摘要:
A full-duplex communication channel is established between the server and a user device. A plurality of search results is obtained based on a request received from the user device. The plurality of search results is provided to the user device via the full-duplex communication channel. The user device is caused to display the plurality of search results in a first webview. A selection of a particular search result among the plurality of search results is received from the user device, via the full-duplex communication channel. Content associated with the particular search result is provided to the user device, via the full-duplex communication channel. The user device is caused to display simultaneously the plurality of search results in the first webview and the content in a second webview.
摘要:
The subject invention provides a system and/or a method that facilitates manipulating data associated to a data storage system, wherein the data storage system has at least one of a characteristic and a constraint associated to a data model. The data model can represent the data storage system such that the data storage system is a database-based file system. A data manipulation component can manipulate data associated to the data model and enforces at least one of the constraint and the characteristic to ensure integrity of such system. In addition, an API component can be invoked to provide the manipulation of data within the data storage system.
摘要:
The subject invention provides a system and/or a method that facilitates mapping a data base model to a database object. A type storage system can utilize a storage mapping of a file storage data model. The mapping can describe the database object created based at least in part upon a schema and how instances of the type described in the schema are stored and/or accessed. Furthermore, a query can be provided to find at least one of an item, a document, and/or a contact that satisfy at least one criterion. The type storage system can receive data, wherein the data is at least one of a schema, a data model, a type, a query, and query criteria via an interface to provide the storing and querying. Additionally, the type storage system can generate a view that exposes at least one instance of the type.
摘要:
The subject innovation provides a system and/or a method that facilitates developing schemas for a file storage system. A type definition component can provide a schema grammar, wherein a generator component can employ the schema grammar to build the schema for the file storage system. The schema grammar can describe information types stored in the file storage system that are represented as instances of complex types that are part of a type system that supports inheritance. The schema grammar can support a declaration of an association between types, versioning specifications, and/or content indexing specifications.
摘要:
A device may include a first interface and a second interface. The device may also include memory containing a set of rules and representations of pre-defined violations thereof. The device may also include digital logic programmed to: (i) receive, by way of the first interface, an Ethernet frame containing Ethernet header fields and an Ethernet payload, wherein the Ethernet payload contains a payload; (ii) extract data from the Ethernet header fields, wherein the data defines a transaction that is functionally equivalent to a further transaction that is defined by the payload; (iii) apply the set of rules to the transaction, wherein doing so involves comparing fields in the data to values and concluding that the transaction does not contain any pre-defined violations; and (iv) modify the Ethernet frame to contain content based on the payload, and transmit the Ethernet frame out the second interface.
摘要:
A device may include a first interface and a second interface. The device may also include memory containing a set of rules and representations of pre-defined violations thereof. The device may also include digital logic programmed to: (i) receive, by way of the first interface, an Ethernet frame containing Ethernet header fields and an Ethernet payload, wherein the Ethernet payload contains a payload; (ii) extract data from the Ethernet header fields, wherein the data defines a transaction that is functionally equivalent to a further transaction that is defined by the payload; (iii) apply the set of rules to the transaction, wherein doing so involves comparing fields in the data to values and concluding that the transaction does not contain any pre-defined violations; and (iv) modify the Ethernet frame to contain content based on the payload, and transmit the Ethernet frame out the second interface.
摘要:
A device may include a first interface and a second interface. The device may also include memory containing a set of rules and representations of pre-defined violations thereof. The device may also include digital logic programmed to: (i) receive, by way of the first interface, an Ethernet frame containing Ethernet header fields and an Ethernet payload, wherein the Ethernet payload contains a payload; (ii) extract data from the Ethernet header fields, wherein the data defines a transaction that is functionally equivalent to a further transaction that is defined by the payload; (iii) apply the set of rules to the transaction, wherein doing so involves comparing fields in the data to values and concluding that the transaction does not contain any pre-defined violations; and (iv) modify the Ethernet frame to contain content based on the payload, and transmit the Ethernet frame out the second interface.
摘要:
Methods and systems for performing risk checks on electronic orders for securities. According to one embodiment, the method comprises performing risk checks on an electronic order for a security, the electronic order being issued from a client computer to an exchange computer via a network, wherein a risk check engine is logically interposed between the client computer and the exchange computer on the network. According to the illustrative method, at the risk check engine, the electronic order is received and parsed into one or more fields and data within the fields is identified at a network layer. The risk check engine performs one or more risk checks on the data using a processing element at the network layer. If the risk checks are passed, the risk check engine permits the electronic order to be transmitted to the exchange computer. If one or more of the risk checks are violated, the risk check engine rejects the order.
摘要:
A device may include a first interface and a second interface. The device may also include memory containing a set of rules and representations of pre-defined violations thereof. The device may also include digital logic programmed to: (i) receive, by way of the first interface, an Ethernet frame containing Ethernet header fields and an Ethernet payload, wherein the Ethernet payload contains a payload; (ii) extract data from the Ethernet header fields, wherein the data defines a transaction that is functionally equivalent to a further transaction that is defined by the payload; (iii) apply the set of rules to the transaction, wherein doing so involves comparing fields in the data to values and concluding that the transaction does not contain any pre-defined violations; and (iv) modify the Ethernet frame to contain content based on the payload, and transmit the Ethernet frame out the second interface.
摘要:
Methods and systems for performing risk checks on electronic orders for securities. According to one embodiment, the method comprises performing risk checks on an electronic order for a security, the electronic order being issued from a client computer to an exchange computer via a network, wherein a risk check engine is logically interposed between the client computer and the exchange computer on the network. According to the illustrative method, at the risk check engine, the electronic order is received and parsed into one or more fields and data within the fields is identified at a network layer. The risk check engine performs one or more risk checks on the data using a processing element at the network layer. If the risk checks are passed, the risk check engine permits the electronic order to be transmitted to the exchange computer. If one or more of the risk checks are violated, the risk check engine rejects the order.