In the area of computer-based platforms, markup language can be used to create web pages.
The systems, methods, and devices described herein each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this disclosure, several non-limiting features will now be discussed briefly.
According to an embodiment, a method for generating a page for a user group is disclosed comprising: receiving user login data; determining a user group from the user login data; retrieving a configuration file for the user group; determining, from the configuration file, a page definition comprising a first configuration section and a second configuration section; generating, from the first configuration section, a first page section, wherein generating the first page section further comprises: transmitting a content request comprising the user login data; and in response to transmitting the content request, receiving first content, wherein the first page section comprises the first content; generating, from the second configuration section, a second page section comprising second content; and generating a user group page comprising the first page section and the second page section, wherein the method is performed by one or more computer hardware processors.
According to an aspect, generating the second page section may further comprise: identifying, from the second configuration section, a resource identifier; retrieving resource metadata for the resource identifier; and generating a markup element from the resource metadata, the second content comprising the markup element.
According to another aspect, the method may further comprise: storing the configuration file as a first version configuration file identifiable by a first version identifier; receiving a modification to the configuration file; storing the modification as a second version configuration file identifiable by a second version identifier; receiving a first request comprising the first version identifier; in response to receiving the first request, causing presentation of the user group page associated with the first version configuration file identifiable by the first version identifier; receiving a second request comprising the second version identifier; and in response to receiving the second request, causing presentation of a modified user group page associated with the second version configuration file identifiable by the second version identifier.
According to yet another aspect, the method may further comprise: storing the configuration file as a first version configuration file identifiable by a first version identifier; receiving a modification to the configuration file; storing the modification as a second version configuration file identifiable by a second version identifier; receiving a first request; in response to receiving the first request, causing presentation of the user group page associated with the first version configuration file identifiable by the first version identifier; receiving a second request comprising the second version identifier; and in response to receiving the second request, causing presentation of a modified user group page associated with the second version configuration file identifiable by the second version identifier.
According to yet another aspect, the method may further comprise: in response to receiving the first request, determining that the first version configuration file identifiable by a first version identifier is a default version for the first request.
According to yet another aspect, the first content may further comprise at least one of: a recent resource, contents of a folder, a favorited resource, or a recently modified resource.
According to yet another aspect, the second content may further comprise a resource from a data pipeline system, the method may further comprise: receiving a dataset; and generating the resource, wherein generating the resource comprises: applying a transformation to the dataset, wherein the output of the transformation comprises a modified dataset, the resource comprising the modified dataset.
According to yet another aspect, the page definition may further comprise a third configuration section, the method may further comprise: generating, from the third configuration section, a third page section, wherein generating the third page section further comprises: determining a geographic region from the user login data; and identifying third content with a tag for the geographic region, wherein the third page section comprises the third content and the user group page comprises the third page section.
According to yet another aspect, at least one of the first content or the second content may comprise an application link, an announcement, a folder, a data catalog, a data request, a data build, a data issue, a file, an image, a report, or a document.
According to another embodiment, a system is disclosed comprising: a non-transitory computer storage medium configured to at least store computer-executable instructions; and one or more computer hardware processors in communication with the non-transitory computer storage medium, the one or more computer hardware processors configured to execute the computer-executable instructions to at least: receive user login data for a user profile; determine a user group from the user login data; retrieve a configuration file for the user group; determine, from the configuration file, a page definition comprising a first configuration section and a second configuration section; generate, from the first configuration section, a first page section, wherein generating the first page section further comprises: transmitting a content request for the user profile; and in response to transmitting the content request, receiving first content, wherein the first page section comprises the first content; generate, from the second configuration section, a second page section comprising second content for the user group; and generate a user group page comprising the first page section and the second page section.
According to an aspect, generating the second page section may further comprise: identifying, from the second configuration section, a resource identifier; retrieving resource metadata for the resource identifier; and generating a markup element from the resource metadata, the second content comprising the markup element.
According to another aspect, the one or more computer hardware processors may be further configured to: store the configuration file as a first version configuration file identifiable by a first version identifier; receive a modification to the configuration file; store the modification as a second version configuration file identifiable by a second version identifier; receive a first request; in response to receiving the first request, cause presentation of the user group page associated with the first version configuration file identifiable by the first version identifier; receive a second request comprising the second version identifier; and in response to receiving the second request, cause presentation of a modified user group page associated with the second version configuration file identifiable by the second version identifier.
According to yet another aspect, the first request may comprise the first version identifier.
According to yet another aspect, the one or more computer hardware processors may be further configured to: in response to receiving the first request, determine that the first version configuration file identifiable by a first version identifier is a default version for the first request.
According to yet another aspect, the first content may further comprise at least one of: a recent resource, contents of a folder, a favorited resource, or a recently modified resource.
According to yet another aspect, the second content may comprise a resource from a data pipeline system, and wherein the one or more computer hardware processors may be further configured to: receive a dataset; and generate the resource, wherein generating the resource comprises: applying a transformation to the dataset, wherein the output of the transformation comprises a modified dataset, the resource comprising the modified dataset.
According to yet another aspect, the page definition may further comprise a third configuration section, and wherein the one or more computer hardware processors may be further configured to: generate, from the third configuration section, a third page section, wherein generating the third page section further comprises: determining a geographic region from the user login data; and identifying third content with a tag for the geographic region, wherein the third page section comprises the third content and the user group page comprises the third page section.
According to yet another aspect, at least one of the first content or the second content may comprise an application link, an announcement, a folder, a data catalog, a data request, a data build, a data issue, a file, an image, a report, or a document.
Accordingly, in various embodiments, large amounts of data can be automatically and dynamically calculated, and the calculated data is efficiently and compactly presented to a user by the system. Thus, in some embodiments, the user interfaces described herein are more efficient as compared to previous user interfaces in which data is not dynamically updated and compactly and efficiently presented to the user.
Further, as described herein, the system may be configured and/or designed to generate user interface data useable for rendering the various user interfaces described. The user interface data may be used by the system, and/or another computer system, device, and/or software program (for example, a browser program), to render the user interfaces. The user interfaces may be displayed on, for example, electronic displays (including, for example, touch-enabled displays).
Additionally, it has been noted that design of computer user interfaces “that are useable and easily learned by humans is a non-trivial problem for software developers.” (Dillon, A. (2003) User Interface Design. MacMillan Encyclopedia of Cognitive Science, Vol. 4, London: MacMillan, 453-458.) The various embodiments of dynamic user interfaces of the present disclosure are the result of significant research, development, improvement, iteration, and testing. This non-trivial development has resulted in the user interfaces described herein which may provide significant cognitive and ergonomic efficiencies and advantages over previous systems. The dynamic user interfaces include improved human-computer interactions that may provide reduced mental workloads, improved decision-making, reduced work stress, and/or the like, for a user. For example, the user interfaces described herein may provide time-varying report-related information and may enable a user to more quickly access, navigate, assess, and digest such information than previous systems. Further, the dynamic user interfaces described herein are enabled by innovations in efficient interactions between the user interfaces and underlying systems and components. The presentation of data via the user interfaces described herein may accordingly provide cognitive and ergonomic efficiencies and advantages over previous systems.
Various embodiments of the present disclosure provide improvements to various technologies and technological fields. For example, as described above, existing data storage and processing technology (including, e.g., in memory databases) is limited in various ways (e.g., manual data review is slow, costly, and less detailed; data is too voluminous; etc.), and various embodiments of the disclosure provide significant improvements over such technology. Additionally, various embodiments of the present disclosure are inextricably tied to computer technology. In particular, various embodiments rely on efficient generation of user interfaces from configuration files. Such features and others (e.g., processing and analysis of large amounts of electronic data) are intimately tied to, and enabled by, computer technology, and would not exist except for computer technology. For example, the dynamic generation of user interfaces described below in reference to various embodiments cannot reasonably be performed by humans alone, without the computer technology upon which they are implemented. Further, the implementation of the various embodiments of the present disclosure via computer technology enables many of the advantages described herein, including more efficient interaction with, and presentation of, various types of electronic data.
Additional embodiments of the disclosure are described below in reference to the appended claims, which may serve as an additional summary of the disclosure.
In various embodiments, systems and/or computer systems are disclosed that comprise a computer readable storage medium having program instructions embodied therewith, and one or more processors configured to execute the program instructions to cause the one or more processors to perform operations comprising one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims).
In various embodiments, computer-implemented methods are disclosed in which, by one or more processors executing program instructions, one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims) are implemented and/or performed.
In various embodiments, computer program products comprising a computer readable storage medium are disclosed, wherein the computer readable storage medium has program instructions embodied therewith, the program instructions executable by one or more processors to cause the one or more processors to perform operations comprising one or more aspects of the above- and/or below-described embodiments (including one or more aspects of the appended claims).
Overview
Although certain preferred embodiments and examples are disclosed below, inventive subject matter extends beyond the specifically disclosed embodiments to other alternative embodiments and/or uses and to modifications and equivalents thereof Thus, the scope of the claims appended hereto is not limited by any of the particular embodiments described below. For example, in any method or process disclosed herein, the acts or operations of the method or process may be performed in any suitable sequence and are not necessarily limited to any particular disclosed sequence. Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding certain embodiments; however, the order of description should not be construed to imply that these operations are order dependent. Additionally, the structures, systems, and/or devices described herein may be embodied as integrated components or as separate components. For purposes of comparing various embodiments, certain aspects and advantages of these embodiments are described. Not necessarily all such aspects or advantages are achieved by any particular embodiment. Thus, for example, various embodiments may be carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other aspects or advantages as may also be taught or suggested herein.
A user may visit a home page for information and navigation purposes. In the context of an organization, the organization typically has a single home page that all of its users to visit. A home page is typically a complex page that is written in a combination of languages, such as a markup language and a scripting language. The home page typically includes thousands of lines of HTML and JavaScript that grows and becomes even more complex over time. The myriad of HTML elements and scripting instructions are also typically arranged in a complex and interconnected manner. Thus, deploying and/or making changes directly to markup pages can be a complex and time-consuming task. Moreover, there can be a single home page for every user, even though different types of users may have different requirements for a home page. Accordingly, a user interface solution that is easily customizable and/or extensible would be advantageous.
Disclosed herein are systems and methods that may be used to advantageously provide customizable user interfaces. The customizable user interfaces, such as a home page, can be defined by one or more configuration files. When a user requests their user interface, a configuration service can retrieve a particular configuration for the user. The configuration may define a user interface for a group of users. A user interface can be generated from the configuration. The configuration can include multiple configuration sections, where each configuration section can define respective page sections. Content can be retrieved based on the configuration. The content can be retrieved based on resource identifiers. Content can also be retrieved from application programming interfaces that can dynamically return resources. In retrieving content, access control lists can be used to determine content that a particular user is authorized to view. The configuration can be versioned. Creation of new configurations or changes to existing configurations can be rapidly deployed and the corresponding user interfaces from the updated configurations can be made available to users within seconds of being deployed. Deployment of such configurations can be accomplished without or before rebuilding or recompiling an entire application, such as a web application.
As mentioned above, users may visit a home page. A home page with many features can be a complex document. For example, the home page may include thousands of lines of HTML and JavaScript instructions and may require many hours of development time to create, update, and test. Creating a home page with markup instructions requires a developer or a team of developers to understand elements, tags, styling instructions, and other concepts at a detailed level. Further, creating a home page with rich functionality typically requires understanding one or more programming languages (such as scripting languages) at a detailed level and also may require additional complex programming to integrate the home page with one or more external services. Creating multiple home pages with different features for different users can take a similar amount of development time to create, update, and test each customized implementation.
Accordingly, the systems and techniques described herein may improve computer technology and/or the configuration of graphical user interfaces. For example, a graphical user interface figuration system may enable quick deployment of multiple user interfaces based on high-level configuration. In some embodiments, instead of a developer having to construct a home page with thousands of lines of markup and scripting instructions, an administrator can quickly deploy new or modified customized home pages with high-level configuration instructions that are a fraction of the low-level instructions that are required in other graphical user interface systems. Further, as soon as the configuration has been saved, the system can present a customized user interface corresponding to the configuration without or before rebuilding or recompiling an entire application, such as a web application. Thus, the systems and techniques described herein can include one or more particular ways for efficiently configuring customized user interfaces in contrast to conventional methods for creating user interfaces.
In order to facilitate an understanding of the systems and methods discussed herein, a number of terms are defined below. The terms defined below, as well as other terms used herein, should be construed to include the provided definitions, the ordinary and customary meaning of the terms, and/or any other implied meaning for the respective terms. Thus, the definitions below do not limit the meaning of these terms, but only provide exemplary definitions.
Data Store: Any computer readable storage medium and/or device (or collection of data storage mediums and/or devices). Examples of data stores include, but are not limited to, optical disks (e.g., CD-ROM, DVD-ROM, etc.), magnetic disks (e.g., hard disks, floppy disks, etc.), memory circuits (e.g., solid state drives, random-access memory (RAM), etc.), and/or the like. Another example of a data store is a hosted storage environment that includes a collection of physical data storage devices that may be remotely accessible and may be rapidly provisioned as needed (commonly referred to as “cloud” storage).
Database: Any data structure (and/or combinations of multiple data structures) for storing and/or organizing data, including, but not limited to, relational databases (e.g., Oracle databases, MySQL databases, etc.), non-relational databases (e.g., NoSQL databases, etc.), in-memory databases, spreadsheets, as comma separated values (CSV) files, eXtendible markup language (XML) files, TeXT (TXT) files, flat files, spreadsheet files, and/or any other widely used or proprietary format for data storage. Databases are typically stored in one or more data stores. Accordingly, each database referred to herein (e.g., in the description herein and/or the figures of the present application) is to be understood as being stored in one or more data stores.
Page: A document that is displayable by a user interface application. A page can be written in in a markup language, such as HTML, and/or can include scripting language, such as JavaScript. A page can be displayable by a web browser application. Example pages are described in further detail below with respect to
Example Graphical User Interface Configuration System
Various communications between these devices are illustrated. For example, the user computing device 102 may send a request to the GUI system 100 and the GUI system 100 may send a response to the user computing device 102. The user computing device 102 may transmit a page request, such as a home page request to the GUI system 100. The user computing device 102 may transmit user login data to the GUI system 100. The page request can include the user login data or the user login data may be sent separately from the page request. Other communications between these devices are described in further detail below.
The example GUI system 100 includes a configuration service 104, a user interface generator 106, a retrieval service 108, and a configuration data storage 112. As described above, the GUI system 100 receives a request and/or user login data. The configuration service 104 can use the user login data to retrieve a configuration 114 from the configuration data storage 112. As described herein, the configuration 114 can be represented within a configuration file, such as a YAML (YAML Ain′t Markup Language) file, which is a human-readable data serialization language. The user interface generator 106 can generate a graphical user interface based on the configuration 114. For example, instructions within the configuration 114 can indicate that the retrieval service 108 should retrieve particular resources and/or call application programming interfaces (APIs) that can return data to be presented in the graphical user interface. The configuration 114 can specify particular resources or other data to be retrieved from the data storages 132, 136. By calling APIs, the retrieval service 108 can dynamically retrieve resources or other data from the data storages 132, 136, such as recent files, favorited data, or other items that can be dynamically returned.
The GUI system 100 can be used in the context of a data pipeline. Additional details and embodiments regarding the GUI system 100 in conjunction with a data pipeline system are described in further detail below with respect to
Example Graphical User Interface Configuration
A configuration container can include multiple page definitions. The configuration container 202 includes a first page definition 206 and a second page definition 208. The ellipsis 210 represents that the configuration container 202 can include further definitions for the page definition 208 and/or additional page definitions. A page definition can include permissions data specifying one or more users and/or user groups that can access the page for the particular page definition. For example, the first page definition 208 can include the key and value “principles” and “_catch all” as a default permission for all users. The page definitions can include key-value data, text data, reference data, links, variables, and/or other types of data for configuring a page, which are described in further detail herein. The page definitions can further correspond to the user interfaces described in further herein. In some embodiments, a first configuration container (such as a configuration file) can refer to (thereby incorporating) a second configuration container, such as by including a reference to the second configuration container.
Configurations can easily be added or modified. The second configuration container 204 can be a modification of the first configuration container 202. The second configuration container 204 can be similar to the first configuration container 202 in some aspects. For example, some of the page definitions in the second configuration container 204 can be the same as some of the page definitions in the first configuration container 202. However, the third page definition 212 can be an addition to the second configuration container 204. By adding the third page definition 212, a completely new page can be defined.
The third page definition 212 can be different from the other page definitions 206, 208 in some aspects. The third page definition 212 can include permissions data for a specific user group. For example, the third page definition 212 can include the key and value “principles” and “e610c5be-5e6c-4169-bb87-9c493bb607b3”. The identifier, “e610c5be-5e6c-4169-bb87-9c493bb607b3,” can be indicative of a user group that is mapped to one or more users that authorizes that user group to view the page associated with the third page definition 212. A permissions database may include mappings from user group identifiers to user identifiers. A user interface may enable an administrator to authorize and/or manage permissions for users and user groups. The user interface may modify the permissions database, which may include identifiers that can be referenced in the configurations, such as the configuration containers and/or page definitions.
A page definition can include one or more configuration sections. One or more page sections can be generated from the configuration sections. The third page definition 212 includes a first configuration section 216, a second configuration section 218, a third configuration section 220, and a fourth configuration section 222. There can be different types of configuration sections, such as sections that refer to APIs that can dynamically retrieve one or more resources or sections that define content more statically, such as a list of resources. The first configuration section 216 can be a favorite documents type of configuration section, which is indicated by the “documentFavorites” text value. Based on the configuration section 216, the GUI system 100 can transmit a content request, which can optionally include user login data, to retrieve one or more resources for a particular user profile, such as the favorited documents. As described herein, the user login data can be used for identification and/or authorization purposes. In response to transmitting the content request, the GUI system 100 can receive first content, such as a list of favorited documents, which can be represented on the generated page. In contrast to some content that is for a specific user, content for a page section can be for a user group generally (such as an application links section for an entire user group as opposed to a user-specific document folder). Some configuration sections can be generally more directed towards static content. For example, the second configuration section 218 can be a static resources type of configuration section. As shown, the second configuration section 218 includes a “resourceList” that has a list of resource identifiers, which can be retrieved by the GUI system 100 for presentation on the generated page. The order of the configuration sections in the page definition can also indicate an order for the respective page sections in a generated page.
There may be other types of configuration sections. The third and fourth configuration sections 220, 222, may be similar to the first configuration section 216 in that they may also refer to APIs that can dynamically retrieve one or more resources. The third configuration section 220 can be a recent documents type of configuration section, which is indicated by the “documentRecents” text value. The fourth configuration section 222 can be a folder type of configuration section, which is indicated by the “documentFolder” text value. Similar to the API call that was indicated by the first configuration section 216, each of the third and fourth configuration sections 220, 222 can refer to API calls to retrieve recent documents or documents from a folder, respectively. Again, similar to the API call indicated by the first configuration section 216 that used user login data, the API calls for the third and fourth configuration sections 220, 222 can also use login data for identification and/or authorization purposes.
The example configurations described herein can enable the rapid creation of customized user interfaces. For example, the first configuration section 216 and the third configuration section 218 are many times shorter than the corresponding markup language elements that may be necessary to accomplish something similar in another GUI framework. The “kind: documentFavorites” and “kind: documentRecents” are short configuration sections and can result in entire page sections that include multiple visual representations of resources and corresponding information. For example, the third configuration section 218 regarding recent files can cause a similar page section to be generated similar to the page section 404 of
Example Graphical User Interfaces
In some embodiments, the page sections 306, 308, 310 can be dynamic. The second page section 306 that presents analysis templates can be associated with a configuration section that causes the GUI system 100 to dynamically retrieve analysis templates. The analysis templates can be dynamically retrieved from a shared folder. Thus, if there are any updates to the shared folder, then a user can be presented with the updated contents of the shared folder when the user accesses the page 302. Likewise, the fourth page section 308 that presents analyses and reports can be associated with a configuration section that causes the GUI system 100 to dynamically retrieve corresponding analyses and reports. Similar to the analysis templates, the analyses and reports can be retrieved from a shared folder.
In some embodiments, the title section 312 and/or the navigation section 314 can be configured in the page definition of a configuration container. For example, a configuration section for a title and/or banner can include the text and/or references to images to be presented in the corresponding page sections 312, 314.
In some embodiments, the GUI system 100 can include a visual editor for a page. For example, any of the user interfaces 300, 400, 500 of
Example Page Generation
Although the method 600 is described in conjunction with the systems of
Beginning at block 602, login data can be received. Example login data includes user login data. The GUI system 100 can receive login data from the user computing device 102. The login data can be for a user profile. Before a customized page is provided to the user computing device 102, such as a home page (including any of the user interfaces described in further detail with respect to
The user computing device 102 can transmit a request for a page to the GUI system 100. In some embodiments, the request can include the login data. Additionally or alternatively, a user can login separately and at a later time the user computing device 102 can transmit a request for a page.
At block 604, a user group can be determined. For example, a user group can be determined from the login data. A user group can be associated with one or more users. The configuration service 104 can determine that the user is associated one or more user groups. The configuration data storage 112 can include a mapping of users (or user identifiers) to one or more user groups.
At block 606, a configuration container can be determined. An example configuration container includes a configuration file. In some embodiments, the configuration service 104 can retrieve a single configuration container from the configuration data storage 112 for all requests. In other embodiments, the configuration service 104 can select a configuration container from multiple configuration containers in the configuration data storage 112. For example, the GUI system 100 may support versioning of configuration containers and an appropriate versioned configuration container can be retrieved based on the page request and/or the login data. A page definition can be retrieved from the configuration container. The configuration service 104 can identify a page definition in a configuration container. Additional details regarding configuration containers are described in further detail with respect to
In some embodiments, and as shown and described in
At block 608, a page can be generated. For example, the page can be generated from the identified page definition. The user interface generator 106 can generate a page for the page definition for the corresponding user group. Accordingly, the generated page can be customized for the user and/or user group. As described above with respect to
The user interface generator 106 can generate different page sections based on the particular configuration of each configuration sections. As described herein, dynamic content can be generated for a page section using API calls. For example, a configuration section can correspond to page sections such as favorited documents, recently modified files, contributions by team members, or recently created templates, to name a few. Accordingly, a corresponding API call can be used to retrieve such dynamic content including any of the types of content described herein. The retrieval service 108 can transmit a content request, such as in an API call. The content request can include login data and/or an access token. In response to the content request, the retrieval service 108 can receive content and/or content metadata, such as favorited documents, recently modified files, contributions by team members, or recently created templates, etc. The user interface generator 106 can include logic for generating a page and/or a page section based on the content and/or content metadata, such as logic that can output markup language (such as HTML) for the page and/or the page section. The user interface generator 106 can include template logic to generate dynamic content for the customized page, such as an HTML template or other markup language template that is parameterized to output markup based on input data corresponding to the dynamically retrieved data. Example generated content can include an application link, an announcement, a folder, a data catalog, a data request, a data build, a data issue, a file, an image, a report, a document, and/or a representation of any of the foregoing.
In some embodiments, the configuration sections associated with dynamic content and APIs can use a plugin (a discrete group of software functions) framework. For each dynamic configuration section type, such as favorite documents or a folder section, there can be a particular plugin for each configuration section type. Thus, each plugin can include the appropriate API calls to communicate with other services to, for example, retrieve favorited documents for a user, retrieve recent documents, or retrieve documents from a particular folder. Moreover, each plugin can include the logic to render the resources retrieved from the corresponding API call. In some embodiments, the API calls can return one or more resource identifiers and the resource identifiers can be rendered as a resource representation. Metadata for a resource and its corresponding resource representation can be determined from a resource plugin, which is described in further detail below.
The user interface generator 106 can generate more static type content based on the configuration section. For example, the configuration section can include a resource identifier. Thus, the configuration section can refer to a resource, such as a document, an image, a data analysis, a time series, etc. The configuration section may also include text values for a title or other content to be included in a page section. Accordingly, the retrieval service 108 can retrieve a resource and/or resource metadata. In particular, the retrieval service 108 can retrieve a resource and/or resource metadata for the resource identifier. Thus, a page can be generated that includes the resource, such as a document, an image, a data analysis, a time series, etc. The user interface generator 106 can include logic for generating a page section based on the resource and/or resource metadata, again, such as logic that can output markup content (such as HTML) for the page and/or the page section. For example, a markup element can be generated from the resource metadata, such as one or more markup elements that can represent a document, an image, a data analysis, a time series, etc. The user interface generator 106 can include template logic to generate static type content for the customized page, such as an HTML template or other markup language template that is parameterized to output markup based on input data corresponding to the static type data, such as the resource metadata.
In some embodiments, the configuration sections can also use a resource plugin. The resource plugin can be responsible for taking a resource identifier as an input and retrieving a corresponding resource or the resources metadata, such as by using an API call and/or retrieving it from the resource data storage 132. Other optional input to retrieve a resource can include a resource version and/or login data such as an access token. The resource metadata can include a resource type, such as a file or data type, a resource name, a resource version. The resource plugin can use login data, such as an access token, in an API call to allow the service on the other side of the API call to determine whether the user has permissions to view or received the requested resource. Additional details regarding permissions and access control lists are described in further detail with respect to
At block 610, the page can be presented. For example, the GUI system 100 can transmit the generated page to the user computing device 102, which causes presentation of the page. Example pages include any of the user interfaces shown in
The other example flowchart of
Beginning at block 652, a configuration container can be created, edited, and/or copied. For example, the configuration containers of
At block 654, a version of the configuration container can be committed. For example, the configuration container from the previous block 652, which can include modifications, can be stored in the configuration data storage 112 with a particular version identifier. That version of the configuration container can then be accessible from the configuration data storage 112 by the particular version identifier. In some embodiments, multiple commits and multiple versions of a configuration container can be stored. Thus, the history of a configuration container may be available from the configuration data storage 112. For example, blocks 652 and 654 for making changings and storing commits, respectively, can process in a loop as shown in the versioning method 650.
At block 656, a request can be received. The request can be for a user group page. The request can include a version identifier, which can be used by the GUI system 100 to identify the corresponding version of a configuration container. In some embodiments, if the request does not include a version identifier, the GUI system 100 can use a default version or master version of a configuration container. Thus, the GUI system 100 can determine that a particular version of a configuration container is a default version for a request, such as a request that does not include a version identifier. At block 658, the configuration container can be retrieved. In particular, the GUI system 100, such as the configuration service 104, can look up the configuration container by the version identifier. At block 660, the configuration container can be transmitted. In particular, the configuration service 104 can transmit the configuration container to the user interface generator 106 to generate a user interface, such as a page, from the configuration container.
Blocks 656, 658, 660 can provide a rapid development experience by which a user or administrator can make changes or create new user interfaces with minimal configuration. A first configuration container can be stored as a first version configuration container that can be identified by a first version identifier. The GUI system 100 can receive a modification to the first configuration container. The modification can be stored as a second version configuration container that can be identified by a second version identifier. Since the history of the configuration container can be stored by the GUI system 100, a first request can be received that includes the first version identifier and a second request can be received that includes the second version identifier. In response to receiving the first request, the GUI system 100 can present a page associated with the first version configuration container as identified by the first version identifier. Likewise, in response to receiving the second request, causing presentation of a modified user group page associated with the second version configuration file identifiable by the second version identifier. Thus, an administrator or user can both edit and view the end results (a user interface or page) based on their modifications to a configuration container. As described herein, these changes can be viewed and deployed without or before recompiling or rebuilding the application that provides the user interfaces, such as a web application. A user can view a first, second, third, etc., version of a page in any order using the versioning system. For example, a uniform resource locator (URL) can include the version of the page and the corresponding configuration container can be retrieved. Thus, an administrator can use a web browser to view multiple versions or the version history of a page by entering different version identifiers in the URL as a parameter.
In some embodiments, the GUI system 100 can present a series of questions to generate a page configuration for user. For example, the GUI system 100 can provide a quiz as part of an onboarding experience for new users. The quiz can include questions such as the user's geographic region, position at an organization, interests, and common applications. Accordingly, the GUI system 100 can include predefined logic to generate a page configuration based on the answers to the questions. For example, answers that indicate a user is more technically focused can result in a page configuration that includes more technical tools and data. Conversely, answers that indicate a user is more non-technical can result in a page configuration that includes more non-technical links and less-technical reports and data.
In some embodiments, the GUI system 100 can use configuration sections that can dynamically retrieve and present parameterized content in the generated user interfaces. It may be advantageous to share content users based on some parameter, such as a geographic region, a team or group affiliation, a content preference, and/or a subject matter type. For example, a resource may be at least partially parameterized, for example, a portion of a report may be parameterized. An author may generate a report that has a fill-in-the-blank for a type of subject matter or a geographic region. A resource, such as a report, or a section of the resource can be associated or tagged with the specific parameter. Thus, users that are interested in or associated with that subject matter type or geographic region can dynamically receive the report or a section of the report that has been parameterized. Accordingly, there can be configuration sections directed towards this type of parameterized content. For example, the configuration section can generically be associated with a parameter, such as any geographic region or subject matter type generally, and when the corresponding page section is generated content can be retrieved for the user's geographic region or subject matter type. Additionally or alternatively, the configuration section can include a specific parameter, such as a specific geographic region (such as “North America”), a specific team affiliation (such as “Team A”), or a specific subject matter type (such as “Sensor Reports”). Thus, dynamic content that is associated or tagged with the specific parameter can be retrieved and presented on a customized page. In some embodiments, the parameterized content can be retrieved via API calls, such as by specifying the parameter as input to an API call and receiving output from the call that includes content associated with the parameter.
In a geographic region example, a page section can be generated from a configuration section directed towards a geographic region parameter. Generating the page section can include determining a geographic region from the user login data and identifying content with a tag for the geographic region. As described herein, identifying content with a specific tag or parameter can be based on an API call.
Example Data Pipeline Context
The example data pipeline system 700 includes one or more applications 702, one or more services 704, one or more initial datasets 706, and a data transformation process 708 (also referred to herein as a build process). The data pipeline system 700 can transform data and record the data transformations. The one or more applications 702 can include applications that enable users to view datasets, interact with datasets, filter data sets, and/or configure dataset transformation processes or builds. The one or more services 704 can include services that can trigger the data transformation builds and API services for receiving and transmitting data. The one or more initial datasets 706 can be automatically retrieved from external sources and/or can be manually imported by a user. The one or more initial datasets 706 can be in many different formats such as a tabular data format (SQL, delimited, or a spreadsheet data format), a data log format (such as network logs), or time series data (such as sensor data).
The data pipeline system 700, via the one or more services 704, can apply the data transformation process 708. An example data transformation process 708 is shown. The data pipeline system 700 can receive one or more initial datasets 712, 714. The data pipeline system 700 can apply a transformation to the dataset(s). For example, the data pipeline system 700 can apply a first transformation 716 to the initial datasets 712, 714, which can include joining the initial datasets 712, 714 (such as or similar to a SQL JOIN), and/or a filtering of the initial datasets 712, 714. The output of the first transformation 716 can include a modified dataset 718. A second transformation 720 of the modified dataset 718 can result in an output dataset 720, such as a report. Each of the steps in the example data transformation process 708 can be recorded by the data pipeline system 700 and made available as a resource to the GUI system 100. For example, a resource can include a dataset and/or a dataset item, a transformation, or any other step in a data transformation process. As mentioned above, the data transformation process or build 708 can be triggered by the data pipeline system 700, where example triggers can include nightly build processes, detected events, or manual triggers by a user. Additional aspects of data transformations and the data pipeline system 700 are described in further detail below.
The techniques for recording and transforming data in the data pipeline system 700 may include maintaining an immutable history of data recording and transformation actions such as uploading a new dataset version to the system 700 and transforming one dataset version to another dataset version. The immutable history is referred to herein as “the catalog.” The catalog may be stored in a database. Preferably, reads and writes from and to the catalog are performed in the context of ACID-compliant transactions supported by a database management system. For example, the catalog may be stored in a relational database managed by a relational database management system that supports atomic, consistent, isolated, and durable (ACID) transactions.
The catalog can include versioned immutable “datasets.” More specifically, a dataset may encompass an ordered set of conceptual dataset items. The dataset items may be ordered according to their version identifiers recorded in the catalog. Thus, a dataset item may correspond to a particular version of the dataset. A dataset item may represent a snapshot of the dataset at a particular version of the dataset. As a simple example, a version identifier of ‘1’ may be recorded in the catalog for an initial dataset item of a dataset. If data is later added to the dataset, a version identifier of ‘2’ may be recorded in the catalog for a second dataset item that conceptually includes the data of the initial dataset item and the added data. In this example, dataset item ‘2’ may represent the current dataset version and is ordered after dataset item ‘1’.
As well as being versioned, a dataset may be immutable. That is, when a new version of the dataset corresponding to a new dataset item is created for the dataset in the system, pre-existing dataset items of the dataset are not overwritten by the new dataset item. In this way, pre-existing dataset items (i.e., pre-existing versions of the dataset) are preserved when a new dataset item is added to the dataset (i.e., when a new version of the dataset is created). Note that supporting immutable datasets is not inconsistent with pruning or deleting dataset items corresponding to old dataset versions. For example, old dataset items may be deleted from the system to conserve data storage space.
A version of dataset may correspond to a successfully committed transaction against the dataset. In these embodiments, a sequence of successfully committed transactions against the dataset corresponds to a sequence of dataset versions of the dataset (i.e., a sequence of dataset items of the dataset).
A transaction against a dataset may add data to the dataset, edit existing data in the dataset, remove existing data from the dataset, or a combination of adding, editing, or removing data. A transaction against a dataset may create a new version of the dataset (i.e., a new dataset item of the dataset) without deleting, removing, or modifying pre-existing dataset items (i.e., without deleting, removing, or modifying pre-existing dataset versions). A successfully committed transaction may correspond to a set of one or more files that contain the data of the dataset item created by the successful transaction. The set of files may be stored in a file system.
In the catalog, a dataset item of a dataset may be identified by the name or identifier of the dataset and the dataset version corresponding to the dataset item. In a preferred embodiment, the dataset version corresponds an identifier assigned to the transaction that created the dataset version. The dataset item may be associated in the catalog with the set of files that contain the data of the dataset item. In a preferred embodiment, the catalog treats the set of files as opaque. That is, the catalog itself may store paths or other identifiers of the set of files but may not otherwise open, read, or write to the files.
In sum, the catalog may store information about datasets. The information may include information identifying different versions (i.e., different dataset items) of the datasets. In association with information identifying a particular version (i.e., a particular dataset item) of a dataset, there may be information identifying one or more files that contain the data of the particular dataset version (i.e., the particular dataset item).
The catalog may store information representing a non-linear history of a dataset. Specifically, the history of a dataset may have different dataset branches. Branching may be used to allow one set of changes to a dataset to be made independent and concurrently of another set of changes to the dataset. The catalog may store branch names in association with dataset version identifiers for identifying dataset items that belong to a particular dataset branch.
The catalog may provide dataset provenance at the transaction level of granularity. As an example, suppose a transformation is executed in the data pipeline system 700 multiple times that reads data from dataset A, reads data from dataset B, transforms the data from dataset A and the data from dataset B in some way to produce dataset C. As mentioned, this transformation may be performed multiple times. Each transformation may be performed in the context of a transaction. For example, the transformation may be performed daily after datasets and B are updated daily in the context of transactions. The result being multiple versions of dataset A, multiple versions of dataset B, and multiple versions of dataset C as a result of multiple executions of the transformation. The catalog may contain sufficient information to trace the provenance of any version of dataset C to the versions of datasets A and B from which the version of dataset C is derived. In addition, the catalog may contain sufficient information the trace the provenance of those versions of datasets A and B to the earlier versions of datasets A and B from which those versions of datasets A and B were derived.
The provenance tracking ability is the result of recording in the catalog for a transaction that creates a new dataset version, the transaction or transactions that the given transaction depends on (e.g., is derived from). The information recorded in the catalog may include an identifier of each dependent transaction and a branch name of the dataset that the dependent transaction was committed against.
According to some embodiments, provenance tracking extends beyond transaction level granularity to column level granularity. For example, suppose a dataset version A is structured as a table of two columns and a dataset version B is structured as a table of five columns. Further assume, column three of dataset version B is computed from column one of dataset version A. In this case, the catalog may store information reflecting the dependency of column three of dataset version B on column one of dataset version A.
The catalog may also support the notion of permission transitivity. For example, suppose the catalog records information for two transactions executed against a dataset referred to in this example as “Transaction 1” and Transaction 2.” Further suppose a third transaction is performed against the dataset which is referred to in this example as “Transaction 3.” Transaction 3 may use data created by Transaction 1 and data created by Transaction 2 to create the dataset item of Transaction 3. After Transaction 3 is executed, it may be decided according to organizational policy that a particular user should not be allowed to access the data created by Transaction 2. In this case, as a result of the provenance tracking ability, and in particular because the catalog records the dependency of Transaction 3 on Transaction 2, if permission to access the data of Transaction 2 is revoked from the particular user, permission to access the data of Transaction 3 may be transitively revoked from the particular user.
The transitive effect of permission revocation (or permission grant) can apply to an arbitrary number of levels in the provenance tracking. For example, returning to the above example, permission may be transitively revoked for any transaction that depends directly or indirectly on the Transaction 3.
According to some embodiments, where provenance tracking in the catalog has column level granularity. Then permission transitivity may apply at the more fine-grained column-level. In this case, permission may be revoked (or granted) on a particular column of a dataset and based on the column-level provenance tracking in the catalog, permission may be transitively revoked on all direct or indirect descendent columns of that column.
A build service can manage transformations which are executed in the system to transform data. The build service may leverage a directed acyclic graph data (DAG) structure to ensure that transformations are executed in proper dependency order. The graph can include a node representing an output dataset to be computed based on one or more input datasets each represented by a node in the graph with a directed edge between node(s) representing the input dataset(s) and the node representing the output dataset. The build service traverses the DAG in dataset dependency order so that the most upstream dependent datasets are computed first. The build service traverses the DAG from the most upstream dependent datasets toward the node representing the output dataset rebuilding datasets as necessary so that they are up-to-date. Finally, the target output dataset is built once all of the dependent datasets are up-to-date.
The data pipeline system 700 can support branching for both data and code. Build branches allow the same transformation code to be executed on multiple branches. For example, transformation code on the master branch can be executed to produce a dataset on the master branch or on another branch (e.g., the develop branch). Build branches also allow transformation code on a branch to be executed to produce datasets on that branch. For example, transformation code on a development branch can be executed to produce a dataset that is available only on the development branch. Build branches provide isolation of re-computation of graph data across different users and across different execution schedules of a data pipeline. To support branching, the catalog may store information represents a graph of dependencies as opposed to a linear dependency sequence.
The data pipeline system 700 may enable other data transformation systems to perform transformations. For example, suppose the system stores two “raw” datasets R1 and R2 that are both updated daily (e.g., with daily web log data for two web services). Each update creates a new version of the dataset and corresponds to a different transaction. The datasets are deemed raw in the sense that transformation code may not be executed by the data pipeline system 700 to produce the datasets. Further suppose there is a transformation A that computes a join between datasets R1 and R2. The join may be performed in a data transformation system such a SQL database system, for example. More generally, the techniques described herein are agnostic to the particular data transformation engine that is used. The data to be transformed and the transformation code to transform the data can be provided to the engine based on information stored in the catalog including where to store the output data.
According to some embodiments, the build service supports a push build. In a push build, rebuilds of all datasets that depend on an upstream dataset or an upstream transformation that has been updated are automatically determined based on information in the catalog and rebuilt. In this case, the build service may accept a target dataset or a target transformation as an input parameter to a push build command. The build service than determines all downstream datasets that need to be rebuilt, if any.
As an example, if the build service receives a push build command with dataset R1 as the target, then the build service would determine all downstream datasets that are not up-to-date with respect to dataset R1 and rebuild them. For example, if dataset D1 is out-of-date with respect to dataset R1, then dataset D1 is rebuilt based on the current versions of datasets R1 and R2 and the current version of transformation A. If dataset D1 is rebuilt because it is out-of-date, then dataset D2 will be rebuilt based on the up-to-date version of dataset D1 and the current version of transformation B and so on until all downstream dataset of the target dataset are rebuilt. The build service may perform similar rebuilding if the target of the push build command is a transformation.
The build service may also support triggers. In this case, a push build may be considered a special case of a trigger. A trigger, generally, is a rebuild action that is performed by the build service that is triggered by the creation of a new version of a dataset or a new version of a transformation in the system.
A schema metadata service can store schema information about files that correspond to transactions reflected in the catalog. An identifier of a given file identified in the catalog may be passed to the schema metadata service and the schema metadata service may return schema information for the file. The schema information may encompass data schema related information such as whether the data in the file is structured as a table, the names of the columns of the table, the data types of the columns, user descriptions of the columns, etc.
The schema information can be accessible via the schema metadata service may versioned separately from the data itself in the catalog. This allows the schemas to be updated separately from datasets and those updates to be tracked separately. For example, suppose a comma separated file is uploaded to the system as particular dataset version. The catalog may store in association with the particular dataset version identifiers of one or more files in which the CSV data is stored. The catalog may also store in association with each of those one or more file identifiers, schema information describing the format and type of data stored in the corresponding file. The schema information for a file may be retrievable via the scheme metadata service given an identifier of the file as input. Note that this versioning scheme in the catalog allows new schema information for a file to be associated with the file and accessible via the schema metadata service. For example, suppose after storing initial schema information for a file in which the CSV data is stored, updated the schema information is stored that reflects a new or better understanding of the CSV data stored in the file. The updated schema information may be retrieved from the schema metadata service for the file without having to create a new version of the CSV data or the file in which the CSV data is stored.
When a transformation is executed, the build service may encapsulate the complexities of the separate versioning of datasets and schema information. For example, suppose transformation A described above in a previous example that accepts the dataset R1 and dataset R2 as input is the target of a build command issued to the build service. In response to this build command, the build service may determine from the catalog the file or files in which the data of the current versions of datasets R1 and R2 is stored. The build service may then access the schema metadata service to obtain the current versions of the schema information for the file or files. The build service may then provide all of identifiers or paths to the file or files and the obtained schema information to the data transformation engine to execute the transformation A. The underlying data transformation engine interprets the schema information and applies it to the data in the file or files when executing the transformation A.
Example Access Control List
The access control item 830 includes an access group 821 and a permission 822. The access group 821 identifies a set of users and/or teams. The permission 822 identifies an operation that a user in the set can perform on the resource 840 (such as a read operation). Additionally or alternatively, the permission 822 can further identify an operation the user in the set can perform on access control list 800. Non-limiting examples of the permission 822 include read, write, owner, create, delete, read only, and/or some combination thereof.
In some embodiments, if the access control list 800 has a classification 830, then a user must be authorized for the classification 830. Thus, the classification 830 may override the permission 822 granted to the team, entity, and/or user. For example, one possible set of classification markings as part of classification 830 include “Top Secret,” “Secret,” “Confidential,” “Restricted,” “For Official Use Only,” among others, while another example classification scheme may use the markings: “Public” and “Restricted,” among others. For example, the permissions of an access control list may indicate that a particular resource should not be shared with particular users.
Various embodiments of the present disclosure may be a system, a method, and/or a computer program product at any possible technical detail level of integration. The computer program product may include a computer readable storage medium (or mediums) having computer readable program instructions thereon for causing a processor to carry out aspects of the present disclosure.
The software instructions and/or other executable code described herein may be read from a computer readable storage medium (or mediums). The computer readable storage medium can be a tangible device that can retain and store data and/or instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device (including any volatile and/or non-volatile electronic storage devices), a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a solid state drive, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions (as also referred to herein as, for example, “code,” “instructions,” “module,” “application,” “software application,” and/or the like) for carrying out operations of the present disclosure may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages. Computer readable program instructions may be callable from other instructions or from itself, and/or may be invoked in response to detected events or interrupts. Computer readable program instructions configured for execution on computing devices may be provided on a computer readable storage medium, and/or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution) that may then be stored on a computer readable storage medium. Such computer readable program instructions may be stored, partially or fully, on a memory device (e.g., a computer readable storage medium) of the executing computing device, for execution by the computing device. The computer readable program instructions may execute entirely on a user's computer (e.g., the executing computing device), partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present disclosure.
Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart(s) and/or block diagram(s) block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks. For example, the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer. The remote computer may load the instructions and/or modules into its dynamic memory and send the instructions over a telephone, cable, or optical line using a modem. A modem local to a server computing system may receive the data on the telephone/cable/optical line and use a converter device including the appropriate circuitry to place the data on a bus. The bus may carry the data to a memory, from which a processor may retrieve and execute the instructions. The instructions received by the memory may optionally be stored on a storage device (e.g., a solid state drive) either before or after execution by the computer processor.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a segment or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the blocks may occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In addition, certain blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions. For example, any of the processes, methods, algorithms, elements, blocks, applications, or other functionality (or portions of functionality) described in the preceding sections may be embodied in, and/or fully or partially automated via, electronic hardware such application-specific processors (e.g., application-specific integrated circuits (ASICs)), programmable processors (e.g., field programmable gate arrays (FPGAs)), application-specific circuitry, and/or the like (any of which may also combine custom hard-wired logic, logic circuits, ASICs, FPGAs, etc. with custom programming/execution of software instructions to accomplish the techniques).
Any of the above-mentioned processors, and/or devices incorporating any of the above-mentioned processors, may be referred to herein as, for example, “computers,” “computer devices,” “computing devices,” “hardware computing devices,” “hardware processors,” “processing units,” and/or the like. Computing devices of the above-embodiments may generally (but not necessarily) be controlled and/or coordinated by operating system software, such as Mac OS, iOS, Android, Chrome OS, Windows OS (e.g., Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, etc.), Windows CE, Unix, Linux, SunOS, Solaris, Blackberry OS, VxWorks, or other suitable operating systems. In other embodiments, the computing devices may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface functionality, such as a graphical user interface (“GUI”), among other things.
For example,
The computer system 900 also includes a main memory 906, such as a random access memory (RAM), cache and/or other dynamic storage devices, coupled to the bus 902 for storing information and instructions to be executed by a processor 904. The main memory 906 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by a processor 904. Such instructions, when stored in storage media accessible to the processor 904, render the computer system 900 into a special-purpose machine that is customized to perform the operations specified in the instructions. Such instructions, as executed by hardware processors, may implement the methods and systems described herein for generating and/or rapidly deploying user interfaces based on configuration files.
The computer system 900 further includes a read only memory (ROM) 908 or other static storage device coupled to bus 902 for storing static information and instructions for processor(s) 904. A storage device 910, such as a magnetic disk, optical disk, or flash drive, etc., is provided and coupled to bus 902 for storing information and instructions. The configuration service 104, the user interface generator 106, and/or the retrieval service 108 of
The computer system 900 may be coupled via the bus 902 to a display 912, such as a cathode ray tube (CRT) or LCD display (or touch screen), for displaying information to a computer user. An input device 914, including alphanumeric and other keys, is coupled to bus 902 for communicating information and command selections to the processor 904. Another type of input device 914 is a touch screen. Another type of user input device is the cursor control 916, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to the processor 904 and for controlling cursor movement on the display 912. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. In some embodiments, the same direction information and command selections as cursor control may be implemented via receiving touches on a touch screen without a cursor.
According to one embodiment, the techniques herein are performed by computer system 900 in response to the processor(s) 904 executing one or more sequences of one or more computer readable program instructions contained in the main memory 906. Such instructions may be read into the main memory 906 from another storage medium, such as the storage device 910. Execution of the sequences of instructions contained in the main memory 906 causes the processor(s) 904 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions.
Various forms of computer readable storage media may be involved in carrying one or more sequences of one or more computer readable program instructions to the processor 904 for execution. For example, the instructions may initially be carried on a magnetic disk or solid state drive of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a computer network. The computer system 900 can receive the data and appropriate circuitry can place the data on the bus 902. The bus 902 carries the data to the main memory 906, from which the processor 904 retrieves and executes the instructions. The instructions received by the main memory 906 may optionally be stored on the storage device 910 either before or after execution by the processor 904.
The term “non-transitory media,” and similar terms, as used herein refers to any media that store data and/or instructions that cause a machine to operate in a specific fashion. Such non-transitory media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 910. Volatile media includes dynamic memory, such as main memory 906. Common forms of non-transitory media include, for example, a floppy disk, a flexible disk, hard disk, solid state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge, and networked versions of the same.
Non-transitory media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between non-transitory media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 902. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
The computer system 900 also includes a communication interface 918 coupled to the bus 902. The communication interface 918 provides a two-way data communication coupling to a network link 920 that is connected to a local network 922. For example, the communication interface 918 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface 918 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN (or WAN component to communicated with a WAN). Wireless links may also be implemented. In any such implementation, the communication interface 918 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
The network link 920 typically provides data communication through one or more networks to other data devices. For example, the network link 920 may provide a connection through the local network 922 to a host computer 924 or to data equipment operated by an Internet Service Provider (ISP) 926. The ISP 926 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 928. The local network 922 and Internet 928 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on the network link 920 and through communication interface 918, which carry the digital data to and from the computer system 900, are example forms of transmission media.
A network, such as the network 160 of
The computer system 900 can send messages and receive data, including program code, through the network(s), network link 920 and communication interface 918. In the Internet example, a server 930 might transmit a requested code for an application program through the Internet 928, the ISP 926, the local network 922 and the communication interface 918.
The received code may be executed by the processor(s) 904 as it is received, and/or stored in the storage device 910, or other non-volatile storage for later execution.
In some embodiments, the GUI system 100 and/or the computer system 900 may operate in a distributed computing environment including several computer systems that are interconnected using one or more computer networks. The GUI system 100 and/or the computer system 900 could also operate within a computing environment having a fewer or greater number of devices than are illustrated in
As described above, in various embodiments certain functionality may be accessible by a user through a web-based viewer (such as a web browser), or other suitable software program). In such implementations, the user interface may be generated by a server computing system and transmitted to a web browser of the user (e.g., running on the user's computing system). Alternatively, data (e.g., user interface data) necessary for generating the user interface may be provided by the server computing system to the browser, where the user interface may be generated (e.g., the user interface data may be executed by a browser accessing a web service and may be configured to render the user interfaces based on the user interface data). The user may then interact with the user interface through the web-browser. User interfaces of certain implementations may be accessible through one or more dedicated software applications. In certain embodiments, one or more of the computing devices and/or systems of the disclosure may include mobile computing devices, and user interfaces may be accessible through such mobile computing devices (for example, smartphones and/or tablets).
It will be appreciated that while the present disclosure typically discusses user interfaces or pages in the context of a data pipeline system as examples, the systems and methods described herein regarding generating user interfaces and other aspects may be agnostic to the backend data systems. For example, the techniques for generating user interfaces from configurations described herein may be used at any organization where the user base is diverse and has different needs for user interfaces.
Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code instructions executed by one or more computer systems or computer processors comprising computer hardware. The processes and algorithms may be implemented partially or wholly in application-specific circuitry.
Many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure. The foregoing description details certain embodiments. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the systems and methods can be practiced in many ways. As is also stated above, it should be noted that the use of particular terminology when describing certain features or aspects of the systems and methods should not be taken to imply that the terminology is being re-defined herein to be restricted to including any specific characteristics of the features or aspects of the systems and methods with which that terminology is associated.
The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate. For example, described blocks or states may be performed in an order other than that specifically disclosed, or multiple blocks or states may be combined in a single block or state. The example blocks or states may be performed in serial, in parallel, or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
The term “substantially” when used in conjunction with the term “real-time” forms a phrase that will be readily understood by a person of ordinary skill in the art. For example, it is readily understood that such language will include speeds in which no or little delay or waiting is discernible, or where such delay is sufficiently short so as not to be disruptive, irritating, or otherwise vexing to a user.
Conjunctive language such as the phrase “at least one of X, Y, and Z,” or “at least one of X, Y, or Z,” unless specifically stated otherwise, is to be understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z, or a combination thereof. For example, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
The term “a” as used herein should be given an inclusive rather than exclusive interpretation. For example, unless specifically noted, the term “a” should not be understood to mean “exactly one” or “one and only one”; instead, the term “a” means “one or more” or “at least one,” whether used in the claims or elsewhere in the specification and regardless of uses of quantifiers such as “at least one,” “one or more,” or “a plurality” elsewhere in the claims or specification.
The term “comprising” as used herein should be given an inclusive rather than exclusive interpretation. For example, a general purpose computer comprising one or more processors should not be interpreted as excluding other computer components, and may possibly include such components as memory, input/output devices, and/or network interfaces, among others.
Any process descriptions, elements, or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing units, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those skilled in the art.
While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it may be understood that various omissions, substitutions, and changes in the form and details of the devices or processes illustrated may be made without departing from the spirit of the disclosure. As may be recognized, certain embodiments of the inventions described herein may be embodied within a form that does not provide all of the features and benefits set forth herein, as some features may be used or practiced separately from others. The scope of certain inventions disclosed herein is indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
This application claims benefit of U.S. Provisional Patent Application Ser. No. 62/640,464 entitled “Graphical User Interface Configuration System” filed Mar. 8, 2018, which is hereby incorporated by reference in its entirety. Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.
Number | Name | Date | Kind |
---|---|---|---|
4881179 | Vincent | Nov 1989 | A |
5109399 | Thompson | Apr 1992 | A |
5241625 | Epard et al. | Aug 1993 | A |
5329108 | Lamoure | Jul 1994 | A |
5632009 | Rao et al. | May 1997 | A |
5670987 | Doi et al. | Sep 1997 | A |
5781704 | Rossmo | Jul 1998 | A |
5798769 | Chiu et al. | Aug 1998 | A |
5845300 | Comer | Dec 1998 | A |
5974572 | Weinberg et al. | Oct 1999 | A |
5999911 | Berg et al. | Dec 1999 | A |
6025844 | Parsons | Feb 2000 | A |
6057757 | Arrowsmith et al. | May 2000 | A |
6065026 | Cornelia et al. | May 2000 | A |
6091956 | Hollenberg | Jul 2000 | A |
6101479 | Shaw | Aug 2000 | A |
6125372 | White | Sep 2000 | A |
6161098 | Wallman | Dec 2000 | A |
6219053 | Tachibana et al. | Apr 2001 | B1 |
6232971 | Haynes | May 2001 | B1 |
6237138 | Hameluck et al. | May 2001 | B1 |
6243706 | Moreau et al. | Jun 2001 | B1 |
6247019 | Davies | Jun 2001 | B1 |
6279018 | Kudrolli et al. | Aug 2001 | B1 |
6341310 | Leshem et al. | Jan 2002 | B1 |
6366933 | Ball et al. | Apr 2002 | B1 |
6369835 | Lin | Apr 2002 | B1 |
6370538 | Lamping et al. | Apr 2002 | B1 |
6430305 | Decker | Aug 2002 | B1 |
6456997 | Shukla | Sep 2002 | B1 |
6470269 | Adar | Oct 2002 | B1 |
6523019 | Borthwick | Feb 2003 | B1 |
6549944 | Weinberg et al. | Apr 2003 | B1 |
6560620 | Ching | May 2003 | B1 |
6581068 | Bensoussan et al. | Jun 2003 | B1 |
6594672 | Lampson et al. | Jul 2003 | B1 |
6631496 | Li et al. | Oct 2003 | B1 |
6642945 | Sharpe | Nov 2003 | B1 |
6665683 | Meltzer | Dec 2003 | B1 |
6674434 | Chojnacki et al. | Jan 2004 | B1 |
6714936 | Nevin, III | Mar 2004 | B1 |
6775675 | Nwabueze et al. | Aug 2004 | B1 |
6820135 | Dingman | Nov 2004 | B1 |
6828920 | Owen et al. | Dec 2004 | B2 |
6839745 | Dingari et al. | Jan 2005 | B1 |
6850317 | Mullins et al. | Feb 2005 | B2 |
6877137 | Rivette et al. | Apr 2005 | B1 |
6944777 | Belani et al. | Sep 2005 | B1 |
6944821 | Bates et al. | Sep 2005 | B1 |
6967589 | Peters | Nov 2005 | B1 |
6976210 | Silva et al. | Dec 2005 | B1 |
6978419 | Kantrowitz | Dec 2005 | B1 |
6980984 | Huffman et al. | Dec 2005 | B1 |
6985950 | Hanson et al. | Jan 2006 | B1 |
7036085 | Barros | Apr 2006 | B2 |
7043702 | Chi et al. | May 2006 | B2 |
7055110 | Kupka et al. | May 2006 | B2 |
7062511 | Poulsen | Jun 2006 | B1 |
7065714 | Theel et al. | Jun 2006 | B1 |
7086028 | Davis et al. | Aug 2006 | B1 |
7139800 | Bellotti et al. | Nov 2006 | B2 |
7158878 | Rasmussen et al. | Jan 2007 | B2 |
7162475 | Ackerman | Jan 2007 | B2 |
7168039 | Bertram | Jan 2007 | B2 |
7171427 | Witowski et al. | Jan 2007 | B2 |
7174377 | Bernard et al. | Feb 2007 | B2 |
7178106 | Lamkin | Feb 2007 | B2 |
7188317 | Hazel | Mar 2007 | B1 |
7194680 | Roy et al. | Mar 2007 | B1 |
7213030 | Jenkins | May 2007 | B1 |
7269786 | Malloy et al. | Sep 2007 | B1 |
7278103 | Clark et al. | Oct 2007 | B1 |
7278105 | Kitts | Oct 2007 | B1 |
7290698 | Poslinski et al. | Nov 2007 | B2 |
7308442 | Takahashi | Dec 2007 | B2 |
7333998 | Heckerman et al. | Feb 2008 | B2 |
7370047 | Gorman | May 2008 | B2 |
7379811 | Rasmussen et al. | May 2008 | B2 |
7379903 | Caballero et al. | May 2008 | B2 |
7392254 | Jenkins | Jun 2008 | B1 |
7426654 | Adams et al. | Sep 2008 | B2 |
7441182 | Beilinson et al. | Oct 2008 | B2 |
7441219 | Perry et al. | Oct 2008 | B2 |
7454466 | Bellotti et al. | Nov 2008 | B2 |
7467375 | Tondreau et al. | Dec 2008 | B2 |
7487139 | Fraleigh et al. | Feb 2009 | B2 |
7502786 | Liu et al. | Mar 2009 | B2 |
7525422 | Bishop et al. | Apr 2009 | B2 |
7529727 | Arning et al. | May 2009 | B2 |
7529734 | Dirisala | May 2009 | B2 |
7558677 | Jones | Jul 2009 | B2 |
7574409 | Patinkin | Aug 2009 | B2 |
7574428 | Leiserowitz et al. | Aug 2009 | B2 |
7579965 | Bucholz | Aug 2009 | B2 |
7596285 | Brown et al. | Sep 2009 | B2 |
7614006 | Molander | Nov 2009 | B2 |
7617232 | Gabbert et al. | Nov 2009 | B2 |
7620628 | Kapur et al. | Nov 2009 | B2 |
7627812 | Chamberlain et al. | Dec 2009 | B2 |
7634717 | Chamberlain et al. | Dec 2009 | B2 |
7703021 | Flam | Apr 2010 | B1 |
7706817 | Bamrah et al. | Apr 2010 | B2 |
7712049 | Williams et al. | May 2010 | B2 |
7716077 | Mikurak | May 2010 | B1 |
7716140 | Nielsen et al. | May 2010 | B1 |
7725530 | Sah et al. | May 2010 | B2 |
7725547 | Albertson et al. | May 2010 | B2 |
7730082 | Sah et al. | Jun 2010 | B2 |
7730109 | Rohrs et al. | Jun 2010 | B2 |
7765489 | Shah | Jul 2010 | B1 |
7770100 | Chamberlain et al. | Aug 2010 | B2 |
7805457 | Viola et al. | Sep 2010 | B1 |
7809703 | Balabhadrapatruni et al. | Oct 2010 | B2 |
7818658 | Chen | Oct 2010 | B2 |
7827494 | Hedayatpour | Nov 2010 | B1 |
7870493 | Pall et al. | Jan 2011 | B2 |
7877421 | Berger et al. | Jan 2011 | B2 |
7880921 | Dattilo et al. | Feb 2011 | B2 |
7894984 | Rasmussen et al. | Feb 2011 | B2 |
7899611 | Downs et al. | Mar 2011 | B2 |
7913164 | Svendsen | Mar 2011 | B1 |
7917376 | Bellin et al. | Mar 2011 | B2 |
7920963 | Jouline et al. | Apr 2011 | B2 |
7933862 | Chamberlain et al. | Apr 2011 | B2 |
7941336 | Robin-Jan | May 2011 | B1 |
7958147 | Turner et al. | Jun 2011 | B1 |
7962281 | Rasmussen et al. | Jun 2011 | B2 |
7962495 | Jain et al. | Jun 2011 | B2 |
7962848 | Bertram | Jun 2011 | B2 |
7966199 | Frasher | Jun 2011 | B1 |
7970240 | Chao et al. | Jun 2011 | B1 |
7971150 | Raskutti et al. | Jun 2011 | B2 |
7984374 | Caro et al. | Jul 2011 | B2 |
8001465 | Kudrolli et al. | Aug 2011 | B2 |
8001477 | Nauerz | Aug 2011 | B2 |
8001482 | Bhattiprolu et al. | Aug 2011 | B2 |
8010507 | Poston et al. | Aug 2011 | B2 |
8010545 | Stefik et al. | Aug 2011 | B2 |
8015487 | Roy et al. | Sep 2011 | B2 |
8024778 | Cash et al. | Sep 2011 | B2 |
8036632 | Cona et al. | Oct 2011 | B1 |
8073857 | Sreekanth | Dec 2011 | B2 |
8103543 | Zwicky | Jan 2012 | B1 |
8134457 | Velipasalar et al. | Mar 2012 | B2 |
8145703 | Frishert et al. | Mar 2012 | B2 |
8185819 | Sah et al. | May 2012 | B2 |
8191005 | Baier et al. | May 2012 | B2 |
8214361 | Sandler et al. | Jul 2012 | B1 |
8214764 | Gemmell et al. | Jul 2012 | B2 |
8225201 | Michael | Jul 2012 | B2 |
8229947 | Fujinaga | Jul 2012 | B2 |
8230333 | Decherd et al. | Jul 2012 | B2 |
8234632 | Hugeback | Jul 2012 | B1 |
8271461 | Pike et al. | Sep 2012 | B2 |
8280880 | Aymeloglu et al. | Oct 2012 | B1 |
8290838 | Thakur et al. | Oct 2012 | B1 |
8290926 | Ozzie et al. | Oct 2012 | B2 |
8290942 | Jones et al. | Oct 2012 | B2 |
8301464 | Cave et al. | Oct 2012 | B1 |
8301904 | Gryaznov | Oct 2012 | B1 |
8302855 | Ma et al. | Nov 2012 | B2 |
8312367 | Foster | Nov 2012 | B2 |
8312546 | Alme | Nov 2012 | B2 |
8352881 | Champion et al. | Jan 2013 | B2 |
8368695 | Howell et al. | Feb 2013 | B2 |
8392556 | Goulet et al. | Mar 2013 | B2 |
8397171 | Klassen et al. | Mar 2013 | B2 |
8412707 | Mianji | Apr 2013 | B1 |
8447722 | Ahuja et al. | May 2013 | B1 |
8452790 | Mianji | May 2013 | B1 |
8463036 | Ramesh et al. | Jun 2013 | B1 |
8489331 | Kopf et al. | Jul 2013 | B2 |
8489641 | Seefeld et al. | Jul 2013 | B1 |
8495048 | Lauridsen | Jul 2013 | B2 |
8498984 | Hwang et al. | Jul 2013 | B1 |
8504911 | Thakare | Aug 2013 | B1 |
8510743 | Hackborn et al. | Aug 2013 | B2 |
8514082 | Cova et al. | Aug 2013 | B2 |
8515207 | Chau | Aug 2013 | B2 |
8527949 | Pleis et al. | Sep 2013 | B1 |
8554579 | Tribble et al. | Oct 2013 | B2 |
8554653 | Falkenborg et al. | Oct 2013 | B2 |
8554709 | Goodson et al. | Oct 2013 | B2 |
8560413 | Quarterman | Oct 2013 | B1 |
8577911 | Stepinski et al. | Nov 2013 | B1 |
8589273 | Creeden et al. | Nov 2013 | B2 |
8595234 | Siripuapu et al. | Nov 2013 | B2 |
8620641 | Farnsworth et al. | Dec 2013 | B2 |
8639757 | Zang et al. | Jan 2014 | B1 |
8646080 | Williamson et al. | Feb 2014 | B2 |
8676857 | Adams et al. | Mar 2014 | B1 |
8682696 | Shanmugam | Mar 2014 | B1 |
8688573 | Ruknoic et al. | Apr 2014 | B1 |
8689108 | Duffield et al. | Apr 2014 | B1 |
8713467 | Goldenberg et al. | Apr 2014 | B1 |
8726379 | Stiansen et al. | May 2014 | B1 |
8732574 | Burr et al. | May 2014 | B2 |
8739278 | Varghese | May 2014 | B2 |
8742934 | Sarpy et al. | Jun 2014 | B1 |
8744890 | Bernier | Jun 2014 | B1 |
8745516 | Mason et al. | Jun 2014 | B2 |
8781169 | Jackson et al. | Jul 2014 | B2 |
8787939 | Papakipos et al. | Jul 2014 | B2 |
8788407 | Singh et al. | Jul 2014 | B1 |
8799313 | Satlow | Aug 2014 | B2 |
8799799 | Cervelli et al. | Aug 2014 | B1 |
8807948 | Luo et al. | Aug 2014 | B2 |
8812960 | Sun et al. | Aug 2014 | B1 |
8830322 | Nerayoff et al. | Sep 2014 | B2 |
8832594 | Thompson et al. | Sep 2014 | B1 |
8868537 | Colgrove et al. | Oct 2014 | B1 |
8880997 | Jardine-Skinner | Nov 2014 | B2 |
8892687 | Call | Nov 2014 | B1 |
8917274 | Ma et al. | Dec 2014 | B2 |
8924872 | Bogomolov et al. | Dec 2014 | B1 |
8930874 | Duff et al. | Jan 2015 | B2 |
8937619 | Sharma et al. | Jan 2015 | B2 |
8938686 | Erenrich et al. | Jan 2015 | B1 |
8984390 | Aymeloglu et al. | Mar 2015 | B2 |
9009171 | Grossman et al. | Apr 2015 | B1 |
9009827 | Albertson et al. | Apr 2015 | B1 |
9021260 | Falk et al. | Apr 2015 | B1 |
9021384 | Beard et al. | Apr 2015 | B1 |
9043696 | Meiklejohn et al. | May 2015 | B1 |
9043894 | Dennison et al. | May 2015 | B1 |
9058315 | Burr et al. | Jun 2015 | B2 |
9116975 | Shankar et al. | Aug 2015 | B2 |
9165100 | Begur et al. | Oct 2015 | B2 |
9286373 | Elliot et al. | Mar 2016 | B2 |
9348880 | Kramer et al. | May 2016 | B1 |
9454281 | Ward et al. | Sep 2016 | B2 |
9483387 | Allocca | Nov 2016 | B1 |
9552123 | Johnston | Jan 2017 | B1 |
9621428 | Lev | Apr 2017 | B1 |
9753744 | Wells | Sep 2017 | B1 |
9880696 | Ward et al. | Jan 2018 | B2 |
10263971 | Zhang | Apr 2019 | B2 |
10412093 | Zhang | Sep 2019 | B2 |
20010021936 | Bertram | Sep 2001 | A1 |
20020007409 | Rode | Jan 2002 | A1 |
20020032677 | Morgenthaler et al. | Mar 2002 | A1 |
20020033848 | Sciammarella et al. | Mar 2002 | A1 |
20020063734 | Khalfay | May 2002 | A1 |
20020065708 | Senay et al. | May 2002 | A1 |
20020091707 | Keller | Jul 2002 | A1 |
20020095360 | Joao | Jul 2002 | A1 |
20020095658 | Shulman | Jul 2002 | A1 |
20020103705 | Brady | Aug 2002 | A1 |
20020116120 | Ruiz et al. | Aug 2002 | A1 |
20020130907 | Chi et al. | Sep 2002 | A1 |
20020174201 | Ramer et al. | Nov 2002 | A1 |
20020194119 | Wright et al. | Dec 2002 | A1 |
20020194267 | Flesner | Dec 2002 | A1 |
20020196229 | Chen et al. | Dec 2002 | A1 |
20020196273 | Krause | Dec 2002 | A1 |
20030028560 | Kudrolli et al. | Feb 2003 | A1 |
20030036927 | Bowen | Feb 2003 | A1 |
20030039948 | Donahue | Feb 2003 | A1 |
20030055652 | Nichols | Mar 2003 | A1 |
20030061132 | Mason et al. | Mar 2003 | A1 |
20030093507 | Shapiro | May 2003 | A1 |
20030093755 | O'Carroll | May 2003 | A1 |
20030110448 | Haut | Jun 2003 | A1 |
20030126102 | Borthwick | Jul 2003 | A1 |
20030140106 | Raguseo | Jul 2003 | A1 |
20030144868 | MacIntyre et al. | Jul 2003 | A1 |
20030163352 | Surpin et al. | Aug 2003 | A1 |
20030200217 | Ackerman | Oct 2003 | A1 |
20030225755 | Iwayama et al. | Dec 2003 | A1 |
20030229848 | Arend et al. | Dec 2003 | A1 |
20040032432 | Baynger | Feb 2004 | A1 |
20040034570 | Davis | Feb 2004 | A1 |
20040044648 | Anfindsen et al. | Mar 2004 | A1 |
20040046789 | Inanoria | Mar 2004 | A1 |
20040064256 | Barinek et al. | Apr 2004 | A1 |
20040078451 | Dietz et al. | Apr 2004 | A1 |
20040083463 | Hawley | Apr 2004 | A1 |
20040085318 | Hassler et al. | May 2004 | A1 |
20040095349 | Bito et al. | May 2004 | A1 |
20040111410 | Burgoon et al. | Jun 2004 | A1 |
20040126840 | Cheng et al. | Jul 2004 | A1 |
20040143602 | Ruiz et al. | Jul 2004 | A1 |
20040143796 | Lerner et al. | Jul 2004 | A1 |
20040163039 | Gorman | Aug 2004 | A1 |
20040181554 | Heckerman et al. | Sep 2004 | A1 |
20040193600 | Kaasten et al. | Sep 2004 | A1 |
20040205492 | Newsome | Oct 2004 | A1 |
20040221223 | Yu et al. | Nov 2004 | A1 |
20040236688 | Bozeman | Nov 2004 | A1 |
20040236711 | Nixon et al. | Nov 2004 | A1 |
20040243555 | Bolsius et al. | Dec 2004 | A1 |
20040260702 | Cragun et al. | Dec 2004 | A1 |
20040267746 | Marcjan et al. | Dec 2004 | A1 |
20050004911 | Goldberg et al. | Jan 2005 | A1 |
20050010472 | Quatse et al. | Jan 2005 | A1 |
20050027705 | Sadri et al. | Feb 2005 | A1 |
20050027887 | Zimler | Feb 2005 | A1 |
20050028094 | Allyn | Feb 2005 | A1 |
20050039116 | Slack-Smith | Feb 2005 | A1 |
20050039119 | Parks et al. | Feb 2005 | A1 |
20050065811 | Chu et al. | Mar 2005 | A1 |
20050080769 | Gemmell | Apr 2005 | A1 |
20050086207 | Heuer et al. | Apr 2005 | A1 |
20050091186 | Elish | Apr 2005 | A1 |
20050125715 | Di Franco et al. | Jun 2005 | A1 |
20050162523 | Darrell et al. | Jul 2005 | A1 |
20050166144 | Gross | Jul 2005 | A1 |
20050180330 | Shapiro | Aug 2005 | A1 |
20050182793 | Keenan et al. | Aug 2005 | A1 |
20050183005 | Denoue et al. | Aug 2005 | A1 |
20050210409 | Jou | Sep 2005 | A1 |
20050246327 | Yeung et al. | Nov 2005 | A1 |
20050251786 | Citron et al. | Nov 2005 | A1 |
20060026120 | Carolan et al. | Feb 2006 | A1 |
20060026170 | Kreitler et al. | Feb 2006 | A1 |
20060026561 | Bauman et al. | Feb 2006 | A1 |
20060031779 | Theurer et al. | Feb 2006 | A1 |
20060045470 | Poslinski et al. | Mar 2006 | A1 |
20060053097 | King et al. | Mar 2006 | A1 |
20060053170 | Hill et al. | Mar 2006 | A1 |
20060059139 | Robinson | Mar 2006 | A1 |
20060059423 | Lehmann et al. | Mar 2006 | A1 |
20060074866 | Chamberlain et al. | Apr 2006 | A1 |
20060074881 | Vembu et al. | Apr 2006 | A1 |
20060080139 | Mainzer | Apr 2006 | A1 |
20060080619 | Carlson et al. | Apr 2006 | A1 |
20060093222 | Saffer et al. | May 2006 | A1 |
20060106847 | Eckardt et al. | May 2006 | A1 |
20060129746 | Porter | Jun 2006 | A1 |
20060136513 | Ngo et al. | Jun 2006 | A1 |
20060139375 | Rasmussen et al. | Jun 2006 | A1 |
20060142949 | Helt | Jun 2006 | A1 |
20060143034 | Rothermel | Jun 2006 | A1 |
20060143075 | Carr et al. | Jun 2006 | A1 |
20060149596 | Surpin et al. | Jul 2006 | A1 |
20060155654 | Plessis et al. | Jul 2006 | A1 |
20060178915 | Chao | Aug 2006 | A1 |
20060203337 | White | Sep 2006 | A1 |
20060218637 | Thomas et al. | Sep 2006 | A1 |
20060241974 | Chao et al. | Oct 2006 | A1 |
20060242040 | Rader et al. | Oct 2006 | A1 |
20060242630 | Koike et al. | Oct 2006 | A1 |
20060265417 | Amato et al. | Nov 2006 | A1 |
20060271277 | Hu et al. | Nov 2006 | A1 |
20060277460 | Forstall et al. | Dec 2006 | A1 |
20060279630 | Aggarwal et al. | Dec 2006 | A1 |
20070000999 | Kubo et al. | Jan 2007 | A1 |
20070011150 | Frank | Jan 2007 | A1 |
20070016363 | Huang et al. | Jan 2007 | A1 |
20070018986 | Hauser | Jan 2007 | A1 |
20070038646 | Thota | Feb 2007 | A1 |
20070038962 | Fuchs et al. | Feb 2007 | A1 |
20070043686 | Teng et al. | Feb 2007 | A1 |
20070057966 | Ohno et al. | Mar 2007 | A1 |
20070061752 | Cory | Mar 2007 | A1 |
20070078832 | Ott et al. | Apr 2007 | A1 |
20070083541 | Fraleigh et al. | Apr 2007 | A1 |
20070094389 | Nussey et al. | Apr 2007 | A1 |
20070113164 | Hansen et al. | May 2007 | A1 |
20070136095 | Weinstein | Jun 2007 | A1 |
20070150369 | Zivin | Jun 2007 | A1 |
20070168871 | Jenkins | Jul 2007 | A1 |
20070174760 | Chamberlain et al. | Jul 2007 | A1 |
20070185850 | Walters et al. | Aug 2007 | A1 |
20070192265 | Chopin et al. | Aug 2007 | A1 |
20070198571 | Ferguson et al. | Aug 2007 | A1 |
20070208497 | Downs et al. | Sep 2007 | A1 |
20070208498 | Barker et al. | Sep 2007 | A1 |
20070208736 | Tanigawa et al. | Sep 2007 | A1 |
20070233709 | Abnous | Oct 2007 | A1 |
20070240062 | Christena et al. | Oct 2007 | A1 |
20070245339 | Bauman et al. | Oct 2007 | A1 |
20070266040 | Figlin | Nov 2007 | A1 |
20070266336 | Nojima et al. | Nov 2007 | A1 |
20070284433 | Domenica et al. | Dec 2007 | A1 |
20070294643 | Kyle | Dec 2007 | A1 |
20070299697 | Friedlander et al. | Dec 2007 | A1 |
20080016155 | Khalatian | Jan 2008 | A1 |
20080016216 | Worley et al. | Jan 2008 | A1 |
20080034420 | Chang | Feb 2008 | A1 |
20080034441 | Saha | Feb 2008 | A1 |
20080040442 | Fieldman | Feb 2008 | A1 |
20080040684 | Crump | Feb 2008 | A1 |
20080051989 | Welsh | Feb 2008 | A1 |
20080052142 | Bailey et al. | Feb 2008 | A1 |
20080077597 | Butler | Mar 2008 | A1 |
20080077642 | Carbone et al. | Mar 2008 | A1 |
20080082486 | Lermant et al. | Apr 2008 | A1 |
20080091693 | Murthy | Apr 2008 | A1 |
20080104019 | Nath | May 2008 | A1 |
20080109714 | Kumar et al. | May 2008 | A1 |
20080126951 | Sood et al. | May 2008 | A1 |
20080148398 | Mezack et al. | Jun 2008 | A1 |
20080155440 | Trevor et al. | Jun 2008 | A1 |
20080172607 | Baer | Jul 2008 | A1 |
20080177782 | Poston et al. | Jul 2008 | A1 |
20080186904 | Koyama et al. | Aug 2008 | A1 |
20080195417 | Surpin et al. | Aug 2008 | A1 |
20080195608 | Clover | Aug 2008 | A1 |
20080222295 | Robinson et al. | Sep 2008 | A1 |
20080249820 | Pathria | Oct 2008 | A1 |
20080263468 | Cappione et al. | Oct 2008 | A1 |
20080267107 | Rosenberg | Oct 2008 | A1 |
20080276167 | Michael | Nov 2008 | A1 |
20080278311 | Grange et al. | Nov 2008 | A1 |
20080288306 | MacIntyre et al. | Nov 2008 | A1 |
20080288475 | Kim et al. | Nov 2008 | A1 |
20080301643 | Appleton et al. | Dec 2008 | A1 |
20080306711 | Bansal | Dec 2008 | A1 |
20080313132 | Hao et al. | Dec 2008 | A1 |
20080313243 | Poston et al. | Dec 2008 | A1 |
20090002492 | Velipasalar et al. | Jan 2009 | A1 |
20090006987 | Simhi | Jan 2009 | A1 |
20090024962 | Gotz | Jan 2009 | A1 |
20090027418 | Maru et al. | Jan 2009 | A1 |
20090030915 | Winter et al. | Jan 2009 | A1 |
20090031401 | Cudich et al. | Jan 2009 | A1 |
20090043801 | LeClair | Feb 2009 | A1 |
20090055251 | Shah et al. | Feb 2009 | A1 |
20090076845 | Bellin et al. | Mar 2009 | A1 |
20090088964 | Schaaf et al. | Apr 2009 | A1 |
20090089651 | Herberger et al. | Apr 2009 | A1 |
20090106178 | Chu | Apr 2009 | A1 |
20090112678 | Luzardo | Apr 2009 | A1 |
20090112745 | Stefanescu | Apr 2009 | A1 |
20090119309 | Gibson et al. | May 2009 | A1 |
20090125359 | Knapic | May 2009 | A1 |
20090125369 | Kloosstra et al. | May 2009 | A1 |
20090125459 | Norton et al. | May 2009 | A1 |
20090132921 | Hwangbo et al. | May 2009 | A1 |
20090132953 | Reed et al. | May 2009 | A1 |
20090143052 | Bates et al. | Jun 2009 | A1 |
20090144262 | White et al. | Jun 2009 | A1 |
20090144274 | Fraleigh et al. | Jun 2009 | A1 |
20090150868 | Chakra et al. | Jun 2009 | A1 |
20090164310 | Grossman | Jun 2009 | A1 |
20090164934 | Bhattiprolu et al. | Jun 2009 | A1 |
20090171939 | Athsani et al. | Jul 2009 | A1 |
20090172511 | Decherd et al. | Jul 2009 | A1 |
20090172821 | Daira et al. | Jul 2009 | A1 |
20090177962 | Gusmorino et al. | Jul 2009 | A1 |
20090179892 | Tsuda et al. | Jul 2009 | A1 |
20090187464 | Bai et al. | Jul 2009 | A1 |
20090187546 | Whyte et al. | Jul 2009 | A1 |
20090199106 | Jonsson et al. | Aug 2009 | A1 |
20090216562 | Faulkner et al. | Aug 2009 | A1 |
20090222400 | Kupershmidt et al. | Sep 2009 | A1 |
20090222759 | Drieschner | Sep 2009 | A1 |
20090222760 | Halverson et al. | Sep 2009 | A1 |
20090234720 | George et al. | Sep 2009 | A1 |
20090248737 | Shukla | Oct 2009 | A1 |
20090248757 | Havewala et al. | Oct 2009 | A1 |
20090249178 | Ambrosino et al. | Oct 2009 | A1 |
20090249244 | Robinson et al. | Oct 2009 | A1 |
20090254970 | Agarwal et al. | Oct 2009 | A1 |
20090271343 | Vaiciulis et al. | Oct 2009 | A1 |
20090281839 | Lynn et al. | Nov 2009 | A1 |
20090282068 | Shockro et al. | Nov 2009 | A1 |
20090287470 | Farnsworth et al. | Nov 2009 | A1 |
20090292626 | Oxford | Nov 2009 | A1 |
20090307049 | Elliott et al. | Dec 2009 | A1 |
20090313463 | Pang et al. | Dec 2009 | A1 |
20090319891 | MacKinlay | Dec 2009 | A1 |
20100004857 | Pereira et al. | Jan 2010 | A1 |
20100011282 | Dollard et al. | Jan 2010 | A1 |
20100042922 | Bradateanu et al. | Feb 2010 | A1 |
20100050181 | Zhang | Feb 2010 | A1 |
20100057622 | Faith et al. | Mar 2010 | A1 |
20100057716 | Stefik et al. | Mar 2010 | A1 |
20100070523 | Delgo et al. | Mar 2010 | A1 |
20100070842 | Aymeloglu et al. | Mar 2010 | A1 |
20100070844 | Aymeloglu | Mar 2010 | A1 |
20100070845 | Facemire et al. | Mar 2010 | A1 |
20100070897 | Aymeloglu et al. | Mar 2010 | A1 |
20100076813 | Ghosh et al. | Mar 2010 | A1 |
20100082660 | Muilenburg | Apr 2010 | A1 |
20100082778 | Muilenburg | Apr 2010 | A1 |
20100082780 | Muilenburg | Apr 2010 | A1 |
20100098318 | Anderson | Apr 2010 | A1 |
20100100963 | Mahaffey | Apr 2010 | A1 |
20100103124 | Kruzeniski et al. | Apr 2010 | A1 |
20100114887 | Conway et al. | May 2010 | A1 |
20100122152 | Chamberlain et al. | May 2010 | A1 |
20100131457 | Heimendinger | May 2010 | A1 |
20100138316 | Connors | Jun 2010 | A1 |
20100162176 | Dunton | Jun 2010 | A1 |
20100191563 | Schlaifer et al. | Jul 2010 | A1 |
20100198684 | Eraker et al. | Aug 2010 | A1 |
20100198796 | Berersniewicz et al. | Aug 2010 | A1 |
20100199225 | Coleman et al. | Aug 2010 | A1 |
20100215166 | Siegel | Aug 2010 | A1 |
20100217641 | Siegel | Aug 2010 | A1 |
20100223260 | Wu | Sep 2010 | A1 |
20100228812 | Uomini | Sep 2010 | A1 |
20100238174 | Haub et al. | Sep 2010 | A1 |
20100250412 | Wagner | Sep 2010 | A1 |
20100262901 | DiSalvo | Oct 2010 | A1 |
20100280851 | Merkin | Nov 2010 | A1 |
20100280857 | Liu et al. | Nov 2010 | A1 |
20100293174 | Bennett et al. | Nov 2010 | A1 |
20100306713 | Geisner et al. | Dec 2010 | A1 |
20100306722 | LeHoty et al. | Dec 2010 | A1 |
20100313119 | Baldwin et al. | Dec 2010 | A1 |
20100313239 | Chakra et al. | Dec 2010 | A1 |
20100318924 | Frankel et al. | Dec 2010 | A1 |
20100321399 | Ellren et al. | Dec 2010 | A1 |
20100325526 | Ellis et al. | Dec 2010 | A1 |
20100325581 | Finkelstein et al. | Dec 2010 | A1 |
20100330801 | Rouh | Dec 2010 | A1 |
20110029526 | Knight et al. | Feb 2011 | A1 |
20110047159 | Baid et al. | Feb 2011 | A1 |
20110047540 | Williams et al. | Feb 2011 | A1 |
20110060753 | Shaked et al. | Mar 2011 | A1 |
20110061013 | Bilicki et al. | Mar 2011 | A1 |
20110066933 | Ludwig | Mar 2011 | A1 |
20110074788 | Regan et al. | Mar 2011 | A1 |
20110074811 | Hanson et al. | Mar 2011 | A1 |
20110078055 | Faribault et al. | Mar 2011 | A1 |
20110078173 | Seligmann et al. | Mar 2011 | A1 |
20110093327 | Fordyce, III et al. | Apr 2011 | A1 |
20110099133 | Chang et al. | Apr 2011 | A1 |
20110106835 | Lauridsen | May 2011 | A1 |
20110107196 | Foster | May 2011 | A1 |
20110117878 | Barash et al. | May 2011 | A1 |
20110119100 | Ruhl et al. | May 2011 | A1 |
20110137766 | Rasmussen et al. | Jun 2011 | A1 |
20110153384 | Horne et al. | Jun 2011 | A1 |
20110161096 | Buehler et al. | Jun 2011 | A1 |
20110161409 | Nair | Jun 2011 | A1 |
20110167105 | Ramakrishnan et al. | Jul 2011 | A1 |
20110170799 | Carrino et al. | Jul 2011 | A1 |
20110173032 | Payne et al. | Jul 2011 | A1 |
20110173093 | Psota et al. | Jul 2011 | A1 |
20110179048 | Satlow | Jul 2011 | A1 |
20110179110 | Soloway | Jul 2011 | A1 |
20110185316 | Reid et al. | Jul 2011 | A1 |
20110208565 | Ross et al. | Aug 2011 | A1 |
20110208724 | Jones et al. | Aug 2011 | A1 |
20110213655 | Henkin | Sep 2011 | A1 |
20110218934 | Elser | Sep 2011 | A1 |
20110219450 | McDougal et al. | Sep 2011 | A1 |
20110225198 | Edwards et al. | Sep 2011 | A1 |
20110225482 | Chan et al. | Sep 2011 | A1 |
20110238495 | Kang | Sep 2011 | A1 |
20110238553 | Raj et al. | Sep 2011 | A1 |
20110251951 | Kolkowtiz | Oct 2011 | A1 |
20110258158 | Resende et al. | Oct 2011 | A1 |
20110270705 | Parker | Nov 2011 | A1 |
20110289397 | Eastmond et al. | Nov 2011 | A1 |
20110289407 | Naik et al. | Nov 2011 | A1 |
20110289420 | Morioka et al. | Nov 2011 | A1 |
20110289513 | Degirmenci | Nov 2011 | A1 |
20110291851 | Whisenant | Dec 2011 | A1 |
20110310005 | Chen et al. | Dec 2011 | A1 |
20110314007 | Dassa et al. | Dec 2011 | A1 |
20120004894 | Butler | Jan 2012 | A1 |
20120019559 | Siler et al. | Jan 2012 | A1 |
20120022945 | Falkenborg et al. | Jan 2012 | A1 |
20120036013 | Neuhaus et al. | Feb 2012 | A1 |
20120036245 | Dare | Feb 2012 | A1 |
20120036434 | Oberstein | Feb 2012 | A1 |
20120050293 | Carlhian et al. | Mar 2012 | A1 |
20120054625 | Pugh | Mar 2012 | A1 |
20120059853 | Jagota | Mar 2012 | A1 |
20120065987 | Farooq et al. | Mar 2012 | A1 |
20120066296 | Appleton et al. | Mar 2012 | A1 |
20120072825 | Sherkin et al. | Mar 2012 | A1 |
20120079363 | Foiling et al. | Mar 2012 | A1 |
20120084117 | Tavares et al. | Apr 2012 | A1 |
20120084118 | Bai et al. | Apr 2012 | A1 |
20120084184 | Raleigh | Apr 2012 | A1 |
20120106801 | Jackson | May 2012 | A1 |
20120117082 | Koperda et al. | May 2012 | A1 |
20120123989 | Yu et al. | May 2012 | A1 |
20120131512 | Takeuchi et al. | May 2012 | A1 |
20120137235 | Ts et al. | May 2012 | A1 |
20120144335 | Abeln et al. | Jun 2012 | A1 |
20120150759 | Tarjan | Jun 2012 | A1 |
20120159307 | Chung et al. | Jun 2012 | A1 |
20120159362 | Brown et al. | Jun 2012 | A1 |
20120159399 | Bastide et al. | Jun 2012 | A1 |
20120170847 | Tsukidate | Jul 2012 | A1 |
20120173985 | Peppel | Jul 2012 | A1 |
20120180002 | Campbell et al. | Jul 2012 | A1 |
20120188252 | Law | Jul 2012 | A1 |
20120196557 | Reich et al. | Aug 2012 | A1 |
20120196558 | Reich et al. | Aug 2012 | A1 |
20120197651 | Robinson et al. | Aug 2012 | A1 |
20120197657 | Prodanovic | Aug 2012 | A1 |
20120197660 | Prodanovic | Aug 2012 | A1 |
20120203708 | Psota et al. | Aug 2012 | A1 |
20120208636 | Feige | Aug 2012 | A1 |
20120215784 | King et al. | Aug 2012 | A1 |
20120221511 | Gibson et al. | Aug 2012 | A1 |
20120221553 | Wittmer et al. | Aug 2012 | A1 |
20120221580 | Barney | Aug 2012 | A1 |
20120226590 | Love et al. | Sep 2012 | A1 |
20120245976 | Kumar et al. | Sep 2012 | A1 |
20120246148 | Dror | Sep 2012 | A1 |
20120254129 | Wheeler et al. | Oct 2012 | A1 |
20120266245 | McDougal et al. | Oct 2012 | A1 |
20120284345 | Costenaro et al. | Nov 2012 | A1 |
20120284670 | Kashik et al. | Nov 2012 | A1 |
20120290879 | Shibuya et al. | Nov 2012 | A1 |
20120296907 | Long et al. | Nov 2012 | A1 |
20120304244 | Xie et al. | Nov 2012 | A1 |
20120311684 | Paulsen et al. | Dec 2012 | A1 |
20120323829 | Stokes et al. | Dec 2012 | A1 |
20120323888 | Osann, Jr. | Dec 2012 | A1 |
20120330801 | McDougal et al. | Dec 2012 | A1 |
20120330973 | Ghuneim et al. | Dec 2012 | A1 |
20120330994 | Tonn | Dec 2012 | A1 |
20130006426 | Healey et al. | Jan 2013 | A1 |
20130006725 | Simanek et al. | Jan 2013 | A1 |
20130006916 | McBride et al. | Jan 2013 | A1 |
20130016106 | Yip et al. | Jan 2013 | A1 |
20130018796 | Kolhatkar et al. | Jan 2013 | A1 |
20130024268 | Manickavelu | Jan 2013 | A1 |
20130046635 | Grigg et al. | Feb 2013 | A1 |
20130046842 | Muntz et al. | Feb 2013 | A1 |
20130055264 | Burr et al. | Feb 2013 | A1 |
20130060786 | Serrano et al. | Mar 2013 | A1 |
20130061169 | Pearcy et al. | Mar 2013 | A1 |
20130073377 | Heath | Mar 2013 | A1 |
20130073454 | Busch | Mar 2013 | A1 |
20130078943 | Biage et al. | Mar 2013 | A1 |
20130086146 | Addala | Apr 2013 | A1 |
20130086482 | Parsons | Apr 2013 | A1 |
20130097482 | Marantz et al. | Apr 2013 | A1 |
20130101159 | Chao et al. | Apr 2013 | A1 |
20130110822 | Ikeda et al. | May 2013 | A1 |
20130110877 | Bonham et al. | May 2013 | A1 |
20130111320 | Campbell et al. | May 2013 | A1 |
20130117651 | Waldman et al. | May 2013 | A1 |
20130124567 | Balinsky et al. | May 2013 | A1 |
20130150004 | Rosen | Jun 2013 | A1 |
20130151148 | Parundekar et al. | Jun 2013 | A1 |
20130151305 | Akinola et al. | Jun 2013 | A1 |
20130151388 | Falkenborg et al. | Jun 2013 | A1 |
20130151453 | Bhanot et al. | Jun 2013 | A1 |
20130157234 | Gulli et al. | Jun 2013 | A1 |
20130166480 | Popescu et al. | Jun 2013 | A1 |
20130166550 | Buchmann et al. | Jun 2013 | A1 |
20130176321 | Mitchell et al. | Jul 2013 | A1 |
20130179420 | Park et al. | Jul 2013 | A1 |
20130187922 | Sexton | Jul 2013 | A1 |
20130224696 | Wolfe et al. | Aug 2013 | A1 |
20130225212 | Khan | Aug 2013 | A1 |
20130226318 | Procyk | Aug 2013 | A1 |
20130226953 | Markovich et al. | Aug 2013 | A1 |
20130232045 | Tai et al. | Sep 2013 | A1 |
20130238616 | Rose et al. | Sep 2013 | A1 |
20130246170 | Gross et al. | Sep 2013 | A1 |
20130251233 | Yang et al. | Sep 2013 | A1 |
20130262527 | Hunter et al. | Oct 2013 | A1 |
20130262528 | Foit | Oct 2013 | A1 |
20130263019 | Castellanos et al. | Oct 2013 | A1 |
20130267207 | Hao et al. | Oct 2013 | A1 |
20130268520 | Fisher et al. | Oct 2013 | A1 |
20130279757 | Kephart | Oct 2013 | A1 |
20130282696 | John et al. | Oct 2013 | A1 |
20130288719 | Alonzo | Oct 2013 | A1 |
20130290011 | Lynn et al. | Oct 2013 | A1 |
20130290825 | Arndt et al. | Oct 2013 | A1 |
20130297619 | Chandarsekaran et al. | Nov 2013 | A1 |
20130311375 | Priebatsch | Nov 2013 | A1 |
20140019936 | Cohanoff | Jan 2014 | A1 |
20140032506 | Hoey et al. | Jan 2014 | A1 |
20140033010 | Richardt et al. | Jan 2014 | A1 |
20140040371 | Gurevich et al. | Feb 2014 | A1 |
20140047319 | Eberlein | Feb 2014 | A1 |
20140047357 | Alfaro et al. | Feb 2014 | A1 |
20140059038 | McPherson et al. | Feb 2014 | A1 |
20140067611 | Adachi et al. | Mar 2014 | A1 |
20140068487 | Steiger et al. | Mar 2014 | A1 |
20140074855 | Zhao et al. | Mar 2014 | A1 |
20140089339 | Siddiqui et al. | Mar 2014 | A1 |
20140095273 | Tang et al. | Apr 2014 | A1 |
20140095509 | Patton | Apr 2014 | A1 |
20140108068 | Williams | Apr 2014 | A1 |
20140108380 | Gotz et al. | Apr 2014 | A1 |
20140108621 | Bryan | Apr 2014 | A1 |
20140108915 | Lu | Apr 2014 | A1 |
20140108985 | Scott et al. | Apr 2014 | A1 |
20140129261 | Bothwell et al. | May 2014 | A1 |
20140129936 | Richards et al. | May 2014 | A1 |
20140149436 | Bahrami et al. | May 2014 | A1 |
20140156527 | Grigg et al. | Jun 2014 | A1 |
20140157172 | Peery et al. | Jun 2014 | A1 |
20140164502 | Khodorenko et al. | Jun 2014 | A1 |
20140189536 | Lange et al. | Jul 2014 | A1 |
20140189804 | Lehmann | Jul 2014 | A1 |
20140195515 | Baker et al. | Jul 2014 | A1 |
20140195887 | Ellis et al. | Jul 2014 | A1 |
20140208281 | Ming | Jul 2014 | A1 |
20140214579 | Shen et al. | Jul 2014 | A1 |
20140222521 | Chait | Aug 2014 | A1 |
20140222793 | Sadkin et al. | Aug 2014 | A1 |
20140229898 | Terwedo | Aug 2014 | A1 |
20140244284 | Smith | Aug 2014 | A1 |
20140244388 | Manouchehri et al. | Aug 2014 | A1 |
20140267294 | Ma | Sep 2014 | A1 |
20140267295 | Sharma | Sep 2014 | A1 |
20140279824 | Tamayo | Sep 2014 | A1 |
20140282187 | MacKinlay et al. | Sep 2014 | A1 |
20140310266 | Greenfield | Oct 2014 | A1 |
20140316911 | Gross | Oct 2014 | A1 |
20140333651 | Cervelli et al. | Nov 2014 | A1 |
20140337772 | Cervelli et al. | Nov 2014 | A1 |
20140344230 | Krause et al. | Nov 2014 | A1 |
20140358829 | Hurwitz | Dec 2014 | A1 |
20150019394 | Unser et al. | Jan 2015 | A1 |
20150026622 | Roaldson et al. | Jan 2015 | A1 |
20150046870 | Goldenberg et al. | Feb 2015 | A1 |
20150073954 | Braff | Mar 2015 | A1 |
20150089353 | Folkening | Mar 2015 | A1 |
20150089424 | Duffield et al. | Mar 2015 | A1 |
20150100897 | Sun et al. | Apr 2015 | A1 |
20150100907 | Erenrich et al. | Apr 2015 | A1 |
20150106379 | Elliot et al. | Apr 2015 | A1 |
20150112998 | Shankar et al. | Apr 2015 | A1 |
20150134666 | Gattiker et al. | May 2015 | A1 |
20150149888 | Rice | May 2015 | A1 |
20150169709 | Kara et al. | Jun 2015 | A1 |
20150169726 | Kara et al. | Jun 2015 | A1 |
20150170077 | Kara et al. | Jun 2015 | A1 |
20150178825 | Huerta | Jun 2015 | A1 |
20150178877 | Bogomolov et al. | Jun 2015 | A1 |
20150186483 | Tappan et al. | Jul 2015 | A1 |
20150186821 | Wang et al. | Jul 2015 | A1 |
20150187036 | Wang et al. | Jul 2015 | A1 |
20150212663 | Papale et al. | Jul 2015 | A1 |
20150222493 | Tully | Aug 2015 | A1 |
20150222693 | Tully | Aug 2015 | A1 |
20150227295 | Meiklejohn et al. | Aug 2015 | A1 |
20150227299 | Pourshahid | Aug 2015 | A1 |
20150254220 | Burr et al. | Sep 2015 | A1 |
20150278315 | Baumgartner et al. | Oct 2015 | A1 |
20150302051 | Baumgartner et al. | Oct 2015 | A1 |
20150309719 | Ma et al. | Oct 2015 | A1 |
20150317342 | Grossman et al. | Nov 2015 | A1 |
20150324868 | Kaftan et al. | Nov 2015 | A1 |
20150363175 | Klausner | Dec 2015 | A1 |
20150378966 | McWilliams | Dec 2015 | A1 |
20160048370 | Zenoff | Feb 2016 | A1 |
20160062555 | Ward et al. | Mar 2016 | A1 |
20160098176 | Cervelli et al. | Apr 2016 | A1 |
20160110369 | Cervelli et al. | Apr 2016 | A1 |
20160162478 | Blassin | Jun 2016 | A1 |
20160162519 | Stowe et al. | Jun 2016 | A1 |
20170103432 | Borchetta | Apr 2017 | A1 |
20170111241 | Degioanni | Apr 2017 | A1 |
20170200240 | Marinelli | Jul 2017 | A1 |
20170366916 | Dong | Dec 2017 | A1 |
20180024701 | Sanches et al. | Jan 2018 | A1 |
20180024731 | Sanches et al. | Jan 2018 | A1 |
20180032605 | Deshpande | Feb 2018 | A1 |
20180032627 | Margatan | Feb 2018 | A1 |
20180060523 | Farh | Mar 2018 | A1 |
20180081642 | Alurralde Iturri | Mar 2018 | A1 |
20180101279 | Ward et al. | Apr 2018 | A1 |
20180137199 | Miller | May 2018 | A1 |
20180164997 | Sinha | Jun 2018 | A1 |
20180176078 | Nigro | Jun 2018 | A1 |
20180181270 | Muramoto | Jun 2018 | A1 |
20190095225 | Nandagopal | Mar 2019 | A1 |
20190332230 | Gueco | Oct 2019 | A1 |
Number | Date | Country |
---|---|---|
2013251186 | Nov 2015 | AU |
102054015 | May 2014 | CN |
102014103482 | Sep 2014 | DE |
102014215621 | Feb 2015 | DE |
1672527 | Jun 2006 | EP |
2551799 | Jan 2013 | EP |
2560134 | Feb 2013 | EP |
2778977 | Sep 2014 | EP |
2835745 | Feb 2015 | EP |
2835770 | Feb 2015 | EP |
2838039 | Feb 2015 | EP |
2846241 | Mar 2015 | EP |
2851852 | Mar 2015 | EP |
2858014 | Apr 2015 | EP |
2858018 | Apr 2015 | EP |
2863326 | Apr 2015 | EP |
2863346 | Apr 2015 | EP |
2869211 | May 2015 | EP |
2884439 | Jun 2015 | EP |
2884440 | Jun 2015 | EP |
2891992 | Jul 2015 | EP |
2911078 | Aug 2015 | EP |
2911100 | Aug 2015 | EP |
2940603 | Nov 2015 | EP |
2940609 | Nov 2015 | EP |
2993595 | Mar 2016 | EP |
3002691 | Apr 2016 | EP |
3009943 | Apr 2016 | EP |
3273345 | Jan 2018 | EP |
2516155 | Jan 2015 | GB |
2518745 | Apr 2015 | GB |
2012778 | Nov 2014 | NL |
2013306 | Feb 2015 | NL |
624557 | Dec 2014 | NZ |
WO 2000009529 | Feb 2000 | WO |
WO 01025906 | Apr 2001 | WO |
WO 2001088750 | Nov 2001 | WO |
WO 2002065353 | Aug 2002 | WO |
WO 2005104736 | Nov 2005 | WO |
WO 2007133206 | Nov 2007 | WO |
WO 2008064207 | May 2008 | WO |
WO 2009061501 | May 2009 | WO |
WO 2010000014 | Jan 2010 | WO |
WO 2010030913 | Mar 2010 | WO |
WO 2010030914 | Mar 2010 | WO |
WO 2012119008 | Sep 2012 | WO |
WO 2013010157 | Jan 2013 | WO |
WO 2013102892 | Jul 2013 | WO |
Entry |
---|
“A First Look: Predicting Market Demand for Food Retail using a Huff Analysis,” TRF Policy Solutions, Jul. 2012, pp. 30. |
“A Quick Guide to UniProtKB Swiss-Prot & TrEMBL,” Sep. 2011, pp. 2. |
About 80 Minutes, “Palantir in a Number of Parts—Part 6—Graph,” Mar. 21, 2013, pp. 1-6, retrieved from the internet http://about80minutes.blogspot.nl/2013/03/palantir-in-number-of-parts-part-6-graph.html retrieved on Aug. 18, 2015. |
Adams et al., “Worklets: A Service-Oriented Implementation of Dynamic Flexibility in Workflows,” R. Meersman, Z. Tari et al. (Eds.): OTM 2006, LNCS, 4275, pp. 291-308, 2006. |
Alur et al., “Chapter 2: IBM InfoSphere DataStage Stages,” IBM InfoSphere DataStage Data Flow and Job Design, Jul. 1, 2008, pp. 35-137. |
Ananiev et al., “The New Modality API,” http://web.archive.org/web/20061211011958/http://java.sun.com/developer/technicalArticles/J2SE/Desktop/javase6/modality/ Jan. 21, 2006, pp. 8. |
Bluttman et al., “Excel Formulas and Functions for Dummies,” 2005, Wiley Publishing, Inc., pp. 280, 284-286. |
Bugzilla@Mozilla, “Bug 18726—[feature] Long-click means of invoking contextual menus not supported,” http://bugzilla.mozilla.org/show_bug.cgi?id=18726 printed Jun. 13, 2013 in 11 pages. |
Butkovic et al., “Using Whois Based Geolocation and Google Maps API for Support Cybercrime Investigations,” Recent Advances in Telecommunications and Circuits: Proceedings of the 11th International Conference on Applied Electromagnetics, Wireless and Optical Communications (Electroscience '13), Proceedings of the 2nd International Conference on Circuits, Systems, Communications, Computers and Applications (CSCCA '13), Proceedings of the 1st International Conference on Solid State Circuits (SSC '13), Proceedings of the 1st International Conference on Antennas & Propagation (ANPRO '13) :Dubrovnik, Croatia, Jun. 25-27, 2013, pp. 194-200, 2013. |
Canese et al., “Chapter 2: PubMed: The Bibliographic Database,” The NCBI Handbook, Oct. 2002, pp. 1-10. |
Chen et al., “Bringing Order to the Web: Automatically Categorizing Search Results,” CHI 2000, Proceedings of the SIGCHI conference on Human Factors in Computing Systems, Apr. 1-6, 2000, The Hague, The Netherlands, pp. 145-152. |
Chung, Chin-Wan, “Dataplex: An Access to Heterogeneous Distributed Databases,” Communications of the ACM, Association for Computing Machinery, Inc., vol. 33, No. 1, Jan. 1, 1990, pp. 70-80. |
Definition “Identify”, downloaded Jan. 22, 2015, 1 page. |
Definition “Overlay”, downloaded Jan. 22, 2015, 1 page. |
Delcher et al., “Identifying Bacterial Genes and Endosymbiont DNA with Glimmer,” BioInformatics, vol. 23, No. 6, 2007, pp. 673-679. |
Dramowicz, Ela, “Retail Trade Area Analysis Using the Huff Model,” Directions Magazine, Jul. 2, 2005 in 10 pages, http://www.directionsmag.com/articles/retail-trade-area-analysis-using-the-huff-model/123411. |
Elias et al., “Exploration Views: Understanding Dashboard Creation and Customization for Visualization Novices,” Sep. 5, 2011, Network and Parallel Computing, pp. 274-291. |
“The FASTA Program Package,” fasta-36.3.4, Mar. 25, 2011, pp. 29. |
Griffith, Daniel A., “A Generalized Huff Model,” Geographical Analysis, Apr. 1982, vol. 14, No. 2, pp. 135-144. |
Hardesty, “Privacy Challenges: Analysis: It's Surprisingly Easy to Identify Individuals from Credit-Card Metadata,” MIT News on Campus and Around the World, MIT News Office, Jan. 29, 2015, 3 pages. |
Hibbert et al., “Prediction of Shopping Behavior Using a Huff Model Within a GIS Framework,” Healthy Eating in Context, Mar. 18, 2011, pp. 16. |
Hogue et al., “Thresher: Automating the Unwrapping of Semantic Content from the World Wide Web,” 14th International Conference on World Wide Web, WWW 2005: Chiba, Japan, May 10-14, 2005, pp. 86-95. |
Hua et al., “A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services”, HiPC 2006, LNCS 4297, pp. 277-288, 2006. |
Huang et al., “Systematic and Integrative Analysis of Large Gene Lists Using DAVID Bioinformatics Resources,” Nature Protocols, 4.1, 2008, 44-57. |
Huff et al., “Calibrating the Huff Model Using ArcGIS Business Analyst,” ESRI, Sep. 2008, pp. 33. |
Huff, David L., “Parameter Estimation in the Huff Model,” ESRI, ArcUser, Oct.-Dec. 2003, pp. 34-36. |
JetScreenshot.com, “Share Screenshots via Internet in Seconds,” <http://web.archive.org/web/20130807164204/http://www.jetscreenshot.com/>, Aug. 7, 2013, pp. 1. |
Kahan et al., “Annotea: an Open RDF Infrastructure for Shared Web Annotations”, Computer Networks, Elsevier Science Publishers B.V., vol. 39, No. 5, dated Aug. 5, 2002, pp. 589-608. |
Keylines.com, “An Introduction to KeyLines and Network Visualization,” Mar. 2014, <http://keylines.com/wp-content/uploads/2014/03/KeyLines-White-Paper.pdf> downloaded May 12, 2014 in 8 pages. |
Keylines.com, “KeyLines Datasheet,” Mar. 2014, <http://keylines.com/wp-content/uploads/2014/03/KeyLines-datasheet.pdf> downloaded May 12, 2014 in 2 pages. |
Keylines.com, “Visualizing Threats: Improved Cyber Security Through Network Visualization,” Apr. 2014, <http://keylines.com/wp-content/uploads/2014/04/Visualizing-Threats1.pdf> downloaded May 12, 2014 in 10 pages. |
Kitts, Paul, “Chapter 14: Genome Assembly and Annotation Process,” The NCBI Handbook, Oct. 2002, pp. 1-21. |
Kwout, <http://web.archive.org/web/20080905132448/http://www.kwout.com/> Sep. 5, 2008, pp. 2. |
Li et al., “Interactive Multimodal Visual Search on Mobile Device,” IEEE Transactions on Multimedia, vol. 15, No. 3, Apr. 1, 2013, pp. 594-607. |
Liu, Tianshun, “Combining GIS and the Huff Model to Analyze Suitable Locations for a New Asian Supermarket in the Minneapolis and St. Paul, Minnesota USA,” Papers in Resource Analysis, 2012, vol. 14, pp. 8. |
Madden, Tom, “Chapter 16: The BLAST Sequence Analysis Tool,” The NCBI Handbook, Oct. 2002, pp. 1-15. |
Manno et al., “Introducing Collaboration in Single-user Applications through the Centralized Control Architecture,” 2010, pp. 10. |
Manske, “File Saving Dialogs,” <http://www.mozilla.org/editor/ui_specs/FileSaveDialogs.html>, Jan. 20, 1999, pp. 7. |
Map Builder, “Rapid Mashup Development Tool for Google and Yahoo Maps!” <http://web.archive.org/web/20090626224734/http://www.mapbuilder.net/> printed Jul. 20, 2012 in 2 pages. |
Microsoft Office—Visio, “About connecting shapes,” <http://office.microsoft.com/en-us/visio-help/about-connecting-shapes-HP085050369.aspx> printed Aug. 4, 2011 in 6 pages. |
Microsoft Office—Visio, “Add and glue connectors with the Connector tool,” <http://office.microsoft.com/en-us/visio-help/add-and-glue-connectors-with-the-connector-tool-HA010048532.aspx?CTT=1> printed Aug. 4, 2011 in 1 page. |
Microsoft Windows, “Microsoft Windows Version 2002 Print Out 2,” 2002, pp. 1-6. |
Microsoft, “Registering an Application to a URI Scheme,” <http://msdn.microsoft.com/en-us/library/aa767914.aspx>, printed Apr. 4, 2009 in 4 pages. |
Microsoft, “Using the Clipboard,” <http://msdn.microsoft.com/en-us/library/ms649016.aspx>, printed Jun. 8, 2009 in 20 pages. |
Mizrachi, Ilene, “Chapter 1: GenBank: The Nuckeotide Sequence Database,” The NCBI Handbook, Oct. 2002, pp. 1-14. |
Nierman, “Evaluating Structural Similarity in XML Documents”, 6 pages, 2002. |
Nitro, “Trick: How to Capture a Screenshot as PDF, Annotate, Then Share It,” <http://blog.nitropdf.com/2008/03/04/trick-how-to-capture-a-screenshot-as-pdf-annotate-it-then-share/>, Mar. 4, 2008, pp. 2. |
Nolan et al., “MCARTA: A Malicious Code Automated Run-Time Analysis Framework,” Homeland Security, 2012 IEEE Conference on Technologies for, Nov. 13, 2012, pp. 13-17. |
Online Tech Tips, “Clip2Net—Share files, folders and screenshots easily,” <http://www.online-tech-tips.com/free-software-downloads/share-files-folders-screenshots/>, Apr. 2, 2008, pp. 5. |
Oracle Corporation: “MySQL Workbench”, Mar. 15, 2016, pp. 1-408, XP055495553, Retrieved from the Internet: URL: https://web.archive.org/web/20160628032348/http://downloads.mysql.com/docs/workbench-en.a4.pdf [retrieved on Jul. 26, 2018]. |
O'Reilly.com, http://oreilly.com/digitalmedia/2006/01/01/mac-os-x-screenshot-secrets.html published Jan. 1, 2006 in 10 pages. |
Palmas et al., “An Edge-Bunding Layout for Interactive Parallel Coordinates” 2014 IEEE Pacific Visualization Symposium, pp. 57-64. |
Perdisci et al., “Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces,” USENIX, Mar. 18, 2010, pp. 1-14. |
Red Gate, “Analyzing Change Impact with SQL Dependency Tracker,” Dec. 22, 2010, https://web.archive.org/web/20101222043638/http://www.red-gate.com/products/sql-development/sql-dependency-tracker/screenshots. |
Rouse, Margaret, “OLAP Cube,” <http://searchdatamanagement.techtarget.com/definition/OLAP-cube>, Apr. 28, 2012, pp. 16. |
Schroder, Stan, “15 Ways To Create Website Screenshots,” <http://mashable.com/2007/08/24/web-screenshots/>, Aug. 24, 2007, pp. 2. |
Shi et al., “A Scalable Implementation of Malware Detection Based on Network Connection Behaviors,” 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, IEEE, Oct. 10, 2013, pp. 59-66. |
Sigrist, et al., “PROSITE, a Protein Domain Database for Functional Characterization and Annotation,” Nucleic Acids Research, 2010, vol. 38, pp. D161-D166. |
Sirotkin et al., “Chapter 13: The Processing of Biological Sequence Data at NCBI,” The NCBI Handbook, Oct. 2002, pp. 1-11. |
SnagIt, “SnagIt, 8.1.0 Print Out 2,” Software release date Jun. 15, 2006, pp. 1-3. |
SnagIt, “SnagIt, 8.1.0 Print Out,” Software release date Jun. 15, 2006, pp. 6. |
SnagIt, “SnagIt, Online Help Guide,” <http://download.techsmith.com/snagit/docs/onlinehelp/enu/snagit_help.pdf>, TechSmith Corp., Version 8.1, printed Feb. 7, 2007, pp. 284. |
Umagandhi et al., “Search Query Recommendations Using Hybrid User Profile with Query Logs,” International Journal of Computer Applications, vol. 80, No. 10, Oct. 1, 2013, pp. 7-18. |
Wang et al., “Research on a Clustering Data De-Duplication Mechanism Based on Bloom Filter,” IEEE 2010, 5 pages. |
Warren, Christina, “TUAW Faceoff: Screenshot apps on the firing line,” <http://www.tuaw.com/2008/05/05/tuaw-faceoff-screenshot-apps-on-the-firing-line/>, May 5, 2008, pp. 11. |
Wright et al., “Palantir Technologies VAST 2010 Challenge Text Records_Investigations into Arms Dealing,” Oct. 29, 2010, pp. 1-10. |
Yang et al., “HTML Page Analysis Based on Visual Cues”, A129, pp. 859-864, 2001. |
“A Word About Banks and the Laundering of Drug Money,” Aug. 18, 2012, http://www.golemxiv.co.uk/2012/08/a-word-about-banks-and-the-laundering-of-drug-money/, pp. 1-5. |
Abbey, Kristen, “Review of Google Docs,” Currents in Electronic Literacy, Digital Writing and Research Lab at the University of Texas at Austin, May 1, 2007, pp. 1-2. |
Acklen, Laura, “Absolute Beginner's Guide to Microsoft Word 2003,” Que Publishing, Dec. 24, 2003, pp. 15-18, 34-41, 308-316. |
Amnet, “5 Great Tools for Visualizing Your Twitter Followers,” https://web.archive.org/web/20110523074129/http://www.amnetblog.com/sections/46-social-media/115-5-great-tools-for-visualizing-your-twitter-followers.html, retrieved on Sep. 24, 2020, pp. 1-4. |
Boyce, Jim, “Microsoft Outlook 2010 Inside Out,” Aug. 1, 2010, retrieved from the internet https://capdtron.files.wordpress.com/2013/01/outlook-2010-inside_out.pdf, pp. 32-36. |
Celik, Tantek, “CSS Basic User Interface Module Level 3 (CSS3 UI),” Jan. 17, 2012, retrieved from internet http://www.w3.org/TR/2012/WD-css3-ui-20120117/#resizing-amp-overflow retrieved on May 18, 2015, pp. 8-58. |
Conner, Nancy, “Google Apps: The Missing Manual,” O'Reilly Media, Inc., May 1, 2008, pp. 93-97, 106-113. |
Cox et al., “Step by Step Microsoft Access 2013,” 2013, Microsoft Press, pp. 197-225. |
Ferreira et al., “A Scheme for Analyzing Electronic Payment Systems,” Brasil 1997, pp. 1-8. |
Galliford, Miles, “SnagIt, Versus Free Screen Capture Software: Critical Tools for Website Owners,” <http://www.subhub.com/articles/free-screen-capture-software>, Mar. 27, 2008, pp. 1-9. |
Gesher, Ari, “Palantir Screenshots in the Wild: Swing Sightings,” The Palantir Blog, Sep. 11, 2007, pp. 1-6. |
GIS-NET3. Department of Regional Planning. Planning & Zoning Information for Unincorporated LA County. Retrieved Oct. 2, 2013 from http://gis.planning.lacounty.gov/GIS-NET3_Public/Viewer.html, pp. 1-2. |
Goswami, Gautam, “Quite Writely Said!,” One Brick at a Time, Aug. 21, 2006, pp. 1-2. |
“GrabUp—What a Timesaver!” <http://atlchris.com/191/grabup/>, Aug. 11, 2008, pp. 1-2. |
Groh, “Microsoft Access 2010 Bible,” 2010, Wiley Publishing Inc., pp. 129-170. |
Gu et al., “Record Linkage: Current Practice and Future Directions,” CSIRO Mathematical and Information Sciences, CMIS Technical Report No. 03/83, Jan. 15, 2004, pp. 1-20, 26-32. |
Hansen et al., “Analyzing Social Media Networks with NodeXL: Insights from a Connected World”, Elsevier Science, Chapter 4, pp. 53-67 and Chapter 10, pp. 143-164, published Sep. 2010. |
Harvey, “Excel 2010 All-in-One for Dummies,” 2010, Wiley Publishing, Inc., pp. 616-633. |
Kelly, Microsoft—Developer Network, “Getting Started with VBA in Word 2010,” Apr. 2010, <http://msdn.microsoft.com/en-us/library/ff604039%28voffice.14%29.aspx> as retrieved on Apr. 4, 2014, pp. 1-16. |
Levi, “Money Laundering Risks and E-Gaming: A European Overview and Assessment,” 2009, http://www.cf.ac.uk/socsi/resources/Levi_Final_Money_Laundering_Risks_egaming.pdf, pp. 4-26. |
Olanoff, Drew, “Deep Dive with the New Google Maps for Desktop with Google Earth Integration, It's More than Just a Utility,” TechCrunch, May 15, 2013, retrieved from the internet: http://web.archive.org/web/20130515230641/http://techcrunch.com/2013/05/15/deep-dive-with-the-new-google-maps-for-desktop-with-google-earth-integration-its-more-than-just-a-utility/, pp. 1-6. |
“Potential Money Laundering Warning Signs,” snapshot taken 2003, https://web.archive.org/web/20030816090055/http:/finsolinc.com/ANTI-MONEY%20LAUNDERING%20TRAINING%20GUIDES.pdf, pp. 1-6. |
Quest, “Toad for Oracle 11.6—Guide to Using Toad,” Quest Software, Inc., Sep. 24, 2012, pp. 5-162. |
Red Gate, “Analyzing Change Impact with SQL Dependency Tracker,” Dec. 22, 2010, https://web.archive.org/web/20101222043638/http://www.red-gate.com/products/sql-development/sql-dependency-tracker/screenshots, pp. 1-5. |
Red Gate, “SQL Dependency Tracker 2.5,” Dec. 22, 2010, https://web.archive.org/web/201012151355/http://www.red-gate/com/products/sql-development/sql-dependency-tracker/, pp. 1-2. |
Red Gate, “Understanding the Diagram,” May 14, 2015, https://web.archive.org/web/20150514124543/http://documentation.red-gate.com/display/SDT2/Understanding+the+diagram, pp. 1-3. |
Red Gate, “Worked Example—A Simple Analysis,” Dec. 2, 2014, https://web.archive.org/web/20141202121918/http://documentation.red-gate.com/display/SDT2/Worked+example+-++a+simple+analysis, pp. 1-8. |
“Refresh CSS Ellipsis When Resizing Container—Stack Overflow,” Jul. 31, 2013, retrieved from internet http://stackoverflow.com/questions/17964681/refresh-css-ellipsis-when-resizing-container, retrieved on May 18, 2015, p. 1. |
Sempf, “Visual Basic 2005 for Dummies,” 2006, Wiley Publishing, Inc., pp. 83-105, 125-139. |
Service Now, “Access dependency maps,” Apr. 14, 2017, https://docs.servicenow.com/bundle/geneva-it-operations-management/page/product/discovery/task/t_AccessDependencyMaps.html, p. 1. |
Simpson, “Access VBA Programming for Dummies,” 2004, Wiley Publishing, Inc., pp. 117-146, 297-315. |
Symantec Corporation, “E-Security Begins with Sound Security Policies,” Announcement Symantec, Jun. 14, 2001, pp. 2-12 (also labeled as pp. 1-20). |
Thompson, Mick, “Chapter 2. Geographic Data,” Getting Started with GEO, CouchDB, and Node.js, O'Reilly Media, Jul. 26, 2011, pp. 1-3. |
Thornber et al., “Include Browser,” Apr. 5, 2014, https://sourceforge.net/projects/sourcenav/files/NG4.4/(second download file “sourcenavigator-NG4.4-i686-opt.tar.bz2”) /SN-NG4.4/share/snavigator/html/userguide/inclbrws.html, pp. 1-4. |
Thornber et al., “Source Navigator NG,” Apr. 5, 2014, https://sourceforge.net/projects/sourcenav/files/NG4.4/, p. 1. |
Wikipedia, “Federated Database System,” Sep. 7, 2013, retrieved from the internet on Jan. 27, 2015, http://en.wikipedia.org/w/index.php?title=Federated_database_system&oldid=571954221, pp. 1-6. |
Chaudhuri et al., “An Overview of Business Intelligence Technology,” Communications of the ACM, Aug. 2011, vol. 54, No. 8, pp. 88-98. |
Number | Date | Country | |
---|---|---|---|
62640464 | Mar 2018 | US |