摘要:
Systems and methods that track changes in a database via a change tracking layer that enables separation of change tracking and change enumeration. Such an arrangement enables multiple change enumeration and sync technologies over a single change tracking layer, while reducing amount of tracking information that are maintained.
摘要:
An e-mail application program operating on a client stores e-mail records in a hierarchical database. The client is linked to a server that stores e-mail records in a flat database. The e-mail records stored in the hierarchical database are mapped to the e-mail records stored in the flat database and vice versa. The mapped e-mail records are then stored in a mapping table.
摘要:
Methods and systems of searching for text across platforms are usable to guide users to additional content for consumption. Search queries are based on text found within digital content and results are provided to indicate content from multiple different content items that contain the same or similar text. Cross-platform searches provide extensive breadth when a consumer is searching for similar information among a myriad of different sources. Additionally, search filtering may help provide more relevant results and search result weighting may provide prioritized lists of relevant content.
摘要:
Systems and methods that track changes in a database via a change tracking layer that enables separation of change tracking and change enumeration. Such an arrangement enables multiple change enumeration and sync technologies over a single change tracking layer, while reducing amount of tracking information that are maintained.
摘要:
Techniques for transferring printable content from a remote device to an eBook reader include exposing a network printer interface that represents the eBook reader as a physical network printer. The remote device can be configured with a printer driver corresponding to the network printer interface, and a user may print documents from the remote device in order to transfer them to the eBook reader.
摘要:
Disclosed are various systems, methods, and other embodiments for the control of access to a mass storage system. In one example, a plurality of buckets are maintained in mass storage system, each of the buckets being employed to store at least one data file. In a server, a use of the buckets by a plurality of entities that use a plurality of clients is facilitated for the storage of a plurality of files over a public network. The use of one of the buckets by the one of the entities is restricted to a namespace.
摘要:
A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If either were detected a response is provided with a suggested solution.
摘要:
A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If either were detected a response is provided with a suggested solution.
摘要:
A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If either were detected a response is provided with a suggested solution.
摘要:
Disclosed are various systems, methods, and other embodiments for the secure storage of files and the like. In one example, a determination is made in a server as to whether an entity indicated in a request received in the server is authorized to transfer a file from a client to a mass storage system over a network. A plurality of instructions are obtained in the server to send to the client, where the instructions are configured to control activity of the client in transferring the file from the client to the mass storage system over the network. The instructions are sent to the client in order to implement the transfer of the file from the client to the mass storage system.