会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Usage-optimized tables
    • 使用优化表
    • US08868618B2
    • 2014-10-21
    • US12968124
    • 2010-12-14
    • Naresh SundaramMarcus E. MarkiewiczBrett A. Shirley
    • Naresh SundaramMarcus E. MarkiewiczBrett A. Shirley
    • G06F17/30G06F7/00
    • G06F17/30377
    • Systems and methods are disclosed for employing usage-optimized tables with a computer database system. In one embodiment, the database system stores create, update, and delete database operations in the usage-optimized table. The create, update, and delete database operations remain in the usage-optimized table until a flush condition is reached. When the flush condition is reached, the create, update, and delete operations are transferred to their corresponding real tables. In embodiments, the read operation does not flush the contents of the usage-optimized table to the real table. In such embodiments, the database system modifies read operations to account for data resident on the usage-optimized tables.
    • 公开了采用使用优化表与计算机数据库系统的系统和方法。 在一个实施例中,数据库系统将创建,更新和删除数据库操作存储在使用优化表中。 创建,更新和删除数据库操作将保留在使用优化表中,直到达到冲洗条件。 当达到冲洗条件时,创建,更新和删除操作将传输到其相应的实际表。 在实施例中,读取操作不将使用优化表的内容刷新到真实表。 在这样的实施例中,数据库系统修改读取操作以考虑驻留在使用优化表上的数据。
    • 4. 发明申请
    • USAGE-OPTIMIZED TABLES
    • 使用优化表
    • US20120150917A1
    • 2012-06-14
    • US12968124
    • 2010-12-14
    • Naresh SundaramMarcus E. MarkiewiczBrett A. Shirley
    • Naresh SundaramMarcus E. MarkiewiczBrett A. Shirley
    • G06F17/30
    • G06F17/30377
    • Systems and methods are disclosed for employing usage-optimized tables with a computer database system. In one embodiment, the database system stores create, update, and delete database operations in the usage-optimized table. The create, update, and delete database operations remain in the usage-optimized table until a flush condition is reached. When the flush condition is reached, the create, update, and delete operations are transferred to their corresponding real tables. In embodiments, the read operation does not flush the contents of the usage-optimized table to the real table. In such embodiments, the database system modifies read operations to account for data resident on the usage-optimized tables.
    • 公开了采用使用优化表与计算机数据库系统的系统和方法。 在一个实施例中,数据库系统将创建,更新和删除数据库操作存储在使用优化表中。 创建,更新和删除数据库操作将保留在使用优化表中,直到达到冲洗条件。 当达到冲洗条件时,创建,更新和删除操作将传输到其相应的实际表。 在实施例中,读取操作不将使用优化表的内容刷新到真实表。 在这样的实施例中,数据库系统修改读取操作以考虑驻留在使用优化表上的数据。
    • 5. 发明授权
    • Embedded macros
    • 嵌入式宏
    • US07716637B2
    • 2010-05-11
    • US11303197
    • 2005-12-15
    • Timothy E. GetschMichael Allen BrothertonMarcus E. MarkiewiczAndrew M. Warden
    • Timothy E. GetschMichael Allen BrothertonMarcus E. MarkiewiczAndrew M. Warden
    • G06F9/44
    • G06F9/45512
    • An embedded macro establishes logic for object properties that define actions that execute when an event triggers. When an embedded macro is associated with an event, a regular event property value is set to an empty string and a shadow property associated with the regular event property is created. An application that supports embedded macros recognizes the empty regular property value as an indicator that a macro is embedded in the event. A binary representation of the macro is accessed from the shadow property and is executed when the event associated with the embedded macro triggers. An action safe list identifies trusted embedded macro actions. Embedded macro actions not included on the safe list are not executed such that untrusted actions are blocked from execution.
    • 嵌入式宏为对象属性建立逻辑,定义在事件触发时执行的动作。 当嵌入式宏与事件相关联时,常规事件属性值将设置为空字符串,并创建与常规事件属性关联的阴影属性。 支持嵌入式宏的应用程序将空的常规属性值识别为事件中嵌入宏的指示符。 从shadow属性访问宏的二进制表示,并在与嵌入式宏关联的事件触发时执行。 操作安全列表标识受信任的嵌入式宏操作。 未包含在安全列表中的嵌入式宏操作不会执行,从而阻止不受信任的操作执行。