Abstract:
A Dedicated Administrator Connection (DAC) for a database server is provided that allows a user with administrator privileges to connect to the database server when a connection by standard means fails. By allowing an administrator to connect to the server through the DAC, the administrator can resolve the issue despite the failure and bring back the server to a responsive state without requiring the server to be shut down and restarted. Additionally, support engineers, developers, etc. can use the DAC to diagnose a range of problems without the use of a debugger or requesting a repro while monitoring for issues.
Abstract:
Methods and systems for generating and sending an XML document are described. In a specific implementation, methods and systems for responding to an XML client request are described. In the described embodiment, an XML response generator is provided. The XML response generator responds to a client request without having to first build and save a hierarchical tree structure in memory that represents the response. The response generator includes one or more request method objects. There is one object for each particular type of client request that might be received. Each request method object knows and gathers the data that is needed to respond to its particular associated client request. In addition, the request method object knows a particular order that the information must be provided. An emitter object is provided and receives calls from the request method object. The calls include the data that is gathered by the request method object. The calls are made in a particular order and ensure that the hierarchical nature of the response that is being built is preserved. The emitter object translates the data that it receives into response portions that are in proper XML syntactic form. A body object is provided and manages a buffer. The body object receives calls from the emitter object that include the properly-formatted XML response portions. The response portions are placed in the buffer. When a defined buffer threshold is reached, the buffered response portions are sent to the client.
Abstract:
Methods and computer program products for transparently redirecting a request for content such that a client system is unaware of the redirection. A client requests content through a front-end server that provides a single point of access for content stored on one or more back-end servers. The single point of access makes it so the client does not know and does not care which particular back-end server stores the requested content. When a back-end server provides a redirect response for content that the back-end server does not store, the front-end server receives the redirect response and reissues the request to a server identified in the redirect response. A front-end server indicator is added to requests so that the back-end server knows the request is from a front-end server. This allows the back-end server to provide a list of servers in the redirect response without causing errors in clients making direct requests to back-end servers when the clients are unable to process a list of servers contained in a redirect response.
Abstract:
Methods for generating WSDL (“Web Services Description Language”) documents to describe types and function entry points based on database metadata are disclosed. Such a method may include resolving the endpoint metadata by querying based on parameters about the request collected by the HTTP stack. From the endpoint metadata, the list of entry points which have been mapped may be collected. For each entry point, attributes about the entry point may be collected, and metadata for the types of parameters to the entry point may be looked up. A first collection of unique XML schema namespaces may be created, with one entry corresponding to each unique XML schema namespace for any arbitrary user-defined XML Schema definitions required by a parameter to an entry point. A second collection of unique XML schema namespaces may be created, with one entry corresponding to each unique XML schema namespace for an entry point. The wrapper elements for the WSDL document and any global XML schema definitions may be emitted. The first collection of unique XML schema namespaces may be iterated through, and the XML schema definitions may be emitted. The second collection of unique XML schema namespaces may be iterated through. For each entry point in the second collection, the XML schema definition for the entry point may be emitted, including any XML schema definitions for parameters to the entry point. After emitting all of the XML schema definitions, the entry points may be iterated through, and WSDL document definitions for messages, port types, and bindings for each entry point may be emitted. After emitting all of the message definitions, the WSDL document may be completed by emitting service entry definitions for the endpoint.
Abstract:
Systems and methodologies are provided as part of a computing environment that implements an enhanced tabular data stream (TDS) protocol. Such enhanced TDS protocol can mitigate synchronization inconsistencies between client and servers, improve robustness of the data transfer, facilitate password specification as part of login procedures, and reduce administration overhead. Various headers are provided as part of the data stream protocol, and a versioning scheme is established that facilitates proper communication between servers and clients having different release dates and versions of the TDS protocol.
Abstract:
Methods and computer program products for using a front-end server to access content stored on one or more back-end servers. The front-end server receives requests for content from client systems. Back-end servers store the content, but to the client system, it appears as if the front-end server is the content's source. Upon receiving the request, the front-end server checks the validity of the request and examines a global catalog that dynamically maps client system requests to the back-end server or servers that store the requested content. In some circumstances, the content will be stored at a single back-end server and the front-end server directs the request to that server. Alternatively, a list of back-end servers storing the requested content may be generated. If so, the front-end then uses an authentication token as a key to a hash operation that is performed on the list and a single server that is capable of satisfying the request for content is identified. A given request and authentication token always identify the same server if the list of servers available for providing the requested content remains the same. The front-end server provides a single source for content requests so that client systems are not required to alter requests or invalidate local caches when content is moved from one back-end server to another. The front-end server also provides an additional level of security for back-end servers.
Abstract:
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in this document include delegation of duties between the internet server and the WebDAV tool, efficient management of a resource's content-type, support for segregation of a namespace into separate virtual roots, and determinations of whether to invoke certain processing extensions to handle requests for a given HTTP verb.
Abstract:
Methods and systems are described for minimizing increases in memory usage when updating an inheritance tree that follows “first one wins” inheritance semantics for property or “metadata” information. The inheritance tree is updated by writing new files to the inheritance tree, each new file potentially having property information or “metadata” associated therewith. The method examines the ancestral line of each new file that is written to the inheritance tree (and any property value in a global location if necessary) to determine whether existing property values that would be applied to the new file match the property value of the new file. If the existing property value does not match the property value of the new file, the property information is set in the ancestral line of the new file at the level of the new file itself. If the existing property value does match the property value of the new file, then the new file is written to the inheritance tree without writing the property information. Thus, as new files are written to the inheritance tree, the method reduces the amount of property information that needs to be written to the inheritance tree.