Abstract:
Various examples are directed to systems and methods for managing a database organized according to a schema. The database may comprise a database file corresponding to a table described by the schema. The database file may comprise a first row entry corresponding to a first row of the table. The first row entry may comprise at least one data item. A command may be received. The command may modify a first data item in the first row of the table. An indication of the modified value for the first data item may be written to a change location at the first file. The first entry may be modified to include a pointer to the indication of the modified value for the first data item.
Abstract:
Various examples are directed to systems and methods for managing a database to include data from an external data source. A database engine may receive a request to add a reference column to a database described by a database schema. The request may comprise a location parameter describing a location of the external data source comprising data for populating the reference column and a data identifying parameter describing data at the external data source for populating the reference column. The database engine may modify the database schema to include the reference column, send a query to the external data source to obtain at least one data item for populating the reference column, and populate the reference column with the at least one data item.
Abstract:
A computing system provides a recording, by a processing device, trace data that is generated for one or more graphical user interface (GUI) interactions of a user. The computing system extracts a subset of the trace data from the recorded trace data, the subset of trace data being associated with one or more GUI interactions specifying operations of a development application performed on a work item. The computing system assembles a script in view of the subset of the trace data to duplicate the operations of the development applications specified by the one or more GUI interactions for one or more other work items.
Abstract:
An example method of providing a list of entities includes obtaining a list of entities responsive to a request from a client. Each entity in the list includes a set of attribute name-value pairs. The method also includes recursively dividing the list of entities into subgroups and for each division resulting in a plurality of subgroups including one or more entities, and assigning a subgroup number to each of the corresponding entity's attribute names by which the division is based. The method also includes generating a logical message tree of entities. The method further includes sorting the list of entities based on the order of the entities in the logical message tree and serializing the sorted list of entities into a data stream. The method also includes transmitting a list of subgroup numbers and the entities in the sorted order over a network to the client.
Abstract:
An example method of providing simulated control of a third-party database to a client includes receiving, at a simulation control proxy, a query that selects data from a database table stored in a third-party database. The method also includes submitting, over a network, the query to the third-party database. The method further includes loading a set of database records included in an initial result set of the query. The method also includes determining whether a data storage device includes modification data indicating that the initial result set is stale. The method further includes updating the initial result set in accordance with the modification data if the initial result set is stale. The method also includes sending the updated result set of the query to a client. The updated result set of the query is different from the initial result set of the query.
Abstract:
Methods, systems, and computer program products for processing a query to determine query results. The query may be analyzed to determine a constant column pair corresponding to the query. The column constant pair may be analyzed with respect to a column constant pair associated with a partitioned data set in order to route the query to a subset of the data set. Data sets may be partitioned into subsets by analyzing historical queries to determine a partitioning column constant pair with respect to the data set that is used to partition the data of the data set into subsets. The query processing may include both query routing and data set partitioning.
Abstract:
An example method of processing a query at a plurality of storage devices includes receiving a dual query from a client and generating a synchronous query and an asynchronous query based on the dual query. The dual query includes a set of conditions for selecting data from a set of database tables. The method further includes sending the synchronous query to a first storage device, sending the asynchronous query to a second storage device, and receiving a result set of the synchronous query. The result set of the synchronous query includes data selected from a set of database records in a set of primary database tables, which is stored in the first storage device and is a subset of the set of database tables. The method further includes marking a database record. A marked database record indicates usage of the data selected from the database record within a time period.
Abstract:
A system and method of managing immutable objects includes monitoring new object construction, detecting construction of an object, determining a key for the object, looking the key up in a persistent storage system, when the key is found in the persistent storage system, loading the object from the persistent storage system, and when the key is not found in the persistent storage system constructing the object, determining whether the object is immutable, and storing the object in the persistent storage system when the object is immutable. In some examples, determining whether the object is immutable includes examining each primitive type data member of the object, examining each reference type constructor parameter of the object to determine whether the reference type constructor parameter is defensively copied, examining all function calls used by the object to determine whether the function calls preserve immutability, and recursively examining each reference type data member of the object.
Abstract:
An example method of integrating a plurality of heterogeneous peer-to-peer communication participants includes retrieving from a first input queue coupled to a duplex service a first message. The first message includes a message identifier and is from a sender. The method also includes applying a first operation on the first message, determining a first output of the first message based on the first operation, and sending the first output of the first message to a target. The method further includes retrieving from a second input queue coupled to the duplex service a second message. The second message includes the message identifier and is from a target. The method also includes applying a second operation on the second message, determining a second output of the second message based on the second operation, and sending the second output of the second message to the sender.
Abstract:
A mechanism for managing data operations in an integrated database system. The method includes receiving a request to perform a data operation and retrieving a data set from a primary data source (PDS) in view of the request. The method also includes storing the data set in a temporary data store (TDS). The method further includes performing the data operation on the stored data set in the TDS.