摘要:
The present disclosure is directed to systems and methods including providing a data structure stored in computer-readable memory at a first location, monitoring a first work surface provided at the first location, determining that a first physical medium has been manipulated on the first work surface, and, in response, generating a first operation based on a manipulation of the first physical medium, applying the first operation to the data structure. Systems and methods can further include receiving operation and object data from a server system, the operation and object data corresponding to a second operation generated in response to manipulation of a second physical medium on a second work surface provided at a second location, applying the second operation to the data structure, processing the object data, and projecting a first virtual medium on the first work surface, the first virtual medium corresponding to the second physical medium.
摘要:
A system, computer-implemented method, and a computer-readable storage medium for a traversal of a property graph, are provided. The edge table of the property graph is divided into a plurality of fragments. A first fragment is selected for traversal using a set of selected vertices, where the traversal identifies a set of edges. Based on the set of edges, a set of adjacent vertices is determined during the traversal. A set of discovered vertices in the property graph is determined based on the set of selected vertices and the set of adjacent vertices.
摘要:
Disclosed herein are system, method, and computer program product embodiments for transforming data from a first version, for example an initial version of a database, to a second version, for example a subsequent version of a database. An embodiment operates by modifying the metadata of the data to include transformational clauses, each of which describes how a portion of the data in the first version is transformed to data required by the second version.
摘要:
System, method, and computer program product embodiments transform data from a first version, for example an initial version of a database, to a second version, for example a subsequent version of a database. An embodiment includes modifying the metadata of the data to include transformational clauses, each of which describes how a portion of the data in the first version is transformed to data in the second version. Another exemplary embodiment includes differentiating between rename and add/delete operations to reduce the amount of transformational clauses included in the metadata. For example, rename operations can be identified by ignoring commonly-named columns between two versions, and identifying columns where the name has changed between the two versions while the data type has not changed.
摘要:
Data replication in a database includes identifying a source database system. The source database includes a main index file and a delta log file. To create a replica, one or more symbolic links to the source database system are generated. The symbolic links identify a path to a physical location of the source database. A replica of the source database is generated based on the symbolic links. The replica includes a copy of the main index file and delta log file. Information associated with the replica and the symbolic links is stored in a recovery log. Replica are provided transparently to most database engine components by re-using partitioning infrastructure. Components “see” replica as tables with a single partition; that partition is a local replica.
摘要:
A system, computer-implemented method, and a computer-readable medium for determining why a query returns a null set in a database management system. When the database management system receives a query graph, database management system compares the query graph to the data graph. Based on the comparison, database management system identifies a discovered component of the query graph and a missing component of the query graph, wherein the missing query component indicates a reason for the null set.
摘要:
Aggregation of an in-memory database includes receiving, by at least one processor having a plurality of threads, input having records stored in random access memory, distributing, by the at least one processor, the input into portions, one of the plurality of threads having an assigned portion, aggregating, by the at least one processor, the records in the assigned portion based on locality of keys in the records and outputting, by the at least one processor, the aggregated records into a global hash table.
摘要:
Disclosed herein are system, method, and computer program product embodiments for the auditable abrogation of columnar in-memory databases. An embodiment operates by retrieving column-oriented data of a column-oriented database associated with an auditing request to access the column-oriented data. The column-oriented data is transformed into corresponding row-oriented data and stored in a row-oriented database independent of the column-oriented database. A response to the auditing request is processed based on the row-oriented data, wherein the processing is performed independent of the column-oriented database, and the response is provided to the auditing request.
摘要:
Database data is unmasked in order to facilitate its efficient handling by a database engine. In response to a request for data of a masked table including a masked element, an engine identifies a mask interval, and then performs a first join with unmasked elements sharing a common key. The table resulting from this first join is then grouped according to a highest level location of the mask. A second join is then performed between the results of this grouping and the mask interval, to produce a corresponding unmasked table including a plurality of unmasked elements corresponding to the masked element. Unmasking according to embodiments may be particularly useful in leveraging processing power of an in-memory database engine, allowing it to efficiently perform batch processing of requests for masked data received from software of an overlying application layer.
摘要:
The present disclosure describes methods, systems, and computer program products for externalizing an enterprise workspace to business applications. One computer-implemented method includes indicating data within an application to be included in a new module, initiating a command to create the new module using the indicated data, transmitting the command to create the new module to an external server, receiving from the external server a list of available enterprise workspaces for adding the new module, selecting at least one available enterprise workspace from the list of available enterprise workspaces, transmitting the selected enterprise workspace to the external server, and receiving a confirmation of the new module creation.