摘要:
A method for handling database locks includes detecting a new query from an administrator for a set of database records. Next, it is determined whether the administrator has any chance of being authorized to acquire a new lock. If so, an attempt is made to acquire the new lock and, on the failure to acquire, the administrator is informed that the lock has already been acquired by a prior administrator. Optionally, the new administrator is also provided with identifying information of the prior administrator and contact information for the prior administrator. The new administrator is therefore pre-screened to determine whether there is any chance to acquire a new lock to reduce the chance that an unauthorized new administrator could lock the set of database records. Also, should the new administrator be authorized but not able to access the set of database records due to a prior lock, the new administrator can be informed of the identity and contact information concerning the holder of the prior lock.
摘要:
Systems and techniques to generate pseudo-random numbers in a specified target range. In general, in one implementation, the technique includes an object class definition that defines a constructor method for generating a pseudo-random number generator object that is capable of generating pseudo-random numbers within a specified output range and a method for instructing the pseudo-random number generator object to output a pseudo-random numbers within the specified output range. The pseudo-random number generator may use a specified seed. In that case, generating pseudo-random numbers within a specified output range may generate a reproducible sequence if the same seed is used. The pseudo-random number generator may be defined to generate pseudo-random numbers that are uniformly distributed across the specified output range.
摘要:
Pseudo-random numbers (PRNs) generated by a PRN generator are mapped to predefined number ranges or target ranges. The target range may be smaller or larger than the range of the PRN generator. Mapping to a smaller target range may include generating PRNs (e.g., integers) from a particular bit-input stream (e.g., 32-bit) having a uniform distribution across the range of numbers; selecting an optimal subset of the generated PRNs to map; and mapping the selected PRNs to a corresponding number in a target range such that the mapped numbers are uniformly distributed across the target range. Mapping to a larger target range may include generating uniformly distributed PRNs; applying a generation function to the PRNs to generate uniformly distributed packed numbers; and applying a mapping function to map selected packed numbers to the target range such that the mapped numbers are uniformly distributed.
摘要:
The paint-spraying apparatus exhibits a supply line 7 for coating material, extending from the color changer to the atomizer. Cut-off valves 26, 27 installed in the supply line delimit an insulating section 25 of said supply line, which insulating section is associated with means 28 to 32 for emptying and flushing said insulating section 25. A voltage divider 16 is connected in parallel to said insulating section 25. When colors are changed, the residual coating material present in said voltage divider 16 can be moved into the empty insulating section 25, after which it is forced by means of slugs back through the entire supply line 7 to the color changer 1, and is thus reclaimed.
摘要:
A system, a method, and a computer program product for providing a layered business configuration are disclosed. A configuration information for configuring an application object of a software application is obtained. The configuration information is arranged in at least one configuration staging table. The configuration staging table contains at least one configuration object. The configuration object contained in the configuration staging table is activated. Based on the activated configuration object, at least one configuration runtime table for configuring the application object is generated.
摘要:
A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Visual image processing based on one or more inputs from sensors on the mobile device can be used to compute and efficiently provide the two dimensional projection of the three dimensional model to be presented on the screen of the mobile device. Related methods, systems, articles of manufacture, and the like are described.
摘要:
In an embodiment, the user input and a corresponding user input pattern is received on a computer generated user interface (UI). Based upon the user input pattern, a probable succeeding user input is predicted, and a network repository is queried to determine a system action corresponding to the probable succeeding user input. The system action may be an action that is estimated to be processed based upon the user input. This system action is processed to determine associated metadata, which is persisted in a UI buffer associated with the UI. A correlation between the succeeding user input and the predicted probable succeeding user input is determined; and based upon the correlation the metadata is retrieved from the UI buffer for execution.
摘要:
In privacy restrictions for columnar storage, a query including operations on one or more protected columns is received. The one or more protected columns are specified with one or more access restricting metadata in a columnar table. It is determined whether the received query comprises operations on the one or more protected columns specified with the one or more access restricting metadata. The execution of the query is restricted and a constraint violation is displayed, based on the determination.
摘要:
The subject matter disclosed herein provides methods and apparatus, including computer program products, for proposing training based on the prediction or measurement of different metrics associated with a transport request. In one aspect there is provided a method that may include preparing a transport request including one or more objects configured to provide an update of an application. The transport request may be associated with one or more metrics, each metric having a metric value. The method may also include determining whether the transport request includes at least one error by at least evaluating the metric value for each of the one or more metrics and comparing the metric value for each of the metrics with a threshold value; and proposing, based on the determining, at least one training course when the transport request includes the at least one error. Related systems, apparatus, methods, and/or articles are also described.
摘要:
A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Visual image processing based on one or more inputs from sensors on the mobile device can be used to compute and efficiently provide the two dimensional projection of the three dimensional model to be presented on the screen of the mobile device. Related methods, systems, articles of manufacture, and the like are described.