摘要:
A mechanism is described for processing requests to specify operations to database objects. A request to perform an action on a set of multiple objects is received by a database system. The request includes references to each object in the set, each reference indicating a table where the respective object resides. The reference is used to locate the object, and once located, the action is performed on the object. The reference may indicate a table using a unique table id not used in any of a plurality of databases to identify a table. The action request may be to modify the object, the references may include references to objects that reside in different database systems.
摘要:
A method and apparatus for generating references to a set of objects which reside in a plurality databases is described. Each object is associated with a table from a plurality of tables that are contained in the plurality of databases. An object id is associated with each object; the object id uniquely identifies the object relative to the objects in the set of objects. A table id is associated with each table; the table id uniquely identifies the table relative to tables in the plurality of tables. A table containing an object is located based on the table id associated with the table, and the object is located in the table based on the object id associated with the object. A table mapping is generated. The table mapping maps a set of tables to databases associated with the set of tables. The set of tables are from the plurality of tables. References to objects from the set of object are generated. Each reference comprises data that identifies an object. The reference contains data representing the object id of the referenced object, the object referred to by the reference. The reference also contains data representing the table id of the table containing the referenced object. An object is located based on the table mapping and the reference referring to the object. The table containing the object is located based on the data in the reference, the data representing the table id associated with the table containing the object.
摘要:
A method and apparatus for creating a data set with pending results are described. In one embodiment, the method includes receiving a user request to process data and processing the user request to begin creating a final result set with at least one field being identified as a pending result field. The processing, in turn, includes creating a portion of an initial result set containing the pending result field before a final value for the pending result field is determined, and transforming the portion of the initial result set to create a portion of the final result set before a final value for the pending result field is determined. The method further includes continuing processing the user request while the final value remains undetermined, and updating the final result set with the final value of the pending result field once the final value is determined.
摘要:
A method and apparatus for pipelined processing of data are described. In one embodiment, the method includes receiving a user request to process data, obtaining the data from a data storage based on the user request, grouping the set of data to create a hierarchical data, and paginating the hierarchical data to create a paginated result set. The pagination begins before the grouping is completed. The method further includes transferring one or more pages of the paginated result set to a client. The transferring begins before the pagination is completed.
摘要:
Network applications are monitored by defining and detecting activities associated with the applications. Such activities are referred to as “business activities” in the sense that the activities are performed in the process of conducting business using applications. Each business activity of interest is associated with a unique “business signature” which can be used to identify the activity from streams or collections of information. In one embodiment, each business signature of interest to a business is defined as a set of one or more parameter name-value pairs. Once defined, network traffic to and from an application is monitored to detect business signatures, to detect that a corresponding business activity was started. Detecting an activity is based on real-time matching of business signature character patterns within a stream of characters with a repository of character patterns that each represents a business signature defined for the application.