摘要:
Embodiments define a set of rules such that a type designer can express as part of a type's definition whether the type has extended the logic and/or constraints of its ancestral types in such a way that applications written against that ancestral type will continue to function correctly. Nonconformity can also be indicated and an embodiment can enforce limitations on a set of operations that can be performed on such instances when treated as their ancestral types. Applications can use standard interfaces to discover from embodiments whether such limitations can be in force for a particular instance and provide a user experience that accounts for those limitations. Embodiments can also provide mechanisms to enable type designers to limit a degree of extensibility for both types and/or Items.
摘要:
Embodiments define a set of rules such that a type designer can express as part of a type's definition whether the type has extended the logic and/or constraints of its ancestral types in such a way that applications written against that ancestral type will continue to function correctly. Nonconformity can also be indicated and an embodiment can enforce limitations on a set of operations that can be performed on such instances when treated as their ancestral types. Applications can use standard interfaces to discover from embodiments whether such limitations can be in force for a particular instance and provide a user experience that accounts for those limitations. Embodiments can also provide mechanisms to enable type designers to limit a degree of extensibility for both types and/or Items.
摘要:
The present invention provides technologies including an item management system for the management of compound items and the storage of such items in tabular format using storage systems such as a database management system. Compound items may include file items which may be stored in a file format using storage systems such as a file system. The present invention further provides technologies for locking such compound items upon access by an application to preserve integrity of the items. In particular, the technologies allow for locking compound items including file items where the file items may be accessed via the item management system and/or via an associated file system.
摘要:
The subject invention provides a system and/or a method that facilitates mapping a data base model to a database object. A type storage system can utilize a storage mapping of a file storage data model. The mapping can describe the database object created based at least in part upon a schema and how instances of the type described in the schema are stored and/or accessed. Furthermore, a query can be provided to find at least one of an item, a document, and/or a contact that satisfy at least one criterion. The type storage system can receive data, wherein the data is at least one of a schema, a data model, a type, a query, and query criteria via an interface to provide the storing and querying. Additionally, the type storage system can generate a view that exposes at least one instance of the type.
摘要:
The subject innovation provides a system and/or a method that facilitates developing schemas for a file storage system. A type definition component can provide a schema grammar, wherein a generator component can employ the schema grammar to build the schema for the file storage system. The schema grammar can describe information types stored in the file storage system that are represented as instances of complex types that are part of a type system that supports inheritance. The schema grammar can support a declaration of an association between types, versioning specifications, and/or content indexing specifications.
摘要:
A system and method provide for synchronous operation of linked command objects in a general purpose software application. The software application provides a user with a variety of operations that manipulate available data objects. The software application manages the data objects in a number of contexts. Each context manages the existence and execution of a number of command objects. Each command object operates on one or more data objects in its context. To support synchronous operations that affect the state of data objects in more than one context, command objects are linked to each other. When one command object is executed, the context of the command object identifies a command object linked to the executed command object and initiates the execution of the linked command object via the context that manages that command object. This synchronization allows for synchronous undo and redone operations. The delete states of the command objects are also synchronized. Deleting a command object destroys it, and prevents it from being undone. When one command object is deleted the command object linked thereto is also deleted, thereby preventing the linked command object from being independently undone resulting in an inconsistent state of the contexts.
摘要:
The subject invention provides a system and/or a method that facilitates creating a data structure to provide a proportional data change. The data change is associated to hierarchical data that can represent a database-based file storage system. An interface can receive at least one data change input related to a target within the hierarchical data. In addition, a change definition component can build the data structure to provide a granular update to the target which is proportional to a data change input.
摘要:
Depth-related requests without root-level information or actions according to standard request-response protocols such as HTTP are disclosed. For example, in one embodiment, a method specifies a request, such as a PROPFIND command, for application against a collection, such as a hierarchy of folders. Within a DEPTH header of the request, the method includes a NOROOT token to indicate that root-level information of the collection is unwanted. The request is then output, according to a predetermined transport protocol such as HTTP. In one embodiment, the outputting of the command is also according to a predetermined markup language, such as XML.
摘要:
A system and method provide for synchronous operation of linked command objects in a general purpose software application. The software application provides a user with a variety of operations that manipulate available data objects. The software application manages the data objects in a number of contexts. Each context manages the existence and execution of a number of command objects. Each command object operates on one or more data objects in its context. To support synchronous operations that affect the state of data objects in more than one context, command objects are linked to each other. When one command object is executed, the context of the command object identifies a command object linked to the executed command object and initiates the execution of the linked command object via the context that manages that command object. This synchronization allows for synchronous undo and redone operations. The delete states of the command objects are also synchronized. Deleting a command object destroys it, and prevents it from being undone. When one command object is deleted the command object linked thereto is also deleted, thereby preventing the linked command object from being independently undone resulting in an inconsistent state of the contexts.
摘要:
A data retrieval system includes a gateway server and an access client. The gateway server is communicatively connected to the access client through a network. The gateway server provides a presentation service (PS) and a real-time service (RTS), which cooperate with the access client to retrieve data from a data store and then provide the retrieved data to a user's remote communication device. More particularly, when a user wishes to retrieve data from the data store or to send data to the data store, the user establishes a communication connection between his or her remote communication device and the gateway server, and then requests the desired data from the gateway server. In response, the gateway server sends a command to the access client, instructing it to retrieve the requested data. The access client retrieves the requested data from the data store, and returns the retrieved data to the gateway server. The gateway server then relays the requested information back to the user's remote communication device.