WebDAV Collections December 10, 1998 Judy Slein

Slides:



Advertisements
Similar presentations
Page 1 of 11 Lessees can submit individual Unit Values for their Production Entities if they do not want to utilize the default unit value. If no Unit.
Advertisements

Interactive Reporting v3.2. Multiple Order By Option Set multiple order by options.
Lesson 3: Advanced Collaboration Unit 2: Advanced Word 2007: Business Communications.
Step-by-Step: Set an Access Password for a Document OPEN the peerreview document from the lesson folder. 1.Click the File tab and then click the Save As.
Copyright © 2008 Pearson Prentice Hall. All rights reserved Copyright © 2008 Prentice-Hall. All rights reserved. Committed to Shaping the Next.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
GT Portal Version 2.0 Data Delivery December 2008.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
Collaboration Diagrams. Example Building Collaboration Diagrams.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
1 Agenda Overview Review Roles Lists Libraries Columns.
Working with SharePoint Document Libraries. What are document libraries? Document libraries are collections of files that you can share with team members.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Copyright  Oracle Corporation, All rights reserved. 5 CMIS Powell Oracle Designer: Design Editor and Building the Database and Table API CMIS.
WWW Distributed Authoring and Versioning (WEBDAV ): An Introduction Jim Whitehead, U.C. Irvine Chair, IETF WEBDAV Working Group.
South Dakota Library Network MetaLib Management Basics Customizing QuickSets South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Updating FireRMS Presented by Dan Cook Implementation Team Lead ZOLL.
WebDAV Issues Munich IETF August 11, Property URL encoding At present, spec. allows encoding of the name of a property so it can be appended to.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Object-Oriented Analysis & Design Subversion. Contents  Configuration management  The repository  Versioning  Tags  Branches  Subversion 2.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
0 eCPIC User Training: Resource Library These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
Microsoft Office 2007 Access Chapter 3 Maintaining a Database.
New & Improved Events List Relationships and Joins Large List Support Field & List Item Validation.
SQL: DDL. SQL Statements DDL - data definition language –Defining and modifying data structures (metadata): database, tables, views, etc. DML - data manipulation.
Chapter 2 Views. Objectives ◦ Create simple and complex views ◦ Creating a view with a check constraint ◦ Retrieve data from views ◦ Data manipulation.
Chapter 9 Constraints. Chapter Objectives  Explain the purpose of constraints in a table  Distinguish among PRIMARY KEY, FOREIGN KEY, UNIQUE, CHECK,
Oracle 11g: SQL Chapter 4 Constraints.
Chapter 4 Constraints Oracle 10g: SQL. Oracle 10g: SQL 2 Objectives Explain the purpose of constraints in a table Distinguish among PRIMARY KEY, FOREIGN.
Evaluating & Maintaining a Site Domain 6. Conduct Technical Tests Dreamweaver provides many tools to assist in finalizing and testing your website for.
General “Search” or “Find” vs “Manage” “Edit” has no second level tab. is always under the “Create” tab “Create” or “Add” – need consistency Clickable.
Microsoft Word 2007 Tracking Changes. Review Tab Select the Review tab from the ribbon to begin Track Changes.
Constraints Lesson 8. Skills Matrix Constraints Domain Integrity: A domain refers to a column in a table. Domain integrity includes data types, rules,
V9 ISIS Upgrade ISIS v9 Transition Demo University of Wisconsin Madison Kathleen Cummings, ISIS Training.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
PestPac Software. Leads The Leads Module allows you to track all of your pending sales for your company from the first contact to the close. By the end.
WaveMaker Visual AJAX Studio 4.0 Training Java Script Events.
Oracle 11g: SQL Chapter 7 User Creation and Management.
XA Advanced Development with Extender and Enterprise Integrator: RPG is so 1980s… Denise Luther Senior Technical Consultant 704.
Chapter 27. Copyright 2003, Paradigm Publishing Inc. CHAPTER 27 BACKNEXTEND 27-2 LINKS TO OBJECTIVES Track and Customize Changes Track and Customize Changes.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Module 5: Managing Content. Overview Publishing Content Executing Reports Creating Cached Instances Creating Snapshots and Report History Creating Subscriptions.
8 Copyright © 2005, Oracle. All rights reserved. Managing Schema Objects.
CDT/1 Creating data tables and Referential Integrity Objective –To learn about the data constraints supported by SQL2 –To be able to relate tables together.
UPLOADING DOCUMENTS IN MURA. Two Options 1.Upload as a “page” in your navigation (preferred)  Easier to find, delete and maintain  Can upload revisions.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED ADMINISTRATION.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Justin Scheitlin Daisey Fahringer
Using E-Business Suite Attachments
To the ETS – Agreement Management Online Training Course
SysML 2.0 Model Lifecycle Management (MLM) Working Group
Microsoft Access 2003 Illustrated Complete
(Includes setup) FAQ ON DOCUMENTS (Includes setup)
Proposal Mechanism.
Configuring Internet-related services
March 17, 1999 Judy Slein WebDAV Collections March 17, 1999 Judy Slein
Mastering Autodesk Revit MEP 2016 CHAPTER 3: Worksets and Worksharing
To the ETS – Agreement Management Online Training Course
WebDAV Collections Breakout Session
WebDAV Design Overview
Versioning and Variant Authoring Requirements
GT Portal v. 2.0 Data Delivery
WebDAV Advanced Collection Requirements
WebDAV Collections Protocol
Presentation transcript:

WebDAV Collections December 10, 1998 Judy Slein

WebDAV Advanced Collections2 Issues n Properties of Direct References n Optional Backpointers n Hiding the Target n Definition of “Weak Reference”

WebDAV Advanced Collections3 Properties of Direct References n Re-Direct header overrides default behavior for any method on a direct reference n Makes direct references behave like redirect references for that request n Makes it possible to access and update the properties of the reference

WebDAV Advanced Collections4 Rationale n Be able to access the properties of the reference –DAV:resourcetype, DAV:reftype, etc. –creator, create date, comment n Be able to modify properties of the reference that were set via headers at creation time –DAV:hidetarget, DAV:refintegrity n For versioning –Specifying different default revisions when accessed from different collections?

WebDAV Advanced Collections5 Optional Backpointers n DAV:references property on a target resource lists all references to it n Read-only property for security reasons

WebDAV Advanced Collections6 Rationale n Scenario: Server declines to delete target because there are references to it. Client must discover the references in order to delete them so that the target can be deleted. n Scenario: Server does not maintain referential integrity. Client wants to be a good citizen by checking for references before deleting a resource. n Scenario: DMS client wants to display a list of all collections that a target belongs to by reference, so that users can navigate to those collections to find related documents or see how the target resource is being used.

WebDAV Advanced Collections7 Proposal: Hiding the Target n Drop this requirement: “When creating a direct reference, it is possible to request that the location of its target be hidden.”

WebDAV Advanced Collections8 Rationale n The constraint really belongs at the target, not at the reference n Added test for the server for every request on a direct reference

WebDAV Advanced Collections9 Proposal: Weak References n Values for Ref-Integrity header are –DAV:weak –DAV:serverdefault n Values for DAV:refintegrity property are –DAV:weak –DAV:serverdefault

WebDAV Advanced Collections10 Rationale: Weak References n Requirement: It is possible when creating a reference to request that the server not enforce referential integrity for that reference –Populate a directory with references before their targets are created –Temporarily remove targets without having to destroy / recreate references to them