摘要:
Techniques for servicing requests for database services include maintaining at a database server an available set of one or more database session data structures. Each database session data structure holds information to support one session of one or more requests for database services over a communication connection that persists for one or more communications from one client. A database session data structure in the available set is not associated with any client currently connected to the database server. These techniques allow a database server to more efficiently service more numerous requests for database services, such as generated by communications using a stateless protocol like HTTP.
摘要:
Various techniques are provided for facilitating the management of hierarchical data within a relational database system. One such technique involves separating the storage structures used to store data that captures the information about the hierarchy (the “hierarchy structures”), from the storage structures used to store the content of the resources that belong to the hierarchy (the “content structures”). Techniques are also provided for allowing users to customize the metadata attributes associated with resources that belong to the information hierarchy. One technique involves registering XML schemas that specify the metadata attributes desired by a user. Another technique involves storing attributes that do not correspond to any declared field in a “catch-all” column within the resource table. Techniques are provided for determining how to store resources as they are added to the database. According to one technique, the database server searches the data of the resource to find content-type information. If content-type information is found, then the database server consults a content-type to content-structure mapping to determine where to store the content of the resource.
摘要:
A program product is described in which a class library is provided to permit object oriented applications flexibly to access and to manipulate, in accordance with the object model, nontraditional data values of a relational table. Nontraditional datatypes of a relational table include multimedia and large object datatypes. The data is manipulable by virtue of extended data objects that each represent particular cells of a relational table, and that inherit type-specific behaviors from the class library.
摘要:
Performing a search to identify web sites that relate to a search term based on text within the web sites includes receiving at least one search term that then is compared with electronic information within at least one electronic information store to determine whether matches exist. The electronic information within the at least one information store may include text and/or full text displayed by different web pages from different web sites. Results based on the matches that are determined to exist are displayed. The results include at least one website identifier. The search may be performed by a web host having members and may further include automatically scanning and storing the text of a website when the website is accessed by a member of the web host. The stored text may be compared against received search terms.
摘要:
Techniques for supporting access controls on application-specific operations performed by an application include receiving first data at a server distinct from the application. The first data describes a first set of privileges for performing a first set of application-specific operations. Second data is also received at the server. The second data associates a first user of the application with a privilege in the first set of privileges. In response to receiving a request at the server from the application, it is determined whether a particular user may have the application perform a particular application-specific operation based on the first data and the second data. The request indicates the particular user and the particular application-specific operation. A response is sent to the application. The response indicates whether the particular user may have the application perform the particular application-specific operation.
摘要:
A Client/Server Database system is described which includes a Database Server providing methods for executing system-created internal command statements (e.g., SQL statements), such as those which ordinarily are submitted to the server by various Clients. The Database Server is modified so that it can be its own "user," thus removing the fundamental schism which had existed in prior systems. The system is allowed to issue SQL commands to itself and, thus, can do anything that either the system or the user can do. The methodology is particularly useful for carrying out upgrades. The system can now set flags that are not accessible to users. Unlike a standalone "utility" approach, however, authentication is assured. Here, the system is assured that a known user--itself--has issued the command. As a result, it is no longer necessary to expose "dangerous" system functions to users.
摘要:
An attribute is associated with one or more files stored on a storage medium, wherein the attribute is indicative to software utilized by a processor to access the files that the files are deletable. One or more files associated with the attribute can be deleted. Files can be deleted, for example, based upon receipt of a request for file system space. A sufficient amount of free space can be created to fulfill the request via the deletion of the one or more files associated with the attribute. A history of accesses to the files can be maintained and a least recently accessed file, associated with the attribute, can be deleted. Files can also be deleted according to a priority included in the attribute.
摘要:
A system and method is provided for personalizing and refining policies within a general notification platform. The system includes a profile definition and selection system that receives contextual information relating to a user state. The profile definition and selection system generates and/or relays a set of control parameters based at least partially upon the contextual information, and a notification manager selectively sends a user notification and/or communication based upon the set of control parameters. Methods are provided for tuning the notification platform. This may include defining one or more context profiles, assigning values to parameters employed in one or more context profiles, determining a current user context, determining which of the one or more user profiles is consistent with the current user context, and utilizing the parameter value associated with the one or more context profiles consistent with the current user context to adjust the notification system.
摘要:
A method and apparatus for automating the process of confidentially determining whether people feel mutual attraction or have mutual interests and for automating the process of notifying the people involved of such a match in feelings or interests, while allowing anonymity if no mutual attraction or interests exist. A computer system receives inputs from various persons indicating the identities of persons for whom they feel attraction or with whom they share mutual interests. The system collects this information and periodically searches for matches, i.e., for mutual attractions or interests that have been entered into the system. No notification occurs unless the system determines that a match in attraction or interests exists. If a first person's feelings or interests are not mirrored by a second person, the system will not notify either person and only the computer system will be aware of the first person's feelings for the second person.
摘要:
If search result records from a database search have an attribute that at least two of the search result records share, but which was not used in the query, then categories are created to correspond to values of the shared attribute. The categories can be displayed in a user-friendly manner, as can a list of the search result records associated with a selected category.