摘要:
In a computer-implemented method for generating a response to an aggregate query request on a source database, a random sample of records is extracted from the source database to generate a sample database. Then an aggregate query is performed on the sample database to generate a sample result, and an estimate of the aggregate query request on the source database is derived from the sample result.
摘要:
A method, system, and computer program product for corporate portal security are provided, wherein security information corresponding to an external object imported into the corporate portal is automatically mapped from the object's native security system into the corporate portal system. For each external object imported, the corporate portal maps external users and external groups identified by the native security into corresponding portal users and portal groups according to a predefined mapping process, and stores the results in a manner that associates the external object with those portal users and portal groups. A plurality of database tables and maps determines the outcome of the predefined mapping process. Advantageously, when new external users or groups are added, they are detected by a synchronization agent which then automatically updates the database tables and maps. When custom group security configurations are desired, or when new domains are added, the portal administrator may manipulate a subset of the database tables and maps to achieve the desired configuration. Advantageously, manually intensive operations such as object-by-object security stampings, and/or re-manipulation of individual security settings associated with re-instantiated crawls, are avoided.
摘要:
A page transition system is described herein that allows for fast switching between a master page and one or more detail pages of a website, without substantial recoding of the website. The system includes a software library that handles link click events in the master page and the back button in detail pages. When the user clicks a link in the master page, the content of the master page is hidden and the content of the detail page is displayed in a hypertext markup language (HTML) iframe or similar construct that occupies the entirety of the browser viewport. When the user clicks the back button in the detail page to return to the master page M, the iframe is hidden or destroyed, and the content for the master page is unhidden. Thus, the system provides smooth page transitions that are faster for users and lower in burden on the server.
摘要:
A personalized feed system is described herein that provides feeds that are tailored to the preferences of each user of a real estate website or application. A user signs up to receive a stored profile with the website, and the profile includes information such as what geographical regions the buyer is interested in, what types of homes the buyer is looking for, and so on. The personalized feed system uses this information to provide a feed specific to the buyer that notifies the buyer of listings that are of particular relevance to that buyer. The personalized feed system summarizes other real estate events that are relevant to the user in a single time-oriented feed. Buyers receive information about new and/or modified listings, sales, outstanding offers, status of a transaction, and the like, while sellers receive information about sales, new and/or modified listings, open offers, and so on.
摘要:
A method of analyzing a resource leak on a first web server uses a second web server. A first HTTP request message is received from a client at a first Web server and includes an identifier of an information component stored on the first Web server which generates a reply to the first HTTP request message including the information component, and sends the reply to the client. Multiple duplicate HTTP request messages for the information component are generated at the first Web server in response to the receiving of the first request, for analyzing a resource leak on the first Web server. Each of the duplicate HTTP request messages includes the identifier of the information component. The duplicate HTTP request are transmitted to a second Web server and multiply any existing resource leak, thereby facilitating detection, diagnosis and/or analysis. The transmitting to the second Web server maintains the first Web server free from receiving the multiple HTTP request messages.