Application recovery from network-induced data corruption
Applying the use of temporal data and temporal data models...
Assessing and managing operational risk in organizational...
Assessing mobile readiness of a page using a trained scorer
Atomic renaming and moving of data files while permitting...
Atomically moving list elements between lists using...
Attribute rule enforcer for a directory
Auditing of customs entry packets
Authenticating a site while protecting against security...
Automated data model extension through data crawler approach
Automated response to solicited and unsolicited...
Automatic task generator method and system
Autonomic rule generation in a content management system
Avoiding redundant computation in service-oriented...
Based on repeated experience, system for modification of...
Batch automated blocking and record matching
Best practices analyzer
Block compression of tables with repeated values
Block locking in a multi-node environment
Block-level data de-duplication using thinly provisioned...