Chandrashekhar Madhukar Vaidya - Sugar Land TX, US Russel Bruce McDonald - Pflugerville TX, US Brett Derek Hawton - Alamo CA, US
Assignee:
BBS Technologies, Inc. - Houston TX
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707679
Abstract:
Some embodiments provide methods and apparatuses for performing a near-instantaneous restore of a database. During operation, the system intercepts a database management system restore request to restore a database from a backup file to a data file, wherein the backup file comprises a first number (e. g. , N) of data pages. Next, in response to intercepting the database management system restore request, the system sends information to the database management system indicating that the backup file comprises a second number (e. g. , N) of data pages, wherein the second number of data pages is less than the first number of data pages (e. g. , N
Methods, Systems And Computer Program Products For Rule Based Delegation Of Administration Powers
Thomas Bernhardt - Spring TX, US Marcus Erickson - Sugar Land TX, US Chandrashekhar Vaidya - Sugar Land TX, US
International Classification:
G06F015/173
US Classification:
709/223000
Abstract:
Systems, methods and computer program products are provided for distributed administration of a network environment having defined administrator authorities. A plurality of rules are defined specifying ones of a plurality of entity objects without administrator authority authorized to invoke administration powers to establish properties of target entity objects. In various embodiments, such rules are based on one or more of the properties of the target ones of the entity. An administrator application identifies one of the rules associated with one of the administration powers for one of the properties to be established and obtains a property of the target entity object designated by the identified rule to determine if the action is authorized. The administrator executes the identified one of the rules to determine if the requesting entity object is authorized to invoke the associated administration power to establish the designated one of the properties of the target entity object and establishes the designated one of the properties of the target entity object if the requesting entity object is so authorized.
System, Method, And Computer Program Product For Creating A Virtual Database
Lon Jones Cherryholmes - Plano TX, US Chandrashekhar M. Vaidya - Sugar Land TX, US Brett Hawton - Alamo CA, US
International Classification:
G06F 17/30
US Classification:
707682, 707E17007
Abstract:
A virtual database is attached to a server database management system (“DBMS”) such that the DBMS believes it needs to recover the database to a last known point of consistency. In order to perform this recovery, the DBMS requests the transaction log file entries to be read from what it believes is the database's transaction log file. However, the requests are intercepted and translated (unbeknownst to the DBMS) instead into requests to read the transaction log portion of the backup file. The DBMS then uses the transaction log records to bring the database to a point of transactional consistency, unaware that the log records are actually being sourced from the transaction log portion of the backup file. All changes made to the data during the recovery phase and later during the execution of any TSQL statements which insert, update, or delete data are routed into a cache file. Accordingly, a “virtual” database is created and used by the server DBMS engine as if it were a real database.