摘要:
Aspects of the subject matter described herein relate to stream operators. In aspects, a stream event is received. Based on a timestamp associated with the stream event and the number of stream operators that have asked to be activated prior to or at the timestamp, zero or more stream objects are informed of one or more time events and torn down if no longer needed. In addition, a destination stream operator is instantiated, if needed, data (e.g., the timestamp and packet, if any) corresponding to the stream event is provided to a stream operator, output data, if any, is received from the stream operator, and the stream operator is torn down if it no longer needs state data between invocations.
摘要:
An extensibility framework that allows a user to write user-defined modules that include user-defined operators (UDO) and user-defined aggregators (UDA) in a non-temporal fashion without the need to worry about temporal attributes of events (or event types). The temporal domain is managed on behalf of the user, and allows the user to write operators and aggregates in the temporal data streaming domain as well as to port existing libraries of non-temporal UDOs/UDAs to the temporal data streaming domain. Temporal attributes and event types are managed for non-temporal UDOs/UDAs by the extensibility framework on behalf of the UDO/UDA writer. Windows can be employed to bridge the gap between the non-temporal domains and temporal domains. Support for complex event processing (CEP) is provided in UDOs/UDAs for base classes related to a CEP operator, CEP aggregate, CEP time sensitive operator, and CEP time sensitive aggregate.
摘要:
A system and method for virtual folder sharing, including utilization of static and dynamic lists. Static and dynamic lists may be created as types of virtual folders. Virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlying file system structure on the disk. A static list consists of a folder of items that are in a specific order, while a dynamic list gathers a set of items based on a scope and a set of criteria. When a list is shared, the actual list is left in place on the sharer's machine or server, while permission is granted to the sharee to remotely access the list and the referenced items. If the list is changed by adding or removing items, these items are also automatically re-permissioned to allow or disallow the sharee to have access to the items.
摘要:
A system and method for virtual folder sharing, including utilization of static and dynamic lists. Static and dynamic lists may be created as types of virtual folders. Virtual folders expose regular files and folders to users in different views based on their metadata instead of the actual physical underlying file system structure on the disk. A static list consists of a folder of items that are in a specific order, while a dynamic list gathers a set of items based on a scope and a set of criteria. When a list is shared, the actual list is left in place on the sharer's machine or server, while permission is granted to the sharee to remotely access the list and the referenced items. If the list is changed by adding or removing items, these items are also automatically re-permissioned to allow or disallow the sharee to have access to the items.
摘要:
An improved method and system for client-side caching that transparently caches suitable network files for offline use. A cache mechanism in a network redirector transparently intercepts requests to access server files, and if the requested file is locally cached, satisfies the request from the cache when possible. Otherwise the cache mechanism creates a local cache file and satisfies the request from the server, and also fills in a sparse cached file as reads for data in ranges that are missing in the cached file are requested and received from the server. A background process also fills in local files that are sparse, using the existing handle of already open server files, or opening, reading from and closing other server files. Security is also provided by maintaining security information received from the server for files that are in the cache, and using that security information to determine access to the file when offline.
摘要:
The present invention extends to methods, systems, and computer program products for altering event lifetimes. Embodiments of the invention include using operators in an event-processing framework (algebra) to shorten (or “clip”) the duration of events. An operator can receive a primary event stream, a clip event stream, and condition as parameters. The operator clips the lifetime of an event in the primary stream to the next event in the clip stream that fulfills the condition. Altering event lifetimes can be used to facilitate cleaning event stream state, converting point events to a continuous signal, and creating and annotating session events.
摘要:
A system and method for synchronizing a database having metadata and raw data. Metadata may be fully synchronized between two systems, with copies stored on both systems. Raw data may be selectively synchronized, so that a client system need not store all of the raw data locally. When disconnected, the client system may identify certain portions of the raw data to store locally, and such data may be synchronized when reconnected to a server system.
摘要:
A method and system for providing state-full access to files and resuming access should a connection be broken. A resume key is returned to the client that allows the client to request a duplicate handle to an open file. The duplicate handle can be used to access the file in the same manner as the handle used to open the file. When a connection is broken, the file remains open on the server for a period of time and the state information associated with the file is maintained. Even if a connection is not broken, a client may request one or more duplicate handles and establish other channels (also known as connections) with which to access the file.
摘要:
Rich structured data for items in a file system that allows different kinds of data to be identified by metadata is mapped into a set of search properties for a desktop search service, which is a flat list. This is applicable to any rich structured data that should be mapped into search properties for a desktop search service. Included is an installation mechanism to install these mappings and an execution infrastructure for utilizing the generated SQL from the mappings to extract search properties from items.
摘要:
Rich structured data for items in a file system that allows different kinds of data to be identified by metadata is mapped into a set of search properties for a desktop search service, which is a flat list. This is applicable to any rich structured data that should be mapped into search properties for a desktop search service. Included is an installation mechanism to install these mappings and an execution infrastructure for utilizing the generated SQL from the mappings to extract search properties from items.