | Aug 2004 | A1 |
20040163039 | Gorman | Aug 2004 | A1 |
20040181519 | Anwar | Sep 2004 | A1 |
20050004911 | Goldberg et al. | Jan 2005 | A1 |
20050043961 | Torres et al. | Feb 2005 | A1 |
20050187809 | Falkenhainer | Aug 2005 | A1 |
20050231392 | Meehan et al. | Oct 2005 | A1 |
20050257157 | Gilboa et al. | Nov 2005 | A1 |
20060037019 | Austin et al. | Feb 2006 | A1 |
20060074882 | Scherer et al. | Apr 2006 | A1 |
20060080400 | Guha | Apr 2006 | A1 |
20060107211 | Mirtich et al. | May 2006 | A1 |
20060224668 | Ginis | Oct 2006 | A1 |
20070005477 | McAtamney | Jan 2007 | A1 |
20070013697 | Gilboa et al. | Jan 2007 | A1 |
20070038657 | Denton et al. | Feb 2007 | A1 |
20070046664 | Raspl et al. | Mar 2007 | A1 |
20070061711 | Bodin et al. | Mar 2007 | A1 |
20070094609 | Gilboa et al. | Apr 2007 | A1 |
20070112714 | Fairweather | May 2007 | A1 |
20070118394 | Cahoon | May 2007 | A1 |
20070124285 | Wright et al. | May 2007 | A1 |
20070136326 | McClement et al. | Jun 2007 | A1 |
20070153706 | Melcher et al. | Jul 2007 | A1 |
20070179941 | Huang et al. | Aug 2007 | A1 |
20070185746 | Chieu et al. | Aug 2007 | A1 |
20070250764 | Jiang | Oct 2007 | A1 |
20070265995 | Remington et al. | Nov 2007 | A1 |
20070294614 | Jacquin et al. | Dec 2007 | A1 |
20080040346 | Aggarwal et al. | Feb 2008 | A1 |
20080058969 | Nixon et al. | Mar 2008 | A1 |
20080120111 | Doyle et al. | May 2008 | A1 |
20080127052 | Rostoker | May 2008 | A1 |
20080178083 | Bergman et al. | Jul 2008 | A1 |
20080183710 | Serjeantson et al. | Jul 2008 | A1 |
20080184140 | Koerner | Jul 2008 | A1 |
20080184167 | Berrill et al. | Jul 2008 | A1 |
20080189438 | Zimmerer et al. | Aug 2008 | A1 |
20080195930 | Tolle | Aug 2008 | A1 |
20080209314 | Sylthe et al. | Aug 2008 | A1 |
20080215559 | Fontoura et al. | Sep 2008 | A1 |
20080238925 | Meehan et al. | Oct 2008 | A1 |
20080271127 | Naibo et al. | Oct 2008 | A1 |
20080288889 | Hunt et al. | Nov 2008 | A1 |
20080294996 | Hunt et al. | Nov 2008 | A1 |
20080306981 | Jiang et al. | Dec 2008 | A1 |
20080307334 | Chaudhri et al. | Dec 2008 | A1 |
20080319829 | Hunt et al. | Dec 2008 | A1 |
20090006148 | Bacalski | Jan 2009 | A1 |
20090007062 | Gilboa et al. | Jan 2009 | A1 |
20090037363 | Kozlov et al. | Feb 2009 | A1 |
20090049422 | Hage et al. | Feb 2009 | A1 |
20090070712 | Schubert et al. | Mar 2009 | A1 |
20090094674 | Schwartz et al. | Apr 2009 | A1 |
20090100360 | Janzen et al. | Apr 2009 | A1 |
20090100407 | Bouillet et al. | Apr 2009 | A1 |
20090125553 | Dickinson | May 2009 | A1 |
20090138415 | Lancaster | May 2009 | A1 |
20090138686 | Gruetzner et al. | May 2009 | A1 |
20090172024 | Hsu et al. | Jul 2009 | A1 |
20090172773 | Moore | Jul 2009 | A1 |
20090216758 | Tuttle et al. | Aug 2009 | A1 |
20090224941 | Kansal et al. | Sep 2009 | A1 |
20090225082 | Hargrove et al. | Sep 2009 | A1 |
20090254971 | Herz et al. | Oct 2009 | A1 |
20090287814 | Robertson et al. | Nov 2009 | A1 |
20090300544 | Psenka et al. | Dec 2009 | A1 |
20090312992 | Chen et al. | Dec 2009 | A1 |
20090322739 | Rubin et al. | Dec 2009 | A1 |
20090327878 | Grandison et al. | Dec 2009 | A1 |
20100005420 | Schneider et al. | Jan 2010 | A1 |
20100049686 | Gotz et al. | Feb 2010 | A1 |
20100057753 | Gotz et al. | Mar 2010 | A1 |
20100070448 | Omoigui | Mar 2010 | A1 |
20100070489 | Aymeloglu et al. | Mar 2010 | A1 |
20100088258 | Oaten et al. | Apr 2010 | A1 |
20100100561 | Cooper et al. | Apr 2010 | A1 |
20100106853 | Kashiyama et al. | Apr 2010 | A1 |
20100131255 | Beckman et al. | May 2010 | A1 |
20100131293 | Linthicum et al. | May 2010 | A1 |
20100138231 | Linthicum et al. | Jun 2010 | A1 |
20100138753 | Riggs et al. | Jun 2010 | A1 |
20100145902 | Boyan et al. | Jun 2010 | A1 |
20100179951 | McPhail | Jul 2010 | A1 |
20100198697 | Brown et al. | Aug 2010 | A1 |
20100199181 | Robertson et al. | Aug 2010 | A1 |
20100205178 | Bush et al. | Aug 2010 | A1 |
20100205238 | Cao et al. | Aug 2010 | A1 |
20100241620 | Manister et al. | Sep 2010 | A1 |
20100287459 | Mital et al. | Nov 2010 | A1 |
20110029636 | Smyth et al. | Feb 2011 | A1 |
20110072000 | Haas et al. | Mar 2011 | A1 |
20110072001 | Basu et al. | Mar 2011 | A1 |
20110072046 | Chi | Mar 2011 | A1 |
20110078101 | Gotz et al. | Mar 2011 | A1 |
20110078160 | Gotz et al. | Mar 2011 | A1 |
20110093430 | B'Far et al. | Apr 2011 | A1 |
20110131253 | Peukert et al. | Jun 2011 | A1 |
20110179020 | Ozzie et al. | Jul 2011 | A1 |
20110231385 | Wang et al. | Sep 2011 | A1 |
20110295795 | Venkatasubramanian et al. | Dec 2011 | A1 |
20110295853 | Li et al. | Dec 2011 | A1 |
20110314007 | Dassa et al. | Dec 2011 | A1 |
20120158643 | Mitai et al. | Jun 2012 | A1 |
20120158644 | Mital et al. | Jun 2012 | A1 |
20120158732 | Mital et al. | Jun 2012 | A1 |
20120158754 | Mital et al. | Jun 2012 | A1 |
20120159312 | Mital et al. | Jun 2012 | A1 |
20120159333 | Mital et al. | Jun 2012 | A1 |
20120159465 | Mital et al. | Jun 2012 | A1 |
20150302074 | Mital et al. | Oct 2015 | A1 |
20150331918 | Mital et al. | Nov 2015 | A1 |
20150378567 | Mital et al. | Dec 2015 | A1 |
20150379108 | Mital et al. | Dec 2015 | A1 |
Entry |
---|
Notice of Allowance in U.S. Appl. No. 12/972,205, dated Sep. 14, 2015, pp. 17. |
Non-final Office Action in U.S. Appl. No. 14/794,021, dated Oct. 7, 2015, pp. 14. |
Notice of Allowance in U.S. Appl. No. 12/972,249, dated Nov. 24, 2015, 15 Pages. |
Notice of Allowance in U.S. Appl. No. 12/971,725, dated Jun. 18, 2015, 8 Pages. |
Non-final Office Action in U.S. Appl. No. 14/790,336, dated Oct. 8, 2015, 10 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 12/972,205”, dated Jan. 13, 2016, pp. 17. |
“Final Office Action issued in U.S. Appl. No. 14/794,021”, dated Jun. 16, 2016, pp. 11. |
“Document Processing System”, Published on: Nov. 16, 2007 Available at: ttp://www.wolfram.com/products/mathematica/analysis/content/DocumentProcessingSystems.html. |
“How to Customize Ubuntu into your Own Custom Distribution”, Published on: Aug. 17, 2008 Available at: http://www.linuxquestions.org/questions/ubuntu-63/how-to-customize-ubuntu-into-your-own-custom-distribution-663412/. |
“Introduction to the XML Pipeline Definition Language (XPL)”, Published on: Sep. 15, 2010 Avaiiable at: http://wiki.orbeon.com/forms/doc/developer-guide/xml-pipeline-language-xpl. |
“LeoStatistic—Building Histogram, Curve Fit, Multivariate Regression, Data Modeling Software”, Published on: Sep. 21, 2010 Avaiiable at: http://www.leokrut.com/leostatistic.html. |
“Optimizing Forms Processing”, Published on: Sep. 15, 2010 Available at: http://www.movetonow.com/contentloptimizing—forms—processing. |
“Publishing Applications to Market Place”, Published on: Nov. 26, 2010 Available at: https://help.creator.zoho.com/Publishing-applications-to-market-place.html. |
“Quella Business Intelligence Package”, Available at: http://www.shareit.com/product.html?cookies=1&productid=300100398&affiliateid=2000122751. |
“Square your Search Results with Google Squared”, Published on: Jun. 2009 Available at: http://googleblog.blogspot.com/2009/06/square-your-search-results-with-google.html. |
“User Customization”, Published on: Nov. 26, 2010, Available at: http://docstore.milk.ua/orelly/perl3/tk/ch16—01.html. |
“Windows Azure and Cloud Computing”, Published on: Sep. 9, 2010 Available at: http://oakleafblog.blogspot.com/2010/09/windows-azure-and-cloud-computingposts09.html. |
“Final Office Action Issued in U.S. Appl. No. 12/819,493”, dated Aug. 15, 2012, 17 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/819,493”, dated Nov. 5, 2013, 21 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/819,493”, dated Mar. 30, 2012, 16 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/819,493”, dated Apr. 10, 2013, 17 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/819,493”, dated Mar. 21, 2014, 21 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 12/819,493”, dated Oct. 14, 2014, 15 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,462”, dated Sep. 18, 2013, 25 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,462”, dated Mar. 21, 2013, 22 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 12/971,462”, dated Feb. 26, 2015, 14 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,638”, dated Feb. 25, 2014, 12 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 12/971,638”, dated Nov. 18, 2014, 12 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 12/971,638”, dated Aug. 30, 2012, 19 Pages. |
“Notice of Allowance issued in U.S. Appl. No. 12/971,638”, dated Apr. 8, 2015, 16 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,685”, dated Oct. 11, 2012, 16 Pages. |
“Non Final Office Action Issued in U.S. Appl. No. 12/971,685”, dated Nov. 20, 2014, 18 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,685”, dated Jul. 13, 2012, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,685”, dated Apr. 24, 2014, 16 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 12/971,685”, dated Apr. 8, 2015, 8 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,725”, dated May 1, 2013, 14 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,725”, dated Jan. 15, 2015, 20 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,725”, dated Aug. 21, 2012, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,725”, dated Jun. 23, 2014, 19 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,782”, dated Jan. 31, 2013, 11 Pages. |
“Final Office Action Issued in U.S. Appl. No. 12/971,782”, dated Dec. 4, 2014, 13 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,782”, dated Apr. 10, 2014, 11 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/971,782”, dated Jul. 13, 2012, 8 Pages. |
“Notice of Allowance Issued in U.S. Appl. No. 12/971,782”, dated Apr. 2, 2015, 10 Pages. |
“Final Office Action issued in U.S. Appl. No. 12/972,144”, dated Nov. 20, 2013, 29 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/972,144”, dated Jun. 9, 2014, 16 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/972,144”, dated Jan. 14, 2013, 23 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/972,144”, dated Jul. 9, 2013, 26 Pages. |
“Notice of Allowance issued in U.S. Appl. No. 12/972,144”, dated Dec. 2, 2014, 5 Pages. |
“Notice of Allowance issued in U.S. Appl. No. 12/972,144”, dated Feb. 20, 2015, 5 Pages. |
“Final Office Action issued in U.S. Appl. No. 12/972,205”, dated Jun. 7, 2013, 35 Pages. |
“Non-Final Office Action issued in U.S. Appl. No. 12/972,205”, dated Apr. 22, 2015, 32 Pages. |
“Non-Final Office Action issued in U.S. Appl. No. 12/972,205”, dated Nov. 26, 2012, 33 Pages. |
“Final Office Action issued in U.S. Appl. No. 12/972,249”, dated Feb. 6, 2015, 40 Pages. |
“Non-Final Office Action Issued in U.S. Appl. No. 12/972,249”, dated Jul. 31, 2014, 30 Pages. |
Ayachit, “Customizing ParaView”, Published on: Oct. 2009 Available at http://www.itk.org/Wiki/images/7/77/Branding—paper.pdf. |
Banerjee, Atanu, “The 2007 Microsoft Office System and Other Platform Technologies for Building Composite Applications”, Published on: Dec. 2006 Available at: http://msdn.microsoft.com/enus/library/bb220802.aspx. |
Berg, Bjarne, “A Comprehensive Guide to SAP NetWeaver Visual Composer”, A Wellseley Information Services, pp. 1-81. |
Biddick, Michael, “Six Questions to Ask Before Buying End-to-End APM”, Published on: Jun. 21, 2010 Available at: http://www.networkcomputing.com/applications/six-questions-to-ask-before-buying-end-to-end-apm/a/d-id/1231626? |
Cheng, et al., “An Ontology-Based Business Intelligence Application in a Financial Knowledge Management System”, In Proceedings of the Expert Systems with Applications, vol. 36, Issue 2, 2009, pp. 3614-3622. |
Collins, Jason ,“Using Innovation in Technology to Create New Business Models”, Available at: http://www.theshiftonline.com/?p=666, Oct. 25, 2010, 3 Pages. |
Delaney, A., “Direct Data Feed Services”, Published on: Jun. 2010 Available at: http://www.ateamgroup.com/?dl id=7460&dl cm=on&dl la=O&dl Is=0. |
Evans, Will, “Dynamic Visualization: Introduction & Theory”, Published on: Jun. 1, 2009 Available at: http://web.archive.org/web/20090609074938/http://blog.semanticfoundry.com/2009/06/01/dynamic-visualization-introduction-theory. |
Frisch, A., “Streaming XML transformations Using Term Rewriting”, Published on: 2007 Available at: http://pauillac.inria.fr/-frisch/xstream/long.pdf. |
Gardarin, G., “XML-Based Components for Federating Multiple Heterogeneous Data Sources”, Published on: 1999 Available at: http://dntt.free.fr/publi/er1999.pdf. |
Hibino, “Processing Incremental Multidimensional Range Queries in a Direct Manipulation Visual Query Environment”, In Proceedings of the IEEE 14th International Conference on Data Engineering, Feb. 23, 1998, 8 Pages. |
Janeiro, “Improving the Development of Service-Based Applications Through Service Annotations”, Published on: 2009 Available at: http://www.m.inf.tu-dresden.de/uploads/Publikationen/AnnotationPaperWWW-Internet2009.pdf. |
Jelinek, J., “XML Visualization Using Tree Rewriting”, Published on: 2004 Available at: http://web.archive.org/web/20050513140516/http://mummy.intranet.gr/includes/docs/Conferences/—02—XMLvisualization-Jelinek-SCCG04.pdf. |
Jing, et al., “Improvement Design and Data Structure of Business Intelligence”, In Proceedings of the Future Computer, Communication, Control and Automation, 2011, pp. 313-321. |
Johnson, “Building ETL Processes for Business Intelligence Solutions”, Published on: Oct. 2008 Available at: http://web.archive.org/web/20081205201733/http://www.ca.com/Files/WhitePapers/ca-erwin-building-etl-processes-sql-wp-us-en.pdf. |
McNee, “Creating Auction Ads for Marketplaces”, Published on: Apr. 19, 2007 Available at: http://web.archive.org/web/20071107061852/http://www.e-articles.info/e/a/title/Creating-Auction-Ads-for-Marketplaces/. |
Mostarda, “MU: An hybrid language for Web Mashups”, Published on: Apr. 20, 2009 Available at: https://em-up.googlecode.com/svn/wiki/papers/www2009.pdf. |
Nagel, Nick, “Enterprise Data Modeling Using XML Schema”, Published on: 2007 Available at: http:citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.6120&rep=rep1 &type=pdf. |
Page, S., “XSL Pipeline Processing”, Published on: Jul. 2, 2007 Available at: http://www.usingxml.com/Transforms/XslPipelines. |
Ravindran, Karthik, “Integrating LOB Systems with the Microsoft Office System”, Published on: Nov. 2007 Available at: https://msdn.microsoft.com/en-us/library/bb896607.aspx. |
Ren, “Practicing for Business Intelligence Application with SQL Server 2008”, In Proceedings of the Applied Mechanics and Materials, vol. 20, 2010, pp. 1499-1503. |
Spillner, “Flexible Human Service Interfaces”, Published on: 2007 Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.70.7734&rep=rep1&type=pdf. |
Tory, et al., “Rethinking Visualization: A High-Level Taxonomy”, Published on: Jan. 2005 Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.94.2968&rep=rep1&type=pdf. |
Webb, et al., “The In-Context Slider: A Fluid Interface Component for Visualization and Adjustment of Values while Authoring”, In Proceedings of the Working Conference on Advanced Visual Interfaces, May 28, 2008, 8 Pages. |
White, Colin J., “IBM Enterprise Analytics for the Intelligent E-Business”, Published on: Sep. 2001 Available at: ftp://public.dhe.ibm.com/software/data/informix/pubs/papers/bi/bi.pdf. |
Yi, et al., “Dust & Magnet: Multivariate Information Visualization Using a Magnet Metaphor”, Information Visualization, vol. 4, Issue 4, 2005, 29 Pages. |
Zhang, “A Feasible Enterprise Business Intelligence Design Model”, In Proceedings of the International Conference on Management of E-Commerce and E-Government, 2009, pp. 182-187. |
Number | Date | Country | |
---|---|---|---|
20150379108 A1 | Dec 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12971638 | Dec 2010 | US |
Child | 14793926 | US |