摘要:
A method, system, and apparatus for discovering and connecting to data sources are provided. A system is provided that includes a server computer operative to maintain a centrally managed repository of data connection definitions. A client computer is also provided including an application program capable of consuming data from a data source. When a request is received by the application to connect to a data source, a list of available sources is retrieved from the server computer. If one of the data sources in the list is selected, a data connection file is retrieved and utilized to connect to the data source. If a report is opened by the application that includes a reference to a data source, the repository is utilized to confirm the connection to the data source.
摘要:
A method, system, and apparatus are provided for exposing and utilizing workbooks as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including one or more worksheets. The workbook may be published to a server computer where the contents of the workbook are exposed as a multi-dimensional data source. The server computer allows client applications to discover and connect to the workbook as a multi-dimensional, data source, such as a cube.
摘要:
A method, system, and apparatus are provided for exposing and utilizing workbook ranges as server data sources. The system includes a client computer capable of executing a spreadsheet application program for creating a workbook including a range that includes data objects. The workbook may be published to a server computer where the specified data objects are exposed as server data sources. The server computer allows client applications to discover and connect to the data objects contained within the workbook as server data sources.
摘要:
A system and method for restricting a client's access to sensitive material in a network document. The system includes a document storage component for storing documents having an associated level of access. The system also includes a server component for receiving a document request from a user, associating the document request with the level of access of the requested document, and sending a server request if the level of access is limited. The system further includes a document governor component for receiving the server request, sending a governor request to the document storage component, receiving an unrestricted document from the document storage component, processing the unrestricted document to limit rights according to the level of access, and sending a limited document to the server in order to allow a user accessibility to the restricted document.
摘要:
Third party data embedding may be provided. Data associated with a third party provider may be saved in a native application save file. If a save file opened by the application is determined to comprise third party data, the application may determine whether an appropriate data provider is available. The application may connect to the data provider and provide on-demand, asynchronous access to the third party data upon request from a user.
摘要:
A snapshot of electronic data is generated to provide information about a file at a specific point in time. The snapshot may be shared between several users. The snapshot is generated based on the type of snapshot that is requested. The snapshot types include a static snapshot, a published item snapshot and an interactive snapshot. Each type of snapshot may hide a portion of the file data from requesting users such that sensitive information is not made available to the users. The static snapshot is generated by saving only static data associated with the file. The interactive snapshot is generated by saving static data associated with the file, but any links or references to dynamic file data are maintained. The published item snapshot includes specific file objects and static data associated with the specified objects.
摘要:
Architecture that enables the capability to call user-defined functions (UDFs) within the hosting page, and from within a spreadsheet. UDFs can be used to add functionality to spreadsheet models. Spreadsheet calculations are spread across a backend calculation server and the web browser. Spreadsheet calculation state is maintained as browser functions are calculated. Moreover, the browser UDFs can be executed synchronously or asynchronously. The architecture also provides capability to dynamically register/unregister UDFs at runtime, which can then be called from the spreadsheet model and executed remotely), and the capability to define a manifest that can include all of the UDF definitions, infinite calculation loop situations are also prevented. The UDFs have full access to the page DOM (document object model).
摘要:
Architecture that enables the capability to call user-defined functions (UDFs) within the hosting page, and from within a spreadsheet. UDFs can be used to add functionality to spreadsheet models. Spreadsheet calculations are spread across a backend calculation server and the web browser. Spreadsheet calculation state is maintained as browser functions are calculated. Moreover, the browser UDFs can be executed synchronously or asynchronously. The architecture also provides capability to dynamically register/unregister UDFs at runtime, which can then be called from the spreadsheet model and executed remotely), and the capability to define a manifest that can include all of the UDF definitions, infinite calculation loop situations are also prevented. The UDFs have full access to the page DOM (document object model).
摘要:
Data is obtained from one or more data sources. The data sources may be real time data sources and non-real time data sources. Calculations may be performed on the data before delivering the data to one or more applications. A direct connection may be established between a first computing device and a second computing device. The direct connection may be used to deliver the data. The data may be broadcast to one or more applications. For example, the broadcast may be to a different subnets within one or more networks.