US20080270974A1 - Enterprise JavaBeans Metadata Model - Google Patents
Enterprise JavaBeans Metadata Model Download PDFInfo
- Publication number
- US20080270974A1 US20080270974A1 US11/966,849 US96684907A US2008270974A1 US 20080270974 A1 US20080270974 A1 US 20080270974A1 US 96684907 A US96684907 A US 96684907A US 2008270974 A1 US2008270974 A1 US 2008270974A1
- Authority
- US
- United States
- Prior art keywords
- metadata
- model
- java
- machine
- extracted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/143—Termination or inactivation of sessions, e.g. event-controlled end of session
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Definitions
- the invention relates generally to enterprise applications, and, more specifically, to processing metadata in enterprise applications.
- Application servers are platforms that host and provide services to applications. Application servers manage the life cycles of applications and take care that the logic implemented in applications is accessible to clients in a centralized fashion.
- Application servers based on the JavaTM Platform, Enterprise Edition 5 (hereinafter “Java EE”) host and provide services to Java enterprise applications (also referred to as “Java EE applications”). Such applications are written in the Java language and conform to a set of specifications so that they can run on a Java application server.
- Application server vendors develop application servers in accordance with the rules and requirements set forth in the Java EE 5 specification.
- a Java EE application has application code and configuration information packed into an Enterprise Application Archive (hereinafter “EAR”).
- EAR Enterprise Application Archive
- the EAR contains one or more modules of a specific type, for example, web modules, web services modules, Enterprise JavaBeans (hereinafter “EJB”) modules, and deployment descriptors.
- Each of these modules is an archive of the respective type.
- application source code written in the Java language
- application configuration information written in eXtensible Markup Language (hereinafter “XML”) format, placed in deployment descriptor files.
- Java EE 5 provides a number of new features as compared to previous versions of the platform. For example, Java EE 5 provides a new way to specify application configuration information, in addition to deployment descriptor files. Java EE 5 supports configuration information supplied with annotations. Annotations are metadata written directly into source code and read by the application server at deploy time and at runtime. Each enterprise technology specification supports a set of annotations that can be used to configure and influence the behavior of the respective application type. For example, the EJB 3.0 specification supports annotations that denote source code as a bean of a specific type, such as session bean or a message-driven bean, and so on. All the metadata that can be supplied with annotations can also be supplied with deployment descriptors.
- EJB When an EJB application is deployed on an application server, the server has to process application source code and both sources of metadata so that a fully functional application is available on the server for clients to use.
- the EJB specification prescribes what an EJB container on a Java EE application server should support and what rules it should observe when processing application source code and application metadata.
- the specification does not prescribe how such requirements should be implemented by application server vendors. It is up to the application server vendor to decide how to implement all the requirements set forth in the specification so that the application server complies with the specification.
- a system and method to process metadata in an enterprise application is described.
- the system extracts metadata from a number of sources and combines input into a unified model of all metadata supplied with the application.
- FIG. 2 is a block diagram of an enterprise application.
- FIG. 2 is a block diagram of an Enterprise Java Beans application.
- FIG. 3 is a flowchart of a process performed by an embodiment of the invention.
- FIG. 4 is a block diagram of a system implemented according to an embodiment of the invention.
- FIG. 5 is a block diagram of a system implemented according to another embodiment of the invention.
- Java EE application servers run Java EE applications.
- Each enterprise application has different modules that pack source code and metadata for specific components, as shown on FIG. 1 .
- the enterprise application 100 has deployment descriptors 105 that specify metadata pertaining to the whole enterprise application; it also has an EJB module 110 , a web module 120 , and an application client module 130 .
- the EJB module 110 represents an EJB application.
- EJB applications run on an EJB container.
- each EJB application 200 has bean classes 210 , interfaces 220 , and a deployment descriptor 230 . With version 3.0 of the EJB specification, metadata can be placed both in the deployment descriptor and in bean classes 210 and interfaces 220 .
- an EJB container must provide a mechanism to obtain and interpret the metadata from both sources. Because annotations and deployment descriptors provide the same functionality, some entries may be duplicated in both sources. Consequently, the EJB container must also provide a mechanism to evaluate metadata and decide which source takes preference so that no conflicts exist in the application logic.
- the EJB specification specifies only that the EJB container should be able to treat the logical semantic of metadata correctly to correctly set up the runtime environment for the EJB application. It is up to the application server vendor to define the way in which the EJB container should obtain the metadata and represent it to the running application.
- the EJB container provides a mechanism to read and combine metadata as described in FIG. 3 .
- the EJB container first parses program code 305 in the application in order to identify metadata in the program code 310 .
- program code is understood to mean both source code as written by an application developer and bytecode as compiled source code.
- the metadata is extracted 315 and a Java model of the metadata is built 320 .
- all annotations are extracted from the program code are represented in Java in the model.
- the deployment descriptor is parsed 325 and the metadata in it is identified 330 .
- the metadata is extracted 335 and a second Java model is built 340 from the metadata in the deployment descriptor.
- Annotations and the deployment descriptor are written in their own formats.
- the EJB container In order for the EJB container to evaluate them consistently and efficiently, it represents them in Java and creates a Java model of the metadata from each source accordingly.
- the EJB container accesses a core metadata model.
- the core metadata model has Java representations of all metadata supported by the EJB specification.
- the EJB container accesses the core metadata model and maps each extracted metadata to an instance of a class from the core metadata model. Thus, once iterates over the complete collection of extracted metadata it has mapped each piece of data to an instance of a Java class representing it.
- the system proceeds to merge them so that a unified model of the metadata in the application logic is constructed.
- the system uses a set of rules in order to compare the models and evaluate each duplicate entry.
- the set of rules specifies how entries from each source should be treated and when entries from one source should take precedence over the other. For example, generally metadata from the deployment descriptor takes precedence over the metadata obtained from annotations.
- an EJB container implements a system of elements as outlined in FIG. 4 .
- Each source of metadata has a dedicated builder to build the Java model from that source.
- the program code 410 is read by the builder 430 .
- the builder 430 extracts metadata from the program code and maps it to metadata classes from the core metadata model 490 .
- the builder 430 constructs the first Java model 450 .
- the builder 440 reads the deployment descriptor 420 and maps it to metadata classes from the core metadata model 490 .
- the builder 440 constructs the second Java model 460 .
- the first Java model 450 and the second Java model 460 are supplied to the merger 470 .
- the merger 470 compares the models and combines them into a unified model 480 .
- each element in the model is assigned a unique key.
- Element keys can also be used for logging purposes. For example, if an event needs to be logged it can be traced to the element that produced it and logged as produced by that element.
- events can be traced back not only to the application but to pieces of logic in the application that invoked the events in question, such as specific classes or methods.
- the business logic to analyze metadata is packaged in an external library and thus integrated in different environments as a standalone module.
- an external library can be integrated in a development environment and used to analyze source code at development time.
- Such an implementation is very valuable because usually, in order to test applications, application developers must package their applications and deploy them on an application server. With the possibility to test applications as they are written, the application developers can save time and resources.
- a system is implemented to obtain and process metadata.
- the input module 510 obtains the source to be analyzed, the parsing module 520 parses the source code and identifies the metadata therein.
- the system has a number of different builders, such as builder 1 540 and builder 2 550 that can read metadata from dedicated sources. In the event that metadata is supplied by new sources the system is extended to accommodate new builders to deal with alternative sources of input.
- the system also logs results from the operation via a logging module 530 to a permanent store 580 for later retrieval.
- Embodiments of the invention can easily be applied to any type of enterprise application such as a web application, a web services application, and so on.
- Elements of embodiments may also be provided as a machine-readable medium for storing the machine-executable instructions.
- the machine-readable medium may include, but is not limited to, flash memory, optical disks, CD-ROMs, DVD ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cares, propagation media or other type of machine-readable media suitable for storing electronic instructions.
- embodiments of the invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
Abstract
A method and system to construct Java representations of metadata in an enterprise application. The system extracts metadata from application source code and deployment descriptors to construct a single output available to the application.
Description
- The invention relates generally to enterprise applications, and, more specifically, to processing metadata in enterprise applications.
- Application servers are platforms that host and provide services to applications. Application servers manage the life cycles of applications and take care that the logic implemented in applications is accessible to clients in a centralized fashion. Application servers based on the Java™ Platform, Enterprise Edition 5 (hereinafter “Java EE”) host and provide services to Java enterprise applications (also referred to as “Java EE applications”). Such applications are written in the Java language and conform to a set of specifications so that they can run on a Java application server. Application server vendors develop application servers in accordance with the rules and requirements set forth in the Java EE 5 specification. A Java EE application has application code and configuration information packed into an Enterprise Application Archive (hereinafter “EAR”). The EAR contains one or more modules of a specific type, for example, web modules, web services modules, Enterprise JavaBeans (hereinafter “EJB”) modules, and deployment descriptors. Each of these modules is an archive of the respective type. In each of these archives, there is application source code written in the Java language and application configuration information written in eXtensible Markup Language (hereinafter “XML”) format, placed in deployment descriptor files.
- Java EE 5 provides a number of new features as compared to previous versions of the platform. For example, Java EE 5 provides a new way to specify application configuration information, in addition to deployment descriptor files. Java EE 5 supports configuration information supplied with annotations. Annotations are metadata written directly into source code and read by the application server at deploy time and at runtime. Each enterprise technology specification supports a set of annotations that can be used to configure and influence the behavior of the respective application type. For example, the EJB 3.0 specification supports annotations that denote source code as a bean of a specific type, such as session bean or a message-driven bean, and so on. All the metadata that can be supplied with annotations can also be supplied with deployment descriptors.
- When an EJB application is deployed on an application server, the server has to process application source code and both sources of metadata so that a fully functional application is available on the server for clients to use. The EJB specification prescribes what an EJB container on a Java EE application server should support and what rules it should observe when processing application source code and application metadata. However, the specification does not prescribe how such requirements should be implemented by application server vendors. It is up to the application server vendor to decide how to implement all the requirements set forth in the specification so that the application server complies with the specification.
- A system and method to process metadata in an enterprise application is described. The system extracts metadata from a number of sources and combines input into a unified model of all metadata supplied with the application.
- The invention is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean at least one.
-
FIG. 2 is a block diagram of an enterprise application. -
FIG. 2 is a block diagram of an Enterprise Java Beans application. -
FIG. 3 is a flowchart of a process performed by an embodiment of the invention. -
FIG. 4 is a block diagram of a system implemented according to an embodiment of the invention. -
FIG. 5 is a block diagram of a system implemented according to another embodiment of the invention. - Descriptions of certain details and implementations follow, including a description of the figures, which may depict some or all of the embodiments described below, as well as discussing other potential embodiments or implementations of the inventive concepts described herein.
- Java EE application servers run Java EE applications. Each enterprise application has different modules that pack source code and metadata for specific components, as shown on
FIG. 1 . For example, theenterprise application 100 hasdeployment descriptors 105 that specify metadata pertaining to the whole enterprise application; it also has anEJB module 110, aweb module 120, and anapplication client module 130. The EJBmodule 110 represents an EJB application. EJB applications run on an EJB container. Referring toFIG. 2 , each EJBapplication 200 hasbean classes 210,interfaces 220, and adeployment descriptor 230. With version 3.0 of the EJB specification, metadata can be placed both in the deployment descriptor and inbean classes 210 andinterfaces 220. From an application developer point of view, all configuration information that can be supplied with annotations can also be supplied in a deployment descriptor. As such, an EJB container must provide a mechanism to obtain and interpret the metadata from both sources. Because annotations and deployment descriptors provide the same functionality, some entries may be duplicated in both sources. Consequently, the EJB container must also provide a mechanism to evaluate metadata and decide which source takes preference so that no conflicts exist in the application logic. The EJB specification specifies only that the EJB container should be able to treat the logical semantic of metadata correctly to correctly set up the runtime environment for the EJB application. It is up to the application server vendor to define the way in which the EJB container should obtain the metadata and represent it to the running application. - In an embodiment of the invention, the EJB container provides a mechanism to read and combine metadata as described in
FIG. 3 . Referring toFIG. 3 , when an EJB application is deployed, the EJB container first parsesprogram code 305 in the application in order to identify metadata in theprogram code 310. As described herein, program code is understood to mean both source code as written by an application developer and bytecode as compiled source code. Then the metadata is extracted 315 and a Java model of the metadata is built 320. Thus, all annotations are extracted from the program code are represented in Java in the model. Then, the deployment descriptor is parsed 325 and the metadata in it is identified 330. The metadata is extracted 335 and a second Java model is built 340 from the metadata in the deployment descriptor. - Annotations and the deployment descriptor are written in their own formats. In order for the EJB container to evaluate them consistently and efficiently, it represents them in Java and creates a Java model of the metadata from each source accordingly. To create each model, the EJB container accesses a core metadata model. The core metadata model has Java representations of all metadata supported by the EJB specification. To build the first Java model and the second Java model, the EJB container accesses the core metadata model and maps each extracted metadata to an instance of a class from the core metadata model. Thus, once it iterates over the complete collection of extracted metadata it has mapped each piece of data to an instance of a Java class representing it. With the two models ready, the system proceeds to merge them so that a unified model of the metadata in the application logic is constructed. To merge the models, the system uses a set of rules in order to compare the models and evaluate each duplicate entry. The set of rules specifies how entries from each source should be treated and when entries from one source should take precedence over the other. For example, generally metadata from the deployment descriptor takes precedence over the metadata obtained from annotations.
- To combine metadata in a unified Java model, an EJB container according to the embodiment of the invention implements a system of elements as outlined in
FIG. 4 . Each source of metadata has a dedicated builder to build the Java model from that source. Referring toFIG. 4 , theprogram code 410 is read by thebuilder 430. Thebuilder 430 extracts metadata from the program code and maps it to metadata classes from thecore metadata model 490. Thus thebuilder 430 constructs thefirst Java model 450. Similarly, thebuilder 440 reads thedeployment descriptor 420 and maps it to metadata classes from thecore metadata model 490. Thus thebuilder 440 constructs thesecond Java model 460. Then thefirst Java model 450 and thesecond Java model 460 are supplied to themerger 470. Themerger 470 compares the models and combines them into aunified model 480. - Once the unified model is constructed, each element in the model is assigned a unique key. Thus the unified model is navigable as each element can be traced via its key. Element keys can also be used for logging purposes. For example, if an event needs to be logged it can be traced to the element that produced it and logged as produced by that element. When application behavior is analyzed, events can be traced back not only to the application but to pieces of logic in the application that invoked the events in question, such as specific classes or methods.
- In another embodiment of the invention, the business logic to analyze metadata is packaged in an external library and thus integrated in different environments as a standalone module. For example, an external library can be integrated in a development environment and used to analyze source code at development time. Such an implementation is very valuable because usually, in order to test applications, application developers must package their applications and deploy them on an application server. With the possibility to test applications as they are written, the application developers can save time and resources. Referring to
FIG. 5 , a system is implemented to obtain and process metadata. Theinput module 510 obtains the source to be analyzed, theparsing module 520 parses the source code and identifies the metadata therein. The system has a number of different builders, such asbuilder1 540 andbuilder2 550 that can read metadata from dedicated sources. In the event that metadata is supplied by new sources the system is extended to accommodate new builders to deal with alternative sources of input. The system also logs results from the operation via alogging module 530 to apermanent store 580 for later retrieval. - With the advent of Java EE 5, all types of enterprise applications support annotations and thus are faced with the problem of combining metadata from different sources. As such, the embodiments of the invention are not limited to EJB applications only, as described above. Embodiments of the invention can easily be applied to any type of enterprise application such as a web application, a web services application, and so on.
- Elements of embodiments may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, flash memory, optical disks, CD-ROMs, DVD ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cares, propagation media or other type of machine-readable media suitable for storing electronic instructions. For example, embodiments of the invention may be downloaded as a computer program which may be transferred from a remote computer (e.g., a server) to a requesting computer (e.g., a client) by way of data signals embodied in a carrier wave or other propagation medium via a communication link (e.g., a modem or network connection).
- It should be appreciated that reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Therefore, it is emphasized and should be appreciated that two or more references to “an embodiment” or “one embodiment” or “an alternative embodiment” in various portions of this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined as suitable in one or more embodiments of the invention.
- In the foregoing specification, the invention has been described with reference to the specific embodiments thereof. It will, however, be evident that various modifications and changes can be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.
Claims (22)
1. A method of generating a unified metadata model for a java enterprise application comprising:
extracting metadata from program code;
building a first java model of the metadata extracted from the program code;
extracting metadata from a deployment descriptor;
building a second java model of the metadata extracted from the deployment descriptor; and
merging the first and second models.
2. The method of claim 1 , wherein program code comprises java source code and bytecode.
3. The method of claim 1 , wherein extracting metadata from program code comprises:
parsing the program code; and
identifying metadata in the program code.
4. The method of claim 1 , wherein building the first java model from the metadata extracted from the program code comprises:
accessing a model comprising java classes representing metadata in java code;
identifying an instance of a class from the model that represents the extracted metadata; and
mapping the extracted metadata to the identified instance of the class.
5. The method of claim 1 , wherein extracting metadata from a deployment descriptor comprises:
parsing the deployment descriptor; and
identifying metadata in the deployment descriptor.
6. The method of claim 1 , wherein building the second java model from the metadata extracted from the deployment descriptor comprises:
accessing a model comprising java classes representing metadata in java code;
identifying an instance of a class from the model that represents the extracted metadata; and
mapping the extracted metadata to the identified instance of the class.
7. The method of claim 1 , wherein merging comprises:
parsing the first metadata model;
parsing the second metadata model;
combining the first and second models in a unified model using a set of rules;
constructing a logical graph of the unified model; and
assigning each element in the unified model a unique identifier representing the absolute path to the model element in the graph.
8. The method of claim 7 , wherein combining the first model and the second model into a unified model comprises applying the set of rules so that no conflicts exist in the application logic.
9. An apparatus comprising:
a core metadata model to maintain java representations of metadata objects;
a first builder to construct a java model of metadata in program code using the core metadata model responsive to receiving the program code;
a second builder to construct a java model of metadata in a deployment descriptor using the core metadata model responsive to receiving the deployment descriptor; and
a merger to receive the models from the first and second builder and unite the first model and the second model.
10. The apparatus of claim 9 , wherein each of the builders maps metadata objects to instances of classes from the core metadata model.
11. The apparatus of claim 9 , wherein the merger merges the models against a set of rules.
12. A system to run Enterprise Java Beans (EJB) applications, the system comprising:
an input module to receive an EJB application;
a parsing module to parse the metadata in the EJB application; and
a set of builder modules to build Java models of the metadata in the EJB application;
a permanent store to store processed EJB applications; and
a network infrastructure to connect the permanent store to the container.
13. The system of claim 12 , further comprising a logging module to log events produced by the EJB application.
14. The system of claim 12 , wherein the set of builder modules comprises:
a first builder module to build a first Java model of metadata from Java source code; and
a second builder module to build a second Java model of metadata from a deployment descriptor.
15. A machine readable medium having instructions therein that when executed by the machine, cause the machine to:
extract metadata from program code;
build a first java model of the metadata extracted from the program code;
extract metadata from a deployment descriptor;
build a second java model of the metadata extracted from the deployment descriptor; and
merge the first and second models.
16. The machine readable medium of claim 15 , wherein program code comprises java source code and bytecode.
17. The machine readable medium of claim 15 , wherein instructions causing the machine to extract metadata from program code, cause the machine to:
parse the program code; and
identify metadata in the program code.
18. The machine readable medium of claim 15 , wherein instructions causing the machine to build the java model from the metadata extracted from the program code, cause the machine to:
access a model comprising java classes representing metadata in java code;
identify an instance of a class from the model that represents the extracted metadata; and
map the extracted metadata to the identified instance of the class.
19. The machine readable medium of claim 15 , wherein instructions causing the machine to extract metadata from a deployment descriptor, cause the machine to:
parse the deployment descriptor; and
identify metadata in the deployment descriptor.
20. The machine readable medium of claim 15 , wherein instructions causing the machine to build the java model from the metadata extracted from the deployment descriptor, cause the machine to:
access a model comprising java classes representing metadata in java code;
identify an instance of a class from the model that represents the extracted metadata; and
map the extracted metadata to the identified instance of the class.
21. The machine readable medium of claim 15 , wherein instructions causing the machine to merge, cause the machine to:
parse the first metadata model;
parse the second metadata model;
compare the first metadata model to the second metadata model using a set of rules;
combine the first and second models in a unified model;
construct a logical graph of the unified model; and
assign each element in the unified model a unique identifier representing the absolute path to the model element in the graph.
22. The machine readable medium of claim 21 , wherein instructions causing the machine to combine the first model and the second model into a unified model, cause the machine to apply the set of rules so that no conflicts exist in the application logic.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/966,849 US20080270974A1 (en) | 2007-04-30 | 2007-12-28 | Enterprise JavaBeans Metadata Model |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US92698907P | 2007-04-30 | 2007-04-30 | |
US11/966,849 US20080270974A1 (en) | 2007-04-30 | 2007-12-28 | Enterprise JavaBeans Metadata Model |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080270974A1 true US20080270974A1 (en) | 2008-10-30 |
Family
ID=39888336
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/966,849 Abandoned US20080270974A1 (en) | 2007-04-30 | 2007-12-28 | Enterprise JavaBeans Metadata Model |
US12/022,429 Active 2030-11-20 US8261272B2 (en) | 2007-04-30 | 2008-01-30 | Method and system for multithreaded request dispatching |
US12/029,677 Active 2031-07-14 US9065843B2 (en) | 2007-04-30 | 2008-02-12 | Method, system and article of manufacture for providing connections and connection aliases descriptors by services and libraries archives |
US12/111,127 Abandoned US20080270986A1 (en) | 2007-04-30 | 2008-04-28 | System and method for enterprise javabeans container |
US12/113,025 Active 2029-07-31 US7962612B2 (en) | 2007-04-30 | 2008-04-30 | Method for connection leak detection and prevention |
US12/112,888 Active 2031-06-04 US8510717B2 (en) | 2007-04-30 | 2008-04-30 | Method and system for testing application modules using static tests from a test suite |
US12/112,881 Active 2030-02-08 US8082508B2 (en) | 2007-04-30 | 2008-04-30 | Method and system for obtaining and modifying portlets via an application programming interface |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/022,429 Active 2030-11-20 US8261272B2 (en) | 2007-04-30 | 2008-01-30 | Method and system for multithreaded request dispatching |
US12/029,677 Active 2031-07-14 US9065843B2 (en) | 2007-04-30 | 2008-02-12 | Method, system and article of manufacture for providing connections and connection aliases descriptors by services and libraries archives |
US12/111,127 Abandoned US20080270986A1 (en) | 2007-04-30 | 2008-04-28 | System and method for enterprise javabeans container |
US12/113,025 Active 2029-07-31 US7962612B2 (en) | 2007-04-30 | 2008-04-30 | Method for connection leak detection and prevention |
US12/112,888 Active 2031-06-04 US8510717B2 (en) | 2007-04-30 | 2008-04-30 | Method and system for testing application modules using static tests from a test suite |
US12/112,881 Active 2030-02-08 US8082508B2 (en) | 2007-04-30 | 2008-04-30 | Method and system for obtaining and modifying portlets via an application programming interface |
Country Status (1)
Country | Link |
---|---|
US (7) | US20080270974A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110161930A1 (en) * | 2009-12-31 | 2011-06-30 | International Business Machines Corporation | Melding of mediation flow service component architecture (sca) components |
US20110246294A1 (en) * | 2010-03-30 | 2011-10-06 | Beet, Inc. | System and method for content management and distribution |
US20130019224A1 (en) * | 2011-07-11 | 2013-01-17 | Honeywell International Inc. | Systems and methods for verifying model equivalence |
US8539439B2 (en) * | 2011-10-13 | 2013-09-17 | Microsoft Corporation | Asynchronous programming model mapping |
US8856745B2 (en) | 2012-08-01 | 2014-10-07 | Oracle International Corporation | System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard |
US9916155B2 (en) * | 2015-12-01 | 2018-03-13 | International Business Machines Corporation | Projects browser for development environments |
US10318276B2 (en) | 2012-11-26 | 2019-06-11 | International Business Machines Corporation | Optimized installation of received patches for application programs already running on computer systems |
US11100009B2 (en) | 2020-01-03 | 2021-08-24 | Bank Of America Corporation | Intelligent detection and ejection of unused application components |
US11314503B2 (en) * | 2020-06-08 | 2022-04-26 | Bank Of America Corporation | Software development documentation using machine learning |
US11693641B1 (en) * | 2022-03-22 | 2023-07-04 | Accenture Global Solutions Limited | Machine learning (ML) powered programming code transformations |
US11768759B2 (en) | 2020-09-29 | 2023-09-26 | Tata Consultancy Services Limited | Method and system for automated testing of web service APIs |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7930704B2 (en) | 2002-02-06 | 2011-04-19 | Oracle International Corporation | J2EE component extension architecture |
US7698434B2 (en) * | 2002-08-29 | 2010-04-13 | Bea Systems, Inc. | J2EE connector architecture |
US7730478B2 (en) | 2006-10-04 | 2010-06-01 | Salesforce.Com, Inc. | Method and system for allowing access to developed applications via a multi-tenant on-demand database service |
US20080270974A1 (en) * | 2007-04-30 | 2008-10-30 | Krasimir Topchiyski | Enterprise JavaBeans Metadata Model |
US8191002B2 (en) | 2007-10-15 | 2012-05-29 | International Business Machines Corporation | Summarizing portlet usage in a portal page |
US7904818B2 (en) * | 2007-10-15 | 2011-03-08 | International Business Machines Corporation | Summarizing portlet usage captured responsive to trigger events in a portal page |
US7984456B2 (en) * | 2007-11-23 | 2011-07-19 | Ketera Technologies Inc. | Interceptor framework using java dynamic proxies |
US8527965B2 (en) * | 2008-04-14 | 2013-09-03 | Oracle America, Inc. | Layered static program analysis framework for software testing |
US20100017385A1 (en) | 2008-07-16 | 2010-01-21 | International Business Machines | Creating and managing reference elements of deployable web archive files |
CN101686245B (en) * | 2008-09-28 | 2014-06-11 | 国际商业机器公司 | Method and system for isolating hypertext transfer protocol session |
US20100131710A1 (en) * | 2008-11-24 | 2010-05-27 | Sap Portals Israel Ltd | Method and apparatus for sharing content between portals |
US8479161B2 (en) * | 2009-03-18 | 2013-07-02 | Oracle International Corporation | System and method for performing software due diligence using a binary scan engine and parallel pattern matching |
US8949421B2 (en) * | 2009-07-29 | 2015-02-03 | Teradata Us, Inc. | Techniques for discovering database connectivity leaks |
US8495048B2 (en) * | 2009-08-26 | 2013-07-23 | International Business Machines | Applying user-generated deployment events to a grouping of deployable portlets |
US8782676B2 (en) * | 2009-09-30 | 2014-07-15 | Sap Ag | System and method for communication between portal applications and portlet containers |
US8527992B2 (en) * | 2009-09-30 | 2013-09-03 | Sap Ag | HTTP request preservation |
US8078922B2 (en) * | 2009-09-30 | 2011-12-13 | Sap Ag | Internal server error analysis |
US20110106835A1 (en) * | 2009-10-29 | 2011-05-05 | International Business Machines Corporation | User-Defined Profile Tags, Rules, and Recommendations for Portal |
US8707263B2 (en) * | 2010-04-19 | 2014-04-22 | Microsoft Corporation | Using a DSL for calling APIS to test software |
US9374437B2 (en) * | 2010-12-30 | 2016-06-21 | Sap Se | Schema validation proxy |
US10678602B2 (en) * | 2011-02-09 | 2020-06-09 | Cisco Technology, Inc. | Apparatus, systems and methods for dynamic adaptive metrics based application deployment on distributed infrastructures |
AU2012203333A1 (en) | 2011-06-15 | 2013-01-10 | Agile Software Pty Limited | Method and apparatus for testing data warehouses |
US8903702B2 (en) | 2011-08-31 | 2014-12-02 | International Business Machines Corporation | Generating specifications for expression language expressions and tag libraries |
US8949774B2 (en) | 2011-09-06 | 2015-02-03 | Microsoft Corporation | Generated object model for test automation |
WO2013042617A1 (en) * | 2011-09-19 | 2013-03-28 | 日本電気株式会社 | Process evaluation device, program, and method |
US8843889B2 (en) * | 2012-04-04 | 2014-09-23 | International Business Machines Corporation | Managing application template artifacts in a networked computing environment |
GB2503920A (en) | 2012-07-12 | 2014-01-15 | Ibm | Using a tag to identify the application context for a program object |
US9658945B2 (en) | 2012-07-31 | 2017-05-23 | Hewlett Packard Enterprise Development Lp | Constructing test-centric model of application |
SG11201500229YA (en) * | 2012-08-15 | 2015-03-30 | Sony Corp | Broadband delivery of personalization information for advanced tv services |
CN103164273A (en) * | 2012-09-06 | 2013-06-19 | 佳都新太科技股份有限公司 | Method for changing synchronous service call to asynchronous parallel call with self-expanding choking algorithm |
US20140229619A1 (en) * | 2013-02-11 | 2014-08-14 | Liferay, Inc. | Resilient Portals Through Sandboxing |
US9092292B2 (en) | 2013-05-16 | 2015-07-28 | Sap Se | Shared application binary storage |
US9965380B2 (en) | 2013-10-02 | 2018-05-08 | International Business Machines Corporation | Automated test runs in an integrated development environment system and method |
US9792203B2 (en) | 2013-11-14 | 2017-10-17 | Sap Se | Isolated testing of distributed development projects |
US9501556B2 (en) | 2014-03-24 | 2016-11-22 | Ca, Inc. | Importing metadata into metadata builder |
US10289430B2 (en) | 2014-03-24 | 2019-05-14 | Ca, Inc. | Interactive user interface for metadata builder |
US9934216B2 (en) * | 2014-03-24 | 2018-04-03 | Ca, Inc. | Schema validation for metadata builder |
US10289713B2 (en) | 2014-03-24 | 2019-05-14 | Ca, Inc. | Logical validation for metadata builder |
US10013430B2 (en) * | 2014-08-18 | 2018-07-03 | Vmware, Inc. | Remotely stored application files |
US10452372B2 (en) * | 2014-12-15 | 2019-10-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and deployment module for managing a container to be deployed on a software platform |
US20160224525A1 (en) * | 2015-02-04 | 2016-08-04 | International Business Machines Corporation | Modification of a portlet |
US10110683B2 (en) * | 2015-08-11 | 2018-10-23 | Unisys Corporation | Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions |
US9569335B1 (en) * | 2015-10-07 | 2017-02-14 | Sap Se | Exploiting software compiler outputs for release-independent remote code vulnerability analysis |
US9838505B2 (en) * | 2015-12-11 | 2017-12-05 | Sap Se | Application based context pooling |
US9870314B1 (en) * | 2016-12-12 | 2018-01-16 | Red Hat, Inc. | Update testing by build introspection |
US10346294B2 (en) * | 2017-04-11 | 2019-07-09 | Semmle Limited | Comparing software projects having been analyzed using different criteria |
US20190056930A1 (en) * | 2017-08-16 | 2019-02-21 | Singareddy Information Technologies, Inc. | System, method, and program product for implementing and co-locating java server faces servlet and sling server servlet in a single webserver |
US10771564B2 (en) * | 2017-11-22 | 2020-09-08 | International Business Machines Corporation | Sharing system managed HTTP client sessions across processes |
US11089079B2 (en) | 2017-11-22 | 2021-08-10 | International Business Machines Corporation | Asynchronously reading HTTP responses in separate process |
US10936468B1 (en) | 2020-05-01 | 2021-03-02 | Boomi, Inc. | System and method of automatic software release termination based on customized reporting static code analysis |
US11558452B2 (en) | 2021-05-20 | 2023-01-17 | Sap Se | Transparent multiple availability zones in a cloud platform |
US11907364B2 (en) | 2021-06-02 | 2024-02-20 | Sap Se | Managing incompliances identified at instances of cloud applications |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040039728A1 (en) * | 2002-08-23 | 2004-02-26 | Diring Software | Method and system for monitoring distributed systems |
US6745208B2 (en) * | 2001-05-31 | 2004-06-01 | International Business Machines Corporation | Method and apparatus for synchronizing an XML document with its object model |
US20040111702A1 (en) * | 2002-12-10 | 2004-06-10 | Chan Kin Ming | Method and apparatus for visual programming |
US20060143223A1 (en) * | 2004-12-27 | 2006-06-29 | Viktoriya Ivanova | System and method for common object/relational mapping |
US20070118551A1 (en) * | 2005-11-23 | 2007-05-24 | International Business Machines Corporation | Semantic business model management |
US7260819B2 (en) * | 2002-02-22 | 2007-08-21 | Bea Systems, Inc. | System and method for software application scoping |
US7302609B2 (en) * | 2003-03-12 | 2007-11-27 | Vladimir Matena | Method and apparatus for executing applications on a distributed computer system |
Family Cites Families (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6584507B1 (en) * | 1999-03-02 | 2003-06-24 | Cisco Technology, Inc. | Linking external applications to a network management system |
US6704806B1 (en) * | 1999-05-27 | 2004-03-09 | Computer Associates Think, Inc. | Method and device for monitoring the creation and destruction of child processes within an application executing in a computer system |
US6684387B1 (en) * | 1999-09-23 | 2004-01-27 | International Business Machines Corporation | Method and apparatus for verifying Enterprise Java Beans |
FR2800183B1 (en) * | 1999-10-26 | 2002-02-22 | Bull Sa | SYSTEM AND METHOD FOR MANAGING THE PERSISTENCE OF EJB COMPONENTS IN A DIRECTORY ACCESSED BY LDAP |
US7089584B1 (en) * | 2000-05-24 | 2006-08-08 | Sun Microsystems, Inc. | Security architecture for integration of enterprise information system with J2EE platform |
US6976061B1 (en) * | 2000-05-24 | 2005-12-13 | Sun Microsystems, Inc. | Resource adapter and XML descriptor for use in a client server environment utilizing an enterprise information system |
US6721777B1 (en) * | 2000-05-24 | 2004-04-13 | Sun Microsystems, Inc. | Modular and portable deployment of a resource adapter in an application server |
GB0017336D0 (en) * | 2000-07-15 | 2000-08-30 | Ibm | Preferable modes of software package deployment |
US7065568B2 (en) * | 2000-11-30 | 2006-06-20 | Microsoft Corporation | System and method for managing states and user context over stateless protocols |
US20020112201A1 (en) * | 2000-12-04 | 2002-08-15 | Flanagan Cormac Andrias | Method and apparatus for automatically inferring annotations for an extended static checker |
US7246351B2 (en) * | 2001-02-20 | 2007-07-17 | Jargon Software | System and method for deploying and implementing software applications over a distributed network |
US7502833B2 (en) * | 2001-05-11 | 2009-03-10 | International Business Machines Corporation | Method for dynamically integrating remote portlets into portals |
US7080119B2 (en) * | 2001-07-17 | 2006-07-18 | Bea Systems, Inc. | System and method for transaction processing with delegated commit feature |
US8473922B2 (en) * | 2001-09-19 | 2013-06-25 | Hewlett-Packard Development Company, L.P. | Runtime monitoring in component-based systems |
US6886041B2 (en) * | 2001-10-05 | 2005-04-26 | Bea Systems, Inc. | System for application server messaging with multiple dispatch pools |
EP1440367B1 (en) * | 2001-10-29 | 2014-11-26 | Accenture Global Services Limited | Connector for an application to an enterprise java bean (ejb) compliant application programming interface (api) |
AU2003211142A1 (en) * | 2002-02-21 | 2003-09-09 | Bea Systems, Inc. | System and method for dynamic activation of enterprise java beans |
US7769825B2 (en) * | 2002-02-22 | 2010-08-03 | Bea Systems, Inc. | System and method for web services Java API-based invocation |
US7856631B2 (en) * | 2002-05-08 | 2010-12-21 | Sap Aktiengesellschaft | Software delivery manager |
US7506342B2 (en) * | 2002-07-23 | 2009-03-17 | Bea Systems, Inc. | System and method for implementing J2EE connector architecture |
US7698434B2 (en) * | 2002-08-29 | 2010-04-13 | Bea Systems, Inc. | J2EE connector architecture |
US7395526B2 (en) * | 2002-12-23 | 2008-07-01 | Sun Microsystems, Inc. | Method and system for managing application server lifecycle |
US7444620B2 (en) * | 2003-02-28 | 2008-10-28 | Bea Systems, Inc. | Systems and methods for a common runtime container framework |
US7069553B2 (en) * | 2003-03-03 | 2006-06-27 | Computer Associates Think, Inc. | Universal deployment tool |
US20050009467A1 (en) * | 2003-07-11 | 2005-01-13 | Nuber Raymond Mark | System and method for satellite communication with a hybrid payload and DAMA support |
US7340726B1 (en) * | 2003-08-08 | 2008-03-04 | Coverity, Inc. | Systems and methods for performing static analysis on source code |
US20050091535A1 (en) * | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Application identity for software products |
CA2449534A1 (en) * | 2003-11-14 | 2005-05-14 | Ibm Canada Limited - Ibm Canada Limitee | On-demand software module deployment |
US7707572B2 (en) * | 2004-05-19 | 2010-04-27 | Bea Systems, Inc. | System and method for application container architecture |
US7343379B2 (en) * | 2004-05-21 | 2008-03-11 | Bea Systems, Inc. | System and method for controls |
US7627671B1 (en) * | 2004-05-22 | 2009-12-01 | ClearApp, Inc. | Monitoring and performance management of component-based applications |
US20050267918A1 (en) * | 2004-05-28 | 2005-12-01 | Gatev Andrei A | System and method for bundling deployment descriptor files within an enterprise archive for fast reliable resource setup at deployment time |
US7562342B2 (en) * | 2004-12-02 | 2009-07-14 | International Business Machines Corporation | Method and apparatus for incrementally processing program annotations |
US7536409B2 (en) * | 2005-02-15 | 2009-05-19 | International Business Machines Corporation | Having a single set of object relational mappings across different instances of the same schemas |
GB0507801D0 (en) * | 2005-04-19 | 2005-05-25 | Ibm | A system for processing a request to a portlet |
US8413134B2 (en) * | 2005-05-10 | 2013-04-02 | International Business Machines Corporation | Method, system and computer program for installing software products based on package introspection |
CN100580670C (en) * | 2005-06-03 | 2010-01-13 | 国际商业机器公司 | Method and computer system for content recovery due to user triggering |
US7711551B2 (en) * | 2005-06-13 | 2010-05-04 | Microsoft Corporation | Static analysis to identify defects in grammars |
US7840944B2 (en) * | 2005-06-30 | 2010-11-23 | Sap Ag | Analytical regression testing on a software build |
US7707552B2 (en) * | 2005-10-17 | 2010-04-27 | International Business Machines Corporation | Method and system for autonomically prioritizing software defects |
US8001477B2 (en) * | 2005-11-11 | 2011-08-16 | International Business Machines Corporation | Method for exchanging portlet configuration data |
US8209690B2 (en) * | 2006-01-19 | 2012-06-26 | University Of Maryland | System and method for thread handling in multithreaded parallel computing of nested threads |
US7853882B2 (en) * | 2006-04-11 | 2010-12-14 | International Business Machines Corporation | Portlets having different portlet specific enablement states |
US20070245013A1 (en) * | 2006-04-13 | 2007-10-18 | Fischer International Identity Llc | Cross domain provisioning methodology and apparatus |
US20070294371A1 (en) * | 2006-06-15 | 2007-12-20 | Petri John E | Method for determining input focus for web pages having aggregated content |
US8214811B2 (en) * | 2006-10-23 | 2012-07-03 | International Business Machines Corporation | Instantiating an interface or abstract class in application code |
US20080270974A1 (en) * | 2007-04-30 | 2008-10-30 | Krasimir Topchiyski | Enterprise JavaBeans Metadata Model |
-
2007
- 2007-12-28 US US11/966,849 patent/US20080270974A1/en not_active Abandoned
-
2008
- 2008-01-30 US US12/022,429 patent/US8261272B2/en active Active
- 2008-02-12 US US12/029,677 patent/US9065843B2/en active Active
- 2008-04-28 US US12/111,127 patent/US20080270986A1/en not_active Abandoned
- 2008-04-30 US US12/113,025 patent/US7962612B2/en active Active
- 2008-04-30 US US12/112,888 patent/US8510717B2/en active Active
- 2008-04-30 US US12/112,881 patent/US8082508B2/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6745208B2 (en) * | 2001-05-31 | 2004-06-01 | International Business Machines Corporation | Method and apparatus for synchronizing an XML document with its object model |
US7260819B2 (en) * | 2002-02-22 | 2007-08-21 | Bea Systems, Inc. | System and method for software application scoping |
US20040039728A1 (en) * | 2002-08-23 | 2004-02-26 | Diring Software | Method and system for monitoring distributed systems |
US20040111702A1 (en) * | 2002-12-10 | 2004-06-10 | Chan Kin Ming | Method and apparatus for visual programming |
US7302609B2 (en) * | 2003-03-12 | 2007-11-27 | Vladimir Matena | Method and apparatus for executing applications on a distributed computer system |
US20060143223A1 (en) * | 2004-12-27 | 2006-06-29 | Viktoriya Ivanova | System and method for common object/relational mapping |
US20070118551A1 (en) * | 2005-11-23 | 2007-05-24 | International Business Machines Corporation | Semantic business model management |
US7761478B2 (en) * | 2005-11-23 | 2010-07-20 | International Business Machines Corporation | Semantic business model management |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10346160B2 (en) | 2009-12-31 | 2019-07-09 | International Business Machines Corporation | Melding of mediation flow service component architecture (SCA) components |
US20120254834A1 (en) * | 2009-12-31 | 2012-10-04 | International Business Machines Corporation | Melding of mediation flow service component architecture (sca) components |
US20110161930A1 (en) * | 2009-12-31 | 2011-06-30 | International Business Machines Corporation | Melding of mediation flow service component architecture (sca) components |
US10817284B2 (en) | 2009-12-31 | 2020-10-27 | International Business Machines Corporation | Melding of mediation flow service component architecture (SCA) components |
US8640095B2 (en) * | 2009-12-31 | 2014-01-28 | International Business Machines Corporation | Melding of mediation flow service component architecture (SCA) components |
US8650540B2 (en) * | 2009-12-31 | 2014-02-11 | International Business Machines Corporation | Melding of mediation flow service component architecture (SCA) components |
US20110246294A1 (en) * | 2010-03-30 | 2011-10-06 | Beet, Inc. | System and method for content management and distribution |
US20120303469A1 (en) * | 2010-03-30 | 2012-11-29 | Diy Media, Inc. | System and method for content management and distribution |
US20130019224A1 (en) * | 2011-07-11 | 2013-01-17 | Honeywell International Inc. | Systems and methods for verifying model equivalence |
US9063672B2 (en) * | 2011-07-11 | 2015-06-23 | Honeywell International Inc. | Systems and methods for verifying model equivalence |
US8539439B2 (en) * | 2011-10-13 | 2013-09-17 | Microsoft Corporation | Asynchronous programming model mapping |
US8856745B2 (en) | 2012-08-01 | 2014-10-07 | Oracle International Corporation | System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard |
US10318276B2 (en) | 2012-11-26 | 2019-06-11 | International Business Machines Corporation | Optimized installation of received patches for application programs already running on computer systems |
US9916155B2 (en) * | 2015-12-01 | 2018-03-13 | International Business Machines Corporation | Projects browser for development environments |
US11100009B2 (en) | 2020-01-03 | 2021-08-24 | Bank Of America Corporation | Intelligent detection and ejection of unused application components |
US11314503B2 (en) * | 2020-06-08 | 2022-04-26 | Bank Of America Corporation | Software development documentation using machine learning |
US11768759B2 (en) | 2020-09-29 | 2023-09-26 | Tata Consultancy Services Limited | Method and system for automated testing of web service APIs |
US11693641B1 (en) * | 2022-03-22 | 2023-07-04 | Accenture Global Solutions Limited | Machine learning (ML) powered programming code transformations |
Also Published As
Publication number | Publication date |
---|---|
US20080270986A1 (en) | 2008-10-30 |
US8261272B2 (en) | 2012-09-04 |
US20080271044A1 (en) | 2008-10-30 |
US8082508B2 (en) | 2011-12-20 |
US9065843B2 (en) | 2015-06-23 |
US20080270992A1 (en) | 2008-10-30 |
US20080270617A1 (en) | 2008-10-30 |
US20080270600A1 (en) | 2008-10-30 |
US8510717B2 (en) | 2013-08-13 |
US7962612B2 (en) | 2011-06-14 |
US20080270924A1 (en) | 2008-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080270974A1 (en) | Enterprise JavaBeans Metadata Model | |
US7512932B2 (en) | Language and object model for describing MIDlets | |
US7565647B2 (en) | Markup compiler that outputs MIDlets | |
US8745584B2 (en) | Dependency injection by static code generation | |
Dig et al. | The role of refactorings in API evolution | |
KR101087439B1 (en) | Software componentization | |
Thai et al. | . NET framework essentials | |
US7299382B2 (en) | System and method for automatic test case generation | |
US9086931B2 (en) | System for translating diverse programming languages | |
US7752598B2 (en) | Generating executable objects implementing methods for an information model | |
US7305671B2 (en) | Conversion of an object model to a source file generation model | |
US8037471B2 (en) | Systems and methods for constructing relationship specifications from component interactions | |
US20030181196A1 (en) | Extensible framework for code generation from XML tags | |
US9965259B2 (en) | System for translating diverse programming languages | |
US8615750B1 (en) | Optimizing application compiling | |
US9424003B1 (en) | Schema-less system output object parser and code generator | |
US20030182626A1 (en) | On-demand creation of MIDlets | |
US20020099738A1 (en) | Automated web access for back-end enterprise systems | |
US7318215B1 (en) | Stored procedure interface language and tools | |
US8112388B2 (en) | Dependency processing of computer files | |
JPH10111802A (en) | Code generator in application field in distribution object system | |
US20090254881A1 (en) | Code generation techniques for administrative tasks | |
US20080052685A1 (en) | Apparatus and method for implementing components, and apparatus and method for verifying components | |
US20070234318A1 (en) | Method, system, and program product for generating source code for a function | |
WO2007050345A2 (en) | Method and system for testing enterprise applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAP AG, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TOPCHIYSKI, KRASIMIR;IVANOVA, ALEXANDRINA;SABEV, HRISTO;AND OTHERS;REEL/FRAME:020549/0944;SIGNING DATES FROM 20071218 TO 20080108 |
|
AS | Assignment |
Owner name: SAP SE, GERMANY Free format text: CHANGE OF NAME;ASSIGNOR:SAP AG;REEL/FRAME:033625/0223 Effective date: 20140707 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |