摘要:
A method, system, and computer program product for corporate portal security are provided, wherein security information corresponding to an external object imported into the corporate portal is automatically mapped from the object's native security system into the corporate portal system. For each external object imported, the corporate portal maps external users and external groups identified by the native security into corresponding portal users and portal groups according to a predefined mapping process, and stores the results in a manner that associates the external object with those portal users and portal groups. A plurality of database tables and maps determines the outcome of the predefined mapping process. Advantageously, when new external users or groups are added, they are detected by a synchronization agent which then automatically updates the database tables and maps. When custom group security configurations are desired, or when new domains are added, the portal administrator may manipulate a subset of the database tables and maps to achieve the desired configuration. Advantageously, manually intensive operations such as object-by-object security stampings, and/or re-manipulation of individual security settings associated with re-instantiated crawls, are avoided.
摘要:
Systems, methods, and other embodiments associated with hybrid optimization strategies in automatic SQL tuning are described. One example method includes receiving a first (e.g., cost-based) execution plan for a user structured query language statement (User SQL) from a first (e.g., cost-based) optimizer. The example method may also include receiving a second (e.g., rules-based) execution plan for the User SQL from a second, different (e.g., rules-based) query optimizer. The method may include identifying a preferred execution plan based on data produced by test executing the execution plans in a reproduced execution environment that reproduces at least a portion of an execution environment in which the user SQL runs. The method may also include controlling a database to execute the User SQL using the preferred execution plan.
摘要:
Systems, methods, and other embodiments associated with maintaining referential integrity while masking database columns are described. One example method includes determining a transitive closure for dependency relationships involving a column to be masked and other columns related to the column to be masked through a dependency relationship. The example method may also include identifying a root column for a column in the transitive closure and creating a mapping table that stores original values and masking values for the root column. The method includes masking the root column and related child columns based on the mapping table in a manner that maintains referential integrity between the root column and the child column. Integrity may be maintained by masking corresponding values in the root column and a child column(s) with identical mask values from the mapping table.
摘要:
Systems, methodologies, media, and other embodiments associated with index replication using crawl modification information are described. One exemplary system embodiment includes an enterprise search system comprising a target search system comprising an index logic that uses modified crawl information related to items associated with sources to maintain an index that supports searching of the items; and, a crawl search system comprising a pipeline processor configured to receive modified crawl information related to the items and to propagate the modified crawl information to the target system.
摘要:
Systems, methodologies, media, and other embodiments associated with deploying files are described. One example system embodiment includes a deployment logic configured to automatically prepare one or more files for deployment that are retrievable from a designated location. The deployment logic can also be configured to deploy the one or more files for execution on one or more servers.
摘要:
A charting application generates a so-called timelink chart. To generate the timelink chart, the charting application renders a timeline axis representing a segment of time. The charting application further renders a business event axis in (orthogonal) relation to the timeline axis. Positions on the business event axis indicate respective types of business events that can occur. For each of multiple business events associated with a respective business activity, the charting application generates a corresponding event instance with respect to the business event axis and the timeline axis to indicate a type associated with a respective business event of the multiple business events and when the respective business event occurs in time. In a final step, the charting application generates a graphical link connecting multiple event instances (associated with the respective business activity) in the timelink chart to display a progression of the respective business activity over time.
摘要:
Systems, methods, and other embodiments associated with selectively acquiring and utilizing query statistics are described. One example method includes selectively acquiring statistics associated with search queries submitted to a search process during a sample period. The statistics may be associated with an index and tokens associated with the index and search queries. The method may also include selecting tokens and/or queries to optimize based, at least in part, on the statistics. In one example, whether and/or how the tokens and/or queries are optimized may depend on estimating index fragmentation based, at least in part, on the statistics.
摘要:
Systems, methods, media, and other embodiments associated with ranking documents by providing a search engine with a series of sub-queries generated from an original query are described. One example system includes input logic for receiving a query. The example system may include a relaxation logic configured to produce sub-queries from the query. The sub-queries may describe metadata string matching, content string matching, and/or metadata numerical attribute analysis. The sub-queries may be provided by an output logic to a search engine in an order that facilitates defining document relevance without requiring post-retrieval relevance ranking.
摘要:
Systems, methods, computer-readable media and other embodiments are provided that relate to processing database queries. In one embodiment, a query analysis logic can be configured to analyze a query to identify multiple instances of the same table. Instance numbering for the multiple table instances can then be performed using the query structure such that equivalent queries will likely get the same instance number assignments to improve materialized view recommendations for queries.